<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1001 to 1015.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc19-list-call-papers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc18"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc18-offline-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16-selected-sessions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc16-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/internet-researchers-conference-irc-2016-studying-internet-in-india-call-for-sessions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/internet-liability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/internet-institute-repository"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ig-round-table-british-high-commission"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/igf-remote-participation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-governance-forum.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/irc19-list-call-papers">
    <title>Internet Researchers' Conference 2019 (IRC19): #List - Call for Papers </title>
    <link>https://cis-india.org/raw/irc19-list-call-papers</link>
    <description>
        &lt;b&gt;Who makes lists? How are lists made? Who can be on a list, and who is missing? What new subjectivities - indicative of different asymmetries of power/knowledge - do list-making, and being listed, engender? What makes lists legitimate information artifacts, and what makes their knowledge contentious? Much debate has emerged about specificities and implications of the list as an information artifact, especially in the case of #LoSHA and NRC - its role in creation and curation of information, in building solidarities and communities of practice, its dependencies on networked media infrastructures, its deployment by hegemonic entities and in turn for countering dominant discourses. For the fourth edition of the Internet Researchers’ Conference (IRC19), we invite papers that engage critically with the form, imagination, and politics of the *list*. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Call for Papers&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;For the fourth edition of the Internet Researchers’ Conference (IRC19), we invite papers that engage critically with the form, imagination, and politics of the *list* - to present or propose academic, applied, or creative works that explore its social, economic, cultural, material, political, affective, or aesthetic dimensions.&lt;/h4&gt;
&lt;p&gt;Paper abstracts (of not more than 500 words) are to be submitted by &lt;strong&gt;Sunday, December 23&lt;/strong&gt; via email sent to &lt;strong&gt;raw@cis-india.org&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Authors of selected paper abstracts will be informed by Monday, December 31, and will be expected to present the full paper (either in person, or remotely) at the IRC19 - #List, to be held in Hyderabad during Jan 31 - Feb 2, 2019.&lt;/p&gt;
&lt;p&gt;Selected paper authors, who are unemployed or underemployed, will be offered support to cover travel expenses fully/partially.&lt;/p&gt;
&lt;p&gt;The only eligibility criteria for submitting papers is that they must engage with the thematic of the conference - *list*.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;IRC19: List&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;For the last several years, #MeToo and #LoSHA have set the course for rousing debates within feminist praxis and contemporary global politics. It also foregrounded the ubiquitous presence of the list in its various forms, not only on the internet but across diverse aspects of media culture. Much debate has emerged about specificities and implications of the list as an information artifact, especially in the case of #LoSHA and NRC - its role in creation and curation of information, in building solidarities and communities of practice, its dependencies on networked media infrastructures, its deployment by hegemonic entities and in turn for countering dominant discourses. Directed by the Supreme Court, the Government of India has initiated the National Register of Citizens process of creating an updated list of all Indian citizens in the state of Assam since 2015. This is a list that sets apart legal citizens from illegal immigrants, based on an extended and multi-phase process of announcement of draft lists and their revisions. NRC is producing a list with a specific question: who is a citizen and who is not? UIDAI has produced a list of unique identification number assigned to individuals: a list to connect/aggregate other lists, a meta-list.&lt;/p&gt;
&lt;p&gt;From Mailing Lists to WhatsApp Broadcast Lists, lists have been the very basis of multi-casting capabilities of the early and the recent internets. The list - in terms of list of people receiving a message, list of machines connecting to a router or a tower, list of ‘friends’ and ‘followers’ ‘added’ to your social media persona - structures the open-ended multi-directional information flow possibilities of the internet. It simultaneously engenders networks of connected machines and bodies, topographies of media circulation, and social graphs of affective connections and consumptions. The epistemological, constitutive, and inscriptive functions of the list, as Liam Young documents, have been crucial to the creation of new infrastructures of knowledge, and to understand where the internet emerges as a challenge to these.&lt;/p&gt;
&lt;p&gt;As a media format that is easy to create, circulate, and access (as seen in the number of rescue and relief lists that flood the web during national disasters) or one that is essential in classification and cross-referencing (such as public records and memory institutions), the list becomes an essential trope to understand new media forms today, as the skeletal frame on which much digital content and design is structured and consumed through.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Who makes lists?&lt;/li&gt;
&lt;li&gt;How are lists made?&lt;/li&gt;
&lt;li&gt;Who can be on a list, and who is missing?&lt;/li&gt;
&lt;li&gt;Who gets counted on lists, and who is counting?&lt;/li&gt;
&lt;li&gt;What new subjectivities - indicative of different asymmetries of power/knowledge - do list-making, and being listed, engender?&lt;/li&gt;
&lt;li&gt;What modalities of creation and circulation of lists affords its authority, its simultaneous revelations and obfuscations?&lt;/li&gt;
&lt;li&gt;What makes lists legitimate information artifacts, and what makes their knowledge contentious?&lt;/li&gt;
&lt;li&gt;What makes lists ephemeral, and what makes their content robust?&lt;/li&gt;
&lt;li&gt;What makes lists hegemonic, and what makes them intersectional?&lt;/li&gt;
&lt;li&gt;What makes lists ordered, and what makes them unordered?&lt;/li&gt;
&lt;li&gt;What do listicles do to habits of reading and creation of knowledge?&lt;/li&gt;
&lt;li&gt;What new modes of questioning and meaning-making have manifested today in various practices of list-making?&lt;/li&gt;
&lt;li&gt;How and when do lists became digital, and whatever happened to lists on paper?&lt;/li&gt;
&lt;li&gt;Are there cultural economies of lists, list-making, and getting listed?&lt;/li&gt;
&lt;li&gt;Are lists content or carriage, are they medium or message?&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc19-list-call-papers'&gt;https://cis-india.org/raw/irc19-list-call-papers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>IRC19</dc:subject>
    

   <dc:date>2018-12-06T07:00:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc18">
    <title>Internet Researchers' Conference 2018 (IRC18): Offline, February 22-24, Sambhaavnaa Institute</title>
    <link>https://cis-india.org/raw/irc18</link>
    <description>
        &lt;b&gt;We are proud to announce that the third edition of the Internet Researchers' Conference series will be held at the Sambhaavnaa Institute, Kandbari (Himachal Pradesh) during February 22-24, 2018. This annual conference series was initiated by the Researchers@Work (RAW) programme at CIS in 2016 to gather researchers, academic or otherwise, studying internet in/from India to congregate, share insights and tensions, and chart the ways forward. The *offline* is the theme of the 2018 edition of the conference (IRC18), and the conference agenda will be shaped by nine sessions selected by all the teams that submitted session proposals, and an independent paper track consisting of six presentations.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Venue: &lt;a href="http://www.sambhaavnaa.org/" target="_blank"&gt;Sambhaavnaa Institute&lt;/a&gt;, Kandbari, Palampur, Himachal Pradesh, 176061&lt;/h4&gt;
&lt;h4&gt;Travel Information: &lt;a href="http://www.sambhaavnaa.org/contact/how-to-reach-us/" target="_blank"&gt;Getting to Sambhaavnaa&lt;/a&gt; (Sambhaavnaa Institute)&lt;/h4&gt;
&lt;h4&gt;Weather in Kandbari: &lt;a href="https://www.accuweather.com/en/in/palampur/198333/daily-weather-forecast/198333?day=8" target="_blank"&gt;10°-20°c with possibility of light shower&lt;/a&gt; (AccuWeather)&lt;/h4&gt;
&lt;h4&gt;Registration: &lt;a href="https://goo.gl/forms/H4kYubotpBgN5hFE3" target="_blank"&gt;RSVP&lt;/a&gt; (Google Drive)&lt;/h4&gt;
&lt;h4&gt;Agenda: &lt;a href="https://docs.google.com/document/d/1KvfsYRCafNcjoGkocVRxbsH_N9dI51k7me7nC8R1LY4/edit?usp=sharing" target="_blank"&gt;Conference Programme&lt;/a&gt; (Google Drive)&lt;/h4&gt;
&lt;h4&gt;Poster: &lt;a href="https://raw.githubusercontent.com/cis-india/irc/master/irc18/IRC18_Poster.png" target="_blank"&gt;Download&lt;/a&gt; (JPG)&lt;/h4&gt;
&lt;hr /&gt;
&lt;img src="https://cis-india.org/raw/irc18-offline-call/image" alt="IRC18: Offline - Call for Sessions" width="45%" /&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/irc/master/irc18/IRC18_Poster.png" alt="IRC18: Offline - Poster" width="45%" /&gt;
&lt;h3&gt;&lt;strong&gt;IRC18: Offline&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Does being offline necessarily mean being disconnected? Beyond anxieties such as FOMO, being offline is also seen as disengagement from a certain milieu of the digital (read: capital), an impediment to the way life is organised by and around technologies in general. However, being offline is not the exception, as examples of internet shutdown and acts on online censorship illustrate the persistence and often alarming regularity of the offline even for the ‘connected’ sections of the population.&lt;/p&gt;
&lt;p&gt;State and commercial providers of internet and telecommunication services work in tandem to produce both the “online” and the “offline” - through content censorship, internet regulation, generalised service provision failures, and so on. Further, efforts to prioritise the use of digital technologies for financial transactions, especially since demonetisation, has led to a not-so-subtle equalisation of the ‘online economy’ with the ‘formal economy’; thus recognising the offline as the zones of informality, corruption, and piracy. This contributes to the offline becoming invisible, and in many cases, illegal, rather than being recognised as a condition that necessarily informs what it means to be digital.&lt;/p&gt;
&lt;p&gt;Who is offline, and is it a choice? The global project of bringing people online has spurred several commendable initiatives in expanding access to digital devices, networks, and content, and often contentious ones such as Free Basics / internet.org, which illustrate the intersectionalities of scale, privilege, and rights that we need to be mindful of when we imagine the offline. Further, the experience of the internet, for a large section of people is often mediated through prior and ongoing experiences of traditional media, and through cultural metaphors and cognitive frames that transcend more practical registers such as consumption and facilitation. How do we approach, study, and represent this disembodied internet – devoid of its hypertext, platforms, devices, it's nuts and bolts, but still tangible through engagement in myriad, personal and often indiscernible ways.&lt;/p&gt;
For the third edition of the Internet Researchers’ Conference (IRC18), we invite participants to critically discuss the *offline*. We invite sessions that present or propose academic, applied, creative, or technical works that explore social, economic, cultural, political, infrastructural, or aesthetic dimensions of the *offline*.
