<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1231 to 1245.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/openness/francis-wins-ept-award"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-july-12-2014-r-krishna-kumar-four-volumes-of-kannada-encyclopaedia-digitised"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/the-diplomat-justin-sherman-and-arindrajit-basu-july-3-2019-fostering-strategic-convergence-in-us-india-tech-relations-5g-and-beyond"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/igf-2013-workshop-287-foss-smart-choice-for-developing-countries"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/foss-wikimedia-under-one-roof-gnunify"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/foss-poster.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-december-30-2015-foreign-media-on-zukerberg-india-backlash"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/for-a-truly-inclusive-consultative-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/the-signpost-august-18-2016-pete-forsyth-and-tony-focus-on-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/first-round-table-on-innovation-ip-and-competition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/first-meeting-on-a-national-policy-for-web-access-for-all"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/first-asia-pacific-workshop-on-empirical-methods-in-innovation-intellectual-property-and-competition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/openness/francis-wins-ept-award">
    <title>Francis Bags EPT Award for Open Access in Developing World</title>
    <link>https://cis-india.org/openness/francis-wins-ept-award</link>
    <description>
        &lt;b&gt;The Electronic Publishing Trust recently announced a new annual award to be made to individuals working in developed countries who have made significant contribution for the cause of open access and free exchange of research findings. There were 30 nominations from 17 countries around the world and Dr. Francis Jayakanth from the National Centre of Science Information, Indian Institute of Science, Bangalore was selected for the inaugural EPT Award for Open Access in the Developing World by a committee that went through all the nominations.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The award function organised by the Electronic Publishing Trust for Development and the Centre for Internet and Society (CIS), Bangalore was held at the Sambasivan Auditorium, M S Swaminathan Research Foundation (MSSRF) in Chennai on 14 February 2012. Leading luminaries such as Prof. M.S. Swaminathan, Prof. Subbiah Arunachalam, Prof. G Baskaran and Prof. K Mangala Sunder participated in the award felicitation ceremony.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Giving the welcome speech, Prof. Arunachalam, distinguished fellow at CIS said that Dr. Jayakanth works for the Indian Institute of Science, Bangalore, has trained many students and helped a number of institutes to set up open access repositories. Prof. Arunachalam added that the event is being celebrated in India as the winner is from India and specified that it is being held at the MS Swaminathan Foundation as this was the institution that hosted the first workshop to promote open access. Prof. Swaminathan had a vital role in arranging funds for the workshop. About 50 people had learnt what open access was, how to set up open access repositories, how to use the EPrints software, etc. For this very reason it was decided to hold the event in Chennai and not Bangalore where Dr. Jayakanth is based.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/Francis7.jpg/image_preview" alt="Participants in the Award Function" class="image-inline image-inline" title="Participants in the Award Function" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Felicitating Dr. Jayakanth, Prof. Swaminathan who presented the award added that it is important to highlight the contributions of those who really convert the concept of social inclusion to reality. He said that today every politician talks about inclusive growth. What is this inclusive growth, how do you convert exclusion to inclusion? Exclusion creates large problems, social problems, economic problems, etc. On a concluding note, Prof. Swaminathan said that the Prime Minister, Dr. Manmohan Singh has declared 2012-13 as the year of science and he hopes that there will be a new science policy and technology policy and that he hopes that a very important component of that should be methods of ensuring open access including open access to knowledge and open access to literature.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Francis3.jpg/image_preview" title="Francis Jayakanth" height="166" width="174" alt="Francis Jayakanth" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In his award acceptance speech, Dr. Jayakanth said that the atmosphere  was very overwhelming and never in his two-and-a-half decade old career  he had the opportunity to speak amidst such luminaries and added that it  was a privilege and prestige to have received the award from Prof.  Swaminathan, the father of the Green Revolution in India. He also added  that no event in India or elsewhere is complete without the active  participation and mentioning of the name of Prof. Arunachalam, the  greatest advocate of open access that India has seen so far, and that he  wouldn’t have been here at the award ceremony but for the timely  intervention of Prof. Arunachalam. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Dr. Jayakanth concluded by saying  that he would like to thank Prof. NV Joshi, Prof. Derek Law, Prof. Alma  Swan, Prof. Balaram, Prof. N Balakrishnan, Prof. Giridhar, and Prof. TB Rajashekar, and  particularly the students of the information and knowledge management  programme at the National Centre of Science Information, Indian  Institute of Science, who were responsible for the growth of a  repository granting more visibility to the 32,000 publications that are  part of the repository.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Mangala.jpg/image_preview" title="Mangala Sunder" height="130" width="177" alt="Mangala Sunder" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Prof. Mangala Sunder of IIT Madras and Prof. G Baskaran of the Institute  of Mathematical Sciences, Chennai, also participated in the event.  Prof. Sunder said that it is for the kind of information that we talk  about, which we want to make public for which champions like Dr.  Jayakanth have been working on the sidelines but working so efficiently  to get institution after institution to convert what is known as a rigid  framework into a flexible more open policy of bringing their scientific  content to their intellectual information content. He said that he  works in the area of content development from the point of view of  education and he understands the difficulty of bringing material to the  public. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There are many issues, such as issues about copyright, issues about people owning the information, issues about people feeling very rigid on what they want to say in the public, etc. Dr. Jayakanth has gone through all these exercises for the last 30 years in slowly creating the “little after little” what are called the waterways to finally see that everyone benefits. The linking of science, knowledge and sustainable development to open access to information, open access to research and open access to content completes the whole cycle of knowledge.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Baskaran.jpg/image_preview" title="Prof. Basakaran" height="177" width="117" alt="Prof. Basakaran" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Prof. Baskaran said that it is a very well deserved award and Dr.  Jayakanth has definitely raised the bar for future awardees. Prof.  Baskaran stressed upon the aspects of open access. He said that as a  theoretical physicist he understands the need for open access very well.  Physicists, when they have new research results place them in arXiv,  the open access repository for preprints in physics. Some people wonder  what if some physicists deposit all kinds of articles in the arXiv.  Experience has shown that 99 per cent of the articles appear in good  journals later. He added that once it is put in the arXiv, the whole  world gets access and a bad paper will be noticed and commented upon by  many. No one likes to be the author of such a paper! He urged that other  sciences, especially the life sciences should have a repository similar  to arXiv and requested Prof. Swaminathan to take the intiative at  MSSRF. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2&gt;Dr. Francis Jayakanth&lt;/h2&gt;
