<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 931 to 945.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/department-of-science-and-technology-department-of-biotechnology-adopt-open-access-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/swatantra-2014-icfoss-december-18-20-2014-fifth-international-free-software-conference-in-kerala"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/new-indian-express-december-5-2014-diana-sahu-access-to-rare-books-made-easy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-part-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/cis-statement-on-limitations-and-exceptions-for-education-teaching-research-institutions-and-persons-with-disabilities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/news/e-gov-reach-december-15-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/ip-watch-catherine-saez-december-18-2014-wipo-study-on-copyright-exceptions-stimulates-broad-discussion-with-author"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/policy-brief-availability-accessibility-govt-information-public-domain.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/news/governance-now-december-1-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/creating-free-software-environment-at-alc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/knowledge-ecology-international-sccr-29-december-11-2014-libraries-archives-public-interest-ngos-q-a-with-dr-crews"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/ada-camp-bangalore"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/openness/blog-old/department-of-science-and-technology-department-of-biotechnology-adopt-open-access-policy">
    <title>Department of Science and Technology &amp; Department of Biotechnology adopt Open Access Policy </title>
    <link>https://cis-india.org/openness/blog-old/department-of-science-and-technology-department-of-biotechnology-adopt-open-access-policy</link>
    <description>
        &lt;b&gt;This post discusses the newly adopted Open Access Policy of the Department of Science and Technology &amp; the Department of Biotechnology.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Ministry of Science and Technology and Earth Sciences approved
the Policy on Open Access to Department of Biotechnology(“DBT”)
and the Department of Science (“DST”) funded research last week.
The DBT and DST Open Access
Policy(“Policy”) is a laudable step towards implementing
open access to publicly funded research and is also in sync with other open access initiatives by Government funded
institutions such as the Council of Scientific and Industrial
Research(“CSIR”), Indian Council of Agricultural Research(“ICAR”)
and Institute of Mathematical Sciences(“IMSc”).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;You may access the
approved policy &lt;a class="external-link" href="https://drive.google.com/file/d/0B8M-eytmCbwXeklnbnJCQTFILXV3SHZXSjl1My1ZQzdsb3FV/view"&gt;here&lt;/a&gt;.
&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;CIS participated in
developing the policy and made various submissions with the goal of
formulating a stringent open access policy. The drafting committee
comprised of members of the DST and DBT. The drafting began in June
2014 and subsequently underwent two rounds of public consultation.
You may access and read about the first draft &lt;a href="http://cis-india.org/openness/blog/department-of-biotechnology-and-department-of-science-ministry-of-science-and-technology-government-of-india-release-open-access-policy"&gt;here&lt;/a&gt;.
I blogged about CIS' comments and the resultant draft policy &lt;a href="http://cis-india.org/openness/cis-comments-to-the-department-of-biotechnology-and-department-of-science-open-access-policy"&gt;here&lt;/a&gt;
and &lt;a href="http://cis-india.org/openness/second-draft-of-open-access-policy-of-the-department-of-biotechnology-and-department-of-science-released"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While the &lt;a href="http://oasis.csir.res.in/utube/CSIR_OPEN_ACCESS_MANDATE.pdf"&gt;CSIR&lt;/a&gt;
and &lt;a href="http://icar.org.in/en/node/6609"&gt;ICAR&lt;/a&gt; present
outlines of their open access policies, the &lt;a href="http://www.imsc.res.in/e_resources_alpha"&gt;IMSc&lt;/a&gt;
provides access to a &lt;a href="http://www.imsc.res.in/xmlui"&gt;digital
repository&lt;/a&gt; containing digital theses/dissertations, matscience
reports and other publications of institute members. CIS also sent
&lt;a href="http://cis-india.org/openness/blog/comments-on-draft-icar-open-access-policy"&gt;comments&lt;/a&gt;
to the ICAR upon &lt;a href="http://cis-india.org/openness/blog/icar-adopts-open-access-policy"&gt;release&lt;/a&gt;
of ICAR’s draft policy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key insertions and amendments to the
final draft of the Policy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The &lt;a href="http://cis-india.org/openness/blog/department-of-biotechnology-and-department-of-science-ministry-of-science-and-technology-government-of-india-release-open-access-policy"&gt;initial
draft of the Policy&lt;/a&gt; did not mandate depositing literature in a
repository. The approved Policy requires researchers to compulsorily
archive their research and provides access to the same. Requests for
embargoed papers deposited in a repository may be forwarded to the
authors by use of a Request Button made available in the repository
software. To ensure timely dissemination of research the embargo
period has been further shortened and the Policy now recommends&amp;nbsp; “&lt;em&gt;..
the embargo should be no longer than 6 months for Science, Technology
and Medicine (STM) disciplines and 12 months for Arts, Humanities and
Social Sciences.” &lt;/em&gt;&lt;a href="http://cis-india.org/openness/cis-comments-to-the-department-of-biotechnology-and-department-of-science-open-access-policy"&gt;CIS
strongly recommended&lt;/a&gt; an embargo period of one year, and making
deposits in repositories mandatory, regardless of the open access
routes ( Gold OA or Green OA) adopted by the researcher.&lt;/p&gt;
&lt;p&gt;
To encourage making publications open access, the Policy also states
that extrinsic metrics such as Journal Impact Factors should
not be the criteria to assess a researcher's work. Thus, the Policy
seeks to create a level playing field for assessment of quality of
publications by making the title of the journal irrelevant. However,
to this end, some concerns remain. The Policy does not address the
legal position of copyright vesting with the government and the
latter retaining rights to reproduction of the work in order to issue
free copies of the work to the public. The Policy apparently
relinquishes the its rightful ownership of the Government in the
research by stating that it does not intend to override the
agreements between the researchers and publishers, however, it
recommends the authors to bring to the notice of publishers their
obligations under the Policy. This is a cause for grave concern
because the bargaining power still rests in the hands of the
publishers, who may impose unfair terms on researchers to make the
publication open access. Furthermore, the Policy fails to establish a time period for compliance and setting up of required
infrastructure, thereby leaving obligations and
duties of various stakeholders undefined.&lt;/p&gt;
&lt;p&gt;
Nonetheless, the policy is a welcome step in the field of Indian
scientific research. It stands to impact approximately 18,000 papers
published since 2013 under the aegis of the DBT and DST. As pointed
out earlier, in the recent past many scientific research institutions
have implemented open access policies. It is hoped that the move
shall be emulated across all disciplines, including arts, humanities
and social sciences.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/department-of-science-and-technology-department-of-biotechnology-adopt-open-access-policy'&gt;https://cis-india.org/openness/blog-old/department-of-science-and-technology-department-of-biotechnology-adopt-open-access-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-12-29T10:17:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/swatantra-2014-icfoss-december-18-20-2014-fifth-international-free-software-conference-in-kerala">
    <title>Swatantra 2014: Fifth International Free Software Conference, Kerala</title>
    <link>https://cis-india.org/openness/news/swatantra-2014-icfoss-december-18-20-2014-fifth-international-free-software-conference-in-kerala</link>
    <description>
        &lt;b&gt;ICFOSS, Govt. of Kerala organized the fifth international Free Software Conference at Hotel Hycinth by Sparsa, Trivandrum from December 18 - 20, 2014. The Centre for Internet and Society was one of the organizations supporting the event. Prof. Subbiah Arunachalam was a speaker and made a presentation on Open Science.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Click to download Prof. Arunachalam's presentation on Open Science &lt;a href="https://cis-india.org/openness/blog-old/open-science.ppt" class="internal-link"&gt;here&lt;/a&gt;. For more details see the ICFOSS &lt;a class="external-link" href="http://icfoss.in/fs2014/"&gt;web page&lt;/a&gt;. T. Vishnu Vardhan chaired a session on Wikimedia and Access to Knowledge in India and Rahimanuddin Shaik co-presented on Making DLI Accessible. The programme schedule can be &lt;a class="external-link" href="http://icfoss.org/fs2014/program_details.html#Wikipedia/Wikimedia"&gt;seen here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Theme: Free Software for a Free World&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;About Swatantra 2014&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;After India's first-ever Free Software event, “Freedom First!” that  was convened in Trivandrum in 2001, Kerala had organized international  Free Software conferences in 2005, 2008, and 2011. These conferences  were an occasion to highlight Kerala's achievements in the domain of  Free Software, as well as to bring together the community to discuss  priorities and action items.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICFOSS is proud to present the fifth international Free  Software conference of Kerala, Swatantra 2014, scheduled during 18-20  December 2014 at Thiruvananthapuram.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The theme of the conference is “Free Software for a Free  World”. This reflects emerging concerns that citizens and communities  face vis-a-vis privacy, online rights &amp;amp; freedoms,  and security at  the global level. Free Software provides a viable alternative to  proprietary software which often compromises on these aspects. Further,  Free Software also provides a technologically robust and cost effective  alternative to other genres of software for all public uses, notably in  Academia, Government, and personal computing, and even in the Arts &amp;amp;  Culture domains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;International dignitaries participating at the Conference  include Dr. Richard Stallman and Ms. Nina Paley. Several luminaries  from the FOSS world within the country are also expected to take part.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 150-200 Free Software enthusiasts, including  practitioners, developers, researchers, academics, students, as well as  representatives from civil society institutions, industry and the  Government are expected to participate in the three-day conference.&lt;/p&gt;
&lt;h3&gt;Supported by&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;FSF-India &lt;/li&gt;
&lt;li&gt;Centre for Internet and Society, Bangalore &lt;/li&gt;
&lt;li&gt;SFLC.IN, Delhi &lt;/li&gt;
&lt;li&gt;Swathanthra Malayalam Computing &lt;/li&gt;
&lt;li&gt;FOSSEE, IIT-B&lt;/li&gt;
&lt;li&gt;SPACE&lt;/li&gt;
&lt;li&gt;DCBB, Kerala University &lt;/li&gt;
&lt;li&gt;Spoken Tutorials, IIT-B&lt;/li&gt;
&lt;li&gt;IEEE Kerala Section&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/swatantra-2014-icfoss-december-18-20-2014-fifth-international-free-software-conference-in-kerala'&gt;https://cis-india.org/openness/news/swatantra-2014-icfoss-december-18-20-2014-fifth-international-free-software-conference-in-kerala&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    

   <dc:date>2014-12-28T02:44:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/new-indian-express-december-5-2014-diana-sahu-access-to-rare-books-made-easy">
    <title>Access to Rare Books Made Easy</title>
    <link>https://cis-india.org/openness/news/new-indian-express-december-5-2014-diana-sahu-access-to-rare-books-made-easy</link>
    <description>
        &lt;b&gt;Rare Odia books that are out of print and not easily accessible on the internet, will now be available at the click of the mouse. In a bid to make them available online, the Odia Wikipedia community last week launched WikiSource, an Odia e-library and a sister project of Odia Wikipedia that has been trying to popularise use of Odia language on the Internet since 2002.&lt;/b&gt;
        &lt;p&gt;The article by Diana Sahu was &lt;a class="external-link" href="http://www.newindianexpress.com/states/odisha/Access-to-Rare-Books-Made-Easy/2014/12/05/article2555236.ece"&gt;published in the New Indian Express&lt;/a&gt; on December 5, 2014&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The online library has 69 books by authors Jagannath Mohanty, Upendra  Bhanja, Fakir Mohan Senapati, Gopabandhu Das, Baladeva Rath and Ram  Das. Besides, the complete volume of Bhagwad Gita in Odia language is  available on WikiSource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The project has been implemented by  Bangalore-based Centre for Internet and Society’s Access to knowledge  programme. Odia Wikipedian Subhashish Panigrahi, also a programme  officer of the Centre for Internet and Society, said work on  digitisation of the books was started in April this year by a team of 12  Wikipedians, comprising mostly students and working professionals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart  from them, 50 tribal students and nine faculty members of Kalinga  Institute of Social Sciences (KISS) helped them with the digitisation  job. As most of the books were typed in Akruti font - a proprietary  Indian Script Code for Information Interchange (ISCII) compliant font -  the font was converted to Unicode text type to make the books searchable  and accessible universally in all mobile and web platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  the first phase, 11 books focusing on children’s literature, travelogue  and biographies of noted people from Odisha by eminent Odia author  Jagannath Mohanty were digitised. Subsequently, works of other authors  were added to the e-library and made available on the internet with open  access through free licence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subhashish said the WikiSource  project was started in 2013 as an incubator project. It went through a  tough process of being accessed by the Wikimedia Language Committee and  Wikimedia Foundation’s board before being released last week. “There are  several precious books that are out of print and not easily accessible  on the internet. So we thought of digitising them and taking them to the  masses. Apart from the 69 books, 81 of seven Odia authors that were  already scanned and digitised by Bhubaneswar-based voluntary  organisation, Srujanika, have been re-licensed and added to the  library,” he said. Srujanika has digitised 740 old Odia magazines and  books so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Generally a technique called Optical Character  Recognition (OCR) is used for digitising scanned books, which currently  is in testing phase in Odia. “Faculty member of ITER in Bhubaneswar Ajit  Nayak along with his students have rectified the bugs and made  character recognition more accurate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But because of problems with  OCR, the books had to be re-typed by the students of KISS on Odia  Wikisource, Subashish added.  Old books apart, books by contemporary  authors like Debiprasanna Pattanayak, Ramakrushna Nanda, Subrat Prusty,  Bharat Majhi and Nirmala Kumari Mohapata, and many other authors have  been taken up for digitisation by Odia WikiSource team. Odia WikiSource  is now live at or.wikisource.org.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/new-indian-express-december-5-2014-diana-sahu-access-to-rare-books-made-easy'&gt;https://cis-india.org/openness/news/new-indian-express-december-5-2014-diana-sahu-access-to-rare-books-made-easy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2014-12-27T01:56:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-part-3">
    <title>[Open] Innovation and Expertise &gt; Patent Protection &amp; Trolls in a Broken Patent Regime (Interviews with Semiconductor Industry - Part 3)</title>
    <link>https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-part-3</link>
    <description>
        &lt;b&gt;This is the third of a four-part blog series1 highlighting findings from a small sample of interviews with fabless semiconductor industry professionals in Taiwan. These industry insiders was approached for the intent of understanding expert knowledge on the process of integrated circuit design. However, the conversations resulted in leanings far beyond that scope. This post explores some of their views on the current intellectual property system.&lt;/b&gt;
        &lt;p&gt;&lt;span&gt;The intellectual property framework is meant to provide a temporary monopoly so those taking the risk to invest time, money, and resources into research 	and development can reap the returns for that investment without having to worry about others undercutting their price and competing for market share. 	Registration of patents supposedly encourages the dissemination of ideas and overall greater knowledge contribution for public access and eventual public 	domain. The interviewees were asked about their thoughts on this system of protection, incentivization, and knowledge-share, resulting in five broad 	themes:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;1) Expertise trumps patent ownership&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Particularly today in a digital world where innovative ideas and concepts can be easily shared, the first thing many people think about when discussing 	innovation, is the need to protect via patents. A vast amount of literature attempts to review the implications of patents' on technological innovation and 	economic development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, one interviewee noted that this emphasis on patent protection often overshadows what is much vital to the success of a technology business or 	industry - the &lt;em&gt;people: &lt;/em&gt;the expertise and experience of the companies, their engineers, and their management. A lot of knowledge and 'intellectual 	property' lies in the procedures and processes which have resulted in effective application of standards and high level of performance for ones' products. 	The value of these skills and intelligence of human resources far outweigh the importance of protecting and owning patents.&lt;/p&gt;
&lt;p&gt;2) Broken patent system&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was a clear consensus that the number one intellectual property concern is the need to revamp the current patent regime, with all interviewees 	agreeing that "useless patents" were being filed. Some suggestions for improvement included international standardization regarding the definition of a 	patent, the process of patent applications, and the scope of what a patent should cover. One interviewee believed that currently, the patent system actually prevents technological innovation, because one single patent can cover many ways of achieving something. The Apple patent entitled '	&lt;em&gt;Method for providing human input into computer' &lt;/em&gt;which patents nearly every single possible human-computer interaction is an example of this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; "Patents today are trivial, and don't contain information regarding HOW to make something; there are too many &lt;em&gt;process&lt;/em&gt; and &lt;em&gt;design&lt;/em&gt; patents, and not enough &lt;em&gt;functional&lt;/em&gt; patents...merely competitive differentiations rather than fundamental technological changes" &lt;/strong&gt; . 	&lt;br /&gt; &lt;br /&gt; This quote expressed the perception that only inventions that affect functionality in a fundamental way should be patented. A patent should not be claimed 	for something you cannot do, or does not show any kind of knowledge for how to solve a problem. One interviewee suggested that if a patent is granted 	without use for 3 years either by the owner or through licensing, the patent should be considered invalid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another industry expert explained that numerous patent applications are entered into the system without enough resources and competencies in the government 	to review them well. Albeit suggested in a joking manner, there may be truth to his claim that a knowledgeable intellectual property tech expert would opt 	to work for the more lucrative law firm over the government. He observed over the years a cycle where patents are easily approved, in which if a lawsuit 	arose, the patents are assessed more carefully again, resulting in massive inefficiencies for the system.&lt;/p&gt;
