<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 811 to 825.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/googles-optical-character-recognition-software-now-works-with-all-south-asian-languages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/education-okfn-subhashish-panigrahi-september-25-2015-ocr-and-oer-update"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/software-freedom-pledge-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/transformaking-2015-international-summit-on-critical-and-transformative-making-yogyakarta"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/international-open-data-charter-comments-by-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-human-dna-profiling-bill-2015"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/blogs/googles-optical-character-recognition-software-now-works-with-all-south-asian-languages">
    <title> Google's Optical Character Recognition Software Now Works with All South Asian Languages </title>
    <link>https://cis-india.org/a2k/blogs/googles-optical-character-recognition-software-now-works-with-all-south-asian-languages</link>
    <description>
        &lt;b&gt;The Optical Character Recognition (OCR) software by Google now works for more than 248 world languages, including all the major South Asian languages, and it's easy to use and works with over 90 percent accuracy for most languages.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://globalvoices.org/2015/08/29/googles-optical-character-recognition-software-now-works-with-all-south-asian-languages/"&gt;Global Voices&lt;/a&gt; on August 29, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://support.google.com/drive/answer/176692" target="_blank"&gt;Optical Character Recognition&lt;/a&gt; (OCR) software by Google &lt;a href="http://gadgets.ndtv.com/apps/news/google-drives-ocr-capabilities-expanded-to-over-200-languages-690194"&gt;now works&lt;/a&gt; for more than 248 world languages, including all the major &lt;a href="https://en.wikipedia.org/wiki/Languages_of_South_Asia" target="_blank"&gt;South Asian languages&lt;/a&gt;, and it's easy to use and works with over 90 percent accuracy for most languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://en.wikipedia.org/wiki/Optical_character_recognition" target="_blank"&gt;OCR&lt;/a&gt; software  has been extremely beneficial for the study of language, helping to  extract text from images of virtually any printed text—and sometimes  even handwriting, which opens the door to old texts, manuscripts, and  more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://gadgets.ndtv.com/apps/news/google-drives-ocr-capabilities-expanded-to-over-200-languages-690194"&gt;Ketan Pratap&lt;/a&gt; at &lt;i&gt;NDTV Gadgets&lt;/i&gt; writes:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;Users can start using the OCR capabilities in Drive by  uploading scanned document in PDF or image form after which they can  right-click on the document in Drive to open with Google Docs. After  choosing the option, a document with the original image alongside  extracted text opens, which can be edited. Google notes that users will  not be required to specify the language of the document as the OCR in  Drive will automatically determine it. The OCR capability in Google  Drive is also available in Drive for Android.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;On Twitter, many users have welcomed and even celebrated this new feature from Google:&lt;/p&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;Optical Character Recognition &lt;a href="https://twitter.com/hashtag/OCR?src=hash"&gt;#OCR&lt;/a&gt; in Google Drive recongnizes many indic languages including &lt;a href="https://twitter.com/hashtag/Kannada?src=hash"&gt;#Kannada&lt;/a&gt; give it a try &lt;a href="http://t.co/99UkCJQ6gb"&gt;http://t.co/99UkCJQ6gb&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Omshivaprakash (@omshivaprakash) &lt;a href="https://twitter.com/omshivaprakash/status/637222750785011713"&gt;August 28, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/shylobisnett"&gt;@shylobisnett&lt;/a&gt; if you have access to a scanner, you can do OCR through google drive. works a bit faster.&lt;/p&gt;
&lt;p&gt;— Whet Moser (@whet) &lt;a href="https://twitter.com/whet/status/636922445971197952"&gt;August 27, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet" style="text-align: justify; "&gt;
&lt;p dir="ltr"&gt;Wow. Searching Google Drive for a keyword also  returns results for images containing that keyword in the image. Didn't  realise it did OCR.&lt;/p&gt;
&lt;p&gt;— Mark Osborne (@mosborne01) &lt;a href="https://twitter.com/mosborne01/status/636285805154078720"&gt;August 25, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Typically OCR software has difficulty reading the text on old  documents or pages with blemishes and ink marks, spitting out gibberish  instead of legible text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google's &lt;a href="https://support.google.com/drive/answer/176692" target="_blank"&gt;support page&lt;/a&gt; on this project shares additional details about character formatting,  like its ability to preserve bold and italicized fonts in the output  text:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;When processing your document, we attempt to preserve  basic text formatting such as bold and italic text, font size and type,  and line breaks. However, detecting these elements is difficult and we  may not always succeed. Other text formatting and structuring elements  such as bulleted and numbered lists, tables, text columns, and footnotes  or endnotes are likely to get lost.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;For some of the languages, like Malayalam and Tamil, the OCR works  with almost 100 percent accuracy, and includes support for formatting  things like like auto-cropping, separating text by discarding images,  and ignoring color backgrounds, explains Tamil user and Wikimedian  Ravishankar Ayyakkannu on &lt;a href="https://www.facebook.com/ravidreams/posts/10154278945453569" target="_blank"&gt;Facebook&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;[…] Google Tamil OCR works with 100% accuracy ! Keep  testing with various samples and comment here. Performance has been the  same for many other Indic languages too. […] A&lt;span&gt;&lt;span&gt;&lt;span class="UFICommentBody"&gt;&lt;span&gt;uto  crops, discards images and colored background. Recognizes different  layouts. I could find only 1 mistake in whole page. Testing latest  Vikatan – &lt;/span&gt;&lt;a dir="ltr" href="https://docs.google.com/document/d/1OXre4-phQOayE0wyGTttQq-eD3Djt_alsuhkmS8BeRI/edit?usp=sharing" rel="nofollow" target="_blank"&gt;https://docs.google.com/…/1OXre4…/edit..&lt;/a&gt; […]&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;(Bangla, Malayalam, Kannada, Odia, Tamil, and Telugu-language users  have commented in the same post with feedback after testing the updated  OCR software. For a few scripts, like Gurmukhi (used to write Punjabi),  it turns out that the output after OCR is quite poor, resulting largely  in gibberish, when testing a screenshot image from &lt;a href="http://pa.wikipedia.org/" target="_blank"&gt;Punjabi Wikipedia&lt;/a&gt;.)&lt;/p&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img alt="Issues with Gurmukhi script after OCR using Google's OCR" class="size-medium wp-image-537788" height="285" src="https://globalvoicesonline.org/wp-content/uploads/2015/08/Issues-with-Punjabi-400x285.jpg" width="400" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Issues with Gurmukhi script after OCR using Google's OCR. Screenshot from &lt;a href="http://pa.wikipedia.org/" target="_blank"&gt;Punjabi Wikipedia&lt;/a&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div class="alignleft wp-caption" id="attachment_537788" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;This is quite a large leap for the languages with lots of old texts  that are not yet digitized. Old and valuable texts in many languages  could now be digitized and shared over the internet using platforms like  &lt;a href="https://wikisource.org" target="_blank"&gt;Wikisource&lt;/a&gt; and could be preserved and made available for sharing knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google's OCR partly uses &lt;a href="https://en.wikipedia.org/wiki/Tesseract_%28software%29" target="_blank"&gt;Tesseract—&lt;/a&gt;an OCR engine released as freeware. Developed as a community project between 1995 and 2006 (and later taken over by &lt;a href="https://code.google.com/archive/p/tesseract-ocr/" target="_blank"&gt;Google&lt;/a&gt;),  Tesseract is considered to be one of the world's most accurate OCR  engines and works for over 60 languages. The source code is now hosted  at &lt;a href="https://github.com/tesseract-ocr" target="_blank"&gt;https://github.com/tesseract-ocr&lt;/a&gt;. Check &lt;a href="https://goo.gl/3X75iR" target="_blank"&gt;this link&lt;/a&gt; for the OCR outputs in various South Asian scripts.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/googles-optical-character-recognition-software-now-works-with-all-south-asian-languages'&gt;https://cis-india.org/a2k/blogs/googles-optical-character-recognition-software-now-works-with-all-south-asian-languages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-09-26T14:31:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar">
    <title>Open Governance and Privacy in a Post-Snowden World : Webinar</title>
    <link>https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar</link>
    <description>
        &lt;b&gt;On 10th September 2015, the OGP Support Unit, the Open Government Guide, and the World Bank held a webinar on “Open Governance and Privacy in a Post-Snowden World” presented by Carly Nyst, Independent consultant and former Legal Director of Privacy International and Javier Ruiz, Policy Director of Open Rights Group. This is a summary of the key issues that were discussed by the speakers and the participants.&lt;/b&gt;
        &lt;p&gt;See &lt;a href="https://events-na4.adobeconnect.com/content/connect/c1/833642795/en/events/event/private/877773861/1209689848/event_landing.html?sco-id=1253823513"&gt;Open Governance and Privacy in a Post-Snowden World&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Summary&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The webinar discussed how Government surveillance has become an important and key issue in the 21&lt;sup&gt;st&lt;/sup&gt; century, thanks to Edward Snowden. The main concern raised was with respect to what a democracy should look like in the present day. Should the states’ use of technology enable state surveillance or an open government? Typically, there is a balance that must be achieved between the privacy of an individual and the security of the state – particularly as the former is primarily about social rights and collective interest of citizens.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;At the international level, the right to privacy has been recognized as a basic human right and an enabler of other individual freedoms. This right encapsulates protection of personal data where citizens have the authority to choose whether to share or reveal their personal data or not. Due to technological advancement that has enabled collection, storage and sharing of personal data, the right to privacy and data protection frameworks have become of utmost importance and relevance with regard to open government efforts. Therefore, it is important for Governments to be transparent in handling sensitive data that they collect and use.&lt;/p&gt;
&lt;p class="Default" style="text-align: justify; "&gt;Many countries have also introduced laws to balance the right to privacy and right to information.  The role of the private sector and NGOs involved in enabling an open and transparent government must also be duly addressed at a national level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Key Questions:&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why should the government release information?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;There are multiple reasons for doing so including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the purposes of research and public policy (which relates to healthcare, social issues, economics, national statistics, census, etc.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency and accountability (politicians, registers, public expenses, subsidies, fraud, court records, education)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Public participation and public services (budgets, anti-corruption, engagement, and e-governance).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all these have certain risks and privacy implications:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Risk of identification of individual: Any individual whose information is released has the risk of identification, followed by issues like identity theft, discrimination, stigmatization or repression. Normally, the solution for this would be anonymization of the data; however, this is not an absolute solution. Privacy laws can generally cope with such risks, but with pseudonymous data it becomes difficult in preventing identification.&lt;/li&gt;
&lt;li&gt;Profiling of social categories which can lead to discrimination: In such a situation, policies and other legislations regulating the use of data and providing remedy for violations can help.&lt;/li&gt;
&lt;li&gt;Exploitation and unfair/unethical use of information: When understanding the potential exploitation of information it is useful to consider who is going to benefit from the release of information.  For example, in UK, with respect to release of Health Data, the main concern is that people and companies will benefit commercially from the information released, despite of the result potentially being improved drugs and treatment. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What are the Solutions?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The webinar also discussed potential solutions to the questions and challenges posed. For example, when &lt;a href="http://www.opengovguide.com/"&gt;commitments of Open Government Data Partnership&lt;/a&gt; are considered, privacy legislations must also be proposed. Further, key stakeholders must make commitments to take pro-active measures to reduce informational asymmetries between the state and citizens.  To reduce the risks, measures must be taken to publish what information the State has or what the Government knows about the citizens. For example, in UK, within the civil society network, it is being duly considered in the national plan that the government will publicize how it will share data and have a centralized view on the process of information handling and usage of the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Open Government Guide provides for Illustrative Commitments like enactment of data protection legislation, establishing programmes for awareness and assessment of their impact, giving citizens control of their personal information and the right to redress when that information is misused, etc. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue of surveillance and the role of privacy in an open government context was also discussed.  The need for creating a balance between the legitimate interest of national security and the privacy of individuals was emphasized. With the rise of digital technologies, many governmental measures pertaining to surveillance intervene in individual privacy. There are many forms of surveillance and this has serious privacy implications, especially in developing countries. For example:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Communications surveillance &lt;/li&gt;
&lt;li&gt;Visual surveillance &lt;/li&gt;
&lt;li&gt;Travel surveillance &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This raises the question: When is surveillance legitimate and when must it be allowed?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://en.necessaryandproportionate.org/"&gt;The International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt; acts as a soft law and tries to set out what a good surveillance system looks like by ensuring that governments are in compliance with international human rights law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In essence surveillance does not violate privacy, however, there must be a clear and foreseeable legal framework laying circumstances when the government has the power to collect data and when individuals might be able to foresee when they might be under surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, a competent judicial authority must be established to oversee surveillance and keep a check on executive power by placing restrictions on privacy invasions. The actions of the government must be proportionate and the benefits must not outweigh harm caused by surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Role of openness in a “mass surveillance” state &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance measures that are being undertaken by governments are increasingly secretive. The European court of Human Rights has held that Secret surveillance may undermine democracy under the cloak of protecting it. Hence, open government and openness will work towards protecting privacy and not undermining it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To balance the measure of government surveillance with privacy, there is a need to publish laws regulating such powers; publish transparency reports about surveillance, interception and access to communications data; reform legislations relating to surveillance by state agencies to ensure it complies with human rights and establish safeguards to ensure that new technologies used for surveillance and interception respect the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conclusion one can draw is that Privacy concerns have gained importance in today’s data driven world. The main question that needs to be answered is whether Government’s should adopt surveillance measures or adopt an Open Government?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering equal importance of national security and privacy of individuals, it is required that a balance must be crafted between the two. This could be possibly done by enacting foreseeable and clear laws outlining scope of surveillance by the Government on one hand, and informing citizens about such measures on the other. Establishment of a competent judicial authority to keep a check on Government actions is also suggested to work out the delicate balance between surveillance and privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar'&gt;https://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-04T11:09:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/education-okfn-subhashish-panigrahi-september-25-2015-ocr-and-oer-update">
    <title>OCR and OER – update</title>
    <link>https://cis-india.org/a2k/blogs/education-okfn-subhashish-panigrahi-september-25-2015-ocr-and-oer-update</link>
    <description>