&lt;h3&gt;&lt;strong&gt;Sessions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;#OnlineGovernanceOfflineGovernment&lt;/strong&gt; - Mohammad Javed Alam and Suman Mandal - &lt;a href="https://cis-india.github.io/irc/irc18/sessions/onlinegovernanceofflinegovernment.html"&gt;Session Details&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;#WomenInTech&lt;/strong&gt; - Priyanka Chaudhuri and Tripti Jain - &lt;a href="https://cis-india.github.io/irc/irc18/sessions/womenintech.html"&gt;Session Details&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;#Cyberflesh&lt;/strong&gt; - Akriti Rastogi, Ishani Dey, and Sagorika Singha - &lt;a href="https://cis-india.github.io/irc/irc18/sessions/cyberflesh.html"&gt;Session Details&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;#RethinkingTheVirtualPublic&lt;/strong&gt; - Daisy Barman and Aamir Qayoom - &lt;a href="https://cis-india.github.io/irc/irc18/sessions/rethinkingthevirtualpublic.html"&gt;Session Details&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;#FeminismIRL&lt;/strong&gt; - Mamatha Karollil, the SIVE Collective, and Tara Atluri - &lt;a href="https://cis-india.github.io/irc/irc18/sessions/feminismirl.html"&gt;Session Details&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;#ILoveYou&lt;/strong&gt; - Dhiren Borisa and Dhrubo Jyoti - &lt;a href="https://cis-india.github.io/irc/irc18/sessions/iloveyou.html"&gt;Session Details&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;#CollectionAndIdentity&lt;/strong&gt; - Ravi Shukla, Rajiv Mishra, and Mrutyunjay Mishra - &lt;a href="https://cis-india.github.io/irc/irc18/sessions/collectionandidentity.html"&gt;Session Details&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;#FollowUsOffline&lt;/strong&gt; - Dinesh, Farah Yameen, Afrah Shafiq, and Bhanu Prakash GS - &lt;a href="https://cis-india.github.io/irc/irc18/sessions/followusoffline.html"&gt;Session Details&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;#OfSiegesAndShutdowns&lt;/strong&gt; - Chinmayi S. K. and Rohini Lakshané - &lt;a href="https://cis-india.github.io/irc/irc18/sessions/ofsiegesandshutdowns.html"&gt;Session Details&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Papers&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Slow journalism and the temporalities of the offline&lt;/strong&gt; - Akshata Pai - &lt;a href="https://cis-india.github.io/irc/irc18/selected-papers.html#slow-journalism"&gt;Paper Abstract&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;﻿Campus campaigns: User perceptions in pre-digital and digital eras&lt;/strong&gt; - Arjun Ghosh - &lt;a href="https://cis-india.github.io/irc/irc18/selected-papers.html#campus-campaigns"&gt;Paper Abstract&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The many lives of food: Blogs to books and back&lt;/strong&gt; - Dhrupadi Chattopadhyay - &lt;a href="https://cis-india.github.io/irc/irc18/selected-papers.html#lives-of-food"&gt;Paper Abstract&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Feminism in digital age&lt;/strong&gt; - Putul Sathe - &lt;a href="https://cis-india.github.io/irc/irc18/selected-papers.html#feminism-digital"&gt;Paper Abstract&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Marathi literary criticism in the era of social media&lt;/strong&gt; - Rajashree Patil - &lt;a href="https://cis-india.github.io/irc/irc18/selected-papers.html#marathi-literary-social"&gt;Paper Abstract&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Taking open science offline&lt;/strong&gt; - Shreyashi Ray - &lt;a href="https://cis-india.github.io/irc/irc18/selected-papers.html#open-science"&gt;Paper Abstract&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;About the IRC Series&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The Researchers at Work (RAW) programme at the Centre for Internet and Society (CIS) initiated the &lt;a href="https://cis-india.github.io/irc/index.html"&gt;Internet Researchers' Conference (IRC)&lt;/a&gt; series to address these concerns, and to create an annual temporary space in India, for internet researchers to gather and share experiences.&lt;/p&gt;
&lt;p&gt;The IRC series is driven by the following interests:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;creating discussion spaces for researchers and practitioners studying internet in India and in other comparable regions,&lt;/li&gt;
&lt;li&gt;foregrounding the multiplicity, hierarchies, tensions, and urgencies of the digital sites and users in India, accounting for the various layers, conceptual and material, of experiences and usages of internet and networked digital media in India, and&lt;/li&gt;
&lt;li&gt;exploring and practicing new modes of research and documentation necessitated by new (digital) objects of power/knowledge.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The &lt;a href="https://cis-india.org/raw/irc16"&gt;first edition of the Internet Researchers' Conference&lt;/a&gt; series was held in February 2016. It was hosted by the Centre for Political Studies at Jawaharlal Nehru University, and was supported by the CSCS Digital Innovation Fund. The &lt;a href="https://cis-india.org/raw/irc17"&gt;second Internet Researchers' Conference&lt;/a&gt; was organised in partnership with the Centre for Information Technology and Public Policy (CITAPP) at the International Institute of Information Technology Bangalore (IIIT-B) campus on March 03-05, 2017.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc18'&gt;https://cis-india.org/raw/irc18&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    

   <dc:date>2018-07-02T18:30:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc18-offline-call">
    <title>Internet Researchers' Conference 2018 (IRC18): Offline - Call for Sessions</title>
    <link>https://cis-india.org/raw/irc18-offline-call</link>
    <description>
        &lt;b&gt;Does being offline necessarily mean being disconnected? Beyond anxieties such as FOMO, being offline is also seen as disengagement from a certain milieu of the digital (read: capital), an impediment to the way life is organised by and around technologies in general. However, being offline is not the exception, as examples of internet shutdown and acts on online censorship illustrate the persistence and often alarming regularity of the offline even for the ‘connected’ sections of the population. The *offline* is the theme of the third Internet Researchers' Conference (IRC18). We invite teams of two or more members to submit sessions proposals by Sunday, November 19 (final deadline). The session selection process is described below. The Conference will be hosted by the Sambhaavnaa Institute of Public Policy and Politics (Kandbari, Palampur, Himachal Pradesh) on February 22-24, 2018.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a href="#offline"&gt;IRC18: Offline&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;&lt;a href="#call"&gt;Call for Sessions&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;&lt;a href="https://cis-india.github.io/irc/irc18/proposed-sessions.html" target="_blank"&gt;Proposed Sessions&lt;/a&gt; (Conference Website)&lt;/h4&gt;
&lt;h4&gt;&lt;a href="http://www.sambhaavnaa.org/" target="_blank"&gt;Sambhaavnaa Institute of Public Policy and Politics&lt;/a&gt; (External Link)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3 id="offline"&gt;&lt;strong&gt;IRC18: Offline&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Does being offline necessarily mean being disconnected? Beyond anxieties such as FOMO, being offline is also seen as disengagement from a certain milieu of the digital (read: capital), an impediment to the way life is organised by and around technologies in general. However, being offline is not the exception, as examples of internet shutdown and acts on online censorship illustrate the persistence and often alarming regularity of the offline even for the ‘connected’ sections of the population.&lt;/p&gt;
&lt;p&gt;State and commercial providers of internet and telecommunication services work in tandem to produce both the “online” and the “offline” - through content censorship, internet regulation, generalised service provision failures, and so on. Further, efforts to prioritise the use of digital technologies for financial transactions, especially since demonetisation, has led to a not-so-subtle equalisation of the ‘online economy’ with the ‘formal economy’; thus recognising the offline as the zones of informality, corruption, and piracy. This contributes to the offline becoming invisible, and in many cases, illegal, rather than being recognised as a condition that necessarily informs what it means to be digital.&lt;/p&gt;
&lt;p&gt;Who is offline, and is it a choice? The global project of bringing people online has spurred several commendable initiatives in expanding access to digital devices, networks, and content, and often contentious ones such as Free Basics / internet.org, which illustrate the intersectionalities of scale, privilege, and rights that we need to be mindful of when we imagine the offline. Further, the experience of the internet, for a large section of people is often mediated through prior and ongoing experiences of traditional media, and through cultural metaphors and cognitive frames that transcend more practical registers such as consumption and facilitation. How do we approach, study, and represent this disembodied internet – devoid of its hypertext, platforms, devices, it's nuts and bolts, but still tangible through engagement in myriad, personal and often indiscernible ways.&lt;/p&gt;
&lt;h4&gt;For the third edition of the Internet Researchers’ Conference (IRC18), we invite participants to critically discuss the *offline*. We invite sessions that present or propose academic, applied, creative, or technical works that explore social, economic, cultural, political, infrastructural, or aesthetic dimensions of the *offline*.&lt;/h4&gt;
&lt;p&gt;For example, the sessions may explore one or more of the following themes:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Geographies of internet access: Infrastructural, socio-political, and discursive forces and contradictions&lt;/li&gt;
&lt;li&gt;Terms, objects, metaphors, and events of the internet and their offline remediation and circulation&lt;/li&gt;
&lt;li&gt;Minimal computing, maker cultures, and digital collaboration and creativity in the offline&lt;/li&gt;
&lt;li&gt;Offline economic cultures and transition towards less-cash economy&lt;/li&gt;
&lt;li&gt;Offline as democratic choice: the right to offline lives in the context of global debates on privacy, surveillance, and data justice&lt;/li&gt; 
&lt;li&gt;Methodologies of studying the *offline* at the intersections of offline and online lives&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Please note that the above are not sub-themes or tracks under which a session should be proposed, but are illustrations of possible session themes and concerns.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 id="call"&gt;&lt;strong&gt;Call for Sessions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;We invite teams of two or more members to propose sessions for IRC18. All sessions will be one and half hours long, and will be fully designed and facilitated by the team concerned, including moderation (if any). Please remember this when planning the session. Everything happening during the session, except for logistical support, will be led and managed by the session team.&lt;/p&gt;
&lt;p&gt;The sessions are expected to drive conversations on the topic concerned. They may include presentation of research papers but this is not mandatory.&lt;/p&gt;
&lt;p&gt;We look forward to sessions that involve collaborative work (either in groups or otherwise), including discussions, interactions, documentation, learning, and making, are most welcome.&lt;/p&gt;
&lt;p&gt;We also look forward to sessions conducted in Indic languages. The proposing team, in such a case, should consider how participants who do not understand the language concerned may engage with the session. IRC organisers and other participants shall help facilitate these sessions, say by offering translation support.&lt;/p&gt;
&lt;p&gt;The only eligibility criteria for proposing sessions are that they must be proposed by a team of at least two members, and that they must engage with the *offline*.&lt;/p&gt;