&lt;p&gt;3. Patent Trolls&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The poor execution of the patent system has resulted in the phenomenon of 'patent trolls', or what is more neutrally termed as non-practicing entities 	("NPEs")[&lt;a href="#1"&gt;1&lt;/a&gt;] or patent assertion entities 	("PAEs").[&lt;a href="#2"&gt;2&lt;/a&gt;] As explained by one interviewee, 	the business models of these entities often begin by conceiving of future technologies which may be necessary or foreseeable in the near future. Then, they 	seek to patent those ideas with no intention of actually producing producing or manufacturing the product. The main purpose is to profit through litigation 	and licensing. An example given of a patent trolling company was "Intellectual Ventures", which describes themselves as an "invention capital company" that "owns some of the world's largest and fastest growing intellectual property portfolios"[&lt;a href="#3"&gt;3&lt;/a&gt;]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The difficulty is that patent trolls are virtually indistinguishable from aspiring inventors and engineers, who may seek to manufacture and scale up their 	products through outsourcing and licensing. In addition, the lack of actual production makes valuation, legislation, and enforcement around this practice 	extremely difficult.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; "The problem is, the guys who have patents think it's worth this much money… and the company that wants to license think it's worth another 		amount. From a regulatory or legal point of view, it's very difficult to legislate these things… you can't legislate a value right? In the end, 		it's how much the customer is willing to pay for it. It doesn't matter how many years someone's been working on it, if no one wants to buy it, it's not 		worth anything." &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Robert L Stoll, former USPTO Commissioner of Patents says the most effective way to reduce predatory behavior is to ensure bad patents don't get issued in 	the first place, highlighting a legislation in the America Invests Act of 2011 which allows third parties to challenge granted patents on basis of former prior art, and non-technical financial or product patent.[&lt;a href="#4"&gt;4&lt;/a&gt;] Increased collaboration shown through standards and cross-licensing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The development of standards is very "fashionable" at the moment, according to one interviewee, who expressed his desire for his own company to be more 	involved in the process. However, another interviewee stated that more could be done to enhance collaboration within industry so that technologies could be 	provided free of licensing and ultimately benefit society at large through greater interoperability. Although there are signs of partnerships through 	cross-licensing agreements, particularly amongst larger firms, there are limitations because not everyone, including small firms, can afford it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most interviewees also expressed the need for greater emphasis on knowledge and research, rather than relying on proprietary technologies, which may 	actually hinder technological innovation. Examples given for companies doing this were Google and IBM, who both have more of a research background, and 	potentially have more research and development resources to engage in this kind of work.&lt;/p&gt;
&lt;p&gt;5) Need for more openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One interviewee who had extensive experience in the hackerspace community was an advocate for openness within the industry, and believed many companies had 	the option to become more open and effectively 'outsource' their research and development to the larger community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some successful projects he suggested was an open-sourced graphics processing unit ("GPU"), which does not exist even for the largely open Rasberry Pi. 	Even the development of a lower quality open sourced GPU in the market would result in tremendous demand, in his opinion. The ARM technology, the most 	popular CPU in the market is also currently semi-closed, and could in his opinion have benefited from more openness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One interviewee expressed disappointment that all of the chips in his company was proprietary, even those that were no longer in production due to fear 	that competitors would be able to anticipate future developments from past projects. He suspected that many things were protected simply because the legal 	department assumed confidential and proprietary, without necessarily a coordinated long-term vision from head management. It is this normalized culture in 	industry that is, in his opinion a great hindrance to innovation, development, and accessibility of technology.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="1"&gt;&lt;/a&gt;&lt;/p&gt;
https://www.patentfreedom.com/about-npes/background/
&lt;p&gt;&lt;a name="2"&gt;&lt;/a&gt;&lt;/p&gt;
http://www.ftc.gov/policy/studies/patent-assertion-entities-pae-study
&lt;p&gt;&lt;a name="3"&gt;&lt;/a&gt;&lt;/p&gt;
http://www.intellectualventures.com/about
&lt;p&gt;&lt;a name="4"&gt;&lt;/a&gt;&lt;/p&gt;
http://www.wipo.int/wipo_magazine/en/2014/02/article_0007.html&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-part-3'&gt;https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-part-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maggie</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2014-12-26T13:19:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy">
    <title>Security, Governments, and Data: Technology and Policy</title>
    <link>https://cis-india.org/internet-governance/events/security-governments-data-technology-policy</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;About the Conference&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;&lt;strong&gt;Conference &lt;/strong&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;&lt;span&gt;Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with.  Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws &amp;amp; policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.&lt;/span&gt;&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;Panel Descriptions&lt;/h3&gt;
&lt;p align="left"&gt; &lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt;Challenges &amp;amp; Present Scenario&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities.  The Government of India has taken numerous steps to address and resolve such challenges.  In July 2013, the National Cyber Security Policy  was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52&lt;/span&gt;&lt;sup&gt;nd&lt;/sup&gt;&lt;span&gt; Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre.  CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Law &amp;amp; Policy&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things,  mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Architecture &amp;amp; Technology&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;International and Domestic Markets&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015.  Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised.  Towards this end, the Government of India  has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment.  Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the &lt;/span&gt;&lt;span&gt;Wassenaar agreement, they have yet to be accepted.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;/td&gt;
&lt;td&gt;Key Note Speech&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;/td&gt;
&lt;td&gt;Challenges &amp;amp; Present Scenario&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;/td&gt;
&lt;td&gt;Law &amp;amp; Policy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;/td&gt;
&lt;td&gt;Architecture &amp;amp; Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;/td&gt;
&lt;td&gt;International &amp;amp; Domestic Markets&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.30&lt;/td&gt;
&lt;td&gt;Conclusion &amp;amp; Closing Remarks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-governments-data-technology-policy'&gt;https://cis-india.org/internet-governance/events/security-governments-data-technology-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-24T08:06:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors">
    <title>Thank You To Our 2014 Sponsors</title>
    <link>https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors</link>
    <description>
        &lt;b&gt;Today’s the last day of work in 2014 for the editorial team at MediaNama, though we’ll run a Holiday Wire update intermittently this week, we’ll have a brief year end review for each major segment. Thank you for reading us in 2014, and have a great Christmas and New Year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was &lt;a class="external-link" href="http://www.medianama.com/2014/12/223-thank-you-to-our-2014-sponsors-spice-digital-antfarm-astro-vision-bruceclay-buongiorno-ccavenue-cis-e2e-fortumo-getit-google-india-com-info-edge-onmobile-qualcomm-times-internet/"&gt;published in Medianama&lt;/a&gt; on December 22, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;From the business side, it’s been a great 2015 for us, and we really  appreciate the support we received in 2014 from all our sponsors,  especially Spice Digital, our annual sponsor, and Antfarm,  which supported us for almost the entire year. We’re still working, for  an idea of our 2015 plans and editorial calendar, please see the  presentation &lt;a href="http://www.medianama.com/advertise/" target="_blank" title="advertise on medianama"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annual Sponsor:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/2011/08/223-thank-you-sponsors-one97-spice-digital/spice-logo-3/" rel="attachment wp-att-34993"&gt;&lt;/a&gt;-&lt;a href="http://www.spicedigital.in/" title="Spice Digital "&gt; Spice Digital Ltd&lt;/a&gt;:  a part of Spice Global Group – US$2 Billion conglomerate promoted by  Dr. BK Modi, is one of India’s leading Mobile Value Added Services  company and offers innovative solutions for Telecom Operators,  Enterprises and Government using mobile connectivity media – Voice, SMS,  USSD, WAP &amp;amp; 3G. We are preferred partner of all major telecom  service providers in India and providing services to international  telecom players in over 20 countries across the globe. We are pioneers  in innovation and technology and committed to deliver excellent Award  winning products and services to the customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have exclusive tie-ups with Hungama and PPL for music streaming services.&lt;br /&gt; We have acquired two leading international VAS players, MMS (Indonesia) and Beoworld (Malaysia).&lt;br /&gt; Recently, we had a major financial investment from MediaTek (Taiwan).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our sponsors during 2014:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://antfarm.in/" title="Antfarm"&gt;Antfarm&lt;/a&gt; is  an innovation sandbox based out of Mumbai. It is led by a team of blue  sky thinkers, entrepreneurs and professionals. The company takes great  ideas with disruptive potential, puts together all the key ingredients  of people, technology, strategy, marketing and capital to build these  into scalable companies. The ultimate aim is to create global businesses  that are ideated and built out of India. The first set of companies  launched are &lt;a href="http://stylista.com/"&gt;Stylista.com&lt;/a&gt;, &lt;a href="http://arrive.com/signin"&gt;Arrive.com&lt;/a&gt;, Fork Media, and the farm is currently scaling up ideas in education, travel &amp;amp; leisure, retail, ad-tech and healthcare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.clickastro.com/"&gt;Astro-Vision&lt;/a&gt; is a name easily recognized and held in great esteem in the world of  astrology services. Its products range from software that run on the  latest operating systems to web based solutions for major portals and  the latest range of mobile phones. Astro-Vision’s focus has always been  on providing innovative astrology solutions using the latest  technologies in the field of IT and communications. From Desktop PCs to  internet portals and mobiles phones, Astro- Vision’s range of solutions  includes stand alone applications, online apps and astro content  services. The company has strategic tie-ups with major IT enabled  service networks like Suvidhaa, Reliance world, One stop shop and many  networks under the Government of India’s CSC scheme, including Spanco  and GNG. Many popular Indian websites today are powered by  Astro-Vision’s web based astrology solutions and astrology content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.bruceclay.com/in/" title="Bruceclay"&gt;Bruce Clay&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.buongiorno.com/" title="Buongiorno"&gt;Buongiorno&lt;/a&gt;, founded  in 1999, is known in the worldwide mobile commerce ecosystem for  developing and managing paid apps and content that help consumers get  greater enjoyment from mobile devices. On July 2012, after the  settlement of a successful public tender offer, Buongiorno became a  wholly-owned subsidiary of NTT DOCOMO – a global leader in mobile  telecommunications technologies and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With direct connections to more than 130 telecom operators in 25  countries, over 10 years’ experience and a team of 600 professionals,  Buongiorno makes the mobile internet experience happen for consumers  globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/wp-content/uploads/ccavenue_highres.jpg"&gt;&lt;/a&gt;- &lt;a href="http://www.ccavenue.com/" title="CCAvenue"&gt;CCAvenue&lt;/a&gt; is India’s largest payment gateway solution powering 85% of the  eMerchants in India across all verticals &amp;amp; has played the role of a  catalyst to the growth of ecommerce with real time, multi-currency,  multiple payment options online payment processing services. The  solution is powered by proprietary technology that integrates  transaction-processing, advance shopping cart, Invoicing, mobile page,  risk assessment and fraud control, smart analytical dashboards, live  monitoring of bank gateways, financial reporting etc. CCAvenue is the  only complete PG solution in the country that has the unique ability to  offer the full spectrum of 100+ Internet payment options.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;5 Credit Cards&lt;/li&gt;
&lt;li&gt;50 Debit Cards&lt;/li&gt;
&lt;li&gt;6 ATM cum Debit Cards&lt;/li&gt;
&lt;li&gt;50+ Netbankings&lt;/li&gt;
&lt;li&gt;Mobile Payments&lt;/li&gt;
&lt;li&gt;4 Cash Cards&lt;/li&gt;
&lt;li&gt;CCAvenue PhonePay IVRS Based Payment Systems.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://cis-india.org/"&gt;The Centre for Internet and Society&lt;/a&gt; (CIS)  is a non-profit research organization that works on policy issues  relating to freedom of expression, privacy, accessibility for persons  with disabilities, access to knowledge and IPR reform, and openness  (including open government data, free/open source software, open  standards, open access to scholarly literature, open educational  resources, and open video), and engages in academic research on digital  natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS critically engages with concerns of &lt;a href="http://cis-india.org/about/substantive-areas/digital-pluralism" title="Digital Pluralism"&gt;digital pluralism&lt;/a&gt;, &lt;a href="http://cis-india.org/about/substantive-areas/public-accountability"&gt;public accountability&lt;/a&gt; and &lt;a href="http://cis-india.org/publications/curricula-and-teaching"&gt;pedagogic practices&lt;/a&gt;, in the field of Internet and Society, with particular emphasis on South-South dialogues and exchange.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hosting and Support&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.e2enetworks.com" rel="nofollow" title="E2E Networks"&gt;E2E Networks&lt;/a&gt;:  India’s most clued in dedicated hosting company founded by geeks. E2E  Networks Private Limited has been into the business of providing Low  latency Dedicated Servers and VPS Servers in India since 2009. E2E  Networks goes way beyond merely provisioning servers/cloud  infrastructure. Our expertise includes strategies and managed services  help for implementing the most suitable cloud architecture based on  public, private or hybrid cloud platforms for your web facing or  enterprise applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://fortumo.com/" title="Fortumo"&gt;Fortumo&lt;/a&gt; allows any developer to set up payment processing for web and mobile  services, games or apps using carrier billing. Payments work for PC  applications, web services and HTML5, Android, Windows Phone &amp;amp;  Windows 8 apps. Fortumo supports payments in 81 countries through 300  mobile operators. Get started with our self-service setup (no monthly  fees or minimum volume commitments) at &lt;a href="http://fortumo.com/"&gt;http://fortumo.com&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.freeads.in/" title="FreeAds"&gt;Getit Infomedia&lt;/a&gt; is India’s digital supermarket for SMEs  to get relevant business leads. We seamlessly deliver excellent value  across all media platforms be it Voice, Mobile Applications, Online,  WAP, Web chat, Print etc. The services provide presence, enquiries and  leads to its advertisers while ensuring end users (consumers) have  access to the best information, benefits and offers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Sponsor&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.google.com" title="Google"&gt;Google&lt;/a&gt; is a global technology leader focused on improving the ways people  connect with information. Google’s innovations in web search and  advertising have made its website a top internet property and its brand  one of the most recognized in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.india.com/" title="India.com"&gt;India.com&lt;/a&gt; is a joint venture between two media giants – Zee Entertainment Enterprise Ltd (ZEEL) and www.&lt;a href="http://pmc.india.com/"&gt;PMC.com&lt;/a&gt; is  all about the new India that is funny, witty, shocking. It shows the  new age Indian in their language. India.com provides a perspective that  is reflective of the changing dynamic of the role media plays in India.  Find out what the new India is saying only at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;. Discover India and Indians at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt; for  no one covers the new India as &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;! Get the latest updates follow @indiacom on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.infoedge.in/"&gt;Info Edge (India) Limited&lt;/a&gt; is among the leading internet companies in India. Info Edge runs leading  internet businesses – Naukri.com -India’s no. 1 job site,  Jeevansathi.com – one of the leading matrimonial portal,99acres.com –  India’s No.1 real estate portal and Shiksha.com – India’s leading  education portal. The company also owns Quadrangle – an offline  executive search business, and Naukri Gulf (a leading jobsite in the  Middle East market). Info Edge also owns Brijj.com, a professional  networking site and Allcheckdeals.com, an online real estate brokerage  firm which is run as a subsidiary company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.onmobile.com/"&gt;OnMobile Global Ltd&lt;/a&gt;.  