&lt;p align="left"&gt;&lt;img src="https://cis-india.org/home-images/Francis1.jpg/image_preview" alt="Francis with the Award" class="image-inline image-inline" title="Francis with the Award" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr. Francis Jayakanth is a library-trained scientific assistant based at the National Centre for Science Information (NCSI), the information centre of the Indian Institute of Science (IISc) in Bangalore. He has played a significant role in the establishment of India’s first institutional repository (IR) (&lt;a class="external-link" href="http://eprints.iisc.ernet.in"&gt;http://eprints.iisc.ernet.in&lt;/a&gt;). He now manages the IR and has provided technical support for establishing IRs in many other universities and institutes in India. He has been the key resource person at many events to train people in setting up IRs and open access journals. He has delivered presentations on IRs, open access journals, the OAI protocol, OAI compliance, and the benefits of open access to authors and institutions and the role of libraries. He has developed a free and open source software tool (CDSOAI), which is widely used. Dr. Jayakanth can indeed be considered an open access ‘renaissance man’, an advocate and technical expert in all aspect of open access development and an inspiration to all, both at the research and policy level.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/openness/francis-jayakanth-presentation" class="internal-link" title="Francis Jayakanth's Presentation"&gt;See Francis's presentation on Who Benefits from Open Access to Scholarly Literature?&lt;/a&gt; [Powerpoint, 1523 KB]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;See the video of the award function below:&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYLtr00A.html?p=1" width="250"&gt;&lt;/iframe&gt;
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYLtr00A"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYLtr00A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/francis-wins-ept-award'&gt;https://cis-india.org/openness/francis-wins-ept-award&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Award</dc:subject>
    
    
        <dc:subject>Open Content</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-08-03T05:36:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-july-12-2014-r-krishna-kumar-four-volumes-of-kannada-encyclopaedia-digitised">
    <title>Four volumes of Kannada Encyclopaedia digitised</title>
    <link>https://cis-india.org/news/the-hindu-july-12-2014-r-krishna-kumar-four-volumes-of-kannada-encyclopaedia-digitised</link>
    <description>
        &lt;b&gt;The content is available online under Creative Commons License.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by R. Krishna Kumar was &lt;a class="external-link" href="http://www.thehindu.com/news/national/karnataka/four-volumes-of-kannada-encyclopaedia-digitised/article6198067.ece"&gt;published in the Hindu&lt;/a&gt; on July 12, 2014, Dr. U.B.Pavanaja is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Articles from the Kannada Encyclopaedia (Kannada Vishwakosha) of the University of Mysore can now be accessed online under the Creative Commons License. The move to make content of the Kannada Vishwakosha accessible is part of the ongoing effort to enrich Kannada content on Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The University of Mysore is working with the Centre for Internet and Society (CIS) to digitise encyclopaedic publications for which the copyrights are owned by the varsity, and to re-release them under the Creative Common License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;U.B. Pavanaja of the Centre for Internet and Society, Bangalore, who is promoting Kannada content on the Internet, told &lt;i&gt;The Hindu&lt;/i&gt; that of the 14 volumes, digitised content of the first four volumes has been uploaded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And, the CIS is awaiting the release of the revised edition of the other  two volumes. “Each volume has about 900 pages and hence over 3,600  pages of the Kannada Vishwakosha can now be accessed. What is  significant is that people seeking quality information in Kannada can  now access reliable content. It is also subject to editing in real time  and hence will remain updated,” according to Mr. Pavanaja. The content  was digitised and uploaded with the help of students who were interning  with the CIS and included three boys and five girls, said Mr. Pavanaja.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The permission for digitising the content has been accorded for the  first six volumes. However, the CIS has sought permission from the  varsity for digitising the content of the other volumes, including  Subject Encyclopaedia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society signed a memorandum of understanding (MoU) with the University of Mysore in February. The varsity issued a certificate to publish the work under the Creative Common License in May.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the plan, the digitised content will be made available for everyone through free content distribution platforms like Wikipedia, Wikisource and this is expected to enhance digital literacy in Kannada language while helping in free dissemination of knowledge in Kannada to students, academics, researchers and the general public. As of now, the articles have been uploaded on Wikisource and will shortly be migrated to Wikipedia also.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, the CIS is trying to hold talks with Kannada University, Hampi, on digitising the Janapada Vishwakosha and make it available under the Creative Common License, said Mr. Pavanaja.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Niranjan Vanalli, Director of EMMRC of the University of Mysore, said digitisation of Kannada Vishwakosha has given a new lease of life to publications. “The 14-volume Kannada Vishwakosha was not available to everyone earlier and was confined to research institutions or libraries. But now that the content is available online, it is accessible to all those who are interested. And, what it is more is that most articles, especially those pertaining to history, art and culture, will be of reference quality and that will act as a major boost to the cause of Kannada language,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, the University of Mysore and CIS will celebrate World Open Knowledge Festival on July 15 at the Kuvempu Institute of Kannada Studies from 11 a.m. to commemorate the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Those interested to access the Kannada Vishwakosha online can log on to: &lt;a class="smarterwiki-linkify" href="http://bit.ly/mysoreuniv"&gt;http://bit.ly/mysoreuniv&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-july-12-2014-r-krishna-kumar-four-volumes-of-kannada-encyclopaedia-digitised'&gt;https://cis-india.org/news/the-hindu-july-12-2014-r-krishna-kumar-four-volumes-of-kannada-encyclopaedia-digitised&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2014-07-14T05:49:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/the-diplomat-justin-sherman-and-arindrajit-basu-july-3-2019-fostering-strategic-convergence-in-us-india-tech-relations-5g-and-beyond">
    <title>Fostering Strategic Convergence in US-India Tech Relations: 5G and Beyond</title>
    <link>https://cis-india.org/telecom/blog/the-diplomat-justin-sherman-and-arindrajit-basu-july-3-2019-fostering-strategic-convergence-in-us-india-tech-relations-5g-and-beyond</link>
    <description>