&lt;p&gt;The deadline for submission of sessions proposals for IRC18 is &lt;strong&gt;Sunday, November 19 (final deadline)&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;To propose a session, please send the following documents (as attached text files) to raw@cis-india.org:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Title of the Session:&lt;/strong&gt; The session should be named in the form of a hashtag (check the &lt;a href="https://cis-india.org/raw/irc17-selected-sessions"&gt;IRC17 selected sessions&lt;/a&gt; for example).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Context of the Session:&lt;/strong&gt; This should be a 300 words note discussing the context, the motivations, and the expectations behind the proposed session.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session Plan:&lt;/strong&gt; This should describe the objectives of the session, what will be done and discussed during the session, and who among the people organising the session will be responsible for what. This note need not be more than 300 words long. If your session involves inviting others to present their work (say papers), then please provide a description and timeline of the process through which these people will be identified.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session Team Details:&lt;/strong&gt; Please share brief biographic notes of each member of the session team, and contact details.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;There is no registration fee for the Conference, but participants are expected to pay for their own travel and accommodation (to be organised by CIS) expenses. Limited funding will be available to support travel and accommodation expenses of few participants who are unemployed or under-employed.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session selection process:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;November 19:&lt;/strong&gt; Deadline of submission of session proposals.All submitted sessions will be posted on the CIS website, along with the names and details of the session team members.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;November 20 - December 17:&lt;/strong&gt; Open review period. All session teams, as well as other interested contributors, are invited to review and comment upon each other's submitted proposals and revise their own. Read the proposed sessions here: &lt;a href="https://cis-india.github.io/irc/irc18/proposed-sessions.html"&gt;Conference Website&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;December 18-31:&lt;/strong&gt; The selection process takes place. All session teams will select 10 sessions to be included in the IRC18 programme. The votes will be anonymous, that is no session team will know which other sessions have voted for their session.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;January 08:&lt;/strong&gt; Announcement of selected sessions.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;February 22-24:&lt;/strong&gt; IRC18 at Sambhaavnaa Institute!&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc18-offline-call'&gt;https://cis-india.org/raw/irc18-offline-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>IRC18</dc:subject>
    
    
        <dc:subject>RAW Events</dc:subject>
    

   <dc:date>2017-11-29T12:30:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc16-selected-sessions">
    <title>Internet Researchers' Conference 2016 (IRC16) - Selected Sessions</title>
    <link>https://cis-india.org/raw/irc16-selected-sessions</link>
    <description>
        &lt;b&gt;We are proud to announce that the first Internet Researchers' Conference (IRC16), organised around the theme of 'studying internet in India,' will be held on February 26-28, 2016, at the Jawaharlal Nehru University (JNU), Delhi. We are deeply grateful to the Centre for Political Studies (CPS) at JNU for hosting the Conference, and to the CSCS Digital Innovation Fund (CDIF) for generously supporting it. Here are the details about the session selection process, the selected sessions, the Conference programme (draft), the pre-Conference discussions, accommodation, and travel grants. The Conference will include a book sprint to produce an open handbook on 'methods and tools for internet research.'&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Session Selection Process&lt;/h2&gt;
&lt;p&gt;We received 23 superb session proposals for the IRC16. All the teams that submitted sessions were invited to vote for their eight favourite session in a double-blind manner - the teams did not know the names of the people who proposed other sessions, and we at CIS did not know which team has voted for which particular set of sessions. After receiving all the votes, we could not help but change the format of the Conference (as planned earlier) to accommodate 15 sessions in total. All Discussion and Workshop sessions of the Conference are double track, except for the three Discussion sessions that received most number of votes.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Selected Sessions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-digitaldesires"&gt;&lt;strong&gt;#DigitalDesires&lt;/strong&gt;&lt;/a&gt;: Received 8.15% votes. Proposed by Silpa Mukherjee, Ankita Deb, and Rahul Kumar.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-followthemedium"&gt;&lt;strong&gt;#FollowTheMedium&lt;/strong&gt;&lt;/a&gt;: Received 7.60% votes. Proposed by Zeenab Aneez and Neha Mujumdar.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-stsdebates"&gt;&lt;strong&gt;#STSDebates&lt;/strong&gt;&lt;/a&gt;: Received 7.60% votes. Proposed by Sumandro Chattapadhyay and Jahnavi Phalkey.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-digitalliteraciesatthemargins"&gt;&lt;strong&gt;#DigitalLiteraciesAtTheMargins&lt;/strong&gt;&lt;/a&gt;: Received 7.06% votes. Proposed by Aakash Solanki, Sandeep Mertia, and Rashmi M.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-internetmovements"&gt;&lt;strong&gt;#InternetMovements&lt;/strong&gt;&lt;/a&gt;: Received 7.06% votes. Proposed by Becca Savory, Sarah McKeever, and Shaunak Sen.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-futurebazaars"&gt;&lt;strong&gt;#FutureBazaars&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Maitrayee Deka, Adam Arvidsson, Rohini Lakshané, and Ravi Sundaram.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-minimalcomputing"&gt;&lt;strong&gt;#MinimalComputing&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Padmini Ray Murray and Sebastian Lütgert.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-webofgenealogies"&gt;&lt;strong&gt;#WebOfGenealogies&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Ishita Tiwary, Sandeep Mertia, and Siddharth Narrain.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-wikishadows"&gt;&lt;strong&gt;#WikiShadows&lt;/strong&gt;&lt;/a&gt;: Received 5.97% votes. Proposed by Tanveer Hasan and Rahmanuddin Shaik.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-literaryspaces"&gt;&lt;strong&gt;#LiterarySpaces&lt;/strong&gt;&lt;/a&gt;: Received 5.43% votes. Proposed by P.P. Sneha and Arup Chatterjee.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-archiveanarchy"&gt;&lt;strong&gt;#ArchiveAnarchy&lt;/strong&gt;&lt;/a&gt;: Received 4.34% votes. Proposed by Ranjani M Prasad and Farah Yameen.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-afcinema2.0"&gt;&lt;strong&gt;#AFCinema2.0&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Akriti Rastogi and Ishani Dey.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-manypublicsofinternet"&gt;&lt;strong&gt;#ManyPublicsOfInternet&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Sailen Routray and Khetrimayum Monish.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-politicsonsocialmedia"&gt;&lt;strong&gt;#PoliticsOnSocialMedia&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Rinku Lamba and Rajarshi Dasgupta.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/irc16-proposed-spottingdata"&gt;&lt;strong&gt;#SpottingData&lt;/strong&gt;&lt;/a&gt;: Received 3.80% votes. Proposed by Dibyajyoti Ghosh and Purbasha Auddy.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Dates and Venue&lt;/h2&gt;
&lt;p&gt;The IRC16 will take place during &lt;strong&gt;February 26-28, 2016&lt;/strong&gt;, at the &lt;a href="http://jnu.ac.in/"&gt;&lt;strong&gt;Jawaharlal Nehru University (JNU)&lt;/strong&gt;&lt;/a&gt;, Delhi. We are delighted to announce that the Conference will be hosted by the &lt;a href="http://www.jnu.ac.in/SSS/CPS/"&gt;&lt;strong&gt;Centre for Political Studies (CPS)&lt;/strong&gt;&lt;/a&gt; at JNU, and will be generously supported by the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;&lt;strong&gt;CSCS Digital Innovation Fund (CDIF)&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Conference Programme&lt;/h2&gt;
&lt;p&gt;Access the draft programme (v.2.1): &lt;a href="https://github.com/cis-india/IRC16/raw/master/IRC16_Programme-v.2.1.pdf"&gt;Download&lt;/a&gt; (PDF).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Pre-Conference Conversations&lt;/h2&gt;
&lt;p&gt;Please join the researchers@cis-india mailing list to take part in the pre-conference conversations: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Accommodation&lt;/h2&gt;
&lt;p&gt;CPS and CIS will provide accommodation to all non-Delhi-based team members of the selected sessions, during the days of the Conference.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Travel Grants&lt;/h2&gt;
&lt;p&gt;We will offer 10 travel grants, up to Rs. 10,000 each, for within-India travel. The following non-Delhi-based team members of the selected sessions have been selected for travel grants: Aakash Solanki, Dibyajyoti Ghosh, Neha Mujumdar, Purbasha Auddy, Rahmanuddin Shaik, Rashmi M, Rohini Lakshané, Sailen Routray, P.P. Sneha, and Zeenab Aneez.&lt;/p&gt;
&lt;p&gt;The travel grants are made possible by the &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;CSCS Digital Innovation Fund (CDIF)&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16-selected-sessions'&gt;https://cis-india.org/raw/irc16-selected-sessions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-01-18T09:23:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc16-call">
    <title>Internet Researchers' Conference (IRC) 2016 - Studying Internet in India: Call for Sessions (Extended to Nov 22)</title>
    <link>https://cis-india.org/raw/irc16-call</link>
    <description>
        &lt;b&gt;With great excitement, we are announcing the beginning of an annual conference series titled Internet Researchers' Conference (IRC), the first edition of which is to take place in Delhi during February 25-27, 2016 (yet to be confirmed). This first conference will focus on the theme of 'Studying Internet in India.' The word 'study' here is a shorthand for a range of tasks, from documentation and theory-building, to measurement and representation. We invite you to propose sessions for the conference by Sunday, November 22, 2015. Final sessions will be selected during December and announced by December 31, 2015. Below are the details about the conference series, as well instructions for proposing a session for the conference.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Call for Sessions document: &lt;a href="https://cis-india.org/raw/internet-researchers-conference-irc-2016-studying-internet-in-india-call-for-sessions/at_download/file"&gt;Download (PDF)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Call for Sessions poster: &lt;a href="https://cis-india.org/raw/internet-researchers-conference-irc-2016-studying-internet-in-india-call-for-sessions-poster/at_download/file"&gt;Download (PNG)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Internet Researchers’ Conference&lt;/h2&gt;
&lt;p&gt;The last decades have seen a growing entanglement of our daily lives with the internet, not only as modes of communication but also as shared socio-politico-cultural spaces, and as objects of study. The emergence of new artifacts, conditions, and sites of power/knowledge with the prevalence of digital modes of communication, consumptions, production, distribution, and appropriation have expectedly attracted academic and non-academic explorers across disciplines, professions, and interests. Researchers across the domains of arts, humanities, and social sciences have attempted to understand life on the internet, or life after the internet, and the way digital technologies mediate various aspects of our being today. These attempts have in turn raised new questions around understanding of digital objects, online lives, and virtual networks, and have contributed to complicating disciplinary assumptions, methods, and boundaries.&lt;/p&gt;