is a pioneer in white-labelled, Value Added Products and Services [VAS]  for mobile, landline and media service providers. The #1 VAS specialist  in emerging and high-growth markets, OnMobile touches the lives of over  1500 million mobile users across 55 countries each month. With our  diverse product portfolio of Mobile Music, multi-screen Video Gateway  and delivery solutions, Phone Backup and Personal Cloud Management  solutions, Voice and Video portals, M-Commerce products and services, we  generate 2 – 5% contribution for top customers and top line revenues of  over US $800 million for over 92 customers globally. We deliver our  products by the best combination of a hosted Cloud with on-site  operations at the customer premises or through products deployed in  customer networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Founded in 2000, OnMobile has business spread across India, U.S.,  LATAM, Africa, Australia, Middle East and Europe. The company was  publicly listed in India in 2008. Recent acquisitions include Voxmobili  (2007), Telisma (2008), Dilithium Networks (2010) and LiveWire (2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OnMobile is the first Indian telecom VAS Company to go public. The  company’s shares are listed on the Bombay Stock Exchange (BSE) and the  National Stock Exchange (NSE) as on March 31, 2010&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://qualcommventures.com/" title="Qualcomm Ventures"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.qualcommventures.com/" title="Qualcomm Ventures"&gt;Qualcomm Ventures&lt;/a&gt; is the investment arm of Qualcomm Inc. (NASDAQ: QCOM), a Fortune 500  company with operations across the globe.As the Venture Capital  investment arm of Qualcomm, the world leader in next-generation mobile  technologies, Qualcomm Ventures has been making strategic investments in  early-stage technology companies since 2000. With a $500 million fund  commitment, Qualcomm Ventures seeks to make strategic investments in  early stage high-technology companies that have the potential to  dramatically transform our world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;QPRIZE (&lt;a href="http://www.qprize.com/"&gt;www.qprize.com&lt;/a&gt;)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;QPrize™ is Qualcomm Venture’s Seed investment competition. It’s  designed to provide entrepreneurs their first level of funding so they  can launch their idea into a successful start-up business. The QPRIZE  competition was first launched in 2009 to promote innovation in the  technology industry and is designed to identify the industry’s most  promising early-stage technology companies. We are looking for bright,  energetic and resourceful entrepreneurs who have a passion for bringing  new technologies and services to market. Our goal is to have QPrize act  as a catalyst for our winners, providing the initial capital to launch  their great ideas and support the company to its first institutional  funding round.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.timesinternet.in/"&gt;Times Internet (TIL)&lt;/a&gt; is a premier digital product company and the digital arm of The Times  of India Group. It reaches over 100m visitors and serves 2 billion  pageviews every month across web and mobile, with businesses across  news, entertainment, sports, local, ecommerce, classifieds, startup  investments, local partnerships, and more.TIL’s key properties in the  news category include&lt;a href="http://t.signauxtrois.com/link?url=http://timesofindia.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=9862a753-3036-4fb0-d995-d0f039be5863"&gt;timesofindia.com&lt;/a&gt;, &lt;a href="http://t.signauxtrois.com/link?url=http://economictimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=ad63a5e6-eeea-4036-a025-091733356fe5"&gt;economictimes.com&lt;/a&gt; and &lt;a href="http://t.signauxtrois.com/link?url=http://navbharattimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=deefd481-21fd-4574-f85e-bd03ecd42c23"&gt;navbharattimes.com&lt;/a&gt;.  Under its fold are topmost internet entertainment portals in India —  Gaana.com – the music broadcasting service and BoxTV.com – the video  streaming site. Indiatimes Shopping emerges as one of the top five  e-commerce companies in India &amp;amp; TimesCity, a lifestyle destination  covering recommendations across Restaurants, Movies, Events, Nightlife  in your city. Times Internet has also entered into partnerships with  global companies offering them its tremendous reach through online media  platforms under its initiative called &lt;a href="http://timesofindia.indiatimes.com/topic/TLP"&gt;Times Global Partners(TGP)&lt;/a&gt;.  The TGP portfolio ranges from licensing partnerships to investments and  acquisition. In the last year, TGP has made four acquisitions, twelve  global partnerships, four minority investments and over 20 investments  into start-ups through TLabs in the Indian ecosystem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors'&gt;https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T14:27:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/cis-statement-on-limitations-and-exceptions-for-education-teaching-research-institutions-and-persons-with-disabilities">
    <title>29th Session of the WIPO SCCR: Statement on the Limitations and Exceptions for Education, Teaching, Research Institutions and Persons with Disabilities</title>
    <link>https://cis-india.org/a2k/blogs/cis-statement-on-limitations-and-exceptions-for-education-teaching-research-institutions-and-persons-with-disabilities</link>
    <description>
        &lt;b&gt;At the 29th session of WIPO's SCCR, the Chair, Martin Moscoso, requested NGOs to send in their statements on limitations and exceptions for education, teaching, research institutions and persons with disabilities in writing, to be placed on the record. Nehaa Chaudhari, on behalf of the Centre for Internet and Society (CIS) sent in this written statement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Thank you very much, Mr. Chair.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we have always maintained in the past sessions of this Committee, the Centre for Internet and Society strongly believes that everyone, regardless of 	borders and barriers, either physical, or those created by time, distance and costs should have access to knowledge and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To that end, we strongly support the proposal made by India, earlier, on continuing constructive work in this area. We also welcome the suggestion by the 	Indian delegation on a synthesis of these issues (facilitated by an expert, through the Chair), so that we can have a constructive discussion on these 	issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chair, we are very mindful of the fact that there exists a very real, very demonstrable need for limitations and exceptions for education, teaching and 	research institutions and also for the benefit of persons with disabilities. There is also an equally crucial need to ensure that these limitations and 	exceptions are open ended and are appropriate for the digital environment; a conversation we believe that is imperative for Member Nations to take forward, 	definitely more so than one around granting a 'para-copyright' for organizations that already enjoy a great deal of protection under existing treaties, and 	are far less vulnerable than beneficiaries of these limitations and exceptions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We thank the United States of America for their document- SCCR/27/8 on the Objectives and Principles for Exceptions and Limitations for Educational, 	Teaching and Research Institutions. We appreciate the recognition of the copyright system in the dissemination of works of authorship as well as the 	critical role that it plays in the promotion of educational, teaching and research objectives. We also appreciate the acknowledgement of a balance of 	rights and exceptions and limitations sustaining the role and activities of educational, teaching and research institutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, we do believe that for a true balance to be achieved between rights and limitations and exceptions, the rights of the users of copyrighted works 	for the purposes of access to knowledge will have to be treated on par with those of the rights holders themselves. We believe that for this to be 	possible, measures will have to be taken to ensure international interoperability of limitations and exceptions and international standards suitable to 	address emerging and present issues of the digital environment will have to be developed. As we have submitted before this Committee earlier, it is our 	belief that the present international legal framework does not sufficiently address the opportunities presented by these information and communication 	technologies. Mr. Chair, we reiterate the need for open ended exceptions and limitations in this area, that will facilitate a cross border exchange of 	books and other learning material.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a first step towards this end, we urge Member States to collaborate on and engage in substantive discussions building on existing Working Documents 	presently before this Committee. We look forward to an engaging discussion and providing all our complete support as we move forward on this very important 	agenda item.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thank you, Mister Chair.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/cis-statement-on-limitations-and-exceptions-for-education-teaching-research-institutions-and-persons-with-disabilities'&gt;https://cis-india.org/a2k/blogs/cis-statement-on-limitations-and-exceptions-for-education-teaching-research-institutions-and-persons-with-disabilities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Limitations &amp; Exceptions</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>WIPO</dc:subject>
    

   <dc:date>2014-12-20T13:40:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/news/e-gov-reach-december-15-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not">
    <title>When technology is able but the mindset is not</title>
    <link>https://cis-india.org/accessibility/news/e-gov-reach-december-15-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not</link>
    <description>
        &lt;b&gt;There are enough digital products and services to help people with disabilities. But widespread ignorance stands between them and digital inclusion reports Geetanjali Minhas.&lt;/b&gt;
        &lt;p class="rtejustify" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://egovreach.in/social/content/when-technology-able-mindset-not?whois=&amp;amp;serarr="&gt;&lt;i&gt;The story appeared in 1-15 December 2014 issue of Governance Now&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Twenty-four-year-old Bhavesh Patel moves around  giving a demonstration of the screen reader Dolphin Supernova in such a  sure-footed manner that no one can imagine he is totally blind. The  device has a voiceover function that can be used on iPhone.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Not just that, Patel travels every day from his  home in Vikhroli to his office in Goregaon, changing buses and trains  with minimal assistance.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Patel’s colleague, Debashish, who is autistic, and no less capable, is known for his immaculate spellings within the company.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Team leader Priti Rohra, despite low vision,  skillfully heads the testing team for websites and meticulously ensures  that guidelines for the disabled are adhered to. Rohra works on policies  and research and has prepared many reports for BarrierBreak, a company  where 75 percent of the staff has disabilities like autism, inhibited  vision and impaired hearing.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Its unique competitive advantage has allowed the  company to help develop niche products and services for converting  textbooks into more disabled-friendly formats like digital talking books  (Epub Conversion). Till now, it has produced 1.5 million pages of  disabled-friendly textbooks.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;“When the government provides technology to its  own employees it is enhancing their productivity,” says Shilpi Kapoor,  founder-director of BarrierBreak and a member of the Nasscom Disability  Advisory Group. “The fundamental difference here is that  internationally, disability inclusion is a mandate, whereas in India it  is considered charity and therefore a challenge. As a result many  disabled are denied jobs as per their calibre and given salaries as  doles.”&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;The priority given to policies for development of  disabled-friendly information technology tools and services has been  relatively low in India. Usually, it stems from an inaccurate  understanding that the development of such tools and services will cost  more money, and there will be no opportunity to recover it from the  market.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;A critical component of digital inclusion is to  make websites and applications disabled-friendly. Most websites are not  compliant with international guidelines on disabled-friendly  requirements. Developers, officials and policy makers give disability  accessibility a cold shoulder, retrofitting it into existing policies  and processes as an after-thought.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;An attitudinal shift might come if the new  national policy on universal electronic accessibility (NPUEA) notified  by DeitY is implemented, resulting in nearly 7,000 government websites  becoming accessible to the disabled, especially visually impaired.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Various reports, including a 2012 survey by the  Centre for Internet and Society (CIS), found that almost 25 percent of  7,800 government websites failed to open and the remaining had  accessibility barriers. The web accessibility survey report of Indian  government websites by the national centre for promotion of employment  for disabled people (NCPEDP) in 2012 too revealed that of the 200  government websites tested, only two were found to be disabled-friendly.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;“Disability is a major social issue that India is  grappling with. It needs to be addressed through not just policy, but  also through assistive technology solutions,” says Prakash Kumar, CEO,  Goods and Services Tax Network.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;CIS executive director Sunil Abraham, who was on  the committee that formulated the NPUEA, says besides non-confirmation  of websites to international norms, there are many technical hurdles.  Text-to-speech and speech-to-text software, mature optical character  recognition systems, speech and grammar check and machine translation  are some of the features that are still not available for most Indian  languages, he adds. “Many government websites use font encoding for  Indian languages which results in the failure of text-to-speech  technologies.”&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;DeitY, under the ministry of communication and  information technology, is supporting some technology interventions for  the disabled, across different Indian languages. This also includes  text-to-speech tools. “Mobile phone manufacturers should also provide  in-built tools to cater to the needs of disabled people,” points out  Ajay Kumar, joint secretary, DeitY.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Emphasising a strong legal framework for  implementation of the policy, Kumar adds that though the new policy  promotes disability inclusion, the information technology ministry does  not have the legal backing to enforce it. “The ministry of social  justice and empowerment is creating a legal framework for the bill that  is under consideration by the concerned committee to mandate some of  these things, including technology assistance for the disabled,” he  adds.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Abraham says besides ensuring that websites and  services are accessible to the disabled, the new policy must be updated  to include a mandate that all parties providing essential services to  the general public must comply with accessibility standards.  “Manufacturers of ICT products should provide at least one accessible  model of their products within each price range that they are operating  within,” he says.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Sam Taraporevala, associate professor and head of  sociology department, St. Xavier’s College, Mumbai and the director of  Xavier’s resource centre for the visually challenged, says with the  government accepting a policy that IT tools should follow accessibility  standards, it is now a question of monitoring, and, perhaps, even  judicial activism.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Nirmita Narasimhan, policy director, CIS, who  works closely with various government departments to bring accessibility  into their policies and programmes, concurs. “There must be  accountability and a monitoring mechanism to check whether websites are  disability compliant,” she says.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Maharashtra is the only state to make it  compulsory for every department to have a scheme for procuring  disability access products. Yet, compliance remains a problem. “Despite  the government holding awareness camps at various districts, barriers  are created for accessing government schemes. Resistance on part of  government agencies to give out equipment to disabled people and lack of  awareness among people about the availability of such facilities are  the other stumbling blocks. Yet, there are ways for getting these  products,” says Kapoor.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Experts say the needs and requirements of the  disabled vary according to their disability and affordability of tools.  Also, low income levels of many disabled people is a dissuading factor  toprocuring equipment. “Most available tools and technologies are  proprietary and, hence, costly and we are not able to scale them up in a  big way,” says Kumar.&lt;/p&gt;
&lt;p class="rtejustify" style="text-align: justify; "&gt;Taraporevala, born with 100% visual impairment,  was instrumental in getting the guidelines for opening and operating  demat accounts for visually impaired persons implemented. He also says  mainstream consumer product companies are moving into touchscreen modes  in mobile phones forgetting a large chunk of disabled population. “While  the standards are there, implementation suffers due to lack of  awareness which, in turn, leads to less demand,” he says.&lt;/p&gt;
&lt;h3 class="rtejustify" style="text-align: justify; "&gt;The way forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governance Now also asked experts if corporate social responsibility (CSR) towards disability inclusion could address challenges in recruitment of disabled persons. “Instead of a hammer approach, a care approach has to be adopted,” ​​says Rita Soni, CEO​, Nasscom Foundation. According to ​Kumar, “Absence of commercial interest in promoting disability accessibility products has afflicted the sector with neglect.” However, Kapoor says, “This has to be an equal opportunity business. There will be differential costs, but at the same time the total number of disabled people in India is close to 70 million and a billion world over. How can you not treat them like a client?”&lt;br /&gt;&lt;br /&gt;Speaking of the revised CSR rules under the Companies Act, Soni adds, “You can support skilling of persons with disabilities that has nothing to do with your business and have it considered as CSR expenditure. But if you make your office building or internet accessible, it does not count. Creating incentives around disability will make us a more inclusive society and make disability more amenable to office environment.”&lt;br /&gt;&lt;br /&gt;Maharashtra IT secretary Rajesh Aggarwal adds, except for the metro, none of our public transport systems are disabled-friendly. As per national building code of India, while giving permissions for public buildings there must be a checklist to ensure that buildings and toilets are wheelchair and blind-friendly. Similarly, hotels must have few rooms which are disabled-friendly.” This awareness has not yet set in,” he says.&lt;br /&gt;&lt;br /&gt;The Asia-Pacific region study of UNESCO global report 2013 has said many countries in the developing world are struggling to attain their millennium development goals of providing universal primary education to all by 2015. Our education system, on the other hand, has serious flaws. “We do not teach professionals about assistive technologies and for that reason an eye doctor does not know about low vision aids or a speech therapist does not know how to use communication devices,” says Kapoor.&lt;br /&gt; &lt;br /&gt;Taraporevala is of the view that universal (architectural) design needs to be actively woven into every design curriculum across the spectrum, instead of being an optional subject. Physical infrastructure, building standards, for instance, need to reflect this and there needs to be active lobbying to ensure that certificates for public places are not given if they lack certain standards.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/news/e-gov-reach-december-15-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not'&gt;https://cis-india.org/accessibility/news/e-gov-reach-december-15-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-12-19T01:33:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/ip-watch-catherine-saez-december-18-2014-wipo-study-on-copyright-exceptions-stimulates-broad-discussion-with-author">
    <title>At WIPO, Study On Copyright Exceptions Stimulates Broad Discussion With Author</title>
    <link>https://cis-india.org/a2k/news/ip-watch-catherine-saez-december-18-2014-wipo-study-on-copyright-exceptions-stimulates-broad-discussion-with-author</link>
    <description>