        &lt;b&gt;The 2019 G-20 summit underscores the importance of fostering strategic convergence in U.S.-India tech relations.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Justin Sherman and Arindrajit Basu was &lt;a class="external-link" href="https://thediplomat.com/2019/07/fostering-strategic-convergence-in-us-india-tech-relations-5g-and-beyond/"&gt;published in the Diplomat&lt;/a&gt; on July 3, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As world leaders gathered for the G-20 summit in Osaka, Japan this past weekend, a multitude of issues from climate to trade to technology came to the fore. Much of the focus was on U.S.-China interactions at the summit, as the two nations are  locked in both a trade war and broader technological and geopolitical competition. Despite the present focus on the U.S. and China, however, it is crucial to not overlook another bilateral relationship of ever-growing importance in the process: The tech relationship between the United States and India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Certainly, the two countries have many disagreements on some technology issues. But this is a geopolitical relationship that is both strategically important for each country, and a vital opportunity for the two largest democracies in the world to collectively combat Chinese-style digital authoritarianism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Huawei and 5G&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, with respect to national security and 5G roll-outs, the U.S and India are not on the same page. The United States, for several months now, has been on a &lt;a href="https://www.lawfareblog.com/confused-us-messaging-campaign-huawei" target="_blank"&gt;diplomatic messaging tour&lt;/a&gt; of the world to try to convince — with great resistance (some would argue failure) — allies, partners, and potential partners alike to ban Chinese firm Huawei from supplying components of 5G networks. Many officials across Europe, the Middle East, South America, and elsewhere have been reluctant to ban Huawei per the U.S. recommendation, and India is no exception. Indeed, National Security Advisory Board Chairman P.S. Raghavan &lt;a href="https://www.thehindu.com/news/national/on-5g-and-data-india-stands-with-developing-world-not-us-japan-at-g20/article28207169.ece/amp/?__twitter_impression=true" target="_blank"&gt;told&lt;/a&gt; &lt;em&gt;The Hindu&lt;/em&gt; that “5G is becoming a fault line in the technology cold war between world powers” and that India must avoid getting caught in these fault lines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In large part, U.S. diplomatic messaging here has fallen short due to &lt;a href="https://www.lawfareblog.com/confused-us-messaging-campaign-huawei" target="_blank"&gt;heavy conflations&lt;/a&gt; of national security- and trade-related risks; and Trump only contributed further to this fact with his latest &lt;a href="https://twitter.com/JenniferJJacobs/status/1145072073800183808" target="_blank"&gt;reference&lt;/a&gt; to Huawei, during the G-20, as a potential trade war bargaining chip. The sheer population of India, however, combined with its fast growing technology sectors and &lt;a href="http://www.cmai.asia/digitalindia/" target="_blank"&gt;desire to digitize&lt;/a&gt;, makes the country an important market player when it comes to the 5G revolution. U.S.-India engagement on 5G issues must be managed effectively through robust articulation of each country’s national interests underscored by a clean segregation of trade and security questions in the discussion. This partnership has the potential to wield great influence in the global market, including in ways that could prioritize or deprioritize certain 5G equipment suppliers (like Huawei).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Data Sovereignty and Data Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data sovereignty is another hot area in which the U.S.-India tech relationship demands careful negotiation. Over the past year, the Indian government has &lt;a href="https://twitter.com/cis_india/status/1143096429298085889" target="_blank"&gt;introduced a range of policy instruments&lt;/a&gt; which dictate that certain kinds of data must be stored in servers located physically within India — termed “&lt;a href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf" target="_blank"&gt;data localization&lt;/a&gt;.” While there are &lt;a href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf" target="_blank"&gt;a number of policy objectives&lt;/a&gt; this gambit ostensibly seeks to serve, the two which stand out are (1) the presently cumbersome process for Indian law enforcement agencies to access data stored in the U.S. during criminal investigations, and (2) extractive economic models used by U.S. companies operating in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A range of conflicting developments emerging from the G-20 summit underscore this fact. India, along with the BRICS grouping, &lt;a href="https://mea.gov.in/bilateral-documents.htm?dtl/31506/Joint+Statement+on+BRICS+Leaders+Informal+Meeting+on+the+margins+of+G20+Summit" target="_blank"&gt;focused&lt;/a&gt; on the development dimensions of data governance and re-emphasized the need for &lt;a href="https://www.youtube.com/watch?v=0a8YsZQ0F6k&amp;amp;feature=youtu.be" target="_blank"&gt;data sovereignty&lt;/a&gt; — broadly understood as the sovereign right of nations to govern data in their national interest for the welfare of their citizens. President Trump &lt;a href="https://www.whitehouse.gov/briefings-statements/remarks-president-trump-g20-leaders-special-event-digital-economy-osaka-japan/" target="_blank"&gt;reigned in his focus&lt;/a&gt; on the need for cross-border data flows and, in direct opposition to some proposals that have emerged from India, explicitly opposed data localization. While India did not sign the &lt;a href="https://www.international.gc.ca/world-monde/international_relations-relations_internationales/g20/2019-06-29-g20_declaration-declaration_g20.aspx?lang=eng" target="_blank"&gt;Osaka Declaration on the Digital Economy&lt;/a&gt; that promoted cross-border data flows, the importance of cross-border data flows in spurring the global economy did find its way into the &lt;a href="https://g20.org/pdf/documents/en/FINAL_G20_Osaka_Leaders_Declaration.pdf" target="_blank"&gt;Final G-20 Leaders Declaration&lt;/a&gt; — which, of course, both countries signed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Geopolitically, the importance of India’s data governance stance cannot be overstated as it could pave the way for the approach adopted by other emerging economies — most notably the BRICS countries. Likewise, the U.S. has important thinking to do around such questions as what shape a national data privacy law could take. Even though the two countries’ views on data may be quite different from one another, the seats that India and the U.S. have at the table for &lt;a href="https://www.theatlantic.com/international/archive/2019/06/g20-data/592606/" target="_blank"&gt;global data governance discussions&lt;/a&gt; — alongside others like Japan, China, and the European Union — underscore the value of meaningful interactions and mutual trust and respect on this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Norms for a Democratic Digital Future&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, as the &lt;a href="https://www.un.org/disarmament/ict-security/" target="_blank"&gt;United Nations Group of Governmental Experts&lt;/a&gt; and the &lt;a href="https://www.un.org/disarmament/open-ended-working-group/" target="_blank"&gt;Open-Ended Working Group&lt;/a&gt; meet to resurrect the norm-formulation process for fostering responsible state behavior in cyberspace, India has some homework to do.  Even though it has been a member of five out of the six Group of Governmental Experts set up thus far, India is yet to come out with a public statement delineating its views on the applicability of International Law applies in cyberspace. Further, India has also failed to articulate a cohesive digital strategy — instead relying on a patchwork of hastily rolled out and often ill-conceived regulatory policies, some of which commentators in the West &lt;a href="https://www.nytimes.com/2019/02/14/technology/india-internet-censorship.html" target="_blank"&gt;have hastily labeled&lt;/a&gt; as digital authoritarianism. The U.S., for its part, amidst a &lt;a href="https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/four-opportunities-for-states-new-cyber-bureau/" target="_blank"&gt;cutback&lt;/a&gt; to diplomatic cyber engagement (as part of cutbacks to diplomacy writ large), could also up its support of international engagement on these issues. Its recent repeal of net neutrality protections could also be argued as a step back from long-time international &lt;a href="https://d1y8sb8igg2f8e.cloudfront.net/documents/The_Idealized_Internet_vs._Internet_Realities_Version_1.0_2018-07-25_203930.pdf" target="_blank"&gt;norm promotion&lt;/a&gt; around internet openness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through a combination of domestic policy gambits and foreign policy maneuvers, both states need to draw lines in the sand that safeguard human rights, international law, and democracy online, while arriving at some balance with each other’s national interests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A primary example lies with artificial intelligence (AI). AI has found increasing use in digital authoritarianism, as dictators use automated, intelligent systems to boost their surveillance capabilities. The Chinese government has arguably been at the &lt;a href="https://freedomhouse.org/report/freedom-net/freedom-net-2018" target="_blank"&gt;forefront&lt;/a&gt; of this enhanced level of authoritarian rule for the digital age.