&lt;p&gt;The Researchers at Work (RAW) programme at the Centre for Internet and Society (CIS) is very excited to invite you to take part in the first of a series of annual conferences for researchers (academic or otherwise) studying internet in India. These conferences will be called the Internet Researchers' Conference (IRC), with the abbreviation reminding us of an early protocol for text-based communication over internet. The first edition will be organised around the theme of ‘studying internet in India.’ The word study here is a shorthand for a range of tasks, from documentation and theory-building, to measurement and representation.&lt;/p&gt;
&lt;p&gt;This conference series is founded on the following interests:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Creating discussion spaces for researchers studying internet in India and in other comparable regions.&lt;/li&gt;
&lt;li&gt;Foregrounding the multiplicity, hierarchies, tensions, and urgencies of the digital sites and users in India.&lt;/li&gt;
&lt;li&gt;Accounting for the various layers, conceptual and material, of experiences and usages of internet and networked digital media in India.&lt;/li&gt;
&lt;li&gt;Exploring and practicing new modes of research and documentation necessitated by new (digital) forms of objects of power/knowledge.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Studying Internet in India&lt;/h2&gt;
&lt;p&gt;The inaugural conference will be held in Delhi (&lt;strong&gt;to be confirmed&lt;/strong&gt;) on February 25-27, 2015. It will comprise of discussion and workshop sessions taking place during the first two days, and a writing sprint and a final round table taking place during the third day.&lt;/p&gt;
&lt;p&gt;The conference will specifically focus on the following questions:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;How do we conceptualise, as an intellectual and political task, the mediation and transformation of social, cultural, political, and economic processes, forces, and sites through internet and digital media technologies in contemporary India?&lt;/li&gt;
&lt;li&gt;How do we frame and explore the experiences and usages of internet and digital media technologies in India within its specific historical-material contexts shaped by traditional hierarchies of knowledge, colonial systems of communication, post-independence initiatives in nation-wide technologies of governance, a rapidly growing telecommunication market, and informal circuits of media production and consumption, among others?&lt;/li&gt;
&lt;li&gt;What tools and methods are made available by arts, humanities, social science, and technical disciplines to study internet in India; how and where do they fail to meet the purpose; what revisions and fresh tool building are becoming necessary; and how should the usage of such tools and methods be taught?&lt;/li&gt;
&lt;li&gt;Given the global techno-economic contours of the internet, and the starkly hierarchical and segmented experiences and usages of the same in India, how do we begin to use the internet as a space for academic and creative practice and intervention?&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Sessions&lt;/h2&gt;
&lt;p&gt;The conference will not be organised around papers but sessions. Each session will be one and half hour long. Potential participants may propose sessions that largely engage with one of the questions listed above.&lt;/p&gt;
&lt;p&gt;Each proposed session must have at least two, and preferably three, co-leaders, who will drive the session, and prepare a session document after the conference. The proposed session can either involve a discussion, or a workshop.&lt;/p&gt;
&lt;p&gt;In a discussion session, the co-leaders may present their works (not necessarily of the academic kind), or invite others to present their works, on a specific theme, which will be followed by a discussion, as structured by the co-leaders.&lt;/p&gt;
&lt;p&gt;In a workshop session, the co-leaders will engage the participants to undertake individual or collaborative work in response to a series of questions, challenges, or provocations offered by the co-leaders at the beginning of the session. The proposed work may involve writing, searching, copying, building, etc., but &lt;strong&gt;not&lt;/strong&gt; speaking.&lt;/p&gt;
&lt;p&gt;Both the kinds of sessions are open to presentations and collaborations in the textual format or in other formats, including but not limited to code-based works and multimedia installations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Writing Sprint&lt;/h2&gt;
&lt;p&gt;At the writing sprint, on the third day morning, all the participants will collaboratively put together the first draft of a handbook on tools and methods of studying Internet in India. It will be created as an online, open access, multilingual, and editable (wiki-like) book, and will be meant for extensive usage and augmentation by students, researchers, and others.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Final Round Table&lt;/h2&gt;
&lt;p&gt;This will take place after the lunch on the third day to wrap-up the conversations (and propose new initiatives, hopefully) emerging during the previous days of the conference, to make plans for follow-up works (including the first IRC Reader), and to speculate about the shape of the next year’s conference.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;IRC Reader&lt;/h2&gt;
&lt;p&gt;The IRC Reader will be produced as documentation of the conversations and activities at the conference. The Reader, obviously, will have the same theme as the conference, and will largely comprise of the session documentation (not necessarily textual) prepared by the co-leaders of the session concerned. Once all the session documentation is shared by the co-leaders and is temporarily published online, all the participants will be invited to share their comments, which will all be part of the final Reader of the conference.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Proposing a Session&lt;/h2&gt;
&lt;p&gt;To propose a session, each team of two/three co-leaders will have to submit the following documents:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The name of the session: It should be created as a &lt;strong&gt;hashtag&lt;/strong&gt;, as in #BlackLivesMatter, or #RefugeesWelcome.&lt;/li&gt;
&lt;li&gt;A plan of the proposed session that should clarify its context, the key questions/challenges/provocations for the session, and how they connect to any one of the four questions listed above. Write no more than one page.&lt;/li&gt;
&lt;li&gt;If it is a discussion session: Mention what will be presented at the session, and who will present it. Share the abstracts of the papers to be presented (if any). Each abstract should not be longer than 300 words.&lt;/li&gt;
&lt;li&gt;If it is a workshop session: Mention what you expect the participants to do during the session, and how the co-leaders will support them through the work. Write no more than one page.&lt;/li&gt;
&lt;li&gt;Three readings, or objects, or software that you expect the participants to know about before taking part in the session.&lt;/li&gt;
&lt;li&gt;CVs of all the co-leaders of the session.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;We understand that finding co-leaders for a session you have in mind might be difficult in certain cases. One possible way for you to find co-leaders is by sharing your session idea on the &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers" target="_blank"&gt;researchers@cis-india.org&lt;/a&gt; mailing list. Alternatively, you may keep an eye on the list to see what potential topics are being discussed. If you are facing any difficulty subscribing to the mailing list, please write to &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;All session proposals must be submitted by &lt;strong&gt;Sunday, November 22&lt;/strong&gt; (extended), 2015, via email sent to &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Selection of Sessions&lt;/h2&gt;
&lt;p&gt;All proposed sessions, along with related documents, will be published online by &lt;strong&gt;November 30&lt;/strong&gt;. All co-leaders of proposed sessions will be invited to vote for 8 sessions before &lt;strong&gt;December 15&lt;/strong&gt;. The sessions with maximum votes will be selected for the conference, and the list of such sessions will be published on &lt;strong&gt;December 31&lt;/strong&gt;, 2015.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Venue, Accommodation, and Travel&lt;/h2&gt;
&lt;p&gt;The conference is most likely to take place in Delhi on &lt;strong&gt;February 25-27, 2016&lt;/strong&gt;. The place, dates, and venue will be confirmed by &lt;strong&gt;December 31&lt;/strong&gt;, 2015.&lt;/p&gt;
&lt;p&gt;The conference organiser(s) will cover all costs related to accommodation and hospitality during the conference.&lt;/p&gt;
&lt;p&gt;Unfortunately, we are not sure if we will be able to pay for travel expenses of the participants. We will confirm this by &lt;strong&gt;December 31&lt;/strong&gt;, 2015.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc16-call'&gt;https://cis-india.org/raw/irc16-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC16</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-11-15T07:48:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/internet-researchers-conference-irc-2016-studying-internet-in-india-call-for-sessions">
    <title>Internet Researchers' Conference (IRC) 2016 - Studying Internet in India: Call for Sessions</title>
    <link>https://cis-india.org/raw/internet-researchers-conference-irc-2016-studying-internet-in-india-call-for-sessions</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/internet-researchers-conference-irc-2016-studying-internet-in-india-call-for-sessions'&gt;https://cis-india.org/raw/internet-researchers-conference-irc-2016-studying-internet-in-india-call-for-sessions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-10-07T10:31:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india">
    <title>Internet Privacy in India</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india</link>
    <description>
        &lt;b&gt;Internet privacy encompasses a wide range of issues and topics. It can be understood as privacy rights that an individual has online with respect to their data, and violations of the same that take place online. Given the dynamic nature of the online sphere, privacy concerns and issues are rapidly changing. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;The Changing Nature of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For example – the way in which the internet allows data to be produced, collected, combined, shared, stored, and analyzed is constantly changing and re-defining  personal data and what type of protections personal data deserves and can be given. For example, seemingly harmless data such IP address, key words used in searches, websites visited, can now be combined and analysed to identify individuals and learn personal information about an individual.  From information shared on social media sites, to cookies collecting user browser history, to individuals transacting online, to mobile phones registering location data – information about an individual is generated through each use of the internet. In some cases the individual is aware that they are generating information and that it is being collected, but in many cases, the individual is unaware of the information trail that they are leaving online, do not know who is accessing the information, and do not have control over how their information is being handled, and for what purposes it is being used. For example, law enforcement routinely troll social media sites for information that might be useful in an investigation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Blurry Line between the Public and Private Sphere&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The above example also highlights how the “sphere” of information on the internet is unclear i.e. is information posted on social media public information – free for use by any individual or entity including law enforcement, employees, data mining companies etc. or is information posted on social media – private, and thus requires authorization for further use. For example, in India, in 2013 the Mumbai police established a “social media lab” for the purposes of monitoring and tracking user behavior and activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authorization is not required for the lab to monitor individuals and their behavior, and individuals are not made aware of the same, as the project claims to analyze only publicly available information. Similar dilemmas have been dealt with by other countries. For example, in the U.S, individuals have contested the use of their tweets without permission,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; while courts in the US have ruled that tweets, private and public, can be obtained by law enforcement with only a subpoena, as technically the information has been shared with another entity, and is therefore no longer private.