        &lt;b&gt;We welcome this short posting from Subhashish Panigrahi which updates a 2014 posting of his on Indic Language Wikipedias as Open Educational Resources at http://education.okfn.org/indic-language-wikipedias-as-open-educational-resources/&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To read the blog post published by Open Education Working Group, see &lt;a class="external-link" href="http://education.okfn.org/ocr-and-oer-update/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Subhashish Panigrahi (&lt;a href="http://twitter.com/subhapa"&gt;@subhapa&lt;/a&gt;)  is an educator, author, blogger, Wikimedian, language activist and free  knowledge evangelist based in Bengaluru&amp;nbsp;(often called  Bangalore),&amp;nbsp;India. After working for a while at the Wikimedia  Foundation’s India Program he is currently at the &lt;a href="https://cis-india.org"&gt;Centre for Internet and Society&lt;/a&gt;‘s &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;Access To Knowledge program&lt;/a&gt;.  He works primarily in building partnership with universities, language  research and GLAM (Gallery, Library, Archive and Museums) organizations  for bringing more scholarly and encyclopedic content under free  licenses, designs outreach programs for South Asian language  Wikipedia/Wikimedia projects and communities. He wears many other hats:  Editor for Global Voices Odia, Community Moderator of Opensource.com,  and Ambassador for India in OpenGLAM Local. Subhashish is the author of a  piece “Rising Voices: Indigenous language Digital Activism” in the book  &lt;a href="http://meson.press/books/digital-activism-in-asia-reader" target="_blank"&gt;Digital Activism in Asia Reader&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Google’s OCR and its use by Wikimedians in South Asia&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Some time back on the &lt;a href="https://support.google.com/drive/answer/176692" target="_blank"&gt;OCR project support&lt;/a&gt; network,&amp;nbsp;Google had announced that the Google drive could be used for &lt;a href="https://support.google.com/drive/answer/176692" target="_blank"&gt;Optical Character Recognition&lt;/a&gt; (OCR). The software now works for over 248 world languages (including  all the major South Asian languages). Though the exact pattern  of&amp;nbsp;development of the software is not clear, some of the Wikimedians  reported that there is improvement over time in the recognition of their  native languages Malayalam and Tamil. The recent encounter has been  with a simple, easy to to use and robust software that can detect most  languages with over 90% accuracy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The OCR technology extracts text from images, scans of printed text,  and even handwriting to some extent, which means that the text can be  extracted pretty much from any old book, manuscript, or image. This  certainly brings hope to most Indian languages as there is a lot to  digitize. Most of the major Indian languages have plenty of  non-digitized literature and the existing OCR systems are not as good as  Google when so many languages are concerned as a whole.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Google’s OCR engine is probably using aspects&amp;nbsp;of &lt;a href="https://en.wikipedia.org/wiki/Tesseract_%28software%29" target="_blank"&gt;Tesseract&lt;/a&gt;, an OCR engine released as free software, or &lt;a href="https://en.wikipedia.org/wiki/OCRopus" target="_blank"&gt;OCRopus&lt;/a&gt;, a free document analysis and optical character recognition (OCR) system that is primarily used in &lt;a href="https://books.google.com/" target="_blank"&gt;Google Books&lt;/a&gt;. Developed as a community project during 1995-2006 and later &lt;a href="https://code.google.com/archive/p/tesseract-ocr/" target="_blank"&gt;taken over by Google&lt;/a&gt;, Tesseract is considered one of the most accurate OCR engines and works for over 60 languages. The source code is available &lt;a href="https://github.com/tesseract-ocr" target="_blank"&gt;on GitHub&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a href="https://support.google.com/drive/answer/176692" target="_blank"&gt;OCR project support page&lt;/a&gt; offers additional details on preserving character formatting for things like bold and italics after OCR in the output text.&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;When processing your document, we attempt to preserve  basic text formatting such as bold and italic text, font size and type,  and line breaks. However, detecting these elements is difficult and we  may not always succeed. Other text formatting and structuring elements  such as bulleted and numbered lists, tables, text columns, and footnotes  or endnotes are likely to get lost.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;The user-end interaction of the OCR software currently is  rather&amp;nbsp;simple. The user has to upload an image of the scan in any image  format (.jpg, .png, .gif, etc.) or PDF to the Google Drive. Upon  completion of the uploading, opening the file in Google Drive shows both  the image and the converted text in the same document.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;One of the most popular free and open digitization platforms, &lt;a href="https://wikisource.org/wiki/Main_Page" target="_blank"&gt;Wikisource&lt;/a&gt; currently  hosts hundreds or&amp;nbsp;thousands of free books which are either out of  copyright or under Creative Commons licenses (CC-by or CC-by-SA)  allowing users to digitize.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While&amp;nbsp;OCR works quite well for Latin based languages, many other  scripts do not get OCRed perfectly. So, the Wikisourcers (Wikisource  contributors) often have to type the text.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thus the&amp;nbsp;new Google OCR might be useful both for the Wikisource  community and many others who are in the mission of digitizing old text  and archiving them.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The image below shows&amp;nbsp;a screen from a&amp;nbsp;tutorial to convert text in the &lt;a title="Odia language" href="https://en.wikipedia.org/wiki/Odia_language" target="_blank"&gt;Odia language&lt;/a&gt; from a scanned image using Google’s OCR.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/education-okfn-subhashish-panigrahi-september-25-2015-ocr-and-oer-update'&gt;https://cis-india.org/a2k/blogs/education-okfn-subhashish-panigrahi-september-25-2015-ocr-and-oer-update&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Educational Resources</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-18T17:09:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/software-freedom-pledge-2015">
    <title>Software Freedom Pledge</title>
    <link>https://cis-india.org/openness/software-freedom-pledge-2015</link>
    <description>
        &lt;b&gt;On September 19, 2015, celebrated globally as Software Freedom Day, a number of enthusiasts got together and collectively took a pledge.&lt;/b&gt;
        &lt;br /&gt;

&lt;p&gt;We, who have gathered together for &lt;a href="http://softwarefreedomday.org/"&gt;Software Freedom Day 2015&lt;/a&gt;, believe that software freedom is both a matter of ethical principle as well as a matter of pragmatism, and is necessary for a democratic, open society.&lt;/p&gt;

&lt;p&gt;We believe that it is desirable that all people, but especially governments, use, contribute to, and spread open standards, free/libre/open source software, open APIs, openly-licensed content (including open data, open access, and open education resources), leading to a vibrant public domain, and ensure that all of the above are accessible for all, including persons with disabilities and other marginalised sections of society.&lt;/p&gt;

&lt;p&gt;Given that, we pledge to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;use and spread free software amongst our family, friends, and neighbours, both in person and virtually.&lt;/li&gt;
&lt;li&gt;demand that services we use in turn use open standards and open APIs, and thus be available for all using free/libre/open source software, without the payment of any royalties.&lt;/li&gt;
&lt;li&gt;raise the issue of software freedom with our democratic representatives, to seek that they in turn respect and promote these principles.&lt;/li&gt;
&lt;li&gt;as far as possible, making our own work openly available, and seek to convince our employers, publishers, producers, and other persons who might be in a position to restrict &lt;/li&gt;
&lt;li&gt;work against any laws, policies — corporate or governmental — or technical restrictions that seek to prevent people from full exercise of their rights, and which are contrary to the above principles.&lt;/li&gt;
&lt;/ul&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;p&gt;Signed by:&lt;/p&gt;

&lt;p&gt;Abhaya Agarwal &lt;br /&gt;
Ananth Subray &lt;br /&gt;
Asutosha Sarangi &lt;br /&gt;
Chirag Sarthi J &lt;br /&gt;
Prakash Hebballi &lt;br /&gt;
Pranesh Prakash &lt;br /&gt;
Ralph Andrade &lt;br /&gt;
Subhashish Panigrahi &lt;br /&gt;
Tito Dutta &lt;br /&gt;
Veethika Mishra&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/software-freedom-pledge-2015'&gt;https://cis-india.org/openness/software-freedom-pledge-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>FLOSS</dc:subject>
    
    
        <dc:subject>Open Content</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Technological Protection Measures</dc:subject>
    

   <dc:date>2015-09-25T12:26:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame">
    <title>Open sesame</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame</link>
    <description>
        &lt;b&gt;The government’s email is shockingly vulnerable.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/opinion/open-sesame/article7678142.ece"&gt;Hindu&lt;/a&gt; on September 22, 2015. CIS research on private email accounts is mentioned.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;As the Centre moves towards smart cities and a Digital  India, some critics have cited the country’s increased vulnerability to  cyber attacks. To be sure, cyber threat groups could disrupt our  infrastructure by taking control of many systems. Such attacks could be  quite damaging. Yes, they are rare today, but are much more likely to  arise in conjunction with traditional armed conflicts. Cyber criminal  groups target Indian organisations on a daily basis.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Almost  two years ago, the IT minister’s office triggered national outrage when  it used a public email service for official communication. There was  much hand-wringing about security practices in a ministry responsible  for setting the technology direction (secure email policy) for the  country. Then in December 2013, the Centre for Internet and Society  revealed that up to 90 per cent of Indian government officials used  private email accounts for professional purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A big deal&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Between  then and now, we’ve read about a new email policy and revelations of  several cyber attacks on government officials. And FireEye revealed a  decade-long cyber espionage operation by a group we call ‘APT30’, which  is likely to be sponsored by China. How did they break in? By sending  targeted ‘spear-phish’ emails with malware attached.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Email  doesn’t sound like a big deal. Most of us have been using it for over a  decade, and think we know how to use it right. But when you’re in a  position of authority with access to sensitive information, you  shouldn’t leave it to chance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Today, state-sponsored  attackers craft these spear-phishing emails after considerable  research. APT30 carefully researched their targets and crafted mails  which would appear extremely relevant, with interesting content. The  moment a victim would open an attachment, an exploit would secretly  install a backdoor. Through that backdoor, groups can compromise the  employee’s entire network and extricate sensitive data. Groups bent on  destruction can deploy malware to destroy the data. They could also take  control of systems managing infrastructure or industrial processes and  create havoc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Spear-phishing has an open rate of 70  per cent, while regular mass emails had an open rate of just 3 per cent.  Email is the front- door for today’s threat groups. That’s why  governments around the world are improving the security of their email  systems to fend off these spear-phishing threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public concerns&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;When  government employees use webmail for official business, they trade away  their security for convenience. The emails they receive are no longer  screened by cyber security solutions, which detect advanced targeted  email attacks before they reach the inbox. In addition, because people  typically retrieve their webmail in a browser, attackers have a larger  attack surface to exploit when carrying out their attacks. For example,  attackers can coax victims to click on a link to a website, which  delivers an exploit via Adobe Flash.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Webmail opens  the door to threats that would otherwise have been intercepted. When our  government employees use webmail for official business, they leave the  front door wide open to threats. One of the best steps we can take  towards improving our government’s cyber security defences is abandoning  public email services.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;The writer is a software architect at the cyber security firm FireEye&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame'&gt;https://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:31:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi">
    <title>Encryption policy would have affected emails, operating systems, WiFi</title>
    <link>https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi</link>
    <description>
        &lt;b&gt;Our email data would have to be stored. If we connect to a WiFi, that data would have to be stored, and that's plain ridiculous. There is a problem when the government tries to target citizens to ensure national security, said Pranesh Prakash, policy director at the Bangalore-based Centre for Internet and Society. &lt;/b&gt;
        &lt;p&gt;The article by Amrita Madhukalya was published in &lt;a class="external-link" href="http://www.dnaindia.com/india/report-encryption-policy-would-have-affected-emails-operating-systems-wifi-2127715"&gt;DNA&lt;/a&gt; on September 23, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The &lt;a href="http://www.dnaindia.com/topic/draft-national-policy"&gt;Draft National Policy&lt;/a&gt; on Encryption, withdrawn by the Department of Electronics and  Information Technology (DeiTY) after it created a furore on privacy  issues, would have had allowed the government access to any form of  digital data that required encryption. Not limited to just WhatsApp or  Viber data, it would have affected email services, WiFi, phone operating  systems, etc.&lt;/p&gt;
&lt;p&gt;"Our email data would have to be stored. If we connect to a WiFi,  that data would have to be stored, and that's plain ridiculous. There is  a problem when the government tries to target citizens to ensure  national security," said Pranesh Prakash, policy director at the  Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;The government, criticised heavily for the policy, withdrew it on  Tuesday afternoon. It said that a new policy will be brought in its  place.&lt;/p&gt;
&lt;p&gt;Nikhil Pahwa of internet watchdog Medianama said that data about  normal day-to-day activities would have to be stored if the policy was  implemented. "The policy would have affected everyday business to  consumer data.&lt;br /&gt; This would mean that if a doctor or lawyer had your data digitised,  they will be open to access, and would have to be kept for at least 90  days," said Pahwa.&lt;/p&gt;
&lt;p&gt;However, he added that a robust encryption is needed. "It is believed that companies like Google, &lt;a href="http://www.dnaindia.com/topic/facebook"&gt;Facebook&lt;/a&gt; allow the NSA to access user data in the US, putting our personal  security, and the national security largely, at risk," said Pahwa.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi'&gt;https://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:23:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us">
    <title>Open letter from CIS to PM Modi on Intellectual Property Rights issues on his Visit to US</title>
    <link>https://cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us</link>
    <description>
        &lt;b&gt;Centre for Internet and Society, through its Policy Director Mr. Pranesh Prakash and Programme Officer Nehaa Chaudhari has addressed an open letter to Prime Minister Narendra Modi on the intellectual property right issues concerning his visit to the United State of America in September, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Apoorva Mandhani was &lt;a class="external-link" href="http://www.livelaw.in/open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us/"&gt;published by LiveLaw&lt;/a&gt; on September 23, 2015. CIS Open Letter &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The letter makes a two-fold request: first&lt;i&gt;, &lt;/i&gt;that the Government of the USA be requested to ratify the Marrakesh Treaty for visually impaired persons and second,&lt;i&gt; &lt;/i&gt;that the Indian Government should not enter into any negotiations around the Trans-Pacific Partnership trade agreement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter relies on the statistics released by the &lt;a href="http://www.worldblindunion.org/English/our-work/our-priorities/Pages/right-2-read-campaign.aspx"&gt;World Blind Union&lt;/a&gt;,  according to which 90% of all published material is not accessible to  blind or print disabled people. The severity of the ‘book famine’, it  says, was highlighted by India in its Closing Statement at the  Diplomatic Conference convened to conclude the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India was the &lt;a href="http://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated"&gt;first country&lt;/a&gt; to ratify the Marrakesh Treaty in June, 2014. However, the Marrakesh  Treaty will come into effect only after 20 Member States have ratified  it or acceded to it. As per information available from the &lt;a href="http://www.wipo.int/treaties/en/ShowResults.jsp?lang=en&amp;amp;treaty_id=843"&gt;World Intellectual Property Organization&lt;/a&gt;,  only 9 countries have ratified or acceded to the treaty and USA is not  one of it. The letter therefore requests Mr. Modi to request USA ratify  the Marrakesh Treaty at the earliest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It says, &lt;i&gt;“The USA is home to some of  the largest publishers of both academic and other/leisure material  including Penguin Random House, Harper Collins, John Wiley &amp;amp; Sons,  the RELX Group, McGraw-Hill Education, Scholastic and Cengage Learning  to name a few. It accounts for a large volume of the world’s book and  other print material export. The active participation of the USA through  the ratification of the Marrakesh treaty is critical if the treaty is  to be truly effective.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to the Trans-Pacific  Partnership trade agreement, the letter communicates its concern  regarding the secrecy of negotiations as well as the content of the  chapter on intellectual property in the TPP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisions sought to be imposed through  the TPP mandate the inclusion of TRIPS plus provisions in national laws,  envisage possible extensions in term of protection on patents, restrict  copyright exceptions and limitations, extend copyright protection terms  and impose a higher liability on intermediaries. All these provisions,  it says, &lt;i&gt;“would be disastrous for an emerging economy such as  India’s, which is a heavy user of intellectual property and not a heavy  producer of the same.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Highlighting CIS’s concerns, the letter  requests that any engagement in TPP negotiations be preceded by national  consultations on the same, soliciting input from various stakeholders  with diverging interests, including academia, civil society, industry  associations, large Indian corporations, small and medium enterprises  and multi- national corporations, rights holders associations and other  interest groups.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us'&gt;https://cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-09-24T02:48:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015">