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to &lt;a href="https://www.newamerica.org/cybersecurity-initiative/digichina/blog/translation-chinese-government-outlines-ai-ambitions-through-2020/" target="_blank"&gt;focusing&lt;/a&gt; on AI applications for everything from natural language processing to self-driving cars — through investments, strategies, policy documents, and so on — Beijing has also been &lt;a href="https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html" target="_blank"&gt;deploying&lt;/a&gt; AI in the service of large-scale human-rights abuses. Chinese strategy papers on AI, while similarly emphasizing many commercial or benign applications and raising attention to such issues as algorithmic fairness, concurrently have &lt;a href="https://www.newamerica.org/cybersecurity-initiative/digichina/blog/online-symposium-chinese-thinking-ai-security-comparative-context/" target="_blank"&gt;discussed&lt;/a&gt; using AI for “social governance,” censorship, and surveillance. To combat the rising intersection of AI and digital authoritarianism, the U.S. and India could wield enormous leverage — as the two largest democracies in the world — in governing these technologies in a democratic fashion that counters &lt;a href="https://www.newamerica.org/cybersecurity-initiative/reports/essay-reframing-the-us-china-ai-arms-race/" target="_blank"&gt;dangerous arms-race narratives&lt;/a&gt; and uses of AI for surveillance and repression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The same goes for paying attention to technology exports and diffusion to human-rights abusers. For instance, companies incorporated in China, among those incorporated elsewhere, have been &lt;a href="https://www.cfr.org/blog/authoritarians-are-exporting-surveillance-tech-and-it-their-vision-internet" target="_blank"&gt;heavily involved&lt;/a&gt; in exports of dual-use surveillance technologies to other countries, including those with questionable or outright poor human-rights records. Although companies incorporated in democracies may engage in such practices as well, most democracies take steps to curtail these practices as much as possible, such as through the multilateral Wassenaar Arrangement — which lays out export controls around conventional weapons and dual-use goods and technologies. The U.S. has long been a party to this agreement, and India &lt;a href="https://economictimes.indiatimes.com/news/defence/wassenaar-arrangement-decides-to-make-india-its-member/articleshow/61975192.cms?from=mdr" target="_blank"&gt;officially joined&lt;/a&gt; in 2018. Arguments persist about the extent to which Beijing is involved in these dual-use surveillance technology exports, but these exports may only increase going forward as companies &lt;a href="https://www.newamerica.org/weekly/edition-254/long-view-digital-authoritarianism/" target="_blank"&gt;increasingly&lt;/a&gt; sell not just internet surveillance tools but also dual-use AI tools. In this way, too, India and the U.S. could play an important role in countering the spread of such capabilities to human-rights abusers and standing against the spread of digital authoritarianism in the process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The relationship here is, therefore, one that requires careful navigation for its significant geopolitical, economic, and ideological consequences. For the future of the technological relationship between the world’s largest democracies—and the extent to which they respect each other’s strategic autonomy while converging on issues of mutual interest—could determine the future of global digital governance.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/the-diplomat-justin-sherman-and-arindrajit-basu-july-3-2019-fostering-strategic-convergence-in-us-india-tech-relations-5g-and-beyond'&gt;https://cis-india.org/telecom/blog/the-diplomat-justin-sherman-and-arindrajit-basu-july-3-2019-fostering-strategic-convergence-in-us-india-tech-relations-5g-and-beyond&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Justin Sherman and Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-07-05T02:19:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/igf-2013-workshop-287-foss-smart-choice-for-developing-countries">
    <title>FOSS: Smart Choice for Developing Countries</title>
    <link>https://cis-india.org/news/igf-2013-workshop-287-foss-smart-choice-for-developing-countries</link>
    <description>
        &lt;b&gt;This workshop is being organised by TechNation and Open Source Alliance of Central Asia on October 23. Sunil Abraham is participating as a panelist and will speak on FOSS and IT Growth Policies in South Asia.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_2013_status_list_view.php?xpsltipq_je=287"&gt;Read the original published on the IGF website&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Internet Governance Forum 2013 is being held at Bali from October 22 to 25. The overarching theme for the 2013 IGF meeting is: "Building Bridges"- Enhancing Multistakeholder Cooperation for Growth and Sustainable Development".&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Theme: The Internet as an Engine for Growth and Advancement&lt;/h2&gt;
&lt;p class="western" style="text-align: justify; "&gt;Free and Open Source Software (FOSS), once limited to advanced users, now attracts average users.  Countries have adopted FOSS for its social, economic and political benefits. Russia has started to shift government to Linux by 2015 and  plans to build a national repository of Open Source Software. China is teaming up with Canonical to develop an open source operating system for Chinese users called Ubuntu Kylin.  According to &lt;i&gt;Black Duck Software&lt;/i&gt;&lt;b&gt; &lt;/b&gt;and &lt;i&gt;North Bridge Venture Partners Open-Source Survey, &lt;/i&gt;Open Source Software is helping improve enterprise networking, smartcars, and academia.  InformationWeek’s survey “Open Source Software Use Joins The Mix,” confirms that FOSS “is believed to create more opportunities for innovation than commercial or proprietary software.”&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;This workshop emphasizes three main issues: 1) Innovative FOSS technologies, 2) Capacity building in FOSS, and 3) Women as FOSS users and developers. It will discuss benefits, costs and implications of choosing FOSS; highlight the representation, role and achievements of women from the Central and South Asian region; and, guide recommendations to build capacity of women in utilizing FOSS for education, health, governance, and civil society.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;&lt;b&gt;Why FOSS?&lt;/b&gt; FOSS fosters education for the persons contributing to it and for those using it. In addition to learning new skills, FOSS developers can help solve real-life problems. Irrespective of geographic location, volunteers work collaboratively to develop software. This creates a sense of community ownership of their technology and enhances employment, employability and increases local innovation.  FOSS reduces deployment costs making it a smart choice by developing countries. FOSS is affordable, stable, reliable, and free of virus.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;&lt;b&gt;What are innovative FOSS technologies?&lt;/b&gt; This workshop will showcase some of the most innovative Open Source Software technologies. It will highlight the fact that most servers are based on open source, and now common users, governments and businesses around the world are transitioning to FOSS.&lt;/p&gt;
&lt;p class="western" style="text-align: justify; "&gt;&lt;b&gt;Why Capacity Building?&lt;/b&gt; Capacity building in computer education should teach students concepts, ensure that students learn through hands on experience using a variety of tools, and leave students the choice of which tool to use to create virtual worlds.  Students should be given responsibilities, including helping run IT systems. For example, students of higher classes could build or modify software for lower classes.&lt;/p&gt;