        &lt;b&gt;During the recent meeting of the World Intellectual Property Organization copyright committee, a study was presented on exceptions and limitations to copyright for libraries and archives at the national level. The presentation spurred a full day of discussion about how to ensure libraries can continue to provide an indispensable service, and a substantive exchange with the author. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Catherine Saez was &lt;a class="external-link" href="http://www.ip-watch.org/2014/12/18/wipo-study-on-copyright-exceptions-stimulates-broad-discussion-with-author/"&gt;published in Intellectual Property Watch&lt;/a&gt; on December 18, 2014&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.wipo.int/meetings/en/details.jsp?meeting_id=32094"&gt;The 29th session&lt;/a&gt; of the Standing Committee on Copyright and Related Rights (SCCR) took place from 8-12 December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  10 December, Kenneth Crews, former director of the copyright advisory  office at Columbia University and now in the private sector, presented &lt;a href="http://www.wipo.int/edocs/mdocs/copyright/en/sccr_29/sccr_29_3.pdf"&gt;an update&lt;/a&gt; [pdf] of his 2008 WIPO-commissioned study on Copyright Limitations and Exceptions for Libraries and Archives (&lt;a href="http://www.ip-watch.org/2014/12/12/copyright-exceptions-for-libraries-wipo-should-step-up-before-someone-else-does-researcher-says/"&gt;&lt;i&gt;IPW&lt;/i&gt;, WIPO, 12 December 2014&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  study provided safe ground for broad discussions on the sensitive issue  of exceptions and limitations, and the role of WIPO in the issue, with a  large number of countries taking the floor to offer comments on the  study and its findings, providing specific details on their own  legislation and/or asking questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Harmonisation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mexico,  for example, asked whether there was a general movement leading to a  harmonisation exercise in international copyright law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Crews  answered there was no movement toward an era of harmonisation, but  harmonisation could be an answer in the field of limitations and  exceptions if it left sufficient policy space to countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the  one hand, he said, “there is virtue in harmonisation, in allowing for  the predictability of the law … as your business activities move from  one country to another.” It makes the law easier to understand, and  easier to address some of the issues of cross-border exchange..,” he  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the major disadvantage of harmonisation would be the  loss of opportunity for countries to “experiment, test new ideas in  lawmaking, and to move in some new directions,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maybe  the answer lies in the middle, said Crews: harmonise the law to a  certain extent, “and then leave some of the details to individual  countries.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The European Union delegate remarked that even in an  integrated legal system such as the EU, very few exceptions to copyright  are mandatory for EU members. Member states “remain free to implement  most of the exceptions in the EU legislation in their national systems,”  he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Implementation Issues&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tunisia  stressed the issue of the implementation of copyright exceptions and  limitations in developing countries, particularly for libraries.  Libraries often are “fearful of the complications,” referring to the  exceptions and limitations legislation, and simply do not use it,  preferring “what is possible and available,” he said&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Crews said it  is important to find “the right formula” for drafting a statute that is  detailed enough that users are law-abiding citizens, “and at the same  time not be so complicated in the structure of the law that it is  difficult or impractical for most – even trained professionals – to  follow.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cross-Border Exchange, TPMs&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Brazil  said the study sheds light on certain areas where further cooperation  would be welcome. The Brazilian delegate said this cooperation could  take into account the dynamic evolution of digital technologies and the  “growing cross-border cooperation among libraries and archives.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  delegate said some factors pose concrete problems for cross-border  cooperation, such as the fact that some 33 WIPO members do not provide  exceptions for libraries, and a higher number of countries do not  provide exceptions and limitations that “could be deemed adequate” to  address the new challenges created by the digital environment, and  limitations and exceptions provided by national legislation vary deeply  from country to country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now that the research has started with  the 2008 report has been updated, we can see that from the universe of  the WIPO membership 33 countries still do not provide limitations and  exceptions for libraries and archives in their national legislation. A  even greater number of WIPO members do not seem to provide limitations  and exceptions that could be deemed adequate in order to address the new  challenges libraries and archives increasingly face with the emergence  of the digital environment&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also said the study states that  technological protection measures (TPM) can have a negative impact on  countries’ ability to “legitimately implement exceptions and  limitations,” which is a “growing concern as countries seek to better  regulate and avoid abuses in the use of TPMs.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Crews said the  issue of cross-border activity and the difficulty in cooperation between  countries induced by the difference in laws is perhaps one of the most  important that WIPO could address. Part of the solution to that problem  might be a trusted third party facilitating the transfer of copyrighted  works, he said. A sharing of resources should be allowed while  protecting the interest of right-holders, he said, “so that they can  participate in this and encourage this activity as well.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many  developing countries keep insisting that the major issue for libraries  and archives is the digital era. The digital revolution “has barely  begun,” Crews said. “The transformation of technology and the way we  communicate and the way we share information is only beginning, so it is  important not to prescribe exact details, but … to take some steps to  open up the issue,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chile also underlined the fact that the study showed a low number of countries providing exceptions for interlibrary loans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to Crews, using licences for cross-border activities is limited to the  countries which the licence covers. The risks of having licences as a  solution to cross-border exchange is that “it leaves the terms to  private negotiations,” and many countries might not have laws on  licensing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Licensing Agreements&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sweden said  the country has a dual system: “traditional limitations” in the law or  preservation and replacement, for example, and a licensing agreement  system. The two systems run side-by-side smoothly, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Crews  said that the licensing agreement system is not adaptable to all  countries. “There are many reasons why it has not been adopted” in some  countries, he said, adding, “I would express some concern about  requiring it as an international matter.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The European Union said  exceptions and limitations and licences often coexist well. Those  licences are often collectively negotiated, said the EU delegate, and  sometimes cover broader uses than the exceptions themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Crews  said conceptually in the law-making process, countries need to reckon  with the relationship not only of the rights of owners and the public  rights of use or the copyright exceptions, but also the role of  licences, and should they be allowed to override an exception that is in  the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“That is a tough question,” he said. “It not only goes  to the balance of rights,” he added, but lawmakers should decide to what  extent an agreement can impede the statute they have worked hard to  develop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Countries Provide Clarifications, New Legislations&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some  countries provided clarifications or additions to the study. For  example, Saudi Arabia, which was mentioned in the study as one of the  countries with no exceptions and limitations, said the 1984 copyright  law provides an exception in paragraph 3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ecuador said it is  working on a substantial reform of its current intellectual property  legislation, including exceptions and limitations for people with  disabilities, teaching and educational institutions, and libraries and  archives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;China said it is undergoing the third revision of its  copyright law, and Thailand said in November it passed an amendment to  its copyright law, on TPMs, and this amendment includes an exemption for  the circumvention of TPM for libraries and archives, educational  institutes, and public broadcasting organisations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Crews said many  countries, including the United States and those in the European Union,  have exceptions for TPMs, with two basic procedures: an exception that  allows the user to “do the act of circumventing the measures to access  the content,” and a legal system that calls on the rights holder to  provide the means to users to access the content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United  States said the US Congress is currently reviewing elements of its  domestic copyright law, including library-related exceptions and  limitations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In November, the Czech Republic introduced a new  amendment to its copyright system, the delegate said, “and the amendment  brought a new exception for libraries and archives and for other  cultural and educational institutions and for public broadcasters,”  enabling them to use orphan works existing in their collection, under  specific terms and for certain specific uses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;NGO Questions and Comments&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  representative of the Electronic Information for Libraries (eIFL) asked  Crews how WIPO, as a United Nations agency with a commitment to enhance  developing countries’ participation in the global innovation economy,  could support countries to be at the forefront of digital developments.  The representative also asked how libraries can accommodate their  increasing need to send and receive information across border, within  the realm of copyright law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many countries have either no  exceptions, or have exceptions but very limited applications, which do  not cover digital technology, Crews said, adding that WIPO is in a  position to shape the next model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The International Publishers  Association said that legislation is one thing but to know whether they  are implemented and how they work is another. The representative advised  looking at what kind of practice, and also practical initiatives  between stakeholders can solve issues at stake.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In many cases, the  representative said, issues are solved by alternative means, citing  collective licensing, but also solutions bringing together stakeholders,  he said, which provide space and flexibility for adaptation and further  change. On cross-border document delivery, he said, “It is not true  that documents are not crossing continents or crossing borders.” He  explained that there are many alternative ways of receiving content  across borders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Crews said he is supportive of alternatives  outside of the law, however, they might not be optimal solutions, he  said. In particular, it often takes no less time to develop those  alternatives than writing law, he said. He added that those  alternatives, such as licences, are available only with respect to  certain types of works, whereas statues apply to all types of works.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The private extra-legal systems are not going to solve all of the issues,” said Crews.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  International Federation of Library Associations and Institutions said  the United Kingdom reform of its copyright law includes for the first  time provisions that prevent contracts and licences from overriding the  exceptions and limitations enjoyed by libraries and archives for  non-commercial uses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Center for Internet and Society (India)  asked about the interoperability of limitations and exceptions to allow  for easier trans-boundary movement of works. Crews said the trans-border  concept seldom appears in library exceptions. Trans-border sometimes is  governed by copyright law and sometimes by some other part of national  law, such as import and export, he said. Some degree of harmonisation  can help with interoperability, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In general terms, and  following an intervention by the TransAtlantic Consumer Dialogue  mentioning public involvement in the discussions, Crews said, “We are  all copyright owners and we are all users of other people’s copyrights  to some extent.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The public does not realise that they are all  owners and users of copyrighted works on a daily basis, he said, and  they need to become participants in the process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;[Update:]&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge  Ecology International asked if the periodical revision of the Berne  Convention’s standards for copyright exceptions, which ended in 1971,  should be resumed. The KEI representative also asked whether the  copyright three-step test contained in the World Trade Organization  Agreement on Trade-Related Aspects of Intellectual Property Rights  (TRIPS) applies to specific limitations and exceptions to remedies for  infringement, in part III of TRIPS (Enforcement of Intellectual Property  Rights).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Crews answered that the three-step test does not apply  to the remedies, or other matters. The test is on “its own terms  applicable to the limitations and exceptions,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the  revision on the Berne Convention, Crews said “the answer is yes” but it  is a “bigger subject than we are convened here today to discuss.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;KEI  also mentioned a Spanish tax which “apparently” is taken on snippets  from news organisations and asked if this tax does not violate the two  mandatory exceptions in the Berne Convention, which are news of the day,  and quotations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Crews said the issue might be about the  interrelationship of copyright with other areas of the law. The Spanish  tax mentioned might be relative to a tax law, he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/ip-watch-catherine-saez-december-18-2014-wipo-study-on-copyright-exceptions-stimulates-broad-discussion-with-author'&gt;https://cis-india.org/a2k/news/ip-watch-catherine-saez-december-18-2014-wipo-study-on-copyright-exceptions-stimulates-broad-discussion-with-author&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>WIPO</dc:subject>
    

   <dc:date>2014-12-27T14:33:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/policy-brief-availability-accessibility-govt-information-public-domain.pdf">
    <title>Policy Brief: Availability and Accessibility of Government Information in the Public Domain</title>
    <link>https://cis-india.org/accessibility/blog/policy-brief-availability-accessibility-govt-information-public-domain.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/policy-brief-availability-accessibility-govt-information-public-domain.pdf'&gt;https://cis-india.org/accessibility/blog/policy-brief-availability-accessibility-govt-information-public-domain.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-12-15T12:31:01Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law">
    <title>Identifying Aspects of Privacy in Islamic Law</title>
    <link>https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law</link>
    <description>
        &lt;b&gt;This white paper seeks to identify aspects of privacy in Islamic Law and demonstrate that the notion of privacy was recognized and protected in traditional Islamic law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I. Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nuances of privacy have been deliberated by numerous scholars till date, without arriving at a definite answer.	&lt;a name="_ftnref1"&gt;&lt;/a&gt; It has been perceived as a right to be left alone,&lt;a name="_ftnref2"&gt;&lt;/a&gt; as mere secrecy,&lt;a name="_ftnref3"&gt;&lt;/a&gt; as the right to a legitimate area of seclusion and solitude.&lt;a name="_ftnref4"&gt;&lt;/a&gt; Privacy is a particularly nebulous concept, with a tendency of resting on intuitionist arguments.	&lt;a name="_ftnref5"&gt;&lt;/a&gt; However, finding refuge in intuitionist arguments has not lent to a clear understanding of the term itself. This presents a peculiar predicament; while privacy is demanded, nobody seems to have a clear understanding of what it truly means.	&lt;a name="_ftnref6"&gt;&lt;/a&gt; Daniel Solove opines that privacy is a concept in disarray, it is about everything and hence it seems to 	be about nothing.&lt;a name="_ftnref7"&gt;&lt;/a&gt; Solove finds agreement in a variety of literature, where privacy has been described as a "chameleon-like word",&lt;a name="_ftnref8"&gt;&lt;/a&gt; a term suffering from an "embarrassment of meanings",	&lt;a name="_ftnref9"&gt;&lt;/a&gt; a "powerful rhetorical battle cry".&lt;a name="_ftnref10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditional notions such as bodily privacy, privacy within one's home, or privacy resulting out of private property are received with far less scepticism 	than more recent aspects of privacy. With the burgeoning increase in information exchange, the ambit of privacy concerns is widened but not always 	understood. While earlier notions of privacy confined themselves to physical intrusions, it is now possible to invade a person's privacy without physically 	intruding on their space. &lt;a name="_ftnref11"&gt;&lt;/a&gt; As capabilities to intrude on privacy increase, the demand for respecting 	privacy grows stronger. In their historic article, Warren and Brandeis referred to privacy as an incorporeal notion, referring to cases of defamation, proprietary harms, contractual harms, breach of confidence to conclude that all such cases belonged to an umbrella principle of the right to privacy.	&lt;a name="_ftnref12"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.II Aspects of Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;William Prosser, a torts scholar, in 1860 attempted to classify privacy comprehensively. He contemplated four kinds of activities as impinging on a 	person's privacy. They were 	&lt;br /&gt; 1. Intrusion upon the plaintiff's seclusion or solitude, or into his private affairs. 	&lt;br /&gt; 2. Public disclosure of embarrassing private facts about the plaintiff. 	&lt;br /&gt; 3. Publicity which places the plaintiff in a false light in the public eye. 	&lt;br /&gt; 4. Appropriation, for the defendant's advantage, of the plaintiff's name or likeness.&lt;a name="_ftnref13"&gt;&lt;/a&gt; &lt;br /&gt; While this classification lent some structure to the understanding of privacy, it restricted itself to only tort law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A wider taxonomy was offered by Daniel Solove, imbibing concerns of digital privacy and information technology. Focussing on activities that invade 	privacy, Solove argued that information collection, aggregation of information, dissemination of such aggregated information and invasion into people's 	private affairs are the aspects integral to understanding the privacy concerns of a data subject.