    <title>Open Letter to PM Modi on Intellectual Property Rights issues on His Visit to the United States of America in September, 2015</title>
    <link>https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015</link>
    <description>
        &lt;b&gt;This is an open letter by CIS to the Prime Minister, Shri Narendra Modi in light of his impending visit to the USA. This letter asks the Prime Minister to urge the USA to ratify the Marrakesh Treaty; and asks that India not be a party to TPP negotiations, in light of recent reports on a study encouraging India to join the TPP.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Shri Narendra Damodardas Modi&lt;br /&gt;Hon’ble Prime Minister of India&lt;br /&gt;152, South Block, Raisina Hill&lt;br /&gt;New Delhi-110011&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;22 September, 2015&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Dear Sir,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We write on behalf of the Centre for Internet and Society, India &lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt;, a Bangalore and New Delhi based not-for-profit organization engaging in research on among others, accessibility for persons with disabilities, intellectual property rights, openness and access to knowledge. Over the past fifteen months, we have welcomed and support certain initiatives of our government as being in line with some of our research interests, specifically, the "Make in India" and "Digital India" initiatives, and your vision of a digitally empowered India, as we have noted in an earlier open letter to you. &lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This letter is in light of your visit to the United States of America (“USA”) this month, to articulate a two-fold request:&lt;em&gt; first, &lt;/em&gt;that during the course of your visit you request the government of the USA to ratify the Marrakesh Treaty for visually impaired persons (“Marrakesh Treaty”); &lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt; and &lt;em&gt;second, &lt;/em&gt;that the Indian government not enter into any negotiations around the Trans-Pacific Partnership trade agreement (“the TPP”).&lt;/p&gt;
&lt;h3&gt;On the Marrakesh Treaty&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;According to figures by the World Blind Union, approximately 90% of all published material is not accessible to blind or print disabled people. &lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt; The severity of the ‘book famine’ experienced by the world’s estimated 300 million blind or otherwise print or visually disabled people (of which an estimated 63 million are in India) was highlighted by India in its Closing Statement at the Diplomatic Conference convened to conclude the Marrakesh Treaty. &lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt; India has historically been a strong advocate of the spirit of the Marrakesh Treaty, becoming the first country to ratify it in June, 2014. &lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; Amendments in 2012 to India’s copyright law predated the signature to the Marrakesh Treaty. These amendments created disability and works neutral exceptions to our copyright law, well beyond the mandate of the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The true realization of the promise of the Marrakesh Treaty however will remain a distant dream until the treaty comes into effect (three months) after 20 Member States have ratified it or acceded to it. &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt; According to information available from the World Intellectual Property Organization &lt;a name="_ftnref8" href="#_ftn8"&gt;[8]&lt;/a&gt;, this number is currently only 9, and the USA is not one of the countries to have done so. The USA is home &lt;a name="_ftnref9" href="#_ftn9"&gt;[9]&lt;/a&gt; to some of the largest publishers of both academic and other/leisure material including Penguin Random House, Harper Collins, John Wiley &amp;amp; Sons, the RELX Group, McGraw-Hill Education, Scholastic and Cengage Learning to name a few. It accounts for a large volume of the world’s book and other print material export. The active participation of the USA through the ratification of the Marrakesh treaty is critical if the treaty is to be truly effective.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;During your visit, we urge you request the government of the United States of America to ratify the Marrakesh Treaty at the earliest. This will bring us one important step closer to eradicating the book famine.&lt;/p&gt;
&lt;h3&gt;On the TPP&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;We are concerned after reports &lt;a name="_ftnref10" href="#_ftn10"&gt;[10]&lt;/a&gt; of a recent study authored by C Fred Bergsten that encourages India to join the TPP. On this front, we are in complete agreement with the reported statement of the Hon’ble Ambassador Shri Arun K. Singh, where he disagrees with some of the findings and analysis of this recent report. &lt;a name="_ftnref11" href="#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The TPP has come into severe criticism &lt;a name="_ftnref12" href="#_ftn12"&gt;[12]&lt;/a&gt; over the years &lt;a name="_ftnref13" href="#_ftn13"&gt;[13]&lt;/a&gt; from a vast multitude &lt;a name="_ftnref14" href="#_ftn14"&gt;[14]&lt;/a&gt; of sources &lt;a name="_ftnref15" href="#_ftn15"&gt;[15]&lt;/a&gt; (including a group of 30 law professors in 2012) &lt;a name="_ftnref16" href="#_ftn16"&gt;[16]&lt;/a&gt; across the various countries that are a party to the negotiations. Among others and most relevant to us as an organization is the criticism around the secrecy of negotiations &lt;a name="_ftnref17" href="#_ftn17"&gt;[17]&lt;/a&gt; as well as the content of the chapter on intellectual property in the TPP. It is our belief that eventually, India stands to lose as a result of the TPP &lt;a name="_ftnref18" href="#_ftn18"&gt;[18]&lt;/a&gt; with its possible adverse impact on our economy. &lt;a name="_ftnref19" href="#_ftn19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The rigid intellectual property protections (including criminal penalties for unintentional copying) &lt;a name="_ftnref20" href="#_ftn20"&gt;[20]&lt;/a&gt; sought to be enforced through the TPP would benefit only US pharmaceutical and entertainment industries. &lt;a name="_ftnref21" href="#_ftn21"&gt;[21]&lt;/a&gt; These provisions (among others) mandate the inclusion of TRIPS plus provisions in national laws, envisage possible extensions in term of protection on patents, restrict copyright exceptions and limitations, extend copyright protection terms and impose a higher liability on intermediaries; &lt;a name="_ftnref22" href="#_ftn22"&gt;[22]&lt;/a&gt;all of which would be disastrous for an emerging economy such as India’s, which is a heavy user of intellectual property and not a heavy producer of the same.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Historically, India has been a supporter of a transparent, multilateral decision making process, a commitment to which was also reiterated recently by the Hon’ble Minister of State for Commerce and Industry, Smt. Nirmala Sitharaman. &lt;a name="_ftnref23" href="#_ftn23"&gt;[23]&lt;/a&gt;India has also raised many of its concerns (on the secrecy of the negotiations as well as substantive provisions themselves) around the TPP and its close cousin, the Anti-Counterfeiting Trade Agreement (“ACTA”) in 2011 &lt;a name="_ftnref24" href="#_ftn24"&gt;[24]&lt;/a&gt; and 2012 &lt;a name="_ftnref25" href="#_ftn25"&gt;[25]&lt;/a&gt; at the World Trade Organization (“WTO”) TRIPS Council and on the ACTA in 2010, also at the WTO Trips Council. &lt;a name="_ftnref26" href="#_ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In light of the above, we strongly urge the Indian government to not engage in negotiations on the TPP. At a minimum, we would request that any engagement in TPP negotiations be preceded by national consultations on the same, soliciting input from various stakeholders with diverging interests, including academia, civil society, industry associations, large Indian corporations, small and medium enterprises and multi- national corporations, rights holders associations and other interest groups.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We thank you for the opportunity to present these views to you. We do hope that you will consider these suggestions favourably, in the interests of India’s economic and social development. We welcome any opportunity to assist you with any queries you may have with regard to these submissions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thank you.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Yours truly&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(For the Centre for Internet and Society, India)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Pranesh Prakash,&amp;nbsp; Policy Director&lt;br /&gt;Nehaa Chaudhari, Programme Officer&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Copies to:&lt;/p&gt;
&lt;ol style="text-align: justify;" type="1"&gt;
&lt;li&gt;Smt. Smriti Zubin Irani, Minister for Human Resource Development, Government of India.&lt;/li&gt;
&lt;li&gt;Prof. (Dr.) Ram Shankar Katheria, Minister of State for Human Resource Development (Higher Education), Government of India.&lt;/li&gt;
&lt;li&gt;Smt. Nirmala Sitharaman, Minister of State for Commerce and Industry, Government of India.&lt;/li&gt;
&lt;li&gt;Shri Vinay Sheel Oberoi, Secretary (Department of Higher Education), Ministry of Human Resources Development, Government of India, Government of India.&lt;/li&gt;
&lt;li&gt;Shri Amitabh Kant, Secretary (Department of Industrial Policy and Promotion), Ministry of Commerce and Industry, Government of India.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;br /&gt;&lt;br /&gt;(Edit - 25 September, 2015) - The following people have reached out to us in support of this letter and have expressed a desire to have their signatures placed on record as support. We wish to acknowledge the same.&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Prof. Dinesh Abrol - Convenor, National Working Group on Patent Laws and WTO&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Dr. B. Ekbal - President, Democratic Alliance for Knowledge Freedom, Kerala&lt;/li&gt;&lt;li&gt;T.C. James - President, NIPO&lt;/li&gt;&lt;li&gt;Dr. Suman Sahai - Chairperson, Gene Campaign&lt;/li&gt;&lt;li&gt;Dr. Biswajit Dhar - Professor, Centre for Economic Studies and Planning, School of Social Sciences, Jawaharlal Nehru University&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt;See generally &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt;Rohini Lakshane, Open Letter to Prime Minister Modi, available at &lt;a href="http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi&lt;/a&gt; (last accessed 22 September, 2015); Centre for Internet and Society/Rohini Lakshane, Digital India &amp;amp; Make in India : Form a patent pool of critical mobile technologies – CIS India, available at &lt;a href="http://www.medianama.com/2015/03/223-digital-india-make-in-india-form-a-patent-pool-of-critical-mobile-technologies-cis-india/" rel="noreferrer"&gt;http://www.medianama.com/2015/03/223-digital-india-make-in-india-form-a-patent-pool-of-critical-mobile-technologies-cis-india/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt;The Marrakesh Treaty to Facilitate Access to Published Works by Visually Impaired Persons and Persons with Print Disabilities adopted on June 27, 2013. Treaty text and other official documentation available at &lt;a href="http://www.wipo.int/treaties/en/ip/marrakesh/" rel="noreferrer"&gt;http://www.wipo.int/treaties/en/ip/marrakesh/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt;World Blind Union, Marrakesh Treaty – Right to Read Campaign, available at &lt;a href="http://www.worldblindunion.org/English/our-work/our-priorities/Pages/right-2-read-campaign.aspx" rel="noreferrer"&gt;http://www.worldblindunion.org/English/our-work/our-priorities/Pages/right-2-read-campaign.aspx&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt;Pranesh Prakash, India’s Closing Statement at Marrakesh on the Treaty for the Blind, available at &lt;a href="http://cis-india.org/a2k/blogs/india-closing-statement-marrakesh-treaty-for-the-blind"&gt;http://cis-india.org/a2k/blogs/india-closing-statement-marrakesh-treaty-for-the-blind&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt;Nehaa Chaudhari, India’s Ratification of the Marrakesh Treaty Celebrated; Accessible Books Consortium Launched, available at &lt;a href="http://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated"&gt;http://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt;Article 18 of the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt;World Intellectual Property Organization, WIPO Administered Treaties: Contracting Parties &amp;gt; Marrakesh VIP Treaty (Treaty not yet in force), available at &lt;a href="http://www.wipo.int/treaties/en/ShowResults.jsp?lang=en&amp;amp;treaty_id=843" rel="noreferrer"&gt;http://www.wipo.int/treaties/en/ShowResults.jsp?lang=en&amp;amp;treaty_id=843&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt;Publishers Weekly, The World’s 57 Largest Book Publishers, 2015, available at &lt;a href="http://www.publishersweekly.com/pw/by-topic/international/international-book-news/article/67224-the-world-s-57-largest-book-publishers-2015.html" rel="noreferrer"&gt;http://www.publishersweekly.com/pw/by-topic/international/international-book-news/article/67224-the-world-s-57-largest-book-publishers-2015.html&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt;S Rajagopalan, US Report Pushes India to Join the Trans-Pacific Partnership, available at &lt;a href="http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html" rel="noreferrer"&gt;http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html&lt;/a&gt; (last accessed 22 September, 2015); Indo-Asian News Service on NDTV, India Can Boost Exports by $500 Billion with Trade Liberalization: Study, available at &lt;a href="http://www.ndtv.com/india-news/india-can-boost-exports-by-500-billion-with-trade-liberalization-study-1218887" rel="noreferrer"&gt;http://www.ndtv.com/india-news/india-can-boost-exports-by-500-billion-with-trade-liberalization-study-1218887&lt;/a&gt; (last accessed 22 September, 2015); Raghavendra M., India can boost exports by $500 billion with trade liberalization: study, available at &lt;a href="http://www.americanbazaaronline.com/2015/09/18/india-can-boost-exports-by-500-billion-with-trade-liberalization-study/" rel="noreferrer"&gt;http://www.americanbazaaronline.com/2015/09/18/india-can-boost-exports-by-500-billion-with-trade-liberalization-study/&lt;/a&gt; (last accessed 22 September, 2015); Press Trust of India in the Business Standard, India can boost exports by USD 500 bn by joining the TPP: report, available at &lt;a href="http://www.business-standard.com/article/pti-stories/india-can-boost-exports-by-usd-500-bn-by-joining-tpp-report-115091701149_1.html" rel="noreferrer"&gt;http://www.business-standard.com/article/pti-stories/india-can-boost-exports-by-usd-500-bn-by-joining-tpp-report-115091701149_1.html&lt;/a&gt; (last accessed 22 September, 2015); Seema Sirohi, India must expand its trade before it gets left behind in the race, available at &lt;a href="http://blogs.economictimes.indiatimes.com/letterfromwashington/india-must-expand-its-trade-before-it-gets-left-behind-in-the-race/" rel="noreferrer"&gt;http://blogs.economictimes.indiatimes.com/letterfromwashington/india-must-expand-its-trade-before-it-gets-left-behind-in-the-race/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt;S Rajagopalan, US Report Pushes India to Join the Trans-Pacific Partnership, available at &lt;a href="http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html" rel="noreferrer"&gt;http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html&lt;/a&gt; (last accessed 22 September, 2015)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt;Natasha Lennard, Noam Chomsky: Trans-Pacific Partnership is a “neoliberal assault”, available at &lt;a href="http://www.salon.com/2014/01/13/chomsky_tpp_is_a_neoliberal_assault/" rel="noreferrer"&gt;http://www.salon.com/2014/01/13/chomsky_tpp_is_a_neoliberal_assault/&lt;/a&gt; (last accessed 22 September, 2015); Zach Carter and Ryan Grim, Noam Chomsky: Obama Trade Deal a ‘Neoliberal Assault’ to ‘Further Corporate Domination’, available at &lt;a href="http://www.huffingtonpost.com/2014/01/13/noam-chomsky-obama-trans-pacific-partnership_n_4577495.html?ir=India&amp;amp;adsSiteOverride=in" rel="noreferrer"&gt;http://www.huffingtonpost.com/2014/01/13/noam-chomsky-obama-trans-pacific-partnership_n_4577495.html?ir=India&amp;amp;adsSiteOverride=in&lt;/a&gt; (last accessed 22 September, 2015); Sean Flynn;, Margot E Kaminski, Brook K Baker and Jimmy H Koo., "Public Interest Analysis of the US TPP Proposal for an IP Chapter" (2011). PIJIP Research Paper Series. Paper 21. &lt;a href="http://digitalcommons.wcl.american.edu/research/21" rel="noreferrer"&gt;http://digitalcommons.wcl.american.edu/research/21&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt;BBC News, TPP: What is it and why does it matter?, available at &lt;a href="http://www.bbc.com/news/business-21782080" rel="noreferrer"&gt;http://www.bbc.com/news/business-21782080&lt;/a&gt; (last accessed 22 September, 2015);&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt;For a compilation on writing on the TPP &lt;em&gt;see&lt;/em&gt; James Love, Trans-Pacific Partnership (TPP also known as the TPPA), available at &lt;a href="http://keionline.org/tpp" rel="noreferrer"&gt;http://keionline.org/tpp&lt;/a&gt; (last accessed 22 September, 2015); &lt;em&gt;see also &lt;/em&gt;American University Program on Information Justice and Intellectual Property, Trans-Pacific Partnership, available at &lt;a href="http://infojustice.org/tpp" rel="noreferrer"&gt;http://infojustice.org/tpp&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt;Zach Carter, Alan Grayson on Trans-Pacific Partnership: Obama Secrecy Hides ‘Assault on Democratic Government’, available at &lt;a href="http://www.huffingtonpost.com/2013/06/18/alan-grayson-trans-pacific-partnership_n_3456167.html?ir=India&amp;amp;adsSiteOverride=in" rel="noreferrer"&gt;http://www.huffingtonpost.com/2013/06/18/alan-grayson-trans-pacific-partnership_n_3456167.html?ir=India&amp;amp;adsSiteOverride=in&lt;/a&gt; (last accessed 22 September, 2015); James Love, KEI analysis of Wikileaks leak of TPP IPR text, from August 30, 2013, available at &lt;a href="http://keionline.org/node/1825" rel="noreferrer"&gt;http://keionline.org/node/1825&lt;/a&gt; (last accessed 22 September, 2015); Ian Verrender, The TPP has the potential for real harm, available at &lt;a href="http://www.abc.net.au/news/2015-03-16/verrender-the-tpp-has-the-potential-for-real-harm/6321538" rel="noreferrer"&gt;http://www.abc.net.au/news/2015-03-16/verrender-the-tpp-has-the-potential-for-real-harm/6321538&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt;Sean Flynn, Law Professors Call for Trans-Pacific Partnership (TPP) Transparency, available at &lt;a href="http://infojustice.org/archives/21137" rel="noreferrer"&gt;http://infojustice.org/archives/21137&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt;Sachie Mizohata, "The Trans-Pacific Partnership and Its Critics: An introduction and a petition," The Asia-Pacific Journal, Vol. 11, Issue 36, No. 3, available at &lt;a href="http://japanfocus.org/-Sachie-MIZOHATA/3996/article.html" rel="noreferrer"&gt;http://japanfocus.org/-Sachie-MIZOHATA/3996/article.html&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt;Vijay Rajamohan, Trans-Pacific Partnership – Should India Join this Mega Trade Deal?, available at &lt;a href="http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/" rel="noreferrer"&gt;http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt;Sylvia Mishra, How will the Trans-Pacific Partnership affect India?, available at &lt;a href="http://www.observerindia.com/cms/sites/orfonline/modules/analysis/AnalysisDetail.html?cmaid=85684&amp;amp;mmacmaid=85685" rel="noreferrer"&gt;http://www.observerindia.com/cms/sites/orfonline/modules/analysis/AnalysisDetail.html?cmaid=85684&amp;amp;mmacmaid=85685&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt;Gabrielle Chan, Trans-Pacific Partnership: a guide to the most contentious issues, available at &lt;a href="http://www.theguardian.com/world/2013/dec/10/trans-pacific-partnership-a-guide-to-the-most-contentious-issues" rel="noreferrer"&gt;http://www.theguardian.com/world/2013/dec/10/trans-pacific-partnership-a-guide-to-the-most-contentious-issues&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt;James Love, New leak of TPP consolidated text on intellectual property provides details of pandering to drug companies and publishers, available at &lt;a href="http://www.keionline.org/node/2108" rel="noreferrer"&gt;http://www.keionline.org/node/2108&lt;/a&gt; (last accessed 22 September, 2015); Vijay Rajamohan, Trans-Pacific Partnership – Should India Join this Mega Trade Deal?, available at &lt;a href="http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/" rel="noreferrer"&gt;http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/&lt;/a&gt; (last accessed 22 September, 2015) referencing Paul Krugman.