&lt;p&gt;Organized by Open Source Alliance of Central Asia (OSACA), this workshop will explore whether the requirements to be a FOSS contributor prevent women from doing so and what it will take for women in Central and South Asia, to become valuable contributors.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Has the proponent organised a workshop with a similar subject during past IGF meetings?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;No.&lt;/p&gt;
&lt;h3&gt;Co-organisers&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;Mr. Omar Mansoor Ansari, TechNation&lt;/span&gt;, Private Sector, AFGHANISTAN, Asia-Pacific Group&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Mr. Sufyan Kakakhel, Open Source Alliance of Central Asia (OSACA)&lt;/span&gt;, Civil Society, PAKISTAN, Asia-Pacific Group&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Have the Proponent or any of the co-organisers organised an IGF workshop before? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;No.&lt;/p&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;H.E. Baryalai Hassam, Ministry of Communications and Information Technology, Male, Government, AFGHANISTAN, Asia-Pacific Group&lt;/li&gt;
&lt;li&gt;Maria Beebe, Telecom Advisory Team (Afghanistan) Deloitte, Female, Private Sector, UNITED STATES, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;li&gt;Sunil Abraham, Center for Internet and Society, Male, Civil Society, INDIA, Asia-Pacific Group&lt;/li&gt;
&lt;li&gt;Roxana Radu, Graduate Institute of International and Development Studies, Female, Technical Community, ROMANIA, Eastern European Group&lt;/li&gt;
&lt;li&gt;Matthias Stürmer, Open Source Switzerland, Male, Technical Community, SWITZERLAND, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;li&gt;Asomiddin Atoev, ISP Association of Tajikistan, Male, Private Sector, TAJIKISTAN, Asia-Pacific Group&lt;/li&gt;
&lt;li&gt;Prof. Dr. rer. pol. Wolfgang F. Finke, Ernst-Abbe University of Applied Sciences, Male, Civil Society, GERMANY, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;li&gt;Dominique Lazankski, The TaxPayers' Alliance, Civil Society, UNITED KINGDOM, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Moderator&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Omar Mansoor Ansari&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Remote Moderator&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Ana Perdigao &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;FOSS: FOSS Smart Choice for Developing Countries&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This high-level thematic workshop discusses the most up-to-dated advancements in Free and Open Source Software (FOSS) technologies. With some of the best minds from the government, industry, civil society and academia learn about innovative FOSS technologies, policy and regulatory environments, project and initiatives, and how Open Source Software technologies can help enhance governance, business, education and the society. The panel will discuss implications for capacity building for women and girls in FOSS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Workshop Agenda&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;0900 - 0910&lt;br /&gt;Welcome and Introduction&lt;br /&gt;Welcome and introduction by Session Chairman&lt;br /&gt;Mr. Omar Mansoor Ansari, President at TechNation, Cofounder/ Board Director, Open Source Alliance of Central Asia (OSACA)&lt;br /&gt;&lt;br /&gt;0910 - 0920&lt;br /&gt;State of FOSS and Government Policies in Afghanistan.&lt;br /&gt;H.E. Eng. Baryalai Hassam, Deputy Minister (Technical), Ministry of Communications and IT, Afghanistan&lt;br /&gt;&lt;br /&gt;0920 - 0930&lt;br /&gt;MOOCs, M-learning and other Resources Online: Implications for Capacity Building&lt;br /&gt;Dr. Maria Beebe, Sr. ICT Advisor (Education), Telecom Advisory Team (Afghanistan) Deloitte, United States&lt;br /&gt;&lt;br /&gt;0930 - 0940&lt;br /&gt;Kick-Starting the Utilization of FOSS in the Public Sector in Afghanistan – Afghan Center of Open Source Systems&lt;br /&gt;Prof. Dr. rer. pol. Wolfgang F. Finke, Ernst-Abbe University of Applied Sciences, Germany&lt;br /&gt;&lt;br /&gt;0940 - 0950&lt;br /&gt;Women Creating Their Spaces Online&lt;br /&gt;&lt;br /&gt;0950 - 1000&lt;br /&gt;Technology transfer and North-South partnerships through open source communities&lt;br /&gt;Dr. Matthias Stürmer, Swiss Open Systems User Group /ch/open, Switzerland&lt;br /&gt;&lt;br /&gt;1000 - 1010&lt;br /&gt;FOSS and the Internet in Central Asia &lt;br /&gt;Asomiddin Atoev, Cofounder/ Board Director, Open Source Alliance of Central Asia (OSACA), Chairman, ISP Association of Tajikistan. &lt;br /&gt;&lt;br /&gt;1010 -1020&lt;br /&gt;FOSS and IT Growth Policies in South Asia&lt;br /&gt;Mr. Sunil Abraham, Executive Director, Center for Internet and Society, India&lt;br /&gt;&lt;br /&gt;1020 - 1030&lt;br /&gt;Open Data&lt;br /&gt;Dominique Lazanski &lt;br /&gt;The TaxPayers' Alliance, UK&lt;br /&gt;&lt;br /&gt;1030 -1100&lt;br /&gt;Q&amp;amp;A and Open Discussion&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inclusiveness of the Session&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This will be a panel workshop, it will allow considerable time for an  Open Discussion and Q&amp;amp;A. We will be making the meeting highly  interactive and participatory by engaging the speakers and participants  to exchange ideas, knowledge and experience.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Suitability for Remote Participation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We will be providing remote participation through video conferencing, creating social media, Twitter and Facebook, accounts that are interlinked and can communicate real time updates with the remote participants. A team of volunteers will be engaged to manage the communication with remote participants.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/igf-2013-workshop-287-foss-smart-choice-for-developing-countries'&gt;https://cis-india.org/news/igf-2013-workshop-287-foss-smart-choice-for-developing-countries&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-10-21T05:28:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/foss-wikimedia-under-one-roof-gnunify">
    <title>FOSS, Wikimedia and Mozilla Under One Roof at GNUnify 2013, Pune</title>
    <link>https://cis-india.org/openness/blog-old/foss-wikimedia-under-one-roof-gnunify</link>
    <description>
        &lt;b&gt;GNUnify 2013 organized in the  campus in Pune from February 15 to 17, 2013. The event was organized by Pune Linux/Unix User Group (PLUG) and Symbiosis Institute of Computer Studies &amp; Research (SICSR). Subhashish Panigrahi reports the outcomes in this blog post.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://www.gnunify.in/"&gt;GNUnify&lt;/a&gt; is an annual gathering consisting of &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Free_and_open-source_software"&gt;Free and Open Source software&lt;/a&gt; workshops, talks, seminars and BOFs (Birds of a feather). This was hosted by the &lt;a class="external-link" href="http://www.plug.org.in/"&gt;Pune Linux User Group&lt;/a&gt; and the &lt;a class="external-link" href="http://sicsr.ac.in/"&gt;Symbiosis Institute of Computer Studies&lt;/a&gt; and Research in Pune, India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Day 1: February 15, 2013&lt;/b&gt;&lt;br /&gt;The first day of the event had many parallel tracks including talks on KDE, Firefox OS, FUEL Project, Wikimedia Localization, OpenSSL, Discussions on Creative Commons, OpenStack and few technical workshops.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Day 2: February 16, 2013&lt;/b&gt;&lt;br /&gt;Few of the full day events includes several talks and discussions about Mozilla and Firefox, Internationalization, Localization and Indic language input method related talks and workshops by the Wikimedia Foundation Engineering team (More details on mediawiki.org), Drupal and workshop and talks on Python. Wikipedians, translators  from various languages, A2K team members Vishnu Vardhan and Subhashish had an open conversation with the Wikimedia Foundation Engineering team.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Day 3: February&lt;/b&gt; &lt;b&gt;17, 2013&lt;/b&gt;&lt;br /&gt;The final day of GNUnify had 3 major parallel day long events; Mozilla India community meetup, Wikipedia translation sprint and Wikipedia gadget workshop. At the end of all the events participants gathered for a group photo and socialized.