&lt;a name="_ftnref14"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its policy paper on privacy in India, the Data Security Council of India (DSCI) recognised privacy issues in the context of e-commerce, transactional 	privacy, cyber crime, national security, and cross border data flows.&lt;a name="_ftnref15"&gt;&lt;/a&gt; Similarly the Department of Personnel and Training (DoPT) in 2011 focussed on understanding privacy in the context of data protection and surveillance.	&lt;a name="_ftnref16"&gt;&lt;/a&gt; Subsequently, in 2012, the Planning Commission of India set up the A.P. Shah Committee to look into 	issues of data protection. This Committee classified the dimensions of privacy into four main categories; interception and access, audio and video 	recording, access and use of personal identifiers, and bodily and genetic material.&lt;a name="_ftnref17"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The classification of privacy for the purpose of this paper is under the heads of bodily privacy, informational and communications privacy, and territorial 	and locational privacy.&lt;a name="_ftnref18"&gt;&lt;/a&gt; Bodily privacy stems from the notion of personal autonomy and inviolate 	personality. Battery, rape, voyeurism are all examples of the recognition of the need to protect the privacy of one's body. Communications and 	informational privacy refers to the protection of sensitive personal information, specific communications and private conversations. Interception of messages, spying, hacking or tapping phone lines are all activities that impinge on privacy under this head. India's ambitious biometric project,	&lt;i&gt;Aadhar, &lt;/i&gt;has brought to the fore concerns surrounding personal information. Territorial privacy is developed from the notion of private property, 	the tort of trespass being ample recognition of the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.III Is India a Private Nation?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October, 2010, the government published an approach paper for legislation on privacy. In explaining the need for privacy legislation in India, the paper 	states, 	&lt;br /&gt; &lt;br /&gt; &lt;i&gt; "India is not a particularly private nation. Personal information is often shared freely and without thinking twice. Public life is organized without 		much thought to safeguarding personal data. In fact, the public dissemination of personal information has over time, become a way of demonstrating the 		transparent functioning of the government."&lt;a name="_ftnref19"&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notion of privacy being a foreign construct carves the argument that legislation on privacy would mean subjecting India to an alien cultural value. 	However, this ignores the possibility of privacy being culturally subjective.&lt;a name="_ftnref20"&gt;&lt;/a&gt; Cultures have exhibited 	different measurements by which they measure public and private realms.&lt;a name="_ftnref21"&gt;&lt;/a&gt; This paper aims to demonstrate 	that while the word "privacy" does not find explicit reference in traditional Indian law, the essence of privacy as we understand it today has existed in 	traditional Indian culture, specifically Indian Islamic culture, pre-dating colonialism in India and modernity in India's legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.IV Displacement of traditional Indian Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Contemporary Indian law functions within a rubric that was constructed after the "expropriation" of traditional law.	&lt;a name="_ftnref22"&gt;&lt;/a&gt; India's colonial legacy rendered the displacement of traditional Indian law with a unified modern legal system abounding in European ideas of modernity and legal systems, leaving it is a state of "fractured modernity".	&lt;a name="_ftnref23"&gt;&lt;/a&gt; Before the British rule, Indians were governed by their personal laws and these laws did not aim to 	unify the nation in ways that Western legal systems did.&lt;a name="_ftnref24"&gt;&lt;/a&gt;. The decision to establish a modern legal 	system stemmed from the desire to administer the law as a function of the state, which would have been impractical at best in the absence of a unified 	legal system.&lt;a name="_ftnref25"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Edward Said eloquently states that the colonial experience does not end when the last European flag comes down or when the last white policeman leaves.	&lt;a name="_ftnref26"&gt;&lt;/a&gt; One cannot help but agree with Said, as the understanding of law in contemporary India is constructed 	on the principles of the English common law and on ideas of a modern legal system. While the word "privacy" does not arise in traditional law, this paper 	argues that the notions of privacy as we perceive it today did exist hitherto the modernization of India's legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.V Structure of the paper&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Part I has laid down the foundation of this paper and the arguments it endeavours to make, Part II explains the sources of Islamic law and attempts 	at locating privacy in them. It also explains certain pervasive concepts that will enhance an understanding of privacy in Islamic law. This paper restricts itself to &lt;i&gt;Sunni &lt;/i&gt;Islamic law. Part III gives an indication of privacy rights in India's neighbouring Islamic countries (both predominantly	&lt;i&gt;Sunni),&lt;/i&gt; Pakistan and Bangladesh; and highlights the legal framework for privacy in these countries.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II. Privacy in Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.I Sources of Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before locating aspects of privacy in Islamic Law, an understanding of its structure and sources will be helpful. Islamic Law is composed of	&lt;i&gt;Shariah, &lt;/i&gt;and &lt;i&gt;fiqh. Shariah&lt;/i&gt; indicates the path a faithful Muslim must undertake to attain guidance in the present world and deliverance to 	the next&lt;i&gt;.&lt;/i&gt; &lt;i&gt;Fiqh, &lt;/i&gt;the jurisprudence of Islam, refers to the rational understanding of &lt;i&gt;Shariah&lt;/i&gt; and human reasoning to appreciate 	the practical implications of Islam. While &lt;i&gt;Shariah&lt;/i&gt; is divine revelation, &lt;i&gt;fiqh&lt;/i&gt; is the human inference of &lt;i&gt;Shariah&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principle tenet of Islam is unwavering obedience to the teachings of God. According to Muslim belief, the &lt;i&gt;Quran&lt;/i&gt; is the divine communication 	from Allah to the Prophet of Islam. It is the foremost record of the word of God, and for this reason is considered the apex source of Islamic law. It is 	in the &lt;i&gt;Quran&lt;/i&gt; that basic norms of &lt;i&gt;Shariah&lt;/i&gt; are found, and it embodies the exact words of God as was revealed to the Prophet over a period of 23 years. &lt;i&gt;Fiqh&lt;/i&gt;, or the understanding of &lt;i&gt;Shariah&lt;/i&gt;, also finds its origins in the holy &lt;i&gt;Quran&lt;/i&gt;.	&lt;a name="_ftnref27"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Sunnah&lt;/i&gt; or Prophetic traditions are the ingredients for the model behaviour of a Muslim as demonstrated by the Prophet. It is a "way, course, 	rule, mode, or manner, of acting or conduct of life."&lt;a name="_ftnref28"&gt;&lt;/a&gt; The &lt;i&gt;Sunnah&lt;/i&gt; were compiled through the 	communications of Prophet Muhammad in the form of &lt;i&gt;Hadiths&lt;/i&gt; which are communications, stories or conversations; and may be religious or secular; 	historical or recent.&lt;a name="_ftnref29"&gt;&lt;/a&gt; The narrators of the &lt;i&gt;Hadith&lt;/i&gt; are known as "&lt;i&gt;isnad&lt;/i&gt;" who convey the 	"&lt;i&gt;matn&lt;/i&gt;" or the substance of the Prophet's actions or words as narrated through oral communications through the years. Due to its very nature, the accuracy of the &lt;i&gt;Sunnah&lt;/i&gt; came under considerable scrutiny, with concerns as to its possible fabrication and dilution.	&lt;a name="_ftnref30"&gt;&lt;/a&gt; However, with a well devised system of recording and verifying sources, the &lt;i&gt;Sunnah &lt;/i&gt; accompanies the imperative source of Islamic law, the &lt;i&gt;Quran.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other sources of Islam are found in human reasoning, or &lt;i&gt;ijtihad&lt;/i&gt;. &lt;i&gt;Ijtihad &lt;/i&gt;assumes a variety of secondary sources such as analogical reasoning &lt;i&gt;(Qiyas),&lt;/i&gt; unanimous consensus &lt;i&gt;(Ijma),&lt;/i&gt; decisions in favour of public interest (&lt;i&gt;isthihsan), &lt;/i&gt;and presumption of continuity	&lt;i&gt; (istishab)&lt;/i&gt;.&lt;a name="_ftnref31"&gt;&lt;/a&gt; &lt;br /&gt; &lt;i&gt;Ijtihad&lt;/i&gt; entails a resilient effort; an exertion in interpreting the primary sources in order to understand &lt;i&gt;Shariah, &lt;/i&gt;to infer the law which is not explicit 	or evident. The legitimacy of &lt;i&gt;Ijma&lt;/i&gt; is found in the Prophetic tradition, which states that the followers of Islam would never agree on an error, 	and will never unite on misguidance.&lt;a name="_ftnref32"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Quran and Sunnah &lt;/i&gt;lie at the pinnacle of Islamic jurisprudence and their authoritativeness lends a ready inference of legal principles derived from them. In exploring the concept of Privacy in Islamic Law, this paper will focus mainly on the material available in the &lt;i&gt;Quran &lt;/i&gt;and	&lt;i&gt;Sunnah.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.II The Public and Private in Islam&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the doctrine of &lt;i&gt;Shariah&lt;/i&gt;, every aspect of life is deemed to be private unless shown otherwise.	&lt;a name="_ftnref33"&gt;&lt;/a&gt; The public sphere is that in which governmental authority operates, making it both transparent and 	open to scrutiny and observation. Since its inception, Islam has considered the idea of governance with reasonable scepticism, ascribing to the view that 	there is no concept of a human ruler beyond reproach.&lt;a name="_ftnref34"&gt;&lt;/a&gt; This perhaps gave impetus to the idea of a 	private sphere as one that is inhabited exclusively by an individual and the divine, excluding any interference of the State; except with permission from 	religious law. In Islamic belief, a pious individual had submitted himself to God, and not the worldly State. Hence, all aspects of his life will align 	with the tenets of Islamic law and in pursuance with the will of God.&lt;a name="_ftnref35"&gt;&lt;/a&gt; Any failure to perform religious duties on the part of a Muslim is beyond the scope of another; it is only a consideration between him and the divine.	&lt;a name="_ftnref36"&gt;&lt;/a&gt; It is believed that the Prophet said, 	&lt;i&gt; "Those, who acknowledge God in words, and not at heart, do not find fault with their fellow Muslims. The wrongdoing of those who do so become the 		subject of God's scrutiny, and when God looks into someone's wrongdoing then all shall be truly exposed" &lt;/i&gt; &lt;a name="_ftnref37"&gt;&lt;/a&gt; The individual is bestowed with complete freedom of action in the private sphere, subject only to the will of the divine. To govern another is wholly 	beyond the capacity of any individual, and this forms a pervasive theme in Islamic jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic Law recognizes that it is inevitable for every society to impose certain requirements on individuals both by the law and by societal norms. In 	respect of a public domain, Islam prescribes an amalgam of requirements of a Muslim community and the teachings of Islam. While committing sins in private is beyond the scope of public or governmental scrutiny, committing a sin in public amounts to a crime, meriting worldly punishment.	&lt;a name="_ftnref38"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic law provides for an individual's obligations to the divine at all times, and to the state in matters within the public domain.	&lt;a name="_ftnref39"&gt;&lt;/a&gt; This is the most striking difference between Islamic law and modern law, as the function of enforcement of the law and punishment are forfeited to the state in a modern legal system, by virtue of the social contract.	&lt;a name="_ftnref40"&gt;&lt;/a&gt; However, in Islamic societies, the concept of social contract does not exist. Instead, an individual's 	obligations lie to the state only if acts meriting worldly punishment occur in the public sphere.&lt;a name="_ftnref41"&gt;&lt;/a&gt; It is 	this distinction in the obligations of individuals that leads to conflicts between the application of Islamic law and modern law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Quran&lt;/i&gt; is replete with rules for all believers to ordain good and forbid evil (al-amrbi al-Ma'rufwa al-nahy 'an al-munkar').	&lt;a name="_ftnref42"&gt;&lt;/a&gt; This divine injunction is a restriction of freedom in the private sphere. The notion of privacy in the 	public sphere was tested through the office of the &lt;i&gt;muhtasib,&lt;/i&gt; or compliance officer. These officers were appointed to ensure that the quality of life is preserved in Islamic societies. Personal or private matters which were visible in the public realm were liable to scrutiny from the	&lt;i&gt;muhtasib&lt;/i&gt; as well. However, this does not extend to matters such as surveillance and spying even on the authority of the state. The Prophet, 	according to the &lt;i&gt;hadith &lt;/i&gt;of Amir Mu'awiyah remarked, &lt;b&gt;&lt;i&gt;"&lt;/i&gt;&lt;/b&gt; &lt;i&gt; If&lt;b&gt; &lt;/b&gt;you try to find out the secrets of the people, then you will definitely spoil them or at least you will bring them to the verge of 		ruin." &lt;/i&gt; &lt;a name="_ftnref43"&gt;&lt;/a&gt; In fact, modern jurists admonish the idea of surveillance as &lt;i&gt;"exactly what Islam has called as the root cause of mischief in politics.&lt;/i&gt;"	&lt;a name="_ftnref44"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.III. Privacy in Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sanctity of one's bodily privacy is well recognised in Islamic Law. The &lt;i&gt;Quran&lt;/i&gt; (24:58)&lt;a name="_ftnref45"&gt;&lt;/a&gt; demarcates certain periods in a day which are times of privacy for an individual, and indicates the need for prior permission before one may enter the 	private sphere of another. These periods are before the prayer at dawn, during the afternoon where one rests, and after the night prayer. This verse also calls upon children who have not yet reached the age of puberty to get accustomed to asking for permission before entering rooms apart from their own.	&lt;a name="_ftnref46"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as bodily seizure of individuals accused of crimes goes, the Traditions indicate a general disinclination towards pre-adjudication restraint of individuals. The very occurrence of it appears to be a cause of discomfort as recorded in the Traditions.	&lt;a name="_ftnref47"&gt;&lt;/a&gt; One of the Prophet's closest companions, Umar, is believed to have encourages officials to speed up adjudication processes so that the accused could not be deprived of the comfort of their homes and families.	&lt;a name="_ftnref48"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;bodily privacy and modesty&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Quran stipulates gender equality, the norms of bodily privacy and modesty applicable to men are far less rigorous than the rules of modesty 	that apply to women.&lt;a name="_ftnref49"&gt;&lt;/a&gt; While staring is not contemplated as a crime in modern jurisdictions, the Quran 	directs "believing men to lower their gaze and be modest." &lt;a name="_ftnref50"&gt;&lt;/a&gt; At the same time, it directs women to adhere to strict rules of clothing and conduct, with directions on how to conduct oneself both in private as well as public.	&lt;a name="_ftnref51"&gt;&lt;/a&gt; Interestingly, with the use of full-body scanners at airports around the world, the bodily privacy of Muslims came to the forefront with several Muslim scholars opining that such use of scanners was in direct violation of the tenets of Islam.&lt;a name="_ftnref52"&gt;&lt;/a&gt; According to the Quran, the modesty of a Muslim woman is an indication of her faith.	&lt;a name="_ftnref53"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communication and Informational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is, in many ways, inextricably linked to the notions of personal autonomy, and inviolate personality. Privacy in matters apart from those concerned with proprietary interests was only developed as a legal idea around the ninth century, although the &lt;i&gt;Quran &lt;/i&gt;made ample references to it.	&lt;a name="_ftnref54"&gt;&lt;/a&gt; Whilst the term "privacy" is not directly alluded to in the &lt;i&gt;Quran&lt;/i&gt;, it contains verses 	emphasizing the importance of respecting personal autonomy. The &lt;i&gt;Quran&lt;/i&gt; (49:12) rebukes those who wish to pry into matters which do not concern them, or harbour suspicions in respect of others, conceding that some suspicions can even be considered crimes.	&lt;a name="_ftnref55"&gt;&lt;/a&gt; This implies an injunction against investigation; which complements the prohibition of circulation of 	information pertaining to an individual's private sphere (24:19).&lt;a name="_ftnref56"&gt;&lt;/a&gt; According to this verse, publication 	of immorality is desirous of punishment. A reasonable conclusion from the reading of these verses is that the &lt;i&gt;Quran&lt;/i&gt; mandates respect for the 	private sphere, guaranteeing that a faithful believer will not violate it.&lt;a name="_ftnref57"&gt;&lt;/a&gt; The Prophet is reported to have said that non interference of individuals in matters that do not concern them is a sign of their good faith.	&lt;a name="_ftnref58"&gt;&lt;/a&gt; Interestingly, the injunction against unwarranted search is for all members of a Muslim community, not 	just followers of Islam. An extension of the concept of informational privacy is the privacy of one's opinion, which is believed to be beyond reproach regardless of its contents. Deeds in the public sphere can be subject to worldly punishment, but thoughts and opinions everywhere, are not subject to it.	&lt;a name="_ftnref59"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Sunnah&lt;/i&gt; have also emphasized on privacy in communications. The Prophet once said,	&lt;i&gt;"He, who looks into a letter belonging to his brother, looks into the Hellfire&lt;/i&gt;"&lt;a name="_ftnref60"&gt;&lt;/a&gt; , indicating that private communications shall enjoy their privacy even in the public domain. This is evident from another saying of the Prophet,&lt;i&gt;"Private encounters result in entrustment&lt;/i&gt;", which entails a restriction on communications arising out of private meetings.	&lt;a name="_ftnref61"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Domestic privacy is considered an important facet of Islamic life and this idea pervades different aspects of &lt;i&gt;Shariah&lt;/i&gt;. Privacy in regard to 	proprietary interests was in fact the first legal conception of privacy recognised by Muslim jurists. &lt;a name="_ftnref62"&gt;&lt;/a&gt; The &lt;i&gt;Quran&lt;/i&gt; (24:27-8) forbids entering another's house in lieu of permission to do the same. &lt;a name="_ftnref63"&gt;&lt;/a&gt; It seeks to ensure that a person visiting another's house is welcome in that house; reminding individuals of their rights during such visits. Further, the	&lt;i&gt;Quran&lt;/i&gt; (2:189) envisions visits made to other's houses only through the front door, indicating respect and transparency in visiting another's 	dwelling place.&lt;a name="_ftnref64"&gt;&lt;/a&gt; Muslim scholars are of the opinion that such rules were laid down in order to safeguard one's private sphere; to allow people to modify their behaviour to accommodate a visitor in a private domain.	&lt;a name="_ftnref65"&gt;&lt;/a&gt; Clarifying the reasons for such rules, a jurist offered the following explanation, 	&lt;i&gt; "The first greeting is for the residents to hear the visitor, the second is for the residents to be cautious( fa-ya khudhu hidhrahum),and the third is 		for them to either welcome the visitor or send him away."&lt;/i&gt;&lt;a name="_ftnref66"&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy in the domestic sphere extends to both physical privacy as well as intangible privacy. The Prophet opined that if one's gaze has entered into a 	private home before his body does, permission to enter the home would be redundant. This follows from the idea that if a person curiously peeps into 	another's home, it is equivalent to him entering it himself. The right to privacy is extended to absolve the home owner of any guilt in the event of attack 	on the intruder. &lt;a name="_ftnref67"&gt;&lt;/a&gt; Curiously, the right to privacy within one's home is extended to privacy in respect 	of sinful behaviour within his private sphere; the accountability of a Muslim to his fellow humans is only to be discerned in respect of his public 	actions.