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt;William New, Leaked TPP Draft Reveals Extreme Rights Holder Position Of US, Japan, Outraged Observers Say, available at &lt;a href="http://www.ip-watch.org/2014/10/17/leaked-tpp-draft-reveals-extreme-rights-holder-position-of-us-japan-outraged-observers-say/" rel="noreferrer"&gt;http://www.ip-watch.org/2014/10/17/leaked-tpp-draft-reveals-extreme-rights-holder-position-of-us-japan-outraged-observers-say/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt;Lalit K Jha, India not being left out of global trade pacts: Minister, available at &lt;a href="http://www.thestatesman.com/news/business/india-not-being-left-out-of-global-trade-pacts-minister/91679.html" rel="noreferrer"&gt;http://www.thestatesman.com/news/business/india-not-being-left-out-of-global-trade-pacts-minister/91679.html&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt;Thirukumaran Balasubramaniam, WTO TRIPS Council: India raises concerns on ACTA and TPPA on discussion of “Trends in the Enforcement of IPRs”, available at &lt;a href="https://donttradeourlivesaway.wordpress.com/2011/10/29/wto-trips-council-india-raises-concerns-on-acta-and-tppa-on-discussion-of-trends-in-the-enforcement-of-iprs/" rel="noreferrer"&gt;https://donttradeourlivesaway.wordpress.com/2011/10/29/wto-trips-council-india-raises-concerns-on-acta-and-tppa-on-discussion-of-trends-in-the-enforcement-of-iprs/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt;Thirukumaran Balasubramaniam, 28 Feb 2012: Intervention delivered by India at WTO TRIPS Council on IP Enforcement Trends noting concerns with ACTA and TPPA, available at &lt;a href="http://keionline.org/node/1376" rel="noreferrer"&gt;http://keionline.org/node/1376&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt;Kanaga Raja, ACTA comes in for criticism at the TRIPS council, available at &lt;a href="http://www.twn.my/title2/wto.info/2010/twninfo100606.htm" rel="noreferrer"&gt;http://www.twn.my/title2/wto.info/2010/twninfo100606.htm&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015'&gt;https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pranesh Prakash and Nehaa Chaudhari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-09-25T06:43:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash">
    <title>India encryption policy draft faces backlash</title>
    <link>https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash</link>
    <description>
        &lt;b&gt;The department of information technology is facing a backlash from industry experts, Internet watchers and netizens on its draft of the National Encryption Policy that it recently made public.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was published in &lt;a class="external-link" href="http://www.livemint.com/Industry/3KK1XWztlnFyR10dffTWMM/India-encryption-policy-draft-faces-backlash.html"&gt;Livemint&lt;/a&gt; on September 22, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While the draft policy aims to enable a secure environment for both information and transactions in cyberspace for individuals, businesses and government, experts are concerned over privacy and outdated standards prescribed in the policy, among other things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy puts the onus to produce encrypted information when demanded by government agencies on Indian citizens as well as on all the online service providers including instant messaging and e-commerce services that use encryption technology (to convert plain information to an unreadable format).&lt;br /&gt;&lt;br /&gt;The department put the policy online late last week and it came on the radar of industry watchers and experts over the weekend. The policy is open for comments from the public till 16 October.&lt;br /&gt;&lt;br /&gt;The policy, in its current form, is poorly drafted and the measures listed in it make Indian information systems vulnerable to cyber attacks, experts say.&lt;br /&gt;&lt;br /&gt;For instance, the policy has mandated the use of specific standards and algorithms for encryption.&lt;br /&gt;&lt;br /&gt;Encryption can be compared to the process of translating information in one language into a foreign language.&lt;br /&gt;&lt;br /&gt;“Specifying certain algorithms to be used for encryption, and restricting the key sizes is same as saying that you are only allowed to communicate using a language from a given set of government-specified languages and no other language can be used,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;However, the ones mentioned in the draft policy are outdated and unsafe to use, experts say. Another thing that weakens the security considerably is the req-uirement for businesses and citizens to keep the information (that was encrypted and sent over) for 90 days, in case law en-forcement agencies demand it. But that also means that for those 90 days, cyber criminals, too, can access it, warn experts.&lt;br /&gt;&lt;br /&gt;Another big gap in the policy is that it leaves out “sensitive departments/agencies of the government designated for performing sensitive and strategic roles”, said Prakash.&lt;br /&gt;&lt;br /&gt;“When the policy states its mission to be the enhancing of confidentiality of information and of security of critical networks by laying out information security best practices, how does it make any sense to keep sensitive or strategic government department and agencies outside its purview?” he asked. “After all, these are the organizations that most need to be kept secure to enhance national cybersecurity.”&lt;br /&gt;&lt;br /&gt;The draft is also ambiguous on which online services—be it shopping online or accessing email—people can use (in compliance with the law) and which online service providers will have to be registered with the government.&lt;br /&gt;&lt;br /&gt;The policy states that “service providers located within and outside India, using encryption technology for providing any type of services in India, must enter into an agreement with the government for providing such services in India”. Users can only use the services that are registered with the government.&lt;br /&gt;&lt;br /&gt;“This is the first time when users are actually being told what are the things they can and cannot do,” said Prakash.&lt;br /&gt;&lt;br /&gt;“The government must take note that the knowledge and expertise of common citizens may be inadequate to understand the nuances of encryption,” said cyber law expert Na Vijayashankar on his blog. “For example, if a citizen uses a service available on the Internet which uses, say, a higher level of encryption than what is appro-ved, then this policy may make him liable for the violation.”&lt;br /&gt;&lt;br /&gt;The problem is enhanced because all online services use some encryption technology. This means that practically all online activity will fall under this new policy.&lt;br /&gt;&lt;br /&gt;For instance, companies like Apple or Microsoft use encryption technologies at various levels of their operating systems; e-commerce services like Flipkart, Amazon and Snapdeal; web browsers like Mozilla Firefox and Google Chrome and mail services like Gmail, Yahoo and Rediff may be required to register with the government. The only way they may escape this requirement is if there is an exemption for products that are in use at a large scale. Network security service providers like Cisco Inc. will also need to comply. (Cisco declined to respond to a query.) Snapdeal said it is still examining the draft policy, while Amazon, Google, Microsoft did not reply to emails sent by Mint. Yahoo said its spokesperson was unavailable.&lt;br /&gt;&lt;br /&gt;One clause that is drawing a lot of ire from industry veterans and technology enthusiasts requires individual users and businesses to store all information that was sent in an encrypted form for 90 days from the date of transaction. The users would also be required to reproduce the plain text and the encrypted text, if demanded by law enforcement agencies.&lt;br /&gt;&lt;br /&gt;The draft policy also overlooks the privacy concerns of citizens and businesses. “It is clearly a violation of freedom of speech. A large part of the policy states how the government can interfere with users, like, by demanding their private messages. The policy is anti-privacy law,” said Prakash. “Privacy and security go hand in hand. So, as this policy weakens the security of the information, it puts the privacy at greater risk.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash'&gt;https://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-22T01:59:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp">
    <title>Peering behind the veil of ICANN’s DIDP (I)</title>
    <link>https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp</link>
    <description>
        &lt;b&gt;One of the key elements of the process of enhancing democracy and furthering transparency in any institution which holds power is open access to information for all the stakeholders. This is critical to ensure that there is accountability for the actions of those in charge of a body which utilises public funds and carries out functions in the public interest. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As the body which “&lt;i&gt;...coordinates the Internet Assigned Numbers Authority (IANA) functions, which are key technical services critical to the continued operations of the Internet's underlying address book, the Domain Name System (DNS)&lt;/i&gt;”&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the centrality of ICANN in regulating the Internet (a public good if there ever was one) makes it vital that ICANN’s decision-making processes, financial flows, and operations are open to public scrutiny. ICANN itself echoes the same belief, and upholds “...&lt;i&gt;a proven commitment to accountability and transparency in all of its practices&lt;/i&gt;”&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which is captured in their By-Laws and &lt;a href="https://www.icann.org/resources/pages/affirmation-of-commitments-2009-09-30-en"&gt;Affirmation of Commitments&lt;/a&gt;. In furtherance of this, ICANN has created its own &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;Documentary Information Disclosure Policy&lt;/a&gt;, where it promises to “...&lt;i&gt;ensure that information contained in &lt;b&gt;documents concerning ICANN's operational activities&lt;/b&gt;, and within ICANN's possession, custody, or control, is &lt;b&gt;made available to the public &lt;/b&gt;unless there is a compelling reason for confidentiality.&lt;/i&gt;”&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has a vast array of documents that are already in the public domain, listed &lt;a href="https://www.icann.org/resources/pages/didp-2012-02-25-en"&gt;here&lt;/a&gt;. These include annual reports, budgets, registry reports, speeches, operating plans, correspondence, etc. However, their Documentary Information Disclosure Policy falls short of meeting international standards for information disclosure. In this piece, I have focused on an examination of their defined conditions for non-disclosure of information, which seem to undercut the entire process of transparency that the DIDP process aims towards upholding. The obvious comparison that comes to mind is with the right to information laws that governments the world over have enacted in furtherance of democracy. While ICANN cannot be equated to a democratically elected government, it nonetheless does exercise sufficient regulatory power of the functioning of the Internet for it to owe a similar degree of information to all the stakeholders in the internet community. In this piece, I have made an examination of ICANN’s conditions for non-disclosure, and compared it to the analogous exclusions in India’s Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ICANN’ꜱ Defined Conditions for Non-Disclosure versus Exclusions in Indian Law :&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN, in its DIDP policy identifies a lengthy list of conditions as being sufficient grounds for non-disclosure of information. One of the most important indicators of a strong transparency law is said to be &lt;b&gt;&lt;i&gt;minimum exclusions&lt;/i&gt;&lt;/b&gt;.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, as seen from the table below, ICANN’s exclusions are extensive and vast, and this has been a barrier in the way of free flow of information. An analysis of their responses to various DIDP requests (available &lt;a href="https://www.icann.org/resources/pages/governance/transparency-en"&gt;here&lt;/a&gt;) shows that the conditions for non-disclosure have been invoked in over 50 of the 85 requests responded to (as of 11.09.2015); i.e., over two-thirds of the requests that ICANN receives are subjected to the non-disclosure policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, an analysis of India’s Right to Information Act, considered to be among the better drafted transparency laws of the world, reveals a much narrower list of exclusions that come in the way of a citizen obtaining any kind of information sought. The table below compares the two lists:&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;No.&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;ICANN&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Analysis&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information provided by or to a government or international organization&lt;/b&gt; which was to be kept confidential or would materially affect ICANN’s equation with the concerned body.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, disclosure of which would prejudicially affect the &lt;b&gt;sovereignty and integrity of India&lt;/b&gt;, the security, "strategic, scientific or economic" interests of the State, relation with foreign State or lead to incitement of an offense&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/ information &lt;b&gt;received in confidence from foreign government&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The threshold for both the bodies is fairly similar for this exclusion.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internal (staff/Board) information &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of ICANN's deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cabinet papers including records of deliberations&lt;/b&gt; of the Council of Ministers, Secretaries and other officers, provided that such decisions the reasons thereof, and the material on the basis of which the decisions were taken &lt;b&gt;shall be made public after the decision has been taken&lt;/b&gt;, and the matter is complete, or over (unless subject to these exemptions)&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The Indian law is far more transparent as it ultimately allows for the records of internal deliberation to be made public after the decision is taken.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information related to the &lt;b&gt;deliberative and decision-making process between ICANN, its constituents, and/or other entities with which ICANN cooperates &lt;/b&gt;that, if disclosed, would or would be likely to compromise the integrity of the deliberative and decision-making process&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is an additional restriction that ICANN introduces in addition to the one above, which in itself is quite broad.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Records relating to an individual's personal information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which relates to &lt;b&gt;personal information &lt;/b&gt;the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual (but it is also provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied by this exemption);&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Again, the Indian law contains a proviso for information with “&lt;i&gt;relationship to any public activity or interest&lt;/i&gt;”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Proceedings of internal appeal mechanisms and investigations.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which has been &lt;b&gt;expressly forbidden to be published by any court of law &lt;/b&gt;or tribunal or the disclosure of which may constitute contempt of court;&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;While ICANN prohibits the disclosure of all proceedings, in India, the exemption is only to the limited extent of information that the court prohibits from being made public.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information provided to ICANN by a party that, if disclosed, would or would be likely to &lt;b&gt;materially prejudice the commercial interests, financial interests, and/or competitive position &lt;/b&gt;of such party or was provided to ICANN pursuant to a nondisclosure agreement or nondisclosure provision within an agreement.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the &lt;b&gt;disclosure of which would harm the competitive position of a third party&lt;/b&gt;, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Confidential business information &lt;/b&gt;and/or internal policies and procedures.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;No similar provision in Indian Law. This is encapsulated in the abovementioned provision&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information that, if disclosed, would or would be likely to &lt;b&gt;endanger the life, health, or safety &lt;/b&gt;of any individual or materially prejudice the administration of justice.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would &lt;b&gt;endanger the life or physical safety of any person &lt;/b&gt;or identify the source of information or assistance given in confidence for law enforcement or security purposes;&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar for both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information subject to any kind of privilege&lt;/b&gt;, which might prejudice any investigation&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information, the disclosure of which would cause a &lt;b&gt;breach of privilege of Parliament &lt;/b&gt;or the State Legislature&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;/Information which would &lt;b&gt;impede the process of investigation or apprehension or prosecution of offenders&lt;/b&gt;;&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both lists.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Drafts of all correspondence, reports, documents, agreements, contracts, emails, or any other forms of communication.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This exclusion is not present in Indian law, and it is extremely broadly worded, coming in the way of full transparency.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information that relates in any way to the &lt;b&gt;security and stability of the Internet&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;This is perhaps necessary to ICANN’s role as the IANA Functions Operator. However, given the large public interest in this matter, there should be some proviso to make information in this regard available to the public as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Trade secrets and commercial and financial information &lt;/b&gt;not publicly disclosed by ICANN.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information including &lt;b&gt;commercial confidence, trade secrets &lt;/b&gt;or intellectual property, the disclosure of which would harm the competitive position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;This is fairly similar in both cases.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information requests:&lt;/p&gt;