&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;Videos&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="300" src="http://commons.wikimedia.org/wiki/File:Jessica_Coates_and_Jane_Hornibrook,_Creative_Commons-GNUnify.webm?embedplayer=yes" width="300"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="300" src="http://commons.wikimedia.org/wiki/File:YuviPanda-GNUnify'13-16February2013.webm?embedplayer=yes" width="300"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Podcasts&lt;br /&gt; &lt;iframe frameborder="0" height="23" src="http://commons.wikimedia.org/wiki/File:Amir_Aharoni,_Yuvi_Panda-talk-GNUnify-1.ogg?embedplayer=yes" width="300"&gt;&lt;/iframe&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="23" src="http://commons.wikimedia.org/wiki/File:Amir_Aharoni,_Yuvi_Panda-talk-GNUnify-2.ogg?embedplayer=yes" width="300"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="23" src="http://commons.wikimedia.org/wiki/File:Amir_Aharoni,_Yuvi_Panda-talk-GNUnify.ogg?embedplayer=yes" width="300"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="23" src="http://commons.wikimedia.org/wiki/File:MozillaINmeetup-GNUnify-2013.ogg?embedplayer=yes" width="300"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/foss-wikimedia-under-one-roof-gnunify'&gt;https://cis-india.org/openness/blog-old/foss-wikimedia-under-one-roof-gnunify&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-07-17T06:55:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/foss-poster.pdf">
    <title>FOSS Poster</title>
    <link>https://cis-india.org/openness/blog-old/foss-poster.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/foss-poster.pdf'&gt;https://cis-india.org/openness/blog-old/foss-poster.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-24T08:58:38Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-december-30-2015-foreign-media-on-zukerberg-india-backlash">
    <title>Foreign Media on Zuckerberg's India Backlash</title>
    <link>https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-december-30-2015-foreign-media-on-zukerberg-india-backlash</link>
    <description>
        &lt;b&gt;When Facebook's co-founder proposed bringing free Web services to India, his stated aim was to help connect millions of impoverished people to unlimited opportunity. Instead, critics have accused him of making a poorly disguised land grab in India's burgeoning Internet sector. The growing backlash could threaten the very premise of Internet.org, his ambitious, two-year-old effort to connect the planet.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post &lt;a class="external-link" href="http://www.ndtv.com/india-news/foreign-media-on-zuckerbergs-india-backlash-1260732"&gt;was published in NDTV&lt;/a&gt; on December 30, 2015. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Indian authorities are circumspect because the Facebook initiative  provides access to only a limited set of websites -- undermining the  equal-access precepts of net neutrality. The telecommunications  regulator is calling for initial comments by Jan 7, extending the  deadline from today, on whether wireless carriers can charge differently  for data usage across websites, applications and platforms.&lt;br /&gt;&lt;br /&gt; Losing this fight could imperil Facebook's Free Basics, which allows  customers to access the social network and select services such as  Messenger and Microsoft's Bing without a data plan.&lt;br /&gt;&lt;br /&gt;"The  India fight is helping shape debates elsewhere," said Pranesh Prakash,  policy director at the Centre for Internet and Society, a  Bangalore-based non-profit advocacy group. "Activists in other countries  such as Brazil, Venezuela and Colombia are watching this debate and  will seize the momentum created in India."&lt;br /&gt;&lt;br /&gt; Zuckerberg's argument for free Web access is based in part on Deloitte  research showing that for every 10 people who are connected to the Web,  one is lifted out of poverty and one job is created.&lt;br /&gt;&lt;br /&gt; Facebook argues that by giving people free access to a small slice of  the Internet, they will quickly see the value in paying for the whole  thing. Zuckerberg has said his biggest challenge in connecting people to  the Web isn't access to cellular networks, but a social hurdle: he  needs to prove to people who have never been online that the Internet is  useful.&lt;br /&gt;&lt;br /&gt; "Who could possibly be against this?" Zuckerberg wrote in an impassioned  op-ed in the Times of India this week. "Surprisingly, over the last  year there's been a big debate about this in India."&lt;br /&gt;&lt;br /&gt; Zuckerberg's pleas underscore what's at stake. Facebook already attracts  1.55 billion people monthly, or about half of the Internet-connected  global population. To keep growing, the world's largest social network  needs to get more people online. Hence the billions of dollars Facebook  is spending on projects to deliver the Web to under-served areas via  drones, satellites and lasers. And Internet.org, which now spans 37  nations.&lt;br /&gt;&lt;br /&gt; India, as the world's second most populous nation, is arguably the most  important piece of Zuckerberg's Free Basics strategy. But the opposition  is fierce. Critics note that the Facebook service doesn't offer Web  favorites such as Google's search. Facebook has said it would be open to  adding more features from competitors, but critics are skeptical of  giving the social-networking giant such influence on the Internet.&lt;br /&gt;&lt;br /&gt; Critics also say that by offering a limited swath of the Internet at  comparatively slow speeds, the company is creating a diluted version of  the Web. That could stifle innovation by causing disadvantages for  Indian startups building rival apps, or allow Facebook and its  telecommunications carrier-partners to act as Internet gatekeepers.&lt;br /&gt;&lt;br /&gt; In a sign of the importance he attaches to the issue, Zuckerberg on  Tuesday called one of India's most prominent entrepreneurs to make his  case.&lt;br /&gt;&lt;br /&gt; One97 Communications, the mobile payments startup backed by Alibaba  Group Holding, is one of several tech companies that have come out  against Facebook's plans.&lt;br /&gt;&lt;br /&gt; "We are totally against telcos preferring one developer over another,"  One97 founder Vijay Shekhar Sharma said in a phone interview before that  call. "We are asking for access neutrality. We are hoping that all  startups will be treated equally."&lt;br /&gt;&lt;br /&gt; Sonia Dhawan, a spokeswoman for One97's payment website Paytm, said the  call took place but didn't describe the conversation further. Sharma  wasn't available for further comment.&lt;br /&gt;&lt;br /&gt; Facebook is now scrambling to drum up support. It's started a "Save Free  Basics In India" campaign, asking Indian users to support "digital  equality" by filling out a form that shoots an e-mail to regulators.  That also has the effect of sending notifications to user's friends  unless they opt out.&lt;br /&gt; Facebook has also taken out full-page advertisements, including one  featuring a smiling Indian farmer and his family who the ads say used  new techniques to double his crop yield.&lt;br /&gt;&lt;br /&gt; While countries such as the Philippines have embraced Free Basics, India  has been "the outlier and more challenging," Chris Daniels, vice  president of Internet.org, said in a Dec. 26 chat on Reddit.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-december-30-2015-foreign-media-on-zukerberg-india-backlash'&gt;https://cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-december-30-2015-foreign-media-on-zukerberg-india-backlash&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-03T09:20:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/for-a-truly-inclusive-consultative-process">
    <title>For a Truly Inclusive Consultative Process</title>
    <link>https://cis-india.org/accessibility/blog/for-a-truly-inclusive-consultative-process</link>
    <description>