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;Indian Courts have yet to deal directly with the question of social media content being public or private information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Complication of Jurisdiction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The borderless nature of information flows over the Internet complicates online privacy, as individual's data is subjected to different levels of protection depending on which jurisdiction it is residing in. Thus, for example an Indian using Gmail, will be subject to the laws of the United States. On one hand this could be seen as a positive, if one country has stronger privacy protections than another, but could also be damaging to privacy in the reverse situation – where one company has lower privacy standards and safeguards. In addition to the dilemma of different levels of protection being provided over data as it flows through different jurisdictions, access by law enforcement to data stored in a different jurisdiction, or data from one country accessible to law enforcement because it is being processed in their jurisdiction, are two other complications that arise.  These complications cannot be emphasized more than with the case of the NSA Leaks. Because Indian data was residing in US servers, the US government could access and use the data with no obligation to the individual.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;In response to the NSA leaks, the government of India has stated that all facts need to be known before any action is taken, while citizens initially sought to hold the companies who disclosed the data to US security agencies such as Google, Facebook etc. accountable.&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite this, because the companies were acting within the legal limits of the United States where they were incorporated, they could not be held liable. In response to the dilemma, many actors in India, including government and industry are asking for the establishment of 'domestic servers'. For example, Dr. Kamlesh Bajaj, CEO of Data Security Council of India was quoted in Forbes magazine promoting the establishment of India centric social media platforms.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;Similarly, after the PRISM scandal became public, the National Security Advisor requested the Telecom Department to only route traffic data through Indian servers.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In these contexts, the internet is a driving force behind a growing privacy debate and awareness in India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Current  Policy for Internet Privacy in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, India's most comprehensive legal provisions that speak to privacy on the internet can be found in the Information Technology Act (ITA) 2000.  The ITA contains a number of provisions that can, in some cases, safeguard online privacy, or in other cases, dilute online privacy. Provisions that clearly protect user privacy include: penalizing child pornography,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;penalizing, hacking and fraud&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;and defining data protection standards for body corporate.&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisions that serve to dilute user privacy speak to access by law enforcement to user's personal information stored by body corporate&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; collection and monitoring of internet traffic data&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;and real time monitoring, interception, and decryption of online communications.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; Additionally, legislative gaps in the ITA serve to weaken the privacy of online users. For example, the ITA does not address questions and circumstances like the evidentiary status of social media content in India, merging and sharing of data across databases, whether individuals can transmit images of their own “private areas” across the internet, if users have the right to be notified of the presence of cookies and do-not track options, the use of electronic personal identifiers across data bases, and if individuals have the right to request service providers to take down and delete their personal content.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Online Data Protection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since 2010, there has been an increasing recognition by both the government and the public that India needs privacy legislation, specifically one that addresses the collection, processing, and use of personal data. The push for adequate data protection standards in India has come both from industry and industrial bodies like DSCI – who regard strong data protection standards as an integral part of business, and from the public, who has voiced increasing concerns that governmental projects, such as the UID, involved with collecting, processing, and using personal data are presently not adequately regulated and are collecting and processing data in such a way that abuses individual privacy.  As mentioned above, India's most comprehensive data protection standards are found in the ITA and are known as  the Information Technology “Reasonable security practices and procedures and sensitive personal data or information” Rules 2011.&lt;a href="#fn14" name="fr14"&gt;[14] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Rules seek to provide rights to the individual with regards to their information and obligate body corporate to take steps towards protecting the privacy of consumer's information. Among other things, the Rules define “sensitive personal information' and require  that any corporate body must publish an online privacy policy, provide individuals with the right to access and correct their information, obtain consent before disclosing sensitive personal information ' except in the case of law enforcement, provide individuals the ability to withdraw consent, establish a grievance officer, require companies to ensure equivalent levels of protection when transferring information, and put in place reasonable security practices. Though the Rules are the strongest form of data protection in India, they have not been recognized by the European Union as meeting the EU standards of “data secure”&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;and many gaps still exist. For example, the Rules apply only to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Body corporate and not to the government&lt;/li&gt;
&lt;li&gt;Electronically generated and transmitted information &lt;/li&gt;
&lt;li&gt;A limited scope of sensitive personal information.&lt;/li&gt;
&lt;li&gt;A body corporate when a contractual agreement is not already in place.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These gaps leave a number of bodies unregulated and types of information unprotected, and limits the scope of the Rules.  It is also unclear to what extent companies are adhering to these Rules, and if they are applying the Rules only to the use of their website or if they are also applying the Rules to their core business practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Cafés&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2011 the Guidelines for Cyber Café Rules were notified under the Information Technology Act. These Rules, among other things, require Cyber Café’s to retain the following details for every user for a period of one year: details of identification, name, address, contact number, gender, date, computer terminal identification, log in time, and log out time. These details must be submitted to the same agency as directed, on a monthly basis.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Cyber Cafes must also retain the history of websites accessed and logs of proxy servers installed at the cyber café for a period of one year.&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;Furthermore, Cyber Café’s must ensure that the partitions between cubicles do not exceed four and half feet in height from floor level.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; Lastly, the cyber café owner is required to provide every related document, register, and information to any officer authorized by the registration agency on demand.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;In effect, the identification and retention requirements of these rules both impact privacy and freedom of expression, as cyber cafes users cannot use the facility anonymously and all their information, including browser history, is stored on an a-priori basis. The disclosure provisions in these rules also impact privacy and demonstrate a dilution of access standards for law enforcement to users internet communications as the provision does not define:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;An authorization process by which the registration agency follows to authorize individuals to conduct inspections.&lt;/li&gt;
&lt;li&gt;Circumstances on which inspection of a Cyber Café by an authorized officer is necessary and permissible.&lt;/li&gt;
&lt;li&gt;The process for which information can be requested, and instead vaguely requires cyber café owners to disclose information “on demand”.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Online Surveillance and Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ITA also allows for the interference of user privacy online by defining broad standards of access to law enforcement and security agencies, and providing the government with the power to determine what tools individuals can use to protect their privacy. This is most clearly demonstrated by provisions that permit the interception, monitoring, and decryption of digital communications&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; provide for the collection and monitoring of traffic data&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; and allow the government to set the national encryption standard.&lt;a href="#fn22" name="fr22"&gt;[22] &lt;/a&gt;In particular, the structure of these provisions and the lack of safeguards incorporated, serve as a dilution to user privacy. For example, though these provisions create a framework for interception they are missing a number of internationally recognized safeguards and practices, such as notice to the individual, judicial oversight, and transparency requirements. Furthermore, the provisions place extensive security and technical obligations on the service provider – as they are required to extend all facilities necessary to security agencies for interception and decryption, and hold the service provider liable for imprisonment up to seven years for non-compliance. This creates an environment where it is unlikely that the service provider would challenge any request for access or interception from law enforcement. Interception is also regulated through provisions and rules under the Indian Telegraph Act 1885 and subsequent ISP and UAS licenses.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Scope of Surveillance and Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The extent to which the Government of India lawfully intercepts communications is not entirely clear, but in 2011 news items quoted that in the month of July  8,736 phones and e-mail accounts were under lawful surveillance.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this number is representative of authorized interception, there have been a number of instances of unauthorized interceptions that have taken place as well. For example, in 2013 it was found that in Himachel Pradesh 1371 phones were tapped based on verbal approval, while the Home Ministry had only authorized interception of 170.