&lt;p&gt;● which are not reasonable;&lt;/p&gt;
&lt;p&gt;● which are excessive or overly burdensome&lt;/p&gt;
&lt;p&gt;● complying with which is not feasible&lt;/p&gt;
&lt;p&gt;● which are made with an abusive or vexatious purpose or by a vexatious or querulous individual.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in Indian Law&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Of all the DIDP exclusions, this is the one which is most loosely worded. The terms in this clause are not clearly defined, and it can effectively be used to deflect any request sought from ICANN because of its extreme subjectivity. What amounts to ‘reasonable’? Whom is the process going to ‘burden’? What lens does ICANN use to define a ‘vexatious’ purpose? Where do we look for answers?&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information available to a person in his &lt;b&gt;fiduciary relationship&lt;/b&gt;, unless the competent authority is satisfied that the larger public interest warrants the disclosure of such information;&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No similar provision in ICANN’s DIDP.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Information which providing access to would involve an &lt;b&gt;infringement of copyright subsisting in a person other than the State&lt;/b&gt;.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;-&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Thus, the net cast by the DIDP exclusions policy is more vast than even than that of a democratic state’s transparency law. Clearly, the exclusions above have effectively allowed ICANN to dodge answers to most of the requests floating its way. One can only hope that ICANN realises that these exclusions come in the way of the transparency that they are so committed to, and does away with this unreasonably wide range on the road to the IANA Transition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/welcome-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/accountability&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/resources/pages/didp-2012-02-25-en&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Shekhar Singh, &lt;i&gt;India: Grassroot Initiatives&lt;/i&gt; in Tʜᴇ Rɪɢʜᴛ ᴛᴏ Kɴᴏᴡ 19, 44 (Ann Florin ed., 2007)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In a proviso, ICANN’s DIDP states that all these exemptions can be overridden if the larger public interest is higher. However, this has not yet been reflected in their responses to any DIDP requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(a), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(f), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(i), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(j), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(b), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(g), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(c), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(h), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section (1)(d), Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8(1)(e), Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 9, Right to Information Act, 2005.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp'&gt;https://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-10-15T02:42:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore">
    <title>Sustainable Smart Cities India Conference 2015, Bangalore</title>
    <link>https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore</link>
    <description>
        &lt;b&gt;Nispana Innovative Platforms organized a Sustainable Smart Cities India Conference 2015, in Bangalore on 3rd and 4th September, 2015. The event saw participation from people across various sectors including Government Representatives from Ministries, Municipalities, Regulatory Authorities, as well as Project Management Companies, Engineers, Architects, Consultants, Handpicked Technology Solution Providers and Researchers. National and International experts and stakeholders were also present to discuss the opportunities and challenges in creating smart and responsible cities as well as citizens, and creating a roadmap for converting the smart cities vision into a reality that is best suited for India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The objective of the conference was to discuss the meaning of a smart city, the promises made, the challenges and possible solutions for implementation of ideas by transforming Indian Cities towards a Sustainable and Smart Future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Smart Cities Mission&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering the pace of rapid urbanization in India, it has been estimated that the urban population would rise by more than 400 million people by the year 2050&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and would contribute nearly 75% to India’s GDP by the year 2030. It has been realized that to foster such growth, well planned cities are of utmost importance. For this, the Indian government has come up with a Smart Cities initiative to drive economic growth and improve the quality of life of people by enabling local area development and harnessing technology, especially technology that leads to Smart outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, the Mission aims to cover 100 cities across the countries (which have been shortlisted on the basis of a Smart Cities Proposal prepared by every city) and its duration will be five years (FY2015-16 to FY2019-20). The Mission may be continued thereafter in the light of an evaluation to be done by the Ministry of Urban Development (MoUD) and incorporating the learnings into the Mission. This initiative aims to focus on area-based development in the form of redevelopment, or developing new areas (Greenfield) to accommodate the growing urban population and ensure comprehensive planning to improve quality of life, create employment and enhance incomes for all, especially the poor and the disadvantaged.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is being done?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Smart City Mission will be operated as a Centrally Sponsored Scheme (CSS) and the Central Government proposes to give financial support to the Mission to the extent of Rs. 48,000 crores over five years i.e. on an average Rs. 100 crore per city per year.The Government has come up with 2 missions:Atal Mission for Rejuvenation and Urban Transformation (AMRUT) and Smart Cities Mission for the purpose of achieving urban transformation.The vision is to preserve India’s traditional architecture, culture &amp;amp; ethnicity while implementing modern technology to make cities livable, use resources in a sustainable manner and create an inclusive environment. Additionally, Foreign Direct Investment regulations have been relaxed to invite foreign capital and help into the Smart City Mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is a Smart City?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the two-day conference, various speakers shared a common sentiment that the Governments’ mission does not clearly define what encompasses the idea of a Smart City. There is no universally accepted definition of a Smart City and its conceptualization varies from city to city and country to country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A global consensus on the idea of a smart city is a city which is livable, sustainable and inclusive. Hence, it would mean a city which has mobility, healthcare, smart infrastructure, smart people, traffic maintenance, efficient waste resource management, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, there is a global debate at United Nations regarding developmental goals. One of these goals is gender equality which is very important for the smart city initiative. According to this, a smart city must be such where the women have a life free from violence, must be made to participate and are economically empowered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Promises&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promises of the Smart City mission include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Make a sustainable future, reduce carbon footprint, adequate water supply, assured electricity supply, proper sanitation, including solid waste management, efficient urban mobility and public transport, affordable housing especially for the poor, robust IT connectivity and digitalization, good governance, especially e-Governance and citizen participation, sustainable environment, safety and security of citizens, particularly women, children and the elderly, and health and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vision is to preserve country’s traditional architecture, culture &amp;amp; ethnicity while implementing modern technology. It was discussed how the Smart City Mission is currently attracting global investment, will create new job opportunities, improve communications and infrastructure, decrease pollution and ultimately improve the quality of living.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Challenges&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main challenges for implementation of these objectives are with respect to housing, dealing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;with existing cities and adopting the idea of retro-fitting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, another challenge is that of eradicating urban poverty, controlling environment degradation, formulating a fool-proof plan, proper waste management mechanism, widening roads but not at the cost of pedestrians and cyclist and building cities which are inclusive and cater to the needs of women, children and disabled people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the top challenges will include devising a fool-proof plan to develop smart cities, meaningful public-private partnership, increasing the renewable energy, water supply, effective waste management, traffic management, meeting power demand, urban mobility, ICT connectivity, e-governance, etc., while preparing for new threats that can emerge with implementation of these new technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What needs to be done?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following suggestions were made by the experts to successfully implement government’s vision of creating successful smart cities in India.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Focus on the 4 P’s: Public-Private-People Partnership since people very much form a part of the cities.&lt;/li&gt;
&lt;li&gt;Integration of organizations, government bodies, and the citizens. The Government can opt for a sentiment analysis.&lt;/li&gt;
&lt;li&gt;Active participation by state governments since Land is a state subject under the Constitution. There must be a detailed framework to monitor the progress and the responsibilities must be clearly demarcated.&lt;/li&gt;
&lt;li&gt;Detailed plans, policies and guidelines&lt;/li&gt;
&lt;li&gt;Strengthen big data initiatives&lt;/li&gt;
&lt;li&gt;Resource maximization&lt;/li&gt;
&lt;li&gt;Make citizens smart by informing them and creating awareness&lt;/li&gt;
&lt;li&gt;Need for competent people to run the projects&lt;/li&gt;
&lt;li&gt;Visionary leadership&lt;/li&gt;
&lt;li&gt;Create flexible and shared spaces for community development.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National/International case studies&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several national and international case studies were discussed to list down practical challenges to enable the selected Indian cities learn from their mistakes or include successful schemes in their planning from its inception.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Amsterdam Smart City: It is said to be a global village which was transformed into a smart city by involving the people. They took views of the citizens to make the plan a success. The role of big data and open data was highly emphasized. Also, it was suggested that there must be alignment with respect to responsibilities with the central, state and district government to avoid overlap of functions. The city adopted smart grid integration to make intelligent infrastructure and subsidized initiatives to make the city livable.&lt;/li&gt;
&lt;li&gt;GIFT City, Gujarat: This is an ICT based sustainable city which is a Greenfield development. It is strategically situated. One of the major features of the City is a utility tunnel for providing repair services and the top of the tunnel can be utilized as a walking/jogging track. The city has smart fire safety measures, wide roads to control traffic, smart regulations.&lt;/li&gt;
&lt;li&gt;TEL AVIV Smart City, Israel: It has been named as the Mediterranean cool city with young and free spirted people. The city comprises of creative class with 3 T’s-talent, technology and tolerance. The city welcomes startups and focuses on G2G, G2C and C2C initiatives by adopting technologically equipped initiatives for effective governance and community building programmes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event saw participation from people across various sectors including Government Representatives of Ministries, Municipalities, Regulatory Authorities, as well as Project Management Companies, Engineers, Architects, Consultants, Handpicked Technology Solution Providers and Researchers.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Foundation for Futuristic Cities:&lt;/b&gt; The conference saw participation from this think tank based out of Hyderabad working on establishing vibrant smart cities for a vibrant India. They are currently working on developing a "Smart City Protocol" for Indian cities collaborating with Technology, Government and Corporate partners by making a framework for Smart Cities, Big Data and predictive analytics for safe cities, City Sentiment Analysis, Situation Awareness Tools and mobile Apps for better city life by way of Hackathons and Devthons.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Centre for SMART cities, Bangalore:&lt;/b&gt; This is a research organization which aims to address the challenge of collaborating and sharing knowledge, resources and best practices that exist both in the private sector and governments/municipal bodies in a usable form and format.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;BDP – India (Studio Leader – Urbanism): &lt;/b&gt;The Organization is based out of Delhi and is involved in providing services relating to master planning, urbanism, design and landscape design. The team includes interior designers, engineers, urbanists, sustainability experts, lighting designers, etc. The vision is to help build and create high quality, effective and inspiring built spaces.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UN Women: &lt;/b&gt;It is a United Nations Organization working on gender equality, women empowerment and elimination of discrimination. They strive to strengthen rights of women by working with women, men, feminists, women’s networks, governments, local authorities and civil society to create national strategies to advance gender equality in line with national and international priorities. The UN negotiated the 2030 Agenda for Sustainable Development in August 2015 (which would be formally adopted by World leaders in September 2015) and it feature 17 sustainable development goals, one of them being achievement of gender equality and empowerment of all women and girls.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Elematic India Pvt. Ltd.: &lt;/b&gt;The Company is a leading supplier of precast concrete technology worldwide providing smart solutions for concrete buildings to help enable build smart cities with safe infrastructure.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event discussed in great detail about what a smart city would look like in a country like India where every city has different demographics, needs and resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Participants had a mutual understanding that a city is not gauged by its length and width, but by the broadness of its vision and height of its dream. The initiative of creating smart cities would echo across the country as a whole and would not be limited to the urban centers. Hence, the plan must be inclusive in implementation and right from its inception, the people and their needs must be given due consideration to make it a success. The issue of the road ahead was resonating in the minds of many, as to how would this exactly happen. Hence, the first step, as was suggested by the experts, was to involve the citizens by primarily informing them, taking their suggestions and planning the project for every city accordingly. While focusing on cities which would be made better by human ingenuity and technology, along with building mechanism for housing, commerce, transportation and utilities, it must not be forgotten that technology is timely, but culture is timeless. The cities must not be faceless and community space must be built with walkable spaces with smart utilization of limited resources. Also, it must be ensured that the cities do not cater to the needs of the elite and skilled population, but also the less privileged community. Adequate urban mapping must be done to ensure placement for community facilities, such as restrooms, trash bins, and information kiosks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A story shared from personal experience by an expert Architect in building Green infrastructure was highly instrumental in setting the tone of the conference and is bound to stay with many of the participants. The son of the Architect, a small child from Baroda left his father speechless when he questioned him about the absence of butterflies from the Big City of Mumbai since he used to play with butterflies every morning in his hometown in Gujarat. The incident was genuinely thought provoking and left every architect, government representative and engineer thinking that before they step on to build a smart cities with technologically equipped infrastructure and utilities - can we, as a country, come together and ensure to build a smart city with butterflies? Can we pay equal attention to sustainability, environment and requirements of a community in the smart city that is envisioned by the Government to make the city livable and inclusive?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions that I, as a participant, am left with are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Building a Greenfield project is comparatively easier than upgrading the existing cities into Smart ones, which requires planning and optimum utilization of resources. The role of local bodies needs to be strengthened which would primarily require skilled workforce, beginning from planning to execution. Therefore, what must be done to make the current cities “Smarter” and how encourage and fund ordinary citizens to redefine and prioritize local needs?&lt;/li&gt;