&lt;a name="_ftnref68"&gt;&lt;/a&gt; This is illustrated by an interesting story in the &lt;i&gt;Hadith &lt;/i&gt;of Umar ibn al-Khattab. 	Khattab climbed the wall of a house on the suspicion of wine being consumed within the premises. On his suspicion being confirmed, he chided them for their 	conduct. They then reminded him that while he pointed out their sins, he himself was guilty of three sins; spying on them, failing to greet them and also 	not approaching their house through the front door. He agreed with them and walked away. &lt;a name="_ftnref69"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rationale behind recognising privacy in the domestic sphere is not just illegal intrusion into one's physical space; it is also intrusion into matters 	of sensitivity which widens the scope for privacy in Islamic Law.&lt;a name="_ftnref70"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III Privacy in Shariah Based States&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Locating aspects of privacy is Shariah-based states is particularly challenging due to the duality of obligations that exists in their legal framework. 	While Islamic law focuses on obligations of individuals to the divine in all affairs and the state only in public matters, legal obligations in modern 	states are understood vis-à-vis the state only.&lt;a name="_ftnref71"&gt;&lt;/a&gt; The incorporation of Islam into these modern legal 	systems represents the attempt at reconciling two distinct sources of law. This Part will consider the legal frameworks for privacy in Pakistan and 	Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.I Pakistan&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic law has had a profound impact on the legal system of Pakistan.&lt;a name="_ftnref72"&gt;&lt;/a&gt; This Islamic Republic integrates	&lt;i&gt;Shariah&lt;/i&gt; law into its common law system, as is evident from Article 227(1) of the 1973 Constitution of Pakistan ("the 1973 Constitution"). It 	reads, " 	&lt;i&gt; All existing laws shall be brought in conformity with the Injunctions of Islam as laid down in the Holy Quran and Sunnah, in this Part referred to as 		the Injunctions of Islam, and no law shall be enacted which is repugnant to such injunction". &lt;/i&gt; &lt;a name="_ftnref73"&gt;&lt;/a&gt; In addition to the Constitutional safeguards, General Zia-ul-Haq, between 1977 and 1988 provided great impetus to Pakistan's process of incorporating Islam 	into its common law system through the establishment of appellate religious courts and also enactment of the &lt;i&gt;Hudood&lt;/i&gt; criminal law, which was 	consequently criticized for being discriminatory and arbitrary.&lt;a name="_ftnref74"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Constitutional Provisions&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enshrined in the 1973 Constitution is the fundamental right of persons not to be subject to any action detrimental to the life, liberty, body, reputation 	or property. While referring to the rights of individuals, Article 4(1) lays down, 	&lt;i&gt; "To enjoy the protection of law and to be treated in accordance with law in the inalienable right of every citizen. Wherever he may be, and of every 		other person for the time being within Pakistan." &lt;/i&gt; &lt;a name="_ftnref75"&gt;&lt;/a&gt; While aspects of privacy can be read into this Article quite emphatically, the 1973 Constitution explicitly recognises the right to privacy, dignity and the inviolability of persons in Article 14(1),&lt;i&gt;"The dignity of man, subject to law, the privacy of home, shall be inviolable".&lt;/i&gt; &lt;a name="_ftnref76"&gt;&lt;/a&gt; The sanctity of these rights is vigorously upheld as laws inconsistent with fundamental rights are 	declared to be void to the extent of their inconsistency.&lt;a name="_ftnref77"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 1973 Constitution recognises the fundamental right of persons not to be subject to any action detrimental to the life, liberty, body, reputation or 	property.&lt;a name="_ftnref78"&gt;&lt;/a&gt; The Pakistan Penal Code (Act XLV of 1860) refers to the protection of privacy of women in 	Section 509, upholding the modesty of women.&lt;a name="_ftnref79"&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications and Informational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Pakistan Telecommunication (Re-organisation) Act 1996 enables investigating authorities under the Act to take cognizance of illegalities in 	communications.&lt;a name="_ftnref80"&gt;&lt;/a&gt; These authorities submit their reports to the courts, ensuring the accountability of 	such events, as well as legitimising search and seizure in pursuance of intercepted communications. The Act also makes arrangements for authorised interception of communications in cases of national security, although the wide and sweeping powers bestowed under this Section are a cause for concern.	&lt;a name="_ftnref81"&gt;&lt;/a&gt; Moreover, any person causing annoyance to another through a telephone is liable to criminal punishment 	under the Telegraph Act, 1885.&lt;a name="_ftnref82"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Medical&lt;a name="_ftnref83"&gt;&lt;/a&gt;and Financial&lt;a name="_ftnref84"&gt;&lt;/a&gt; information is recognised as a 	unit of privacy in the legal system of Pakistan. The delicate balance between transparency of government action and extent of privacy of information is 	struck in the Freedom of Information Ordinance, which exempts divulging information regarding personal privacy of individuals, private documents and 	financial privacy.&lt;a name="_ftnref85"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as digital privacy is concerned, the law in Pakistan is still at a nascent stage. In 2000, Pakistan implemented the National Information Technology 	Policy and Action Plan, which provided for confidentiality of transactional information.&lt;a name="_ftnref86"&gt;&lt;/a&gt; In 2002, an 	Electronic Transactions Ordinance was passed with a view to recognise and protect electronic transactions, setting up a framework within which privacy of 	information can be guaranteed and authenticity can be verified.&lt;a name="_ftnref87"&gt;&lt;/a&gt; There is no devoted law on data protection yet, although a Draft Electronic Data Protection Bill was published by the Ministry of Information in 2005.	&lt;a name="_ftnref88"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial and Locational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akin to notions of privacy of the home in Islamic law, criminal trespass is a punishable offence under the Pakistan Penal Code.	&lt;a name="_ftnref89"&gt;&lt;/a&gt; Pakistan has an unfortunately intimate relationship with terrorism. The Anti Terrorism Act of 1997 	incorporates some provisions which raise concerns as to the sanctity of individual privacy. The Act allows an officer of police, armed forces or civil armed forces to enter and search any premise, &lt;a name="_ftnref90"&gt;&lt;/a&gt; and to seize any property	&lt;a name="_ftnref91"&gt;&lt;/a&gt; they suspect to be connected to a terrorist act, without a warrant. Perhaps what is more worrying is that the entry of an officer is not subject to review, unlike in other Islamic countries like the United Arab Emirates.	&lt;a name="_ftnref92"&gt;&lt;/a&gt; The trade off between personal liberties and national security is acutely felt in Pakistan, with 	intelligence agencies carrying on mass surveillance, without any legal framework providing for the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.II Privacy in Bangladesh&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bangladesh identifies itself as a secular nation, although Islam is the state religion. &lt;a name="_ftnref93"&gt;&lt;/a&gt; The Constitution of Bangladesh uses the word privacy in the context of both territorial and communications privacy.	&lt;a name="_ftnref94"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bangladesh Penal Code, similar to Pakistan's, contains a section guaranteeing the bodily privacy of a woman and prohibiting any form of outraging her 	modesty.&lt;a name="_ftnref95"&gt;&lt;/a&gt; It criminalises assault,&lt;a name="_ftnref96"&gt;&lt;/a&gt; and also provides 	for private defence in case of assault.&lt;a name="_ftnref97"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy of communications is subject to interception for the purpose of public safety, as envisaged in the Telegraph Act, 1885.&lt;a name="_ftnref98"&gt;&lt;/a&gt; It also contains provisions regarding unlawful interception of messages,&lt;a name="_ftnref99"&gt;&lt;/a&gt; as well as tampering or damaging communications.	&lt;a name="_ftnref100"&gt;&lt;/a&gt;The Telecommunications (Amendment) Act 2006 gives the police sweeping powers to intercept mobile 	communications as well. However, a notice was issued to the government after this amendment to demonstrate its legality. Bangladesh also has the Right to 	Information Act, 2009 to promote transparency in governance, although it has a considerable number of agencies exempt from the Act as well. Provisions for 	cyber crime are enshrined in the Information and Communication Technology Act, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of territorial privacy, the Bangladesh Penal Code recognises criminal trespass,&lt;a name="_ftnref101"&gt;&lt;/a&gt; house 	trespass,&lt;a name="_ftnref102"&gt;&lt;/a&gt; lurking house trespass&lt;a name="_ftnref103"&gt;&lt;/a&gt; and house 	breaking&lt;a name="_ftnref104"&gt;&lt;/a&gt; as offences under Bangladeshi law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV. Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is a comprehensive term that entails a plethora of claims, making an exact definition of the term difficult to come by. In the absence of an 	explicit reference to privacy in the Indian Constitution, the Supreme Court has brought the right to privacy within the penumbra of Article 21 through 	various case laws.&lt;a name="_ftnref105"&gt;&lt;/a&gt; In 2010, the Government in its approach paper on privacy claimed that India is 	not a particularly private nation.&lt;a name="_ftnref106"&gt;&lt;/a&gt; In order to comprehensively understand India's modern legal 	framework, it is imperative to analyze the concepts of traditional law as they existed hitherto the colonial era. Although the term "privacy" is a modern 	construct, this paper has sought to demonstrate that the notion of privacy was well recognized and protected in traditional Islamic law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the discussion above, it is evident that the concept of privacy in &lt;i&gt;Shariah&lt;/i&gt; law rests convincingly within the taxonomy adopted in this paper. 	The &lt;i&gt;Quran&lt;/i&gt; and &lt;i&gt;Hadith&lt;/i&gt; accommodate concerns surrounding private property, personal autonomy, protection of private communications, domestic 	life, modesty and the modern idea of surveillance. In addition to this, Islamic jurisprudence ascribes to the idea of a public and private sphere. The 	public sphere is occupied by society and governmental action, being liable to scrutiny and observation. On the other hand, the private sphere is occupied 	by the individual and the divine alone, free from any interference except in accordance with &lt;i&gt;Shariah&lt;/i&gt; law. Inspite of the term "privacy" not 	finding explicit mention in the &lt;i&gt;Quran&lt;/i&gt; or &lt;i&gt;Hadith&lt;/i&gt;, a closer analysis of &lt;i&gt;Shariah&lt;/i&gt; reveals privacy as a pervasive theme in Islamic 	jurisprudence.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; Daniel Solove, &lt;i&gt;A Taxonomy of Privacy, &lt;/i&gt;Vol. 154, No.3&lt;i&gt; &lt;/i&gt;University of Pennsylvania Law Journal, 477 (2006).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;The Right to Privacy&lt;/i&gt;, 4 Harvard Law Review 193, 193 (1890).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Richard A. Posner, &lt;i&gt;Privacy, Surveillance and the Law, Vol. 75 No. 1&lt;/i&gt;&lt;i&gt; &lt;/i&gt;The University of Chicago Law Review&lt;i&gt; &lt;/i&gt;245, 245			&lt;i&gt; &lt;/i&gt;(2008).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Blanca Rodríguez Ruiz, Privacy in Telecommunications: A European and an American Approach 39 (1st ed. 1997).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; James Q. Whitman, &lt;i&gt;The Two Western Cultures of Privacy : Dignity versus Liberty, &lt;/i&gt;113 Yale Law Journal 1152, 1153 (2004).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; Whitman, &lt;i&gt;supra &lt;/i&gt;note 5, at 1153.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 479.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Referencing Lillian r. BeVier,			&lt;i&gt;Information About Individuals in the Hands of Government: Some Reflections on Mechanisms for Privacy Protection&lt;/i&gt;, 4 WM. &amp;amp; MARY BILL 			RTS. J. 455, 458 (1995) .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Referencing KIM LANE SCHEPPELE, LEGAL SECRETS 184-85 (1988).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Referencing 1 J. THOMAS MCCARTHY, THE RIGHTS OF PUBLICITY AND PRIVACY § 5.59 (2d ed. 2005).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 560.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;supra &lt;/i&gt;note 2, at 193.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; William L Prosser, &lt;i&gt;Privacy, &lt;/i&gt;48 California Law Review 383,389 (1960).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 488.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Data Security Council of India, Policy Paper: Privacy in India. Available at 			https://www.dsci.in/sites/default/files/Policy%20Paper%20-%20Privacy%20in%20India.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Department of Personnel and Training, (DoPT) Approach Paper for a Legislation on Privacy. Report available at 			http://ccis.nic.in/WriteReadData/CircularPortal/D2/D02rti/aproach_paper.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; Justice Ajit.P.Shah Committee, Report of the Group of Experts on Privacy, 60. Available at - 			http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Bhairav Acharya, at http://freespeechhub.thehoot.org/freetracker/storynew.php?storyid=565&amp;amp;sectionId=10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; DoPT, Approach Paper. &lt;i&gt;supra&lt;/i&gt; note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Whitman, &lt;i&gt;supra&lt;/i&gt; note 5, at 1154.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Chandran Kukathas, &lt;i&gt;Cultural Privacy&lt;/i&gt;, Vol. 91, No. 1 The Monist 68, 69 (2008).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; Marc Galanter, &lt;i&gt;Displacement of Traditional Law in Modern India, &lt;/i&gt;Vol XXIV, No. 4 Journal of Social Issues 65, 67 (1968).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; Stuart Corbridge &amp;amp; John Harriss, Reinventing India: Liberalization, Hindu Nationalism and Popular Democracy 238 (Reprint, 2006).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Galanter, &lt;i&gt;supra&lt;/i&gt; note 22, at 66.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 67.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Edward Said, &lt;i&gt;Representing the Colonized: Anthropology's Interlocutors&lt;/i&gt;, Vol. 15 No.2 Critical Inquiry 205, 207 (1989).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; Mohammad Hashim Kamali, Shari'ah Law, An Introduction 19 (2009)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;&lt;/a&gt; M Mustafa Al Azami, Studies in Hadith Methodology and Literature 7 (2002).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;&lt;/a&gt; &lt;i&gt;Id. &lt;/i&gt; at 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;&lt;/a&gt; NJ Coulson, A History of Islamic Law 22 (1964)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;&lt;/a&gt; Kamali, &lt;i&gt;s&lt;/i&gt;&lt;i&gt;upra &lt;/i&gt;note 27, at 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;&lt;/a&gt; &lt;i&gt;Sunan Ibn Majah&lt;/i&gt; , Book of Tribulations (Kitab al-Fitan) , #3950, available at http://sunnah.com/ibnmajah/36.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;&lt;/a&gt; Mohsen Kadivar, &lt;i&gt;An Introduction to the Private and Public Debate in Islam, &lt;/i&gt;Vol.70 , No. 3 Social Research 659, 663 (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;&lt;/a&gt; Lara Aryani, &lt;i&gt;Privacy Rights in Shariah and Shariah-based States, &lt;/i&gt;Vol. 3, Iss.2, Journal of Islamic State Practices in International Law, 3 			(2007)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 665.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; at 667. Referencing Koleini, Mohammad. Al-Kaafi. Qom, Vol. 2: 353 1388.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 671.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;&lt;/a&gt; &lt;i&gt;Social Contract Theory of John Locke(1932-1704) in the Contemporary World&lt;/i&gt; , SelectedWorks of Daudi Mwita, Nyamaka (2011) Available at http://works.bepress.com/cgi/viewcontent.cgi?article=1009&amp;amp;context=dmnyamaka.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 673.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;&lt;/a&gt; Abul a'la Mawdudi, Human Rights in Islam 24 (1995). Also available online, at 			http://books.google.co.in/books?id=RUJWdCOmmxoC&amp;amp;printsec=frontcover#v=onepage&amp;amp;q&amp;amp;f=false.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;&lt;/a&gt; Aryani, &lt;i&gt;supra &lt;/i&gt;note 34, at 13.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;&lt;/a&gt; This indicates Sura 24 : verse 58.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;&lt;/a&gt; Holy Quran, 24:58 - O you who have believed, let those whom your right hands possess and those who have not [yet] reached puberty among you ask 			permission of you [before entering] at three times: before the dawn prayer and when you put aside your clothing [for rest] at noon and after the 			night prayer. [These are] three times of privacy for you. There is no blame upon you nor upon them beyond these [periods], for they continually 			circulate among you - some of you, among others. Thus does Allah make clear to you the verses; and Allah is Knowing and Wise. (Translation from 			Sahih International available at http://quran.com/24/58)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;&lt;/a&gt; Reza Sadiq, &lt;i&gt;Islam's Fourth Amendment : Search and Seizure in Islamic Doctrine and Muslim Practice, &lt;/i&gt;Vol. 40 Georgetown Journal of 			International Law 703, 730 (2008 - 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 733. Referencing IBRAHIM ABDULLA&lt;b&gt; &lt;/b&gt;AL-MARZOUQI, Human Rights in Islamic Law 392 (2000).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;&lt;/a&gt; Rohen Peterson, &lt;i&gt;The Emperor's New Scanner :Muslim Women at the Intersection of the First Amendment and Full Body Scanners, &lt;/i&gt;22 Hastings 			Women's Law Journal 339, 343 (2011).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;&lt;/a&gt; Holy Quran, 24:30 - Tell the believing men to reduce [some] of their vision and guard their private parts. That is purer for them. Indeed, Allah is 			Acquainted with what they do. (Translation from Sahih International available at http://quran.com/24/30-31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;&lt;/a&gt; Holy Quran, 24:31- And tell the believing women to reduce [some] of their vision and guard their private parts and not expose their adornment 			except that which [necessarily] appears thereof and to wrap [a portion of] their headcovers over their chests and not expose their adornment except 			to their husbands, their fathers, their husbands' fathers, their sons, their husbands' sons, their brothers, their brothers' sons, their sisters' 			sons, their women, that which their right hands possess, or those male attendants having no physical desire, or children who are not yet aware of 			the private aspects of women. And let them not stamp their feet to make known what they conceal of their adornment. And turn to Allah in 			repentance, all of you, O believers, that you might succeed. (Translation from Sahih Internation, available at http://quran.com/24/30-31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;&lt;/a&gt; David Garner&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Muslims warned not to go through airport body scanners because they violate Islamic rules on nudity&lt;/i&gt;, The daily 			mail, (Feb 12, 2010). 			&lt;a href="http://www.dailymail.co.uk/news/article-1250616/Muslims-warned-airport-body-scanners-violate-Islamic-rules-nudity.html#ixzz3KF8hS6q3"&gt; http://www.dailymail.co.uk/news/article-1250616/Muslims-warned-airport-body-scanners-violate-Islamic-rules-nudity.html#ixzz3KF8hS6q3 &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;&lt;/a&gt; Holy Quran, 33:59 - O Prophet, tell your wives and your daughters and the women of the believers to bring down over themselves [part] of their 			outer garments. That is more suitable that they will be known and not be abused. And ever is Allah Forgiving and Merciful. (Translation from Sahih 			International, available at http://quran.com/33/59.