&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;This demonstrates that there are instances of when existing safeguards for interception and surveillance are undermined and highlights the challenge of enforcement for even existing safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demonstrating the tensions between right to privacy and governmental access to communications, and at the same time highlighting the issue of jurisdiction was the standoff between RIM/BlackBerry and the Indian Government. For several years, the Indian Government has requested that RIM provide access to the company’s communication traffic, both BIS and BES, as Indian security agencies have been unable to decrypt the data. Solutions that the Indian Government has proposed include: RIM providing the decryption keys to the government, RIM establishing a local server, local ISPs and telcos developing an indigenous monitoring solution. In 2012, RIM finally established a server in Mumbai and in 2013 provided a lawful interception solution that satisfied the Indian Government.&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implementation of the Central Monitoring System by the Indian Government is another example of the Government seeking greater access to communications. The system will allow security agencies to bypass service providers and directly intercept communications. It is unclear if the system will provide for the interception of only telephonic communications or if it will also allow for the interception of digital communications and internet traffic. It is also unclear what checks and balances exist in the system. By removing the service provider from the equation the government is not only taking away a potential check, as service providers can resist unauthorized requests, but it is also taking away the possibility for companies to be transparent about the interception requests that they comply with.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Future frameworks for privacy in India: The Report of the Group of Experts on Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In October 2012 the Report of the Group of Experts on Privacy was published by a committee of experts chaired by Justice A.P. Shah.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;The report creates a set of recommendations for a privacy framework and legislation in India. Most importantly, the Report recognizes privacy as a fundamental right and defines nine National Privacy Principles that would apply to all data controllers both in the private sector and the public sector. This would work to ensure that businesses and governments are held accountable to protecting privacy and that legislation and practices found across sectors, states/governments, organizations, and governmental bodies are harmonized. The privacy principles are in line with global standards including the EU, OECD, and APEC principles on privacy, and include: notice, choice &amp;amp; consent, collection limitation, purpose limitation, access and correction, accountability, openness, disclosure of information, security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report also envisions a system of co-regulation, in which the National Privacy Principles will be binding for every data controller, but Self Regulatory Organizations at the industry level will have the option of developing principles for that specific sector. The principles developed by industry must be approved by the privacy commissioner and be in compliance with the National Privacy Principles. In addition to defining principles, the Report recommends the establishment of a privacy commissioner for overseeing the implementation of the right to privacy in India and specifies that aggrieved individuals can seek redress either through issuing a complaint the privacy commissioner or going before a court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nine national privacy principles include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notice: Principle 1: Notice&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall give simple to understand notice of its information practices to all  individuals, in clear and concise language, before any personal information is collected from them. Such notices should include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;During Collection &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What personal information is being collected; &lt;/li&gt;
&lt;li&gt;Purposes for which personal information is being collected; &lt;/li&gt;
&lt;li&gt;Uses of collected personal information; &lt;/li&gt;
&lt;li&gt;Whether or not personal information may be disclosed to third persons; &lt;/li&gt;
&lt;li&gt;Security safeguards established by the data controller in relation to the personal information; &lt;/li&gt;
&lt;li&gt;Processes available to data subjects to access and correct their own personal information; &lt;/li&gt;
&lt;li&gt;Contact details of the privacy officers and SRO ombudsmen for filing complaints. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Notices&lt;/b&gt;&lt;br /&gt;Data breaches must be notified to affected individuals and the commissioner when applicable. Individuals must be notified of any legal access to their personal information after the purposes of the access have been met. Service providers would have to explain how the information would be used and if it may be disclosed to third persons such as advertisers, processing  Individuals must be notified of changes in the data controller’s privacy policy. Any other information deemed necessary by the appropriate authority in the interest of the privacy of data subjects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: A telecom service provider must make available to individuals a privacy policy before any personal information is collected by the company. The notice must include all categories of information as identified in the principle of notice. For example, the service provider must identify the types of personal information that will be collected from the individual from the initial start of the service and during the course of the consumer using the service. For a telecom service provider this could range from name and address to location data.  The notice must identify if information will be disclosed to third parties such as advertisers, processers, or other telecom companies. If a data breach that was the responsibility of the company takes place, the company must notify all affected customers. If individuals have their personal data accessed or intercepted by Indian law enforcement or for other legal purposes, they have the right to be notified of the access after the case or other purpose for the data has been met.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 2: Choice and Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall give individuals choices (opt-in/opt-out) with regard to providing their personal information, and take individual consent only after providing notice of its information practices. Only after consent has been taken will the data controller collect, process, use, or disclose such information to third parties, except in the case of authorized agencies. When provision of information is mandated by law, it should be in compliance with all other National Privacy Principles. Information collected on a mandatory basis should be anonymized within a reasonable timeframe if published in public databases. As long as the additional transactions are performed within the purpose limitation, fresh consent will not be required. The data subject shall, at any time while availing the services or otherwise, also have an option to withdraw his/her consent given earlier to the data controller. In such cases the data controller shall have the option not to provide goods or services for which the said information was sought if such information is necessary for providing the goods or services. In exceptional cases, where it is not possible to provide the service with choice and consent, then choice and consent should not be required.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of implementation&lt;/b&gt;: If an individual is signing up to a service, a company can only begin collecting, processing, using and disclosing their data after consent has been taken. If the provision of information is mandated by law, as is the case for the census, this information must be anonymized after a certain amount of time if it is published in public databases. If there is a case where consent is not possible, such as in a medical emergency, consent before processing information, does not need to be taken.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 3: Collection Limitation&lt;/h3&gt;
&lt;p&gt;A data controller shall only collect personal information from data subjects as is necessary for the purposes identified for such collection, regarding which notice has been provided and consent of the individual taken. Such collection shall be through lawful and fair means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a bank is collecting information to open an account for a potential customer, they must collect only that information which is absolutely necessary for the purpose of opening the account, after they have taken the consent of the individual.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 4: Purpose Limitation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Personal data collected and processed by data controllers should be adequate and relevant to the purposes for which they are processed. A data controller shall collect, process, disclose, make available, or otherwise use personal information only for the purposes as stated in the notice after taking consent of individuals. If there is a change of purpose, this must be notified to the individual. After personal information has been used in accordance with the identified purpose it should be destroyed as per the identified procedures. Data retention mandates by the government should be in compliance with the National Privacy Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a bank is collecting information from a customer for opening a bank account, the bank can only use that information for the purpose of opening the account and any other reasons consented to. After a bank has used the information to open an account, it must be destroyed. If the information is retained by the bank, it must be done so with consent, for a specific purpose, with the ability of the individual to access and correct the stored information, and in a secure fashion.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 5: Access and Correction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Individuals shall have access to personal information about them held by a data controller; shall be able to seek correction, amendments, or deletion such information where it is inaccurate; be able to confirm that a data controller holds or is processing information about them; be able to obtain from the data controller a copy of the personal data. Access and correction to personal information may not be given by the data controller if it is not, despite best efforts, possible to do so without affecting the privacy rights of another person, unless that person has explicitly consented to disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: An individual who has opened a bank account, has the right to access the information that was initially provided and subsequently generated. If there is a mistake, the individual has the right to correct the mistake. If the individual requests information related to him that is stored on a family member from the bank, the bank cannot disclose this information without explicit consent from the family member as it would impact the privacy of another.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 6: Disclosure of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall only disclose personal information to third parties after providing notice and seeking informed consent from the individual for such disclosure. Third parties are bound to adhere to relevant and applicable privacy principles. Disclosure for law enforcement purposes must be in accordance with the laws in force. Data controllers shall not publish or in any other way make public personal information, including personal sensitive information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a website, like a social media site, collects information about how a consumer uses its website, this information cannot be sold or shared with other websites or partners, unless notice of such sharing has been given to the individual and consent has been taken from the individual. If websites provide information to law enforcement, this must be done in accordance with laws in force, and cannot be done through informal means. The social media site would be prohibited from publishing, sharing, or making public the personal information in any way without obtaining informed consent.