&lt;li&gt;The conference touched upon the need for a well-planned policy framework to govern the smart cities; however, what was missing was a discussion on the kind of policies that would be required for every city to ensure governance and monitor the operations. Chalking out well thought of urban policies is the first step towards implementation of the Project and requires deliberation in this regard.&lt;/li&gt;
&lt;li&gt;The Government plans seem to cater to the needs of a handful of sections of the society and must focus on safety of women, chalk out initiatives to build basic utilities like public toilets, plan the infrastructure keeping in mind the disabled individuals, etc. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This is of paramount importance since it is necessary for the Government to consider who would be the potential inhabitants of these future smart cities and what would be their particular needs. Before the cities are made better by use of technology, there is a requirement of more toilets as a basic utility. Thus, instead of focusing on technological advancement as the sole foundation to make lives of the people easy, the cities must have provision of utilities which are accessible to develop livable smart cities. Hence, what measures would the Government and other bodies involved in the plan take to ensure that the urban enclaves would not oversee the under privileged class?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue that went unnoticed during the two-day event was pertaining to the Fundamental Rights of individuals within the city. For example, the right of privacy, right to access services and utilities, right to security, etc. These basic rights must be given due recognition by the smart city developers to uphold the spirit of these internationally accepted Human Rights principles. Therefore, it is important to ask how these future cities are going to address the rights of its people in the cities?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from plans of working on waste management, another important factor that must not be overlooked is sustainability in terms of maximization of the available resources in the best possible ways and techniques to be adopted to stop the fast paced degradation of the environment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference could suggest more solutions to adopt measures like rain water harvesting, better sewage management in the existing cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, the importance of big data in building the smart cities was emphasized by many experts. However, the question of regulation of data being generated and released was not talked about. Use of big data analytics involves massive streaming of data which required regulation and control over its use and generation to ensure such information is not misutilised in any way. In such a scenario, how would these cities regulate and govern big data techniques to make the infrastructure and utilities technologically efficient on one hand, but also to use the large data sets in a monitored fashion on the other?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An answer to these crucial issues and questions would have brought about a lot of clarity in minds of all the officials, planners and the potential residents of the Smart Cities in India.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; 2014 revision of the World Urbanization Prospects, United Nations, Department of Economic and Social Affairs, July 2014, Available at : http://www.un.org/en/development/desa/publications/2014-revision-world-urbanization-prospects.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Smart Cities, Mission Statement and Guidelines, Ministry of Urban Development, Government of India, June 2015, Available at : http://smartcities.gov.in/writereaddata/SmartCityGuidelines.pdf&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore'&gt;https://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-21T02:24:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/transformaking-2015-international-summit-on-critical-and-transformative-making-yogyakarta">
    <title>Transformaking 2015 : International Summit on Critical and Transformative Making, Yogyakarta</title>
    <link>https://cis-india.org/a2k/blogs/transformaking-2015-international-summit-on-critical-and-transformative-making-yogyakarta</link>
    <description>
        &lt;b&gt;Transformaking 2015 brought together makers, scientist, hackers, bricoleurs, researchers, artists, designers and other interdisciplinary practitioners from across the globe in a series of Residency and Research Program, Symposium, Exhibition, Fair, and Satellite Projects. It was held from August 10 to September 20, 2015. Transformaking 2015 was organized by HONF Foundation &amp; CATEC (Culture Arts Technoloy Empowerment Community) in partnership with the Centre for Internet &amp; Society (CIS), Common Room, Crosslab, and Nicelab. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;More information on the event can be accessed on this &lt;a class="external-link" href="http://transformaking.org/opencall"&gt;website&lt;/a&gt;. I presented a talk &lt;a class="external-link" href="http://transformaking.org/program/symposium"&gt;Open Spectrum and Open Science – Policy and Future Opportunities&lt;/a&gt;. I was also a speaker in a panel &lt;a class="external-link" href="http://transformaking.org/program/symposium"&gt;Encouraging Innovations through Communication and Open Source Culture&lt;/a&gt; with fellow panelists Tom Rowlands (Future Everything), Gustav Hariman (Common Room, Bandung) and Colette Tron (Alphabetville) and moderated by Sachet Manandhar of Karkhana Labs, Nepal.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;As with many other societies, Indonesia has a distinct maker culture that goes back centuries. The rise of collective movements in the network culture following the digital revolution — with associated terms such as DIY (do-it-yourself), DIWO (do-it-with-others), open source, maker and hacker spaces — only reinvigorates and replicates traditional production practices at the grass-roots level: verbal passing of knowledge both vertical (between generations) and horizontal (among community members), voluntary communal division of labour, inventiveness to overcome limited infrastructures, driven by the need to find solutions for a better life rather than personal profit. Our forefathers were the genuine makers.&lt;br /&gt;&lt;br /&gt;The burgeoning maker movement has been receiving growing recognition as it demonstrates great potential to address concerns and provide innovative solutions at a local, citizen level where established socio-political systems fail. As the makers and associated maker culture come into contact with large industries, they run the risk of being reduced into commodities. A critical attitude is essential to keep the maker movement genuine with lessons from our forefathers in mind and catalyze practices create solutions and sustainable implementations in a process of transformative making — or Transformaking.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The summit aimed to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Create a forum for all stakeholders to discuss views, practices, questions, and issues in the realm of critical making movement&lt;/li&gt;
&lt;li&gt;Exhibit projects that create tangible, transformative solutions at a citizen level&lt;/li&gt;
&lt;li&gt;Produce usable tools and define dissemination strategies for catalyzing local transformations globally&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;The following is a note on the Conception of the Summit:&lt;/p&gt;
&lt;h3&gt;Conception of the Summit - Why 'Transformaking'?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The act of Making is not new, and has been an ongoing process over centuries of mankind, ever since the invention of Neanderthal tools, the wheel, cultural artifacts and practices, to the modern day space shuttle and modes of communication. Today’s networked knowledge society is catalyzing and affecting the process of Making and knowledge production in interesting ways by mediating the co-located and instantaneous access, dissemination and sharing of information amongst people across vast distances.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/Transformaking.png/@@images/c5d0eac0-51db-4a42-a514-286e593c1c32.png" alt="null" class="image-inline" title="Transformaking" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The notion of free labour accompanying a rising participation in the  gift economy of network culture, is loaded with words such as &lt;em&gt;DIY, Open Knowledge, Open Data, Free &amp;amp; Open Source&lt;/em&gt;,  that blurs the lines of distinction between production &amp;amp;  consumption, labour &amp;amp; cultural expression, and has transcended both  the puritan new left movement on one hand and the neo-liberal free  market ideology on the other.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There has evidently been a marked shift in the site of labour — from  the factory to society, that autonomists have called ‘the social  factory’ which challenges the very notion of capitalism from the inside.  In Pierre Lévy’s own words — A shift from the Cartesian model of  thought based on the singular idea of cogito (I think) to a collective  or plural cogitamus (we think), seems to be the unifying goal  represented by various models and spaces for thinking such as  Makercultures, Think Tanks, Maker Movements, Maker Labs &amp;amp;  Hacker/Maker Spaces.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This change in the process of making and  knowledge production is further underlined by contextualized maker  activity geared towards fueling change, thereby challenging traditional  modes of production and consumption, creative and cultural expression,  structures of societal organization, ownership, access, intellectual  property and copyright regimes, models of participative democracy,  citizen science and civic governance in a process of Transformative  Making or –what we call – ‘&lt;strong&gt;Transformaking&lt;/strong&gt;’.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Transformaking: The International Summit on Critical and Transformative Making 2015&lt;/strong&gt; shall bring together makers, hackers, bricoleurs, educators, researchers, theorists, artists and designers to:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;A Symposium to self reflect, debate and put forth views with regards to  their respective practices and dissect various complexities and  questions that surround the areas of Critical and Transformative Making.&lt;/li&gt;
&lt;li&gt;An Exhibition on Critical Making featuring completed and contextualized projects and productions.&lt;/li&gt;
&lt;li&gt;Produce a tangible outcome, of the first International Summit, that  focuses on collating diverse views, practices and usable tools along  with strategizing modes of academic publication and dissemination for  furthering meaningful local transformations, globally.&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/transformaking-2015-international-summit-on-critical-and-transformative-making-yogyakarta'&gt;https://cis-india.org/a2k/blogs/transformaking-2015-international-summit-on-critical-and-transformative-making-yogyakarta&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sharath</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-18T18:00:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/international-open-data-charter-comments-by-cis">
    <title>International Open Data Charter: Comments by CIS</title>
    <link>https://cis-india.org/openness/international-open-data-charter-comments-by-cis</link>
    <description>
        &lt;b&gt;The second meeting of Stewards of the International Open Data Charter is in progress in Santiago, Chile, where the revisions made to the Charter based on the comments received during the public consultation period that ended on July 31, 2015, are being re-discussed and finalised by the Stewards. Here we are sharing the comments submitted by us on the first public draft of the Charter published during the International Open Data Conference in Ottawa, Canada, in May 2015. The comments include those submitted by Sumandro and Sharath Chandra Ram.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The draft International Open Data Charter and all the submitted comments can be accessed here: &lt;a href="http://opendatacharter.net/charter/" target="_blank"&gt;http://opendatacharter.net/charter/&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Comments on the Public Draft&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Note: The text below contains excerpts from the public draft of the Charter, followed by submitted comments in &lt;strong&gt;bold&lt;/strong&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;1) The world is witnessing the growth of a global movement facilitated by technology and digital media and fuelled by information – one that contains enormous potential to create more accountable, efficient, responsive, and effective governments and businesses, and to spur economic growth.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The word ‘movement’ can perhaps be replaced by ‘transformation.’ ‘Movement’ tends to suggest some kind of unity of purpose or objective, which is not perhaps what is meant here. Also, is it possible to add ‘transparent’ to ‘accountable, efficient, responsive, and effective’?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Open data sit at the heart of this global movement.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Perhaps ‘transformation’ and not ‘movement’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2) Building a more democratic, just, and prosperous society requires transparent, accountable governments that engage regularly and meaningfully with citizens. Accordingly, there is an ongoing effort to enable collaboration around key social challenges, to provide effective oversight of government activities, to support economic development through innovation, and to develop effective, efficient public policies and programmes.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Perhaps insert ‘sustainable’ before ‘economic development’. In the second sentence, none of the action phrases (‘enable collaboration’ and ‘effective oversight’ and ‘innovation’ and ‘develop effective, efficient’) are speaking about either democracy or justice. The focus seems to be completely on effectiveness. Phrases like ‘transparent’, ‘accountable’, and ‘participatory’ should be introduced here.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Open data is essential to meeting these challenges.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The above point clarifies why ‘data is essential’ but not why ‘open data is essential’. The connection between democracy and justice on one hand, and open data on the other is not yet articulated clearly.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3) Effective access to data allows individuals and organisations to develop new insights and innovations that can generate social and economic benefits to improve the lives of people around the world, and help to improve the flow of information within and between countries. While governments collect a wide range of data, they do not always share these data in ways that are easily discoverable, useable, or understandable by the public.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Along with allowing ‘insights’ and ‘innovations’ to develop, can it also be highlighted that open data make decisions and processes transparent?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is a missed opportunity.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I agree with above comments that it is perhaps better to articulate this not as ‘missed opportunity’ but to highlight this as the very ‘opportunity’ that the open data agenda is interested in capturing.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;4) Today, many people expect to be able to access high quality information and services, including government data, when and how they want. Others see the opportunity presented by government data as one which can provide innovative policy solutions and support economic and social benefits for all members of society. We have arrived at a point at which people can use open data to generate value, insights, ideas, and services to create a better world for all.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This point may also mention that some people are interested in using government data to open up government decisions and processes and make them transparent, which is a necessary condition for making the government accountable.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;6) Providing access to government data can drive sustainable and inclusive growth by empowering citizens, the media, civil society, and the private sector to identify gaps, and work toward better outcomes for public services in areas such as health, education, public safety, environmental protection, and governance. Open data can do this by:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Perhaps ‘democratic participation’ can be added after ‘sustainable and inclusive growth’. That is: ‘Providing access to government data can drive sustainable and inclusive growth, and democratic participation, by empowering citizens…’&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;7) Open government data can be used in innovative ways to create useful tools and products that help to navigate modern life more easily. Used in this way, open data are a catalyst for innovation in the private sector, supporting the creation of new markets, businesses, and jobs. These benefits can multiply as more private sector and civil society organisations adopt open data practices modelled by government and share their own data with the public.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The incentive for private sector and CSOs to open up data is not clear. Overall benefit may rise with them opening up data, but how does a private company / CSO benefit by opening up its data?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;8) We, the adherents to the International Open Data Charter, agree that open data are an under-used resource with huge potential to encourage the building of stronger, more interconnected societies that better meet the needs of our citizens and allow innovation and prosperity to flourish.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Along with ‘stronger’ and ‘more interconnected’, please mention ‘more transparent’ and ‘more democratic’. Also it is not clear what is meant by ‘stronger’. ‘[B]etter meet the needs of our citizens’ does not necessarily suggest a more democratic or just society, but a more effective welfare distribution system. Please add ‘… and empower the citizens to ensure accountability of the government.’&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;9) We therefore agree to follow a set of principles that will be the foundation for access to, and the release and use of, open government data. These principles are:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Open Data by Default;&lt;/li&gt;