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;&lt;/a&gt; Eli Alshech,			&lt;i&gt;"Do Not Enter Houses Other than Your Own": The Evolution of the Notion of a Private Domestic Sphere in Early Sunnī Islamic Thought&lt;/i&gt; Vol. 11, No. 3, Islamic Law and Society 291, 304 (2004).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;&lt;/a&gt; Holy Quran, 49:12 - O you who have believed, avoid much [negative] assumption. Indeed, some assumption is sin. And do not spy or backbite each 			other. Would one of you like to eat the flesh of his brother when dead? You would detest it. And fear Allah ; indeed, Allah is Accepting of 			repentance and Merciful. ( Translation from Sahih International, available at http://quran.com/49/12)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a name="_ftn56"&gt;&lt;/a&gt; Holy Quran, 24:19 - Indeed, those who like that immorality should be spread [or publicized] among those who have believed will have a painful 			punishment in this world and the Hereafter. And Allah knows and you do not know. ( Translation from Sahih International, available at 			http://quran.com/24/19)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a name="_ftn57"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 666.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a name="_ftn58"&gt;&lt;/a&gt; Ahmad Atif Ahmad, Islam Modernity violence and everyday life 176 (1&lt;sup&gt;st&lt;/sup&gt; ed. 2009)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a name="_ftn59"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 667.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a name="_ftn60"&gt;&lt;/a&gt; &lt;i&gt; &lt;/i&gt; &lt;i&gt;Ibid&lt;/i&gt; , at 178.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a name="_ftn61"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a name="_ftn62"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra &lt;/i&gt;note 54, at 291.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a name="_ftn63"&gt;&lt;/a&gt; Holy Quran, 24:27-8 - O you who have believed, do not enter houses other than your own houses until you ascertain welcome and greet their 			inhabitants. That is best for you; perhaps you will be reminded. And if you do not find anyone therein, do not enter them until permission has been 			given you. And if it is said to you, "Go back," then go back; it is purer for you. And Allah is Knowing of what you do. ( Translation from Sahih 			International, available at http://quran.com/24)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a name="_ftn64"&gt;&lt;/a&gt; Holy Quran, 2:189 - They ask you, [O Muhammad], about the new moons. Say, "They are measurements of time for the people and for Hajj." And it is 			not righteousness to enter houses from the back, but righteousness is [in] one who fears Allah. And enter houses from their doors. And fear Allah 			that you may succeed. (Translation from Sahih International, available at http://quran.com/2)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a name="_ftn65"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra &lt;/i&gt;note 54, at 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a name="_ftn66"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 306. Referencing Ibn Abi Hatim, 8&lt;b&gt; &lt;/b&gt;TAF5IRAL-QUR'ANAL-'ADHIM &lt;i&gt;2566 &lt;/i&gt;(Makiabat Nlilr Mustaffi 1999).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a name="_ftn67"&gt;&lt;/a&gt; Ahmad, &lt;i&gt;supra &lt;/i&gt;note 58, at 177.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a name="_ftn68"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra note &lt;/i&gt;54&lt;i&gt;, at 324.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a name="_ftn69"&gt;&lt;/a&gt; Aryani, supra note 34, at 4. Also see Ahmad, &lt;i&gt;supra &lt;/i&gt;note 24, at 178.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a name="_ftn70"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra note &lt;/i&gt;54&lt;i&gt;, &lt;/i&gt;at 310.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a name="_ftn71"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra&lt;/i&gt; note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a name="_ftn72"&gt;&lt;/a&gt; Moeen Cheema, &lt;i&gt;Beyond Beliefs: Deconstructing the Dominant Narratives of the Islamization of Pakistan's Law, &lt;/i&gt;60 American Journal of 			Comparative Law 875 (2012).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a name="_ftn73"&gt;&lt;/a&gt; The Constitution of the Islamic Republic of Pakistan, 1973. Available at http://www.na.gov.pk/publications/constitution.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a name="_ftn74"&gt;&lt;/a&gt; Cheema, &lt;i&gt;supra &lt;/i&gt;note 72, at 879.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a name="_ftn75"&gt;&lt;/a&gt; The Constitution of the Islamic Republic of Pakistan, 1973, &lt;i&gt;supra &lt;/i&gt;note 73&lt;i&gt;.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a name="_ftn76"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a name="_ftn77"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Article 8 - "(1) Any law, or any custom or usage having the force of law, in so far as it is inconsistent with the rights conferred by this 			Chapter, shall, to the extent of such inconsistency, be void. (2) The State shall not make any law which takes away or abridges the right so 			conferred and any law made in contravention of this clause shall, to the extent of such contravention, be void&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a name="_ftn78"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Article 4(2)(a) - "no action detrimental to the life, liberty, body, reputation or property of any person shall be taken except in accordance with 			law."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a name="_ftn79"&gt;&lt;/a&gt; Section 509, Pakistan Penal Code (Act XLV of 1860), Available at http://www.oecd.org/site/adboecdanti-corruptioninitiative/46816797.pdf.&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a name="_ftn80"&gt;&lt;/a&gt; Section 32, Pakistan Telecommunication (Re-Organisation) Act, 1996. Available at http://www.pta.gov.pk/media/pta_act_140508.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a name="_ftn81"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 54.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a name="_ftn82"&gt;&lt;/a&gt; Section 25-D, Pakistan Telegraph Act, 1885. Available at http://www.fia.gov.pk/law/Offences/26.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a name="_ftn83"&gt;&lt;/a&gt; Section 12, Pakistan Medical and Dental Council Code of Ethics. Available at 			http://www.pmdc.org.pk/LinkClick.aspx?fileticket=v5WmQYMvhz4%3D&amp;amp;tabid=292&amp;amp;mid=845.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a name="_ftn84"&gt;&lt;/a&gt; http://www.sbp.org.pk/publications/prudential/ordinance_62.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a name="_ftn85"&gt;&lt;/a&gt; Section 8, Freedom of Information Ordinance, 2002. Available at 			http://infopak.gov.pk/Downloads/Ordenances/Freedom_of_%20Information_Ordinance2002.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a name="_ftn86"&gt;&lt;/a&gt; Pakistan IT Policy and Action Plan, available at http://www.unapcict.org/ecohub/resources/pakistan-information-technology-policy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a name="_ftn87"&gt;&lt;/a&gt; Electronic Transactions Ordinance, available at http://www.pakistanlaw.com/eto.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a name="_ftn88"&gt;&lt;/a&gt; For a more detailed account, see			&lt;a href="http://www.supremecourt.gov.pk/ijc/articles/10/1.pdf"&gt;http://www.supremecourt.gov.pk/ijc/articles/10/1.pdf&lt;/a&gt;. Second draft available at 			http://media.mofo.com/docs/mofoprivacy/PAKISTAN%20Draft%20Law%202nd%20Revision%20.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a name="_ftn89"&gt;&lt;/a&gt; Sections 441 - 462, Pakistan Penal Code (XLV of 1860) Chapter XVII, "Offences against Property".&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a name="_ftn90"&gt;&lt;/a&gt; Section 5, Anti Terrorism Act, 1997. Available at http://www.fia.gov.pk/law/ata1997.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a name="_ftn91"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a name="_ftn92"&gt;&lt;/a&gt; Lara Aryani, &lt;i&gt;supra&lt;/i&gt; note 34, at 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a name="_ftn93"&gt;&lt;/a&gt; Julhas Alam, &lt;i&gt;Bangladesh moves to retain Islam as state religion, &lt;/i&gt;Cns News, 			http://cnsnews.com/news/article/bangladesh-moves-retain-islam-state-religion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a name="_ftn94"&gt;&lt;/a&gt; Article 43, Constitution of Bangladesh. Available at http://www1.umn.edu/humanrts/research/bangladesh-constitution.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a name="_ftn95"&gt;&lt;/a&gt; Section 509, Bangladesh Penal Code,1860. Available at http://bdlaws.minlaw.gov.bd/print_sections_all.php?id=11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a name="_ftn96"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Sections 351- 358.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a name="_ftn97"&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; . Section 100.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a name="_ftn98"&gt;&lt;/a&gt; Section 5, Bangladesh Telegraph Act, 1885. Available at http://bdlaws.minlaw.gov.bd/print_sections_all.php?id=55.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a name="_ftn99"&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; . Section 24.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a name="_ftn100"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 25.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a name="_ftn101"&gt;&lt;/a&gt; &lt;i&gt; &lt;/i&gt; Bangladesh Penal Code, 1860. &lt;i&gt;supra &lt;/i&gt;note 95&lt;i&gt;. &lt;/i&gt;Section 441.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a name="_ftn102"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 442.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a name="_ftn103"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 443.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a name="_ftn104"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 445.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a name="_ftn105"&gt;&lt;/a&gt; See, Kharak Singh v. State of Uttar Pradesh, AIR 1963 SC 1295 : (1964) 1 SCR 332; Govind v. State of Madhya Pradesh, AIR 1975 SC 1378; Rajagopal v. 			State of Tamil Nadu, AIR 1995 SC 264; People's Union for Civil Liberties (PUCL) v. Union of India, AIR 1997 SC 568; X v. Hospital Z, AIR 1999 SC 			495.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a name="_ftn106"&gt;&lt;/a&gt; DoPT, Approach Paper. &lt;i&gt;supra&lt;/i&gt; note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law'&gt;https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidushi Marda and Bhairav Acharya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-01T14:04:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/news/governance-now-december-1-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not">
    <title>When technology is able but the mindset is not</title>
    <link>https://cis-india.org/accessibility/news/governance-now-december-1-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not</link>
    <description>
        &lt;b&gt;There are enough digital products and services to help people with disabilities. Widespread ignorance stands between them and digital inclusion.&lt;/b&gt;
        &lt;div id="stcpDiv" style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/when-technology-able-the-mindset-not"&gt;story by Geetanjali Minhas&lt;/a&gt; appeared in December 1-15, 2014, issue. 
&lt;hr /&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;Twenty-four-year-old  Bhavesh Patel moves around giving a demonstration of the screen reader  Dolphin Supernova in such a sure-footed manner that no one can imagine  he is totally blind. The device has a voiceover function that can be  used on iPhone. &lt;br /&gt; &lt;br /&gt; Not just that, Patel travels every day from his home in Vikhroli to his  office in Goregaon, changing buses and trains with minimal assistance.&lt;br /&gt; &lt;br /&gt; Patel’s colleague, Debashish, who is autistic, and no less capable, is known for his immaculate spellings within the company. &lt;br /&gt; &lt;br /&gt; Team leader Priti Rohra, despite low vision, skillfully heads the  testing team for websites and meticulously ensures that guidelines for  the disabled are adhered to. Rohra works on policies and research and  has prepared many reports for BarrierBreak, a company where 75 percent  of the staff has disabilities like autism, inhibited vision and impaired  hearing. Its unique competitive advantage has allowed the company to  help develop niche products and services for converting textbooks into  more disabled-friendly formats like digital talking books (Epub  Conversion). Till now, it has produced 1.5 million pages of  disabled-friendly textbooks.&lt;br /&gt; &lt;br /&gt; “When the government provides technology to its own employees it is  enhancing their productivity,” says Shilpi Kapoor, founder-director of  BarrierBreak and a member of the Nasscom Disability Advisory Group. “The  fundamental difference here is that internationally, disability  inclusion is a mandate, whereas in India it is considered charity and  therefore a challenge. As a result many disabled are denied jobs as per  their calibre and given salaries as doles.”&lt;br /&gt; &lt;br /&gt; The priority given to policies for development of disabled-friendly  information technology tools and services has been relatively low in  India. Usually, it stems from an inaccurate understanding that the  development of such tools and services will cost more money, and there  will be no opportunity to recover it from the market.&lt;br /&gt; &lt;br /&gt; A critical component of digital inclusion is to make websites and  applications disabled-friendly. Most websites are not compliant with  international guidelines on disabled-friendly requirements. Developers,  officials and policy makers give disability accessibility a cold  shoulder, retrofitting it into existing policies and processes as an  after-thought.&lt;br /&gt; &lt;br /&gt; An attitudinal shift might come if the new national policy on universal  electronic accessibility (NPUEA) notified by DeitY is implemented,  resulting in nearly 7,000 government websites becoming accessible to the  disabled, especially visually impaired. &lt;br /&gt; &lt;br /&gt; Various reports, including a 2012 survey by the Centre for Internet and  Society (CIS), found that almost 25 percent of 7,800 government websites  failed to open and the remaining had accessibility barriers. The web  accessibility survey report of Indian government websites by the  national centre for promotion of employment for disabled people (NCPEDP)  in 2012 too revealed that of the 200 government websites tested, only  two were found to be disabled-friendly. “Disability is a major social  issue that India is grappling with. It needs to be addressed through not  just policy, but also through assistive technology solutions,” says  Prakash Kumar, CEO, Goods and Services Tax Network.&lt;br /&gt; &lt;br /&gt; CIS executive director Sunil Abraham, who was on the committee that  formulated the NPUEA, says besides non-confirmation of websites to  international norms, there are many technical hurdles. Text-to-speech  and speech-to-text software, mature optical character recognition  systems, speech and grammar check and machine translation are some of  the features that are still not available for most Indian languages, he  adds. “Many government websites use font encoding for Indian languages  which results in the failure of text-to-speech technologies.”&lt;br /&gt; &lt;br /&gt; DeitY, under the ministry of communication and information technology,  is supporting some technology interventions for the disabled, across  different Indian languages. This also includes text-to-speech tools.  “Mobile phone manufacturers should also provide in-built tools to cater  to the needs of disabled people,” points out Ajay Kumar, joint  secretary, DeitY. Emphasising a strong legal framework for  implementation of the policy, Kumar adds that though the new policy  promotes disability inclusion, the information technology ministry does  not have the legal backing to enforce it. “The ministry of social  justice and empowerment is creating a legal framework for the bill that  is under consideration by the concerned committee to mandate some of  these things, including technology assistance for the disabled,” he  adds.&lt;br /&gt; &lt;br /&gt; Abraham says besides ensuring that websites and services are accessible  to the disabled, the new policy must be updated to include a mandate  that all parties providing essential services to the general public must  comply with accessibility standards. “Manufacturers of ICT products  should provide at least one accessible model of their products within  each price range that they are operating within,” he says.&lt;br /&gt; &lt;br /&gt; Sam Taraporevala, associate professor and head of sociology department,  St. Xavier’s College, Mumbai and the director of Xavier’s resource  centre for the visually challenged, says with the government accepting a  policy that IT tools should follow accessibility standards, it is now a  question of monitoring, and, perhaps, even judicial activism. Nirmita  Narasimhan, policy director, CIS, who works closely with various  government departments to bring accessibility into their policies and  programmes, concurs. “There must be accountability and a monitoring  mechanism to check whether websites are disability compliant,” she says.&lt;br /&gt; &lt;br /&gt; Maharashtra is the only state to make it compulsory for every department  to have a scheme for procuring disability access products. Yet,  compliance remains a problem. “Despite the government holding awareness  camps at various districts, barriers are created for accessing  government schemes. Resistance on part of government agencies to give  out equipment to disabled people and lack of awareness among people  about the availability of such facilities are the other stumbling  blocks. Yet, there are ways for getting these products,” says Kapoor.&lt;br /&gt; &lt;br /&gt; Experts say the needs and requirements of the disabled vary according to  their disability and affordability of tools. Also, low income levels of  many disabled people is a dissuading factor toprocuring equipment.  “Most available tools and technologies are proprietary and, hence,  costly and we are not able to scale them up in a big way,” says Kumar.&lt;br /&gt; &lt;br /&gt; Taraporevala, born with 100% visual impairment, was instrumental in  getting the guidelines for opening and operating demat accounts for  visually impaired persons implemented. He also says mainstream consumer  product companies are moving into touchscreen modes in mobile phones  forgetting a large chunk of disabled population. “While the standards  are there, implementation suffers due to lack of awareness which, in  turn, leads to less demand,” he says.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;The way forward&lt;/b&gt;&lt;br /&gt; Governance Now also asked experts if corporate social responsibility  (CSR) towards disability inclusion could address challenges in  recruitment of disabled persons. “Instead of a hammer approach, a care  approach has to be adopted,” ​​says Rita Soni, CEO​, Nasscom Foundation.  According to ​Kumar, “Absence of commercial interest in promoting  disability accessibility products has afflicted the sector with  neglect.” However, Kapoor says, “This has to be an equal opportunity  business. There will be differential costs, but at the same time the  total number of disabled people in India is close to 70 million and a  billion world over. How can you not treat them like a client?”&lt;br /&gt; &lt;br /&gt; Speaking of the revised CSR rules under the Companies Act, Soni adds,  “You can support skilling of persons with disabilities that has nothing  to do with your business and have it considered as CSR expenditure. But  if you make your office building or internet accessible, it does not  count. Creating incentives around disability will make us a more  inclusive society and make disability more amenable to office  environment.”&lt;br /&gt; &lt;br /&gt; Maharashtra IT secretary Rajesh Aggarwal adds, except for the metro,  none of our public transport systems are disabled-friendly. As per  national building code of India, while giving permissions for public  buildings there must be a checklist to ensure that buildings and toilets  are wheelchair and blind-friendly. Similarly, hotels must have few  rooms which are disabled-friendly.” This awareness has not yet set in,”  he says.&lt;br /&gt; &lt;br /&gt; The Asia-Pacific region study of UNESCO global report 2013 has said many  countries in the developing world are struggling to attain their  millennium development goals of providing universal primary education to  all by 2015. Our education system, on the other hand, has serious  flaws. “We do not teach professionals about assistive technologies and  for that reason an eye doctor does not know about low vision aids or a  speech therapist does not know how to use communication devices,” says  Kapoor. &lt;br /&gt; &lt;br /&gt; Taraporevala is of the view that universal (architectural) design needs  to be actively woven into every design curriculum across the spectrum,  instead of being an optional subject. Physical infrastructure, building  standards, for instance, need to reflect this and there needs to be  active lobbying to ensure that certificates for public places are not  given if they lack certain standards.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/news/governance-now-december-1-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not'&gt;https://cis-india.org/accessibility/news/governance-now-december-1-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-12-14T06:01:06Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/creating-free-software-environment-at-alc">