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 7: Security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall secure personal information that they have either collected or have in their custody, by reasonable security safeguards against loss, unauthorised access, destruction, use, processing, storage, modification, deanonymization, unauthorized disclosure [either accidental or incidental] or other reasonably foreseeable risks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a company is a telecommunication company, it must have security measures in place to protect customers communications data from loss, unauthorized access, destruction, use, processing, storage, modification, denanonmyization, unauthorized disclosure, or other forseeable risk. This could include encrypting communications data, having in place strong access controls, and establishing clear chain of custody for the handling and processing communications data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 8: Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A data controller shall take all necessary steps to implement practices, procedures, policies and systems in a manner proportional to the scale, scope, and sensitivity to the data they collect, in order to ensure compliance with the privacy principles, information regarding which shall be made in an intelligible form, using clear and plain language, available to all individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: If a hospital is collecting and processing personal information of, for example, 1,000 patients, their policies and practices must reflect and be applicable to the amount, sensitivity, and nature of information that they are collecting. The policies about the same must be made available to all individuals – this includes individuals of different intelligence, skill, and developmental levels.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle 9: Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The data controller shall be accountable for complying with measures which give effect to the privacy principles. Such measures should include mechanisms to implement privacy policies; including tools, training, and education; external and internal audits, and requiring organizations or overseeing bodies extend all necessary support to the Privacy Commissioner and comply with the specific and general orders of the Privacy Commissioner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Example of Implementation&lt;/b&gt;: To ensure that a hospital is in compliance with the national privacy principles, it must undertake activities like running trainings and providing educational information to employees on how to handle patient related information, conducting audits, and establishing an officer or body for overseeing the implementation of privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Public Discourses on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, there have been a number of important discourses related to privacy around various projects and topics. These discourses have been driving public awareness about privacy in India, and represent an important indication of public perception of privacy and privacy concerns.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Unique Identification Project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of these discourses is a public dialogue and debate on the Unique Identification Project. Since 2009 the Government of India has been rolling out an identity scheme known as UID or Aadhaar.  The scheme is applicable to all residents in India, and seeks to provide individuals with an identity based on their fingerprints, iris scans, and photograph. The project has been heavily supported by some, and at the same time, heavily critiqued by others. Of those critiquing the project, which included a Parliamentary Standing Committee on Finance,&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;privacy has been a driving force behind the concerns about the project. Arguing that not only does the UID Bill not have sufficient privacy safeguards in its provisions&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;but the design of the project and the technology of the project places individual privacy at risk. For example,  the project relies on centralized storage of biometrics collected under the scheme; it does not account for or address how transaction data that is generated each time an individual identifies himself/herself with the UID will be stored, processed, and shared; and does not provide adequate security measures to protect sensitive information like biometrics.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Human DNA Profiling Bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2006 the Department of Biotechnology piloted a draft human DNA Profiling Bill with the objective of creating DNA databases at the national and regional levels, and enabling the creation and storage of DNA profiles for forensic purposes. Since 2006 there have been two more drafts of the bill released to the public, and an expert committee has been created to finalize the text of the bill. Individuals, including the Centre for Internet and Society, publicly raising concern about the bill, cite a lack of privacy safeguards in the provisions, and expansive circumstances and reasons that the bill permits the creation and storage of DNA profiles.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For many years there has been running public discourse about the surveillance that the Indian government has been undertaking. This discourse is growing and is now being linked to privacy and the need for India to enact a privacy legislation. As discussed above, the current surveillance regime is lacking on many fronts, while at the same time the government continues to seek greater interception powers and more access to larger sets of information in more granularity. Projects like the Central Monitoring System, NATGRID, and Lawful Interception Solutions have caused individuals to question the government on the proportionality of State surveillance and ask for a comprehensive privacy legislation that also regulates surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for strong and enforceable surveillance provisions is not unique to India, and in 2013 the International Principles on the Application of Human Rights to the Surveillance of Communications were drafted. The principles lay out standards that ensure that surveillance is in compliance with international human rights law and serve as safeguards that countries can incorporate into their regimes to ensure the same. The principles include: legality, legitimate aim, necessity, adequacy, proportionality, competent judicial authority, due process, user notification, transparency, public oversight, integrity of communications and systems, safeguards for international cooperation, safeguards against illegitimate access. Along with defining safeguards, the principles highlight the challenge of rapidly changing technology and how it is constantly changing how information can be surveilled by governments and what information surveilled by governments, and how information can be combined and analysed to draw conclusions about individuals.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A Privacy Legislation for India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since 2010, there has been a strong public discourse around the need for a privacy legislation in India. In November 2010, a “Privacy Approach” paper was released to the public which envisioned the creation of a data protection legislation. In 2011, the Department of Personnel and Training released a draft privacy bill that defined a privacy regime that encompassed data protection, surveillance, and mass marketing, and recognized privacy as a fundamental right.&lt;a href="#fn31" name="fr31"&gt;[31] &lt;/a&gt;In 2012 the Report of the Group of Experts on Privacy, as discussed above, was published.&lt;a href="#fn32" name="fr32"&gt;[32] &lt;/a&gt;Presently, the Department of Personnel and Training is drafting the text of the Governments Privacy Bill.  In 2013, the Centre for Internet and Society drafted the Citizen’s Privacy Protection Bill – a citizen’s version of a privacy legislation for India.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; From April 2013 – October 2013, the Centre for Internet and Society, in collaboration with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India, held a series of seven Privacy Roundtables across India.  The objective of the Roundtables was to gain public feedback to a privacy framework in India. Topics discussed during the meetings included, how to define sensitive personal information vs. Personal information, if co-regulation should be a model adopted as a regulatory framework, and what should be the legal exceptions to the right to privacy.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Clearly, privacy is an emerging and increasingly important field in India’s internet society. As companies collect greater amounts of information from and about online users, and as the government continues to seek greater access and surveillance capabilities, it is critical that India prioritizes privacy and puts in place strong safeguards to protect the privacy of both Indians and foreigners whose data resides temporarily or permanently in India.  The first step towards this is the enactment of a comprehensive privacy legislation recognizing privacy as a fundamental right. The Report of the Group of Experts on Privacy and the government considering a draft privacy bill are all steps in the right direction.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. http://www.zdnet.com/in/india-sets-up-social-media-monitoring-lab-7000012758/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. http://www.techdirt.com/articles/20130203/18510621869/investigative-journalist-claims-her-public-tweets-arent-publishable-threatens-to-sue-blogger-who-does-exactly-that.shtml&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. http://www.npr.org/blogs/alltechconsidered/2013/10/02/228134269/your-digital-trail-does-the-fourth-amendment-protect-us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. http://www.bbc.co.uk/news/technology-24744695&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. http://www.thehindu.com/news/national/sc-to-hear-pil-on-us-surveillance-of-internet-data/article4829549.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. http://forbesindia.com/article/checkin/indias-internet-privacy-woes/35971/1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. http://www.thehindubusinessline.com/industry-and-economy/info-tech/route-domestic-net-traffic-via-india-servers-nsa-tells-operators/article5022791.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. ITA section 67&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. ITA section 43, 66, and 66F&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Information Technology (Reasonable security practices and procedures and Sensitive personal data or information) Rules, 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Information Technology (Reasonable security practices and procedures and Sensitive personal data or information) Rules, 2011.  section 6(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Information Technology (Procedure and Safeguards for monitoring and collection of Traffic Data or other information) Rules 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn1"&gt;13&lt;/a&gt;]. Information Technology (Procedure and Safeguards for intercepting, monitoring, and decryption) Rules 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Ibid footnote 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Business Standard. Data secure status for India is vital: Sharma on the FTA with EU. September 3rd 2013. Available at: http://www.business-standard.com/article/economy-policy/data-secure-status-for-india-is-vital-sharma-on-fta-with-eu-113090300889_1.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(2) &amp;amp; 5(3). Available at: http://deity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Guidelines for Cyber Cafe Rules 5(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Guidelines for Cyber Café Rules 5(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Guidelines for Cyber Café Rules 7(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Ibid footnote 9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Ibid footnote 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. ITA section 84A&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Jain, B. 8,736 phone and e-mail accounts tapped by different government agencies in July. September 17th 2011. Available at: http://articles.economictimes.indiatimes.com/2011-09-17/news/30169231_1_phone-tap-e-mail-accounts-indian-telegraph-act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. The Economic Times. Action to be taken in ‘phone tapping’ during BJP rule: Virbhadra Singh. March 6th 2013. Available at: http://articles.economictimes.indiatimes.com/2013-03-06/news/37500338_1_illegal-phone-virbhadra-singh-previous-bjp-regime&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Chaudhary, A. BlackBerry’s Tussle with Indian Govt. Finally Ends; BB Provides Interception System. http://www.medianama.com/2013/07/223-blackberrys-tussle-with-indian-govt-finally-ends-bb-provides-interception-system/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Report of the Group of Experts on Privacy. Available at: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. http://164.100.47.134/lsscommittee/Finance/42%20Report.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. http://www.indianexpress.com/news/uid-bill-skips-vital-privacy-issues/688614/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. http://www.epw.in/authors/elonnai-hickok&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. http://ccis.nic.in/WriteReadData/CircularPortal/D2/D02rti/aproach_paper.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. http://www.iltb.net/2011/06/analysis-of-the-privacy-bill-2011/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. http://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. http://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    