&lt;li&gt;Quality and Quantity;&lt;/li&gt;
&lt;li&gt;Accessible and Useable by All;&lt;/li&gt;
&lt;li&gt;Engagement and Empowerment of Citizens;&lt;/li&gt;
&lt;li&gt;Collaboration for Development and Innovation&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Does it makes sense to remove the ‘Quantity and Quality’ point and merging it with ‘Accessible and Usable by All’? Data quantity and quality issues, along with those related to publication of data, can all logically follow under the topic of data access and use. For example, highly aggregated data published once a year without documentation is not really usable data.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;10) We will develop an action plan in support of the implementation of the Charter and its Technical Annexes, and will update and renew the action plan at a minimum of every two years. We agree to commit the necessary resources to work within our political and legal frameworks to implement these principles in accordance with the technical best practices and timeframes set out in our action plan.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We (at CIS) strongly feel that the Charter should also prescribe that along with the national Action Plan, Open Data Citizen’s Charters are created for various levels and verticals of the government. This will clarify data publication responsibilities and targets at ministerial and sub-national (including city) governmental levels, and will allow for much more effective monitoring (national and international) of the Action Plan implementation process.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;‘[A]t a minimum of every two years’ reads a bit unclear. Does it mean that the Action Plan should be renewed only after two years and not before, or that the Action Plan should be renewed every two years or before that?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;11) We recognise that free access to, and the subsequent use of, government data are of significant value to society and the economy, and that government data should, therefore, be open by default.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Along with clarifying the scope of ‘government data,’ the idea of ‘open’ in the context of data needs a clear definition as an independent point. The document is getting into ‘open by default’ without clarifying what is ‘open’, including both necessary and sufficient conditions.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;12) We acknowledge the need to promote the global development and adoption of tools and policies for the creation, use, and exchange of open data and information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I agree with Mike Linksvayer. This is a great opportunity for the Charter to connect the open data agenda with the wider open agendas, especially that of free and open source softwares. It is very important that this point promotes ‘global development of free and open source tools’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Extending the comment by Jose Subero, along with ‘tools’ and ‘policies’, it will be great to have a mention of ‘standards’ here, which is critical for ensuring ‘interoperability’ and thus ‘harmonisation’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;13) We recognise that the term ‘government data’ is meant in the widest sense possible. This could apply to data held by national, federal, and local governments, international government bodies, and other types of institutions in the wider public sector. This could also apply to data created for governments by external organisations, and data of significant benefit to the public which is held by external organisations and related to government programmes and services (e.g. data on extractives entities, data on transportation infrastructure, etc).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;It is wonderful that the point promotes a wide understanding of ‘government data’ but at the same time it should also define a necessary core understanding of data, just to ensure that governments do not interpret this point too narrowly.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Further, a focus only on data created by public agencies can perhaps be too narrow (for the necessary/core understanding of ‘government data’). With public services delivered increasingly by private agencies and public-private-partnerships, it is crucial that ‘government data’ should explicitly include any data coming out of a process funded by public money (the process may be carried out by a public agency or not). This is an extremely important point from a developing country perspective.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;14) We recognise that there is domestic and international legislation, in particular pertaining to security, privacy, confidentiality, intellectual property, and personally-identifiable and other sensitive information, which must be observed and/or updated where necessary.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;From a developing country perspective, it is very important that the Charter does not keep this critical point dependent on domestic and international legislations. International legislation may not be very developed for all of the mentioned topics, and many countries may not have existing domestic legislations on these topics either. The Charter should mention an internationally acceptable list of concerns / criteria for not opening up data. The list may include the topics mentioned here, like privacy and national security. This need not be a list of sufficient criteria, but of necessary ones.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;15) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;develop and adopt policies and practices to ensure that all government data is made open by default, as outlined in this Charter, while recognising that there are legitimate reasons why some data cannot be released;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;'Administrative reforms’ are most often crucial to make government data ‘open by default, and the same should be mentioned along with ‘policies’ and ‘practices’.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;provide clear justifications as to why certain data cannot be released;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This is a great point. Perhaps it can be added that all government agencies should produce a list of all data assets maintained by them, point out the ones that cannot be made open, and provide clear justification as to why those cannot be released. This comment pre-empts 19.1. Perhaps this point about providing justification for not releasing data can be merged with 19.1.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;develop the leadership, management, oversight, and internal communication policies necessary to enable this transition to a culture of openness.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Along with ‘leadership, management, oversight, and internal communication’, is it possible to add ‘incentives’? This is often overlooked in implementing open data policies.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;16) We recognise that governments and other public sector organisations hold vast amounts of information that may be of interest to citizens, and that it may take time to identify data for release or publication.&lt;/p&gt;
&lt;p&gt;17) We also recognise the importance of consulting with citizens, other governments, non-governmental organisations, and other open data users, to identify which data to prioritise for release and/or improvement.&lt;/p&gt;
&lt;p&gt;18) We agree, however, that governments’ primary responsibility should be to release data in a timely manner, without undue delay.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Points 16-18 seem to suggest that the ‘quantity and quality’ issue is mostly one of prioritisation. This can be misleading. This is perhaps the ‘quantity’ issue, but not at all the ‘quality’ issue.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;19) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;...&lt;/li&gt;
&lt;li&gt;release high-quality open data that are timely, comprehensive, and accurate in accordance with prioritisation that is informed by public requests. To the extent possible, data will be released in their original, unmodified form and at the finest level of granularity available, and will also be linked to any visualisations or analyses created based on the data, as well as any relevant guidance or documentation;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Please add ‘human- and machine-readable’ along with ‘timely, comprehensive, and accurate’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Put ‘, and’ between ‘, and accurate’ and ‘in accordance’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;‘Relevant guidance or documentation’ should be mentioned before, and not after, ‘visualisations or analyses’.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;ensure that accompanying documentation is written in clear, plain language, so that it can be easily understood by all;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Add that the documentation should be ‘comprehensive’, along with being written in plain language.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;make sure that data are fully described, and that data users have sufficient information to understand their source, strengths, weaknesses, and any analytical limitations;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Regarding ‘Full description of data’ — Aggregate data must be accompanied by low level raw data along with details of analytical methods used to arrive at figures. This allows for verification as well as alternate views and detection of statistical anomalies.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;ensure that open datasets include consistent core metadata, and are made available in human- and machine-readable formats under an open and unrestrictive licence;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Is this the necessary definition of ‘open data’? If so, it should be much higher up.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;allow users to provide feedback, and continue to make revisions to ensure the quality of the data is improved as needed; and&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This point should clarify if it is talking about making revisions of the data itself (its content), or how it is being published (its form), or both?&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;apply consistent information lifecycle management practices, and ensure historical copies of datasets are preserved, archived, and kept accessible as long as they retain value.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;The ‘as long as they retain value’ part seems vague. Who is going to take this decision about value? Is it possible to rephrase this as ‘as long as they are demanded by data users’?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;21) We recognise that open data should be made available free of charge in order to encourage their widest possible use.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Maybe ‘government data’ and not ‘open data’ (open data already means it is available gratis). Also, along with ‘free of charge’ maybe add ‘under open license’, as that is a critical requirement for ‘widest possible use.’&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;22) We recognise that when open data are released, they should be made available without bureaucratic or administrative barriers, such as mandatory user registration, which can deter people from accessing the data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I strongly believe that this point should be removed. Registration of the data user can also be very useful for the government agencies to track demand and actual usage of their datasets. Instead of the government agencies doing such kind of tracking as a background process, it is much better if the data usage monitoring of all users is done transparently. Along with perhaps a public dashboard of data usages of the users of an open data portal. As long as the registration barrier does not involve an approval process by the government agency, it can be allowed.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A more general point should be added as part of this principle, regarding no-discrimination (or approval process) among data users interested in accessing and using of open government data.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;23) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;release data in open formats and free of charge to ensure that the data are available to the widest range of users to find, access, and use them. In many cases, this will include providing data in multiple formats, so that they can be processed by computers and used by people; and&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Please add ‘open license’ along with ‘open formats’ and ‘free of charge’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;24) We recognise that the release of open data strengthens our public and democratic institutions, encourages better development, implementation, and assessment of policies to meet the needs of our citizens, and enables more meaningful, better informed engagement between governments and citizens.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Perhaps add ‘, and makes them transparent’ after ‘strengthens our public and democratic institutions’. Please also add ‘monitoring’ along with ‘development, implementation, and assessment’.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;25) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;implement oversight and review processes to report regularly on the progress and impact of our open data initiatives;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;The functioning of these ‘oversight and review processes’ must be open and transparent themselves. The reporting should be public.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;engage with community and civil society representatives working in the domain of transparency and accountability to determine what data they need to effectively hold governments to account; encourage the use of open data to develop innovative, evidence-based policy solutions that benefit all members of society, as well as empower marginalised groups; and&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This must also include a point regarding the government proactively seeking data demands from citizens, CSOs, academics, and the private sector.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;‘as well as empower marginalised groups’ is too vague. Perhaps it can be made into a separate point, and qualified with what kinds of empowerment is needed – from demanding data, to accessing and using data, to be aware of the data collected from such groups by the government agencies.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;be transparent about our own data collection, standards, and publishing processes, by documenting all of these related processes online.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This should be part of point 19.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;26) We recognise the importance of diversity in stimulating creativity and innovation. The more citizens, governments, civil society, and the private sector use open data, the greater the social and economic benefits that will be generated. This is true for government, commercial, and non-commercial uses.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The diversity point is almost already made with points 20-21 – widest possible users lead to widest possible use.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;28) We will:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;...&lt;/li&gt;
&lt;li&gt;engage with civil society, the private sector, and academic representatives to determine what data they need to generate social and economic value;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This is also covered under the Principle 3.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;provide training programs, tools, and guidelines designed to ensure government employees are capable of using open data effectively in policy development processes;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;This should be part of Principle 1.&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;encourage non-governmental organisations to open up data created and collected by them in order to move toward a richer open data ecosystem with multiple sources of open data;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;I agree with ABS. Why not ‘non-governmental organisations and the private sector’?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Also the document shifts back and forth between ‘civil society organisations’ and ‘non-governmental organisations’. If both mean the same in this document, then it should use only one.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;General Comments on the Charter&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1. Why not merge the Principle 4 and 5 so as to describe an overall situation of engagement and collaboration. The ends can be commercial acts or towards democratic practices, but the existing principles do not make much a difference between the two types of acts.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2. Further, can a new principle be added at the end that would address the implementation process of the Action Plan? Specifically, it should clarify how the implementation itself be an open process, with not only the Action Plan but annual reports regarding the status of implementation. This principle may connect to the work being done by the Implementation WG.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/international-open-data-charter-comments-by-cis'&gt;https://cis-india.org/openness/international-open-data-charter-comments-by-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>International Open Data Charter</dc:subject>
    

   <dc:date>2015-09-08T11:01:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india">
    <title>Data Flow in the Unique Identification Scheme of India</title>
    <link>https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india</link>
    <description>