    <title>Creating Free Software Environment at Andhra Loyola College</title>
    <link>https://cis-india.org/openness/blog-old/creating-free-software-environment-at-alc</link>
    <description>
        &lt;b&gt;Andhra Loyola college has signed an MoU with CIS-A2K and as part of it CIS-A2K team has provided a free and open software environment at Andhra Lyola College's Computer Center. Thirty machines have been installed with free software Operating system and some useful applications such as GIMP, Inkscape, firefox, libreoffice, etc.&lt;/b&gt;
        &lt;div class="kssattr-macro-text-field-view kssattr-templateId-blogentry_view.pt kssattr-atfieldname-text plain" id="parent-fieldname-text"&gt;
&lt;p style="text-align: justify; "&gt;Principal, Vice-principal,  management and faculty at Andhra Loyola College expressed interest in  upgrading their lab computers to latest software without having the  glitches of piracy issues. The obvious solution to this was to install  Linux based free OS like Ubuntu/Debian&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Program Director of CIS-A2K advised to  have this process done in a pilot manner instead of forced imposition on  faculty and students to use a totally new working environment. So, 30  machines from PG lab were selected for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These machines were installed with  Ubuntu 12.04 LTS edition. In addition to the default available Libre  office, firefox and terminal, Tools like Gimp, inkscape, apache web  server were also installed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each of the faculty and students  present at the installation time were evangelized about Free Software  and its wise uses in the long term.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/creating-free-software-environment-at-alc'&gt;https://cis-india.org/openness/blog-old/creating-free-software-environment-at-alc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rahim</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Telugu Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-05-27T00:54:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/knowledge-ecology-international-sccr-29-december-11-2014-libraries-archives-public-interest-ngos-q-a-with-dr-crews">
    <title>SCCR 29 Libraries, Archives and Public Interest NGOs in Q&amp;A with Dr. Crews</title>
    <link>https://cis-india.org/a2k/news/knowledge-ecology-international-sccr-29-december-11-2014-libraries-archives-public-interest-ngos-q-a-with-dr-crews</link>
    <description>
        &lt;b&gt;While the many publishers representatives took the floor to explain that there are truly no problems with limitations and exceptions for libraries and archives (and anyway according to them if there are problems that can be solved with licenses), libraries &amp; archives as well as public interest groups make their case: the committee must continue its work on limitations and exceptions for libraries and archives and find solutions.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This blog entry was &lt;a class="external-link" href="http://keionline.org/node/2147"&gt;published on the website of Knowledge Ecology International&lt;/a&gt; on December 11, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Here are excerpts from some of the interventions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hasmik Galstyan, Yerevan, Armenia speaking for the Electronic Information for LIbraries (eIFL.net)&lt;/b&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&amp;gt;&amp;gt; EIFL: I'm speaking on behalf of  the electronic information for libraries and that works with libraries  and library con sort Sha in more than 60 developing and transition  economy countries. We thank the Secretariat for commissioning the  updated study that provided a comprehensive overview in the IP law. We  thank professor crews for his clear presentation.
&lt;p&gt;The report contains positives and negatives from our Point of View.  The positives include the fact that law makers are to some degree  responding to the need for legal change and a small number of countries  have over the last six years created new exceptions especially with  regard to digital services. These changes are to be commended. On the  other hand, it is discouraging that 18% of countries including five EIFL  partner countries have new exceptions for libraries and over one-third  located almost totally in the developing world still do not have an  exception allowing libraries to make copies of their works for the  users. The trend regarding digital library services doesn't look good.  Even for states that  introduce amendment 2008 digital is barred in 50%  in some cases for preservation and it states with anti-circumvention  protection while some have applied library exceptions as mentioned by  professor crews half of the countries have provided no library  exceptions. So while a small number of countries are moving ahead and  reforming their copyright laws the digital divide is being perpetuated  at a time when libraries everywhere are adopting new technologies and  Developing Countries are rapidly moving to mobile. My question is how  can the situation be addressed. How can WIPO as an UN agency with a  commitment to work with Developing Countries to enhance their  participation in the global innovation economy most effectively support  countries to be at the forefront of digital developments. To ensure that  our libraries that are working hard to support education and  development are not operating with one hand tied behind our backs.&lt;/p&gt;
&lt;p&gt;My second question is considering that between 2008 and 2014 only a  handful of countries have been implemented made changes benefitting  libraries and their users and imagining that the current rate of support  for a change stays the same, how long do you think it will take before  all WIPO Member States have exceptions good enough to support library  activities in the Digital Age? And the last question, please. Libraries  collections contain materials of unique cultural and historical  significance to people in other countries to the national border changes  shared languages and a host of other reasons. In addition collaboration  among researchers today is international. Therefore libraries  increasingly need to send and receive information across borders. In our  examination of copyright laws how do they accommodate or not these  activities? Thank you very much.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The libraries representatives were echoed by archives representatives.  &lt;b&gt;William Maher, University of Illinois at Urbana-Champaign, representing the Society of America Archivists&lt;/b&gt;.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;Thank you for producing a study that  brings such clarity to the quite confusing maze of the laws that  librarians and archivists must work with.  Archives has been mentioned a  lot over the past couple of days but I am only the second archivist to  be addressing this issue at SCCR. Archivists know that the general  populations does not understand what archives are and how and why we do  what we do.  However, it seems reasonable that those who draft copyright  laws should understand that archives are fundamentally about the  unpublished legacy of humankind.  Yet, when looking at the 70 or so  countries in the 2014 study, archives are seriously overlooked–Despite  whatever minimal improvement for libraries, archives have been left out  of 53% of the exceptions for preservation and 72 % of the exceptions for  copying for research.  Is this absence of provisions also reflected in  the fact that the laws lack definitions of archives? Can this oversight  be read as meaning that archives do not matter to the nations copyright  system, or does it mean that copyright should not matter to archives?&lt;br /&gt; &amp;gt;&amp;gt; KENNETH CREWS: Well, thank you very much. Yes, I think you have  also heard me speak very strongly about the distinct interests of  archives and maybe I should say even more important the distinct  interests of our citizens in archives and in the works that they are --  the work that they are doing. And their ability to use these copyright  provisions for the benefit of the country and of its citizens. I  certainly can't emphasize that enough. So I -- I'm not going to read in  to the lack of reference to archives. The kind of meaning that you are  asking about. But instead I think we can certainly say that it makes you  wonder if archives have been recognized by the drafters of many of  these statutes and if in the case of following through on the example of  the models influencing domestic law it really is have archives come to  the attention of the individuals who have been responsible for  developing some of the models. So I believe very strongly that the  future statutes in individual countries and the drafting of different  kinds of instruments or models that may come from WIPO or any other  organization need to encompass archives. And the -- because the  preservation and research access and other kinds of beneficial uses of  archival material goes directly to the preservation of the culture and  the history of our countries and our people. And it is vital that we be  able to do that and keep archives at the table. And I thank you very  much for being here.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Another stakeholder, &lt;b&gt;Nehaa Chaudhari, Lawyer, Programme Officer at the Centre for Internet and Society&lt;/b&gt; questioned Dr. Crews on provisions regarding digital works:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;CIS: Thank you Madame Chair. Thank you  very much professor crews for your presentation yesterday and this  comprehensive study on libraries and archives. Very timely and very  important to us from the [...] access to knowledge and information most  critically.
&lt;p&gt;I have two questions. My first question: did you find in your  examination that in terms of or on the question of limitations and  exceptions did you find that there was an equal or equitable treatment  of digital resources in comparison to resources available in more  traditional formats? And if not, where do you think that are lever of  change lies to ensure that fair use of fair dealing provisions are  extended e equitably to the digital environment as well.&lt;/p&gt;
&lt;p&gt;My second question is on the interoperability of limitations and  exceptions. Given that copyright is a very national thing and as your  study has also well established countries have a whole range of veridy  veers approaches and practices on limitations and exceptions. But also  given the fact that we live in an increasingly globalized world we need a  system that is interoperable with respect to the transboundary movement  of works with as little fiction as possible. Again both in the physical  as well as in the digital environments. So what did your examination  show of how interoperable or not the range of limitations and exceptions  actually have. Those are my two questions. Thank you very much.&lt;/p&gt;
&lt;p&gt;&amp;gt; KENNETH CREWS: Thank you very much. On the second question, I'm  afraid I might mind myself only repeating some of the concepts that have  already said about transborder and really about in the statutes anyway,  a lack of recognition of transborder. And the transborder concept, so I  will add this piece to the conversation, the transborder concept seldom  if ever appears in these library exceptions to the extent that we are  going to find it in copyright law or some other part of a national law  it may very well be over in the import/export kind -- area of the law.  But that also goes to the interoperability which think we have answered a  few times just this sort -- the lack of exact harmonization and as  others have reminded me I have said before that I may not be a fan of  exact precise harmonization and indeed it may not be possible or even  desirable. But some degree of harmonization can help with that  interoperability. Interesting question, you do -- you did raise a new  point about digital. We have talked several times in this conversation  about use of digital technologies in the exercise of the rights of use  under the exception. However what I think you were asking about is the  ability to apply the exception to works that are digital in the first  place that are what we call born digital and that's a very interesting  question. The statutes do not address that. Sometimes you will see a  statute that refers to -- that says it applies to all these different  kinds of works but not computer software. That tells you somebody was  thinking it shouldn't apply to software but somehow software is  different and there are problems with that. We know that software has  changed and been incorporated in to many different works. But we  generally see a statute almost always see a statute that's about books  or archival materials or some other kind of work without specifying the  technology. So can it apply to an e-book in addition to the paper book?  The statutes don't go there. They don't sort that out.&lt;/p&gt;
&lt;p&gt;So in my common law tradition I look at that and see that as a question for interpretation. In&lt;br /&gt; a civil code system I might look at it and see it a little bit more firmly for lack of a better word&lt;br /&gt; about what the scope of that word book, for example, really means.  Really good question. And it is one that the statutes have not picked up  on. Thank you very much.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Finally, the &lt;b&gt;TransAtlantic Consumer Dialogue (TACD) representative David Hammerstein&lt;/b&gt; made the following political and philosophical intervention:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;Thank you very much. Thank you Mr. Crews  for your presentation. I would like to say a few general words. Internet  and the digital obviously is global. Copyright laws are national.  Economic power is global. Politics is national. This is very relevant to  our discussion.
&lt;p&gt;And other relevant factor is that copyright law and the idea of  exceptions and limitations are very complicated. It is for small circles  of specialists usually and when these things come out in to the open to  the greater public opinion things change radically. I can only remind  peep of this room for the debate on ACTA or the debate for SOPA and PIPA  in the United States. When these issues come out of the closet things  are seen in a very, very different light. The opinion of copyright  specialist especially where I know in the European Union and totally  different with the opinions of the general public. And the general  public the vast majority are frustrated by copyright law because social  reality that applies de facto and I am not talking about piracy, I am  talking about de facto flexibilities and exceptions and limitations are  very, very far from the legal reality of the copyright. The vast  majority of Europeans would like to have a harmonized and mandatory  exceptions and limitations that we are speaking about, whether it be  more text and data mining, whether it be for libraries whether it be  cross-border, whether it be preservation of cultural heritage, they  would like that. Now the opinions of the often of political structures  are captured by certain experts and very special groups that are  interested in what they want. Especially the European Union is at a  cross roads and we can see it politically because around a year ago the  European Union launched a process called lnss for Europe where some of  the ideas presented by some of the industry people were brought up  memorandums of understanding and that the solution to exceptions and  limitations for these issues could be found in voluntary measures  between stakeholders. This was a failure. This was a terrible failure.  We had letters many many many Nobel Prize winners who are asking tore a  legal exceptions and limitations for text and data mining for other  scientific research and we think that many orphan works legislation does  not go far enough. Et cetera, et cetera, self generated user content.  How can that Democratic debate take place and these cross roads can be  made a positively by real decisions. And I think those real decisions  have to be deal with the public dough minute yon, what is public  knowledge and things about the commons, we are talking about the  knowledge commons here need to have a democratic debate and need to have  democratic management. Now this could be done by very delayed mediation  to end up in the hands of a few copyright experts that are very close  to very narrow industry that I think is defending outdated models or we  could open a democratic debate where exceptions and limitations for  libraries and archives for preservation for scientific limitation would  be beyond borders. Even inside the European Union today it is almost  hard to imagine there to be harmonization in the internal market. And  the people making money prefer a fragmented market even though European  site sents want a harmonized market for these things. My question is  impossible question. I am sorry to put you on spot of how to open up the  door, how to bring this issue out of the closet and how to involve  millions of people who really want that change. Thank you very much&lt;/p&gt;
&lt;/blockquote&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/knowledge-ecology-international-sccr-29-december-11-2014-libraries-archives-public-interest-ngos-q-a-with-dr-crews'&gt;https://cis-india.org/a2k/news/knowledge-ecology-international-sccr-29-december-11-2014-libraries-archives-public-interest-ngos-q-a-with-dr-crews&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>WIPO</dc:subject>
    

   <dc:date>2014-12-27T16:54:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/ada-camp-bangalore">
    <title>AdaCamp Bangalore: "Nothing could be more open and encouraging than this"</title>
    <link>https://cis-india.org/openness/news/ada-camp-bangalore</link>
    <description>
        &lt;b&gt;I can say this conference was the most truly touched feminist endeavor I have ever witnessed or thought of. An inspiration to last through. — Rupali Talwatkar. &lt;/b&gt;
        &lt;p&gt;Rohini Lakshané delivered a session on digital security. For more info see the &lt;a class="external-link" href="https://adainitiative.org/2014/12/adacamp-bangalore-nothing-could-be-more-open-and-encouraging-than-this/"&gt;details on Ada Initiative website&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Session on Imposter Syndrome:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Impostor syndrome is a common       reaction to doing publicly visible and publicly criticised work       like that done in open technology and culture. Impostor Syndrome &lt;b&gt;is         the feeling that you aren't actually qualified for the work you         are doing and will be discovered as a fraud&lt;/b&gt;. It is prevalent       among women in open tech/culture, many of whom have been       socialised to value other's opinion of their work above their own,       and to do things "by the book."&lt;br /&gt; &lt;a href="http://adainitiative.org/what-we-do/impostor-syndrome-training/" target="_blank"&gt;http://adainitiative.org/what-we-do/impostor-syndrome-training/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Session on Open Street Maps:&lt;/b&gt;&lt;br /&gt; &lt;a href="https://etherpad.wikimedia.org/p/yAxa2Kwkfm" target="_blank"&gt;https://etherpad.wikimedia.org/p/yAxa2Kwkfm&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/ada-camp-bangalore'&gt;https://cis-india.org/openness/news/ada-camp-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-02-12T01:53:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