   <dc:date>2014-01-08T13:51:06Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf">
    <title>Internet Monitor</title>
    <link>https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf</link>
    <description>
        &lt;b&gt;Malavika's piece on India's Identity Crisis is published in this report.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf'&gt;https://cis-india.org/internet-governance/blog/internet-monitor-2013.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-01-09T07:33:02Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/internet-liability">
    <title>Internet Liability</title>
    <link>https://cis-india.org/internet-governance/files/internet-liability</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/internet-liability'&gt;https://cis-india.org/internet-governance/files/internet-liability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-10-20T07:04:53Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/internet-institute-repository">
    <title>Internet Institute Repository</title>
    <link>https://cis-india.org/internet-governance/files/internet-institute-repository</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/internet-institute-repository'&gt;https://cis-india.org/internet-governance/files/internet-institute-repository&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-07-17T03:38:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf">
    <title>Internet Institute Agenda</title>
    <link>https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf'&gt;https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-03T05:42:17Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ig-round-table-british-high-commission">
    <title>Internet Governance Round-table at British High Commission</title>
    <link>https://cis-india.org/news/ig-round-table-british-high-commission</link>
    <description>
        &lt;b&gt;A Internet Governance Round-table was hosted at the residence of the British High Commissioner in Delhi on March 4, 2014. Geeta Hariharan participated in the round-table.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event aimed to bring together stakeholders from government, industry and the non-governmental sectors in India to discuss issues of Internet governance, and forms part of the UK’s commitment and interests in cyber-engagement with India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The panel included the following members:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Julian Evans, the Acting British High Commissioner to India&lt;/li&gt;
&lt;li&gt;Jonathan Cook, Second Secretary, Foreign Security Policy Team, British High Commission&lt;/li&gt;
&lt;li&gt;Kamlesh Bajaj, CEO, Data Security Council of India&lt;/li&gt;
&lt;li&gt;Rahul Jain, Principal Consultant, Data Security Council of India&lt;/li&gt;
&lt;li&gt;Vikram Tiwathia, Associate Director General, Cellular Operators Association of India&lt;/li&gt;
&lt;li&gt;Dr. Govind, Senior Director heading the E-Infrastructure &amp;amp; Internet Governance Division, Department of Electronics and Information Technology, Government of India&lt;/li&gt;
&lt;li&gt;Narayanan, NIXI&lt;/li&gt;
&lt;li&gt;Dr. Sundeep Oberoi, TCS&lt;/li&gt;
&lt;li&gt;M.P. Gupta, Professor &amp;amp; Chair, Information Systems and Centre for Excellence in E-Gov, IIT Delhi&lt;/li&gt;
&lt;li&gt;Somnath Mitra, Xchanging&lt;/li&gt;
&lt;li&gt;Mahima Kaul, Observer Research Foundation&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The British government’s views on cyber-engagement and Internet governance were touched upon, voicing their support for a free, open and secure Internet, upholding human rights. The UK supports a multi-stakeholder approach to Internet governance. However, their position on the Sao Paolo meeting is as yet not officially clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five broad issues were raised for discussion:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Balancing the role of government and non-government stakeholders, and the limits of governmental regulation Internet for development&lt;/li&gt;
&lt;li&gt;Free speech and privacy v. security&lt;/li&gt;
&lt;li&gt;Practical model of Internet governance (multi-stakeholder or multilateral)&lt;/li&gt;
&lt;li&gt;India’s contribution, presence or expectations of the Sao Paolo meeting&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The speakers raised concerns about the effectiveness of the multi-stakeholder model in light of international law built on the Westphalian model, where governments are effectively the only real law-makers and regulators. In considering whether non-governmental stakeholders (such as NGOs and think-tanks, industry and corporations, individuals) should have an equal voice in IG, concerns were raised about the representativeness of such actors, and accountability that they would have. In this regard, the future and desirability of the ICANN (and the US’ stake in it), and fora like the IGF and the UN-WGEC as platforms for participation were discussed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While civil society involvement is imperative, government initiatives are necessary to create access to the Internet, and to ensure that the Internet is made safe and utilized for development. This obviously creates tensions between privacy and liberty, and security concerns; one of the speakers spoke of Snowden as the “elephant in the room”. Not only was a common concept of privacy non-existent at the international level, it would also be difficult to achieve (except a  namesake ‘lowest common denominator’ definition), as states must account for their experiences with terrorism as well as cultural differences. For instance, the way the UK deals with privacy/security concerns in comparison with India would be very different. Finally, the possibilities and potential outcomes of the Sao Paolo meeting were touched upon without elaborate discussion on the same.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ig-round-table-british-high-commission'&gt;https://cis-india.org/news/ig-round-table-british-high-commission&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-01T10:32:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/igf-remote-participation">
    <title>Internet Governance Forum: Participate Remotely</title>
    <link>https://cis-india.org/internet-governance/events/igf-remote-participation</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to attend the sixth annual meeting of the Internet Governance Forum (IGF) as a remote participant from Bangalore. The IGF is being held in Nairobi from 27-30 September 2011. CIS has been registered as a remote IGF hub. This will allow many of us who are unable to attend the IGF in person. You can follow the discussion, watch the web cast of the event, follow real-time closed captioning and participate live (via text or video) that will be answered by panelists in the IGF.  &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The IGF is a multi-stakeholder forum that
addresses public policy issues related to key elements of Internet governance. The overall
theme of the meeting will be ‘&lt;strong&gt;Internet as a Catalyst for Change: Access, Development,
Freedoms and Innovation&lt;/strong&gt;'. The various themes are as follows:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Internet Governance
for Development&lt;/li&gt;&lt;li&gt;Emerging Issues&lt;/li&gt;&lt;li&gt;Managing Critical
Internet Resources&lt;/li&gt;&lt;li&gt;Security, Openness
and Privacy&lt;/li&gt;&lt;li&gt;Access and Diversity&lt;/li&gt;&lt;li&gt;Taking Stock and the
Way Forward&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Sunil Abraham,
Executive Director of the Centre for Internet and Society, will be
participating in the following workshops:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/events/digital-technologies-for-civic-engagement" class="external-link"&gt;Use
of Digital Technologies for Civic Engagement and Political Change: Lessons Learned
and Way Forward&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=211"&gt;The
Impact of Regulation: FOSS and Enterprise&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=75"&gt;Putting
Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=219"&gt;Privacy,
Security, and Access to Rights: A Technical and Policy Analyses&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Shyam Ponappa,
Fellow at the Centre for Internet and Society, will be presenting remotely for
the following workshop:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=121"&gt;Open
Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Nishant
Shah, Director Research at Centre for Internet and
Society, has organized the following workshop:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a&gt;Use
of Digital Technologies for Civic Engagement and Political Change: Lessons
Learned and Way Forward&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;We are not limited to following specific workshops. Please follow
the link for more information on
workshops of your interest, program details and the schedule:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/schedule-a-programme-2011"&gt;http://www.intgovforum.org/cms/schedule-a-programme-2011&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Participation is free. However, we would be grateful if you could
confirm your attendance by emailing Natasha Vaz “n&lt;a href="mailto:atasha@cis-india.org"&gt;atasha@cis-india.org&lt;/a&gt; or Tom Dane at
“&lt;a class="external-link" href="mailto:tjdane@gmail.com"&gt;tjdane@gmail.com&lt;/a&gt;”. We hope you will join us to watch the web cast and
contribute your own insights on the various workshops.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Looking
forward to welcoming you at the workshops!&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/igf-remote-participation'&gt;https://cis-india.org/internet-governance/events/igf-remote-participation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-27T05:09:56Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017">
    <title>Internet Governance Forum Report 2017</title>
    <link>https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017'&gt;https://cis-india.org/internet-governance/files/internet-governance-forum-report-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-01-11T02:03:44Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-governance-forum.pdf">
    <title>Internet Governance Forum Poster</title>
    <link>https://cis-india.org/internet-governance/blog/internet-governance-forum.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-governance-forum.pdf'&gt;https://cis-india.org/internet-governance/blog/internet-governance-forum.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-24T09:35:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