        &lt;b&gt;At Inclusive Planet we attempt to engage as many people with disabilities as possible with the consultative process which precedes the enactment of legislation and policy, and we are very happy with the NDA Government’s positive steps in putting out all proposed amendments to the public at large for feedback.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Some of the areas on which public comment has been sought is the proposed repeal and reenactment of the &lt;a href="http://wcd.nic.in/"&gt;Juvenile Justice Act&lt;/a&gt;, the amendments of three labour laws viz. &lt;a href="http://labour.nic.in/upload/uploadfiles/files/latest_update/what_new/53994ae87860bBriefforNIC.pdf"&gt;the Factories Act&lt;/a&gt;, the &lt;a href="http://labour.nic.in/upload/uploadfiles/files/latest_update/what_new/53a03358f4233publicdomaininformation0001.pdf"&gt;Minimum Wages Act&lt;/a&gt;, and the &lt;a href="http://labour.nic.in/upload/uploadfiles/files/latest_update/what_new/53a155b084b2echildlabourcompressed.pdf"&gt;Prevention of Child Labour Act&lt;/a&gt;, and the Railways Ministry has asked for &lt;a href="http://indianrailways.gov.in/"&gt;comments towards the formulation of the Rail Budget&lt;/a&gt;. All of these are extremely key legislations and in fact there is a lot to contribute in terms of suggesting enabling provisions towards accessibility and recognizing potential discrimination against persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the disabilities sector is faced with two major problems when it comes to this process. One is that the material which is uploaded onto the respective government websites is inaccessible for screen readers. Many of these are large documents which are essentially scanned copies of the printed notifications – for example, the Factories Act press release is now available in an easier format than &lt;a href="http://labour.nic.in/upload/uploadfiles/files/latest_update/what_new/5396e1126daa0Factories.pdf"&gt;the original version&lt;/a&gt; which had been uploaded. The websites themselves are not easy to navigate and are not screen reader friendly. Efforts are on by the newly launched &lt;a href="https://cis-india.org/accessibility/blog/accesshub.org"&gt;India Access Hub&lt;/a&gt; to convert these documents into an accessible format for contributors and discussions on their forum, however, the process seems tedious and there is no reason why the Government bodies cannot ensure that the best possible document, screen reader compatibility wise, is not made available to the public. This would ensure that precious time is not consumed in the process of making the document accessible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is closely linked to the second issue – the comments and suggestions which have been called for are required within a short period of time – between 15 days (Juvenile Justice Act) to 30 days (all three labour legislations) and while the advertisement for the Railway Budget appears to have been put out on the weekend of the 21&lt;sup&gt;st&lt;/sup&gt; of June, since the budget itself is slated to be tabled on the 8&lt;sup&gt;th&lt;/sup&gt; of July by recent media reports, feedback is realistically required within this week itself. The process becomes exclusionary on account of these narrow deadlines – the presumption being made is that specialized agencies with able-bodied representatives can revert speedily with their feedback. The disability sector is quite keen on responding to all proposed legislation, as the provisions of the United Nations Convention on the Rights of Persons with Disabilities demand compliance in terms of non discrimination and access across all sectors. It is also difficult to respond with such momentum considering that many stakeholders are not online, and for some, processing and expressing viewpoints may take longer than the average person, not to mention the importance of making this information available in a simplified format. Ideally, any person with impairment should be able to express their views and be considered as a stakeholder; however, with the barriers in place which prevent effective access and accommodation to the expression of views, 15% of the population may effectively be disabled to that extent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is by no means a new complaint – the lack of accessibility of government documentation has been rampant and raised before previous Governments as well – however, the hope is that with the NDA Government’s manifesto focus on using information technology to alleviate the concerns of persons with disabilities, that the mandate for all Government Websites to be compliant with the &lt;a href="http://www.w3.org/TR/WCAG20/"&gt;Web Content Accessibility Guidelines (WCAG) 2.0&lt;/a&gt; will be implemented with immediate effect, and in the meantime that Government Officials be instructed to upload fully accessible documents to their websites. It would also not be out of place to institute a common information portal for all documents open for public consultation to make such access easier for all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There should never be any bar on access to information: particularly that which affords an opportunity to the public to be heard and considered. It is sincerely hoped that the new Government takes a much needed positive step in this direction.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/for-a-truly-inclusive-consultative-process'&gt;https://cis-india.org/accessibility/blog/for-a-truly-inclusive-consultative-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>salelkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-07-02T04:44:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia">
    <title>Font problem hits Odia</title>
    <link>https://cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia</link>
    <description>
        &lt;b&gt;Focus on search for solution to lack of compatibility. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Bibhuti Barik was &lt;a class="external-link" href="http://www.telegraphindia.com/1140707/jsp/odisha/story_18587707.jsp#.U9IESqgu5R8"&gt;published in the Telegraph&lt;/a&gt; on July 7, 2014. Subhashish Panigrahi gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The available Odia fonts that could be used for digital publications have compatibility problems. The fonts, which number around 10, have been developed for specific purposes and cannot be used in all applications.&lt;br /&gt;&lt;br /&gt;Computer application researchers, linguistics, information technology experts and educationists, who met at a workshop here today, urged the state government and the IT industry to ensure the smooth use of Odia fonts.&lt;br /&gt;&lt;br /&gt;These fonts are available on different software tools, but if one purchases one of them to install on his or her computer, it fails to open in another system. Since this happens due to lack of compatibility, it also discourages users to use Odia fonts in official work and day-to-day life.&lt;br /&gt;&lt;br /&gt;“I think the use of Odia language in computers is restricted only to desktop publication (DTP). As the compatibility factor has come as a major handicap, the use is becoming more restricted in day-to-day life. The state government should come forward to facilitate a software so that the fonts can be used through a uniform system,’’ said linguist and founding director of the Mysore-based Central Institute of Indian Languages, Debi Prasanna Pattanayak.&lt;br /&gt;&lt;br /&gt;Subhashish Panigrahi, a Bangalore-based IT professional who is now working on a project for Wikipedia Foundation, said: “Different fonts in Odia came to existence quite late and all were based on the skeleton of Latin fonts so that when one types an English font on the keyboard, the screen shows an Odia font. Later, unicode fonts were developed, which were not only compatible to the Internet, but had elements common with other Indian languages as well.”&lt;br /&gt;&lt;br /&gt;Odia publishers did not agree to use the unicode fonts as they were using customised softwares. For this reason, the published books and literature fails to reach the Internet.&lt;br /&gt;&lt;br /&gt;In 2011, Srujanika, a city-based organisation, developed a converter to use fonts from other categories to unicode type.&lt;br /&gt;&lt;br /&gt;Sujata Patel, chief operating officer of Pune -based Tech Z Solution, said: “The affordability of Odia tools and fonts is a major concern. As they are developed by non-Odia professionals, the aesthetic aspect of Odia fonts and characters are not being taken into consideration.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subrat Prusty, member secretary Institute of Odia Studies and Research, said: “Odia is yet to come to the computer screen on different software tools which are used for tables, Internet applications, medical, engineering and business applications.”&lt;br /&gt;&lt;br /&gt;“Despite having hundreds of engineering colleges, two technical universities and 10 universities we are yet to use Odia in computers,” Prusty added.&lt;br /&gt;&lt;br /&gt;Researchers from US, Singapore, IITs, central universities, IT professionals, linguists, artistes, educationists and students of computer applications took part in the workshop that was organised at the computer science department of the Institute of Technical and Education and Research of Sikhya O Anusandhan University.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia'&gt;https://cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-25T08:04:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/the-signpost-august-18-2016-pete-forsyth-and-tony-focus-on-india">