        &lt;b&gt;This note analyses the data flow within the UID scheme and aims at highlighting vulnerabilities at each stage. The data flow within the UID Scheme can be best understood by first delineating the organizations involved in enrolling residents for Aadhaar. The UIDAI partners with various Registrars usually a department of the central or state Government, and some private sector agencies like LIC etc– through a Memorandum of Understanding for assisting with the enrollment process of the UID project.&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;Many thanks to Elonnai Hickok for her invaluable guidance, input and feedback&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;These Registrars then appoint Enrollment Agencies that enroll residents by collecting the necessary data and sharing this with the UIDAI for de-duplication and issuance of an Aadhaar number, at enrolment centers that they set up. The data flow process of the UID is described below:&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h3&gt;&lt;b&gt;Data Capture&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Filling out an enrollment form&lt;/i&gt; – To enroll for an Aadhaar number, individuals are required to provide proof of address and proof of identity. These documents are verified by an official at the enrollment center. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Vulnerability: Though an official is responsible for verifying these documents, it is unclear how this verification is completed. It is possible for fraudulent proof of address and proof of identity to be verified and approved by this official.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;The 'introducer' system&lt;/i&gt;: For individuals who do not have a Proof of Identity, Proof of Address etc the UIDAI has established an 'introducer' system. The introducer verifies that the individual is who they claim to be and that they live where they claim to live.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: This introducer is akin to the introducer concept in banking; except that here, the introducer must be approved by the Registrar, and need not know the person bring enrolled. This leads to questions of authenticity and validity of the data collected and verified by an 'introducer'. The Home Ministry in 2012, indicated that this must be reviewed.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Categories of data for enrollment&lt;/i&gt;: The UIDAI has a standard enrollment form and list of documents required for enrollment. This includes: name, address, birth date, gender, proof of address and proof of identity. Some MoUs (Memorandum of Understanding) permit for the Registrars to collect additional information in addition to what is required by the UIDAI. This could be any information the Registrar deems necessary for any purpose.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Vulnerability: The fact that a Registrar may collect any information they deem necessary and for any purpose leads to concerns regarding (1) informed consent – as individuals are in placed in a position of having to provide this information as it is coupled with the Aadhaar enrollment process (2) unauthorized collection - though the MOU between the UIDAI and the Registrar has authorized the Registrar to collect additional information – if the information is personal in nature and the Registrar is a body corporate it must be collected as per the Information Technology Rules 2011 under section 43A. It is unclear if Registrars that are body corporates are collecting data in accordance to these rules. (3) As Registrars are permitted to collect any data they deem necessary for any purpose – this leads to concerns regarding misuse of this data..&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;Verification of Resident’s Documents&lt;/i&gt;: true copies of original  documents, after verification are sent to the Registrar for “permanent storage.”&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: It is unclear as to what extent and form this storage takes place. There is no clarity on who is responsible for the data once collected, and the permissible uses of such data are also unclear. The contracts between the UID and Registry claim that guidelines must be followed, while the guidelines state that, “&lt;i&gt;The documents are required to be preserved by Registrar till the UIDAI finalizes its document storage agency”&lt;/i&gt; and states that the &lt;i&gt;“Registrars must ensure that the documents are stored in a safe and secure manner and protected from unauthorized access.”&lt;/i&gt; &lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The question of what is “unauthorized access”, “secure storage”, when is data transferred to the UIDAI and when the UIDAI will access it and why remain unanswered. Moreover, there is nothing about deleting documents once the MoU lapses. The guidelines in question were also developed post facto.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Data collection for enrollment&lt;/i&gt;: After verification of proof of address and proof of identity, operators at the enrolling the agency will be enrolling individuals.  Data Collection is completed by operators at the enrolling agency. This includes the digitization of enrollment forms and collection of biometrics. Enrollment information is manually collected and entered into computers operating software provided by the UIDAI and then transferred to the UIDAI. Biometrics are collected through devices that have been provided by third parties such as Accenture and L1Identity Solutions.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Vulnerability: After data is collected by enrollment operators it is  possible for data leakage to occur at the point of collection or during transfer to the Registrar and UIDAI. Data operators, are therefore not answerable to the UIDAI, but to a private agency; a fact which has been the cause of concern even within the government.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; There have also been instances of sub contracting which leads to more complications in respect of accountability. Misuse&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; and loss of data is a very real possibility, and irregularities have been reported as well.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; By relying on technology that is provided by third parties (in many cases foreign third parties) data collected by these devices is also available to these companies while at the same time the companies are not regulated by Indian law.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Import pre-enrolment data into Aadhaar enrollment client&lt;/i&gt;, &lt;i&gt;Syncing NPR/census data into the software&lt;/i&gt;: The National Population Register (NPR) enrolls usual residents, and is governed by the Citizenship Rules, which prescribe a penalty for non disclosure of information.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: Biometrics does not form part of the Rules that govern NPR data collection; the Citizenship Rules, 2003. In many ways, collection of biometrics without amending the citizenship laws amounts to a worrying situation. The NPR hands over information that it collects to UIDAI, biometrics collected as part of the UIDAI is included in the NPR, leading to concerns surrounding legality and security of such data.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;i&gt; Resident’s consent&lt;/i&gt;: for “whether the resident has agreed to &lt;b&gt;share the captured information&lt;/b&gt; with organizations engaged in delivery of welfare services.”&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: This allows the UIDAI to use data in an almost unfettered fashion. The enrolment form reads, “&lt;i&gt;‘‘I have no objection to the UIDAI sharing information provided by me to the UIDAI with agencies engaged in delivery of welfare services.” &lt;/i&gt;Informed consent, Vague. What info and with whom. Why is necessary for the UIDAI to share this information, when the organization is only supposed to be a passive intermediary? Does beyond the mandate of the UIDAI, which is only to provide and authenticate the number.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Biometric exceptions&lt;/i&gt;: The operator checks if the resident’s eyes/hands are amputated/missing, and after the Supervisor verifies the same, the record is made as an exception and only the individuals photograph is recorded.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: There has widespread misuse of this clause, with data being fabricated to fall into this category, making it unreliable as a whole. In March 2013, 3.84 lakh numbers were cancelled as they were based on fraudulent use of the exception clause. &lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Operator checks if resident wants Aadhaar enabled bank account&lt;/i&gt;: The UID project was touted to be a scheme that would ensure access to benefits and subsidies that are provided through cash transfers as well as enabling financial inclusion. Subsequently, the need for a Aadhaar embedded bank account was made essential to avail of these benefits. The operator at this point checks whether the resident would like to open such a bank account.&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;span&gt; Vulnerability&lt;/span&gt;: The data provided at the time of linking UID with a bank account cannot be corrected or retracted. Although this has the vision of financial inclusion, it is now a threat of exclusion.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Capturing biometrics- &lt;/i&gt;The UIDAI scheme includes assigning each individual a unique identification number after collecting their demographic and biometric information. One Time Passwords are used to manually override a situation in which biometric identification fails.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The UIDAI data collection process was revamped in 2012 to include best finger detection and multiple try method.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerabilities&lt;/span&gt;: The collection process is not always accurate, in fact, 70% of the residents who enrolled in Salt Lake, will have to re-enroll due to discrepancies at the time of enrollment.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; Further, a large number of people in India are unable to give biometric information due to manual labour, or cataracts etc.&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;After such data is entered, the Operator shows such data to the Resident or Introducer or Head of the Family (as the case may be) for validation.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;Operator Sign off&lt;/i&gt; – Each set of data needs to be verified by an Operator whose fingerprint is already stored in the system.&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span&gt;Vulnerability:&lt;/span&gt;&lt;i&gt; Vesting authority to sign off in an operator allows for  signing off on inaccurate or fraudulent data. &lt;/i&gt;For example, the issuance of aadhaar numbers to biometric exceptions highlight issues surrounding misuse and unreliability of this function.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;After this, the Enrolment operator gets supervisor’s sign off for any exceptions that might exist, Acknowledgement and consent for enrolment is stored. Any correction to specified data can be made within 96 hours.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Document Storage, Back up and Sync&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;After gathering and verifying all the information about the resident, the Enrolment Agency Operator will store photocopies of the documents of the resident. These Agencies also backup data “from time to time” (recommended to be twice a day), and maintain it for a minimum of 60 days. They also sync with the server every 7-10 days.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: The security implications of third party operators storing information is greatly exacerbated by the fact that these operators use technology and devices from companies have close ties to intelligence agencies in other countries; L-1 Identity Solutions have close ties with America’s CIA, Accenture with French intelligence etc. &lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h3&gt;&lt;b&gt;Transfer of Demographic and Biometric Data Collected to CIDR&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;“First mile logistics” include transferring data by using Secure File Transfer Protocol) provided by UIDAI or through a “suitable carrier” such as India Post.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Vulnerability&lt;/span&gt;: There is no engagement between the UIDAI and the enrolling agencies; the registrars engage private enrolment agencies, and not the UIDAI. Further, the scope of people authorized to collect information, the information that can be collected, how such information is stored etc are all vague. In 2009, there was a notification that claimed that the UIDAI owns the database&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; but there is no indication on how it may be used, how this might react to instances of identity fraud, etc.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h3&gt;&lt;b&gt;Data De-duplication and Aadhar Generation at CIDR&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;On receiving biometric information, the de-duplication is done to ensure that each individual is given only one UID number.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Vulnerability&lt;/span&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This de-duplication is carried out by private companies, some of which are not of indian origin and thus are also not bound by Indian law. Also, the volume of Aadhaar numbers rejected due to quality or technical reasons is a cause of worry; the count reaching 9 crores in May 2015.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The MoUs promise registrars access to information contained in the Aadhaar letter, although individuals are ensured that such letter is only sent to them. &lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;General compliance and de-duplication has been an issue, with over 34,000 people being issued more than one Aadhaar number,&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; and innumerable examples of faulty Aadhaar cards being issued.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Enrolment Process Essentials : UIDAI , (December 13,2012), http://nictcsc.com/images/Aadhaar%20Project%20Training%20Module/English%20Training%20Module/module2_aadhaar_enrolment_process17122012.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;UIDAI to review biometric data collection process of 60 crore resident Indians: P Chidambaram&lt;/i&gt;, Economic Times, (Jan 31, 2012), &lt;a href="http://articles.economictimes.indiatimes.com/2012-01-31/news/31010619_1_biometrics-uidai-national-population-register"&gt;http://articles.economictimes.indiatimes.com/2012-01-31/news/31010619_1_biometrics-uidai-national-population-register&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt;See: an MoU signed between the UIDAI and the Government of Madhya Pradesh. Also see: Usha Ramanathan, “&lt;i&gt;States as handmaidens of UIDAI&lt;/i&gt;”, The Statesman (August 8, 2013).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;http://nictcsc.com/images/Aadhaar%20Project%20Training%20Module/English%20Training%20Module/module2_aadhaar_enrolment_process17122012.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Document Storage Guidelines for Registrars – Version 1.2, https://uidai.gov.in/images/mou/D11%20Document%20Storage%20Guidelines%20for%20Registrars%20final%2005082010.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Arindham Mukherjee, Lola Nayar, &lt;i&gt;Aadhaar,A Few Basic Issues&lt;/i&gt;, Outlook India, (December 5, 2011)&lt;i&gt;, &lt;/i&gt;&lt;a href="http://dataprivacylab.org/TIP/2011sept/India4.pdf"&gt;http://dataprivacylab.org/TIP/2011sept/India4.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;i&gt;Aadhaar: UIDAI probing several cases of misuse of personal data, &lt;/i&gt;The Hindu, (April 29, 2012), http://www.thehindubusinessline.com/economy/aadhar-uidai-probing-several-cases-of-misuse-of-personal-data/article3367092.ece.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Harsimran Julka, &lt;i&gt;UIDAI wins court battle against HCL technologies, &lt;/i&gt;The Economic Times, (October 4, 2011), &lt;a href="http://articles.economictimes.indiatimes.com/2011-10-04/news/30242553_1_uidai-bank-guarantee-hp-and-ibm"&gt;http://articles.economictimes.indiatimes.com/2011-10-04/news/30242553_1_uidai-bank-guarantee-hp-and-ibm&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Chetan Chauhan, &lt;i&gt;UIDAI cancels 3.84 lakh fake Aadhaar numbers&lt;/i&gt;, The Hindustan Times, (December 26, 2012), &lt;a href="http://www.hindustantimes.com/newdelhi/uidai-cancels-3-84-lakh-fake-aadhaar-numbers/article1-980634.aspx"&gt;http://www.hindustantimes.com/newdelhi/uidai-cancels-3-84-lakh-fake-aadhaar-numbers/article1-980634.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Usha Ramanathan, “&lt;i&gt;Inclusion project that excludes the poor&lt;/i&gt;”, The Statesman (July 4, 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; UIDAI to Refresh Data Collection Process, Zee News, (February 7, 2012) &lt;a href="http://zeenews.india.com/news/delhi/uidai-to-refresh-data-collection-process_757251.html"&gt;http://zeenews.india.com/news/delhi/uidai-to-refresh-data-collection-process_757251.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Snehal Sengupta, &lt;i&gt;Queue up again to apply for Aadhaar&lt;/i&gt;, The Telegraph, (February 27, 2015), http://www.telegraphindia.com/1150227/jsp/saltlake/story_5642.jsp#.VayjDZOqqko&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Chauhan, &lt;i&gt;supra &lt;/i&gt;note 7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Usha Ramanathan, &lt;i&gt;Three Supreme Court Orders Later, What’s the Deal with Aadhaar? &lt;/i&gt;Yahoo News, (April 13, 2015), &lt;a href="https://in.news.yahoo.com/three-supreme-court-orders-later--what-s-the-deal-with-aadhaar-094316180.html"&gt;https://in.news.yahoo.com/three-supreme-court-orders-later--what-s-the-deal-with-aadhaar-094316180.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Usha Ramanathan, “&lt;i&gt;Threat of Exclusion and of Surveillance&lt;/i&gt;”&lt;i&gt;,&lt;/i&gt; The Statesman (July 2, 2013).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Over 9 Crore Aadhaar enrolments rejected by UIDAI, &lt;/i&gt;Zee News (May 8, 2015).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Usha Ramanathan, “&lt;i&gt;States as handmaidens of UIDAI&lt;/i&gt;”, The Statesman (August 8, 2013).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Surabhi Agarwal, &lt;i&gt;Duplicate Aadhar numbers within estimate, &lt;/i&gt;Live Mint (March 5, 2013).&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Usha Ramanathan, “&lt;i&gt;Outsourcing enrolment, gathering dogs and trees&lt;/i&gt;”, The Statesman (August 7, 2013).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india'&gt;https://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-03T17:02:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-human-dna-profiling-bill-2015">
    <title>CIS Human DNA Profiling Bill 2015</title>
    <link>https://cis-india.org/internet-governance/blog/cis-human-dna-profiling-bill-2015</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-human-dna-profiling-bill-2015'&gt;https://cis-india.org/internet-governance/blog/cis-human-dna-profiling-bill-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-09-02T17:04:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