    <title>Focus on India—WikiConference produces new apps; state government adopts free licenses</title>
    <link>https://cis-india.org/a2k/news/the-signpost-august-18-2016-pete-forsyth-and-tony-focus-on-india</link>
    <description>
        &lt;b&gt;WikiConference India and its productive hackathon

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The second &lt;a class="extiw" href="https://meta.wikimedia.org/wiki/WikiConference_India_2016" title="meta:WikiConference India 2016"&gt;WikiConference India&lt;/a&gt;,  held August 5–7 in the northern Indian city of Chandigarh, drew  hundreds of new and experienced members from 20 language communities of  various Wikimedia projects from India, Bangladesh, Sri Lanka, and Nepal.  This event was &lt;a class="text external" href="https://opensource.com/life/16/8/wikipedia-conference-india-2016" rel="nofollow"&gt;more thematic&lt;/a&gt; than the first WikiConference India (held in 2011), with numerous  presentations, panel discussions and workshops on the gender gap,  Wikipedia in education, Mediawiki, and state of the movement in India.  The event was organized by the Community of Wikimedians in India,  supported by &lt;a class="extiw" href="https://meta.wikimedia.org/wiki/Wikimedia_India" title="m:Wikimedia India"&gt;Wikimedia India&lt;/a&gt; and the &lt;a href="https://en.wikipedia.org/wiki/Centre_for_Internet_and_Society_%28India%29" title="Centre for Internet and Society (India)"&gt;Centre for Internet and Society&lt;/a&gt;, and &lt;a class="extiw" href="https://meta.wikimedia.org/wiki/Grants:PEG/Community_of_Wikimedians_in_India/WikiConference_India_2016" title="meta:Grants:PEG/Community of Wikimedians in India/WikiConference India 2016"&gt;funded by the Wikimedia Foundation&lt;/a&gt;. The newly formed user group &lt;a class="extiw" href="https://meta.wikimedia.org/wiki/Punjabi_Wikimedians" title="m:Punjabi Wikimedians"&gt;Punjabi Wikimedians&lt;/a&gt; hosted the event. WikiConference India's main goal was to build  community and increase participation among Wikimedians in India.  Interest in the event was strong: 452 Wikimedians from more than six  countries applied for ~100 scholarships. Wikipedia's well known gender  gap was evident: only 55 scholarship applicants were women, but a strong  focus on diversity resulted in ~25% of scholarship recipients going to  women, and the inclusion of speakers of ~20 languages. In all, about 250  people attended the conference. Several Foundation staff spoke at the  event, including executive director Katherine Maher, Asaf Bartov, and  Tighe Flanagan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A highlight of the conference was the hackathon track, which spanned  all three days of the conference. It proved highly productive, yielding  seven apps that are expected to help Wikimedians in a variety of ways. I  spoke with Santosh Shingare (&lt;a href="https://en.wikipedia.org/wiki/User:Cherishsantosh" title="User:Cherishsantosh"&gt;Cherishsantosh&lt;/a&gt;),  the Bangalore-based Wikimedian who organized the hackathon. Santosh had  previously served as an organizer of the 2011 WikiConference, and has  run hackathons annually since then. Santosh's primary motivation for  holding such events is learning; he spoke of limited opportunities to  learn about new areas of technology beyond his core skills in WebRTC and  Android. He enjoys collaborating with other Wikimedians and sharing  technical skills. This event was his first with an international draw,  and he looks forward to opportunities to collaborate beyond India's  borders in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Santosh outlined in &lt;a class="extiw" href="https://lists.wikimedia.org/pipermail/wikimania-l/2016-August/007857.html" title="mailarchive:wikimania-l/2016-August/007857.html"&gt;a message to the Wikimania email list&lt;/a&gt;, the hackathon's 35 participants made substantial progress with the following projects:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;WikiSpeak with native language (web and Android): Speaking the text of Wikipedia articles&lt;/li&gt;
&lt;li&gt;Edit Tamil Wiktionary (Android)&lt;/li&gt;
&lt;li&gt;Audio file upload to Wikidata (Android): Assists users in uploading  small files that demonstrate the pronunciation of lexical items&lt;/li&gt;
&lt;li&gt;A layer that shows local Wikipedia articles on a Google Map&lt;/li&gt;
&lt;li&gt;&lt;a href="https://en.wikipedia.org/wiki/Optical_character_recognition" title="Optical character recognition"&gt;Optical character recognition&lt;/a&gt; for Hindi and Malayalam&lt;/li&gt;
&lt;li&gt;Communication platform [WebRTC] (Web Application): Santosh wrote this app himself; hackathon participants used it to communicate&lt;/li&gt;
&lt;li&gt;Notifications: browser notifications for Wikipedia functions such as recent changes&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Santosh highlights that the projects grew out of advance  communication. To identify problems and generate ideas, the hackathon  organizing team posted a survey ahead of the event. Requests from  various language communities, including Hindi, Tamil, Punjabi, and  Malayalam, drove several of the projects. The software is all freely  licensed, and there are no plans to generate revenue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Santosh is not a prolific Wikipedia writer or editor, but rather sees  value in his ability to communicate among Wikimedians who seek features  from various language communities, including his native Marathi and  other Indic languages in which he has varying degrees of fluency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He plans to update the Wikimedia community shortly with further  details on each of the seven projects. He is already planning the next  of India's annual hackathons. Hackathon organizers worldwide might be  interested in learning more about Indian Wikimedians' efforts, and  Wikimedians around the world can expect to benefit from their projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference generated &lt;a class="extiw" href="https://meta.wikimedia.org/wiki/WikiConference_India_2016/Press" title="meta:WikiConference India 2016/Press"&gt;a number of media reports&lt;/a&gt;. &lt;a href="https://en.wikipedia.org/wiki/User:Peteforsyth" title="User:Peteforsyth"&gt;P&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Indian_state_of_Tamil_Nadu_adopts_Creative_Commons_license"&gt;Indian state of Tamil Nadu adopts Creative Commons license&lt;/span&gt;&lt;/h3&gt;
&lt;div style="float: right; padding-left: 20px; text-align: justify; "&gt;
&lt;div class="center"&gt;
&lt;div class="floatnone"&gt;&lt;a class="image" href="https://en.wikipedia.org/wiki/File:India_TN.svg"&gt;&lt;img alt="India TN.svg" height="322" src="https://upload.wikimedia.org/wikipedia/commons/thumb/9/96/India_TN.svg/275px-India_TN.svg.png" width="275" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;The state of Tamil Nadu on the subcontinent&lt;/div&gt;
&lt;/div&gt;
&lt;div class="plainlinks" style="padding-left: 5em; text-align: justify; "&gt;
&lt;p&gt;Last week brought a rare piece of good news in the world's uncertain  progress towards the widespread free licensing of information on the  Internet. &lt;a href="https://en.wikipedia.org/wiki/User:Ravidreams" title="User:Ravidreams"&gt;Ravidreams&lt;/a&gt; announced on the &lt;a class="extiw" href="https://lists.wikimedia.org/pipermail/wikimediaindia-l/2016-August/012649.html" title="mailarchive:wikimediaindia-l/2016-August/012649.html"&gt;Wikimedia India mailing list&lt;/a&gt; that the government of one of India's largest and most populous states—&lt;a href="https://en.wikipedia.org/wiki/Tamil_Nadu" title="Tamil Nadu"&gt;Tamil Nadu&lt;/a&gt;—has issued an &lt;a class="extiw" href="https://commons.wikimedia.org/wiki/File:GoTN_Tamil_Development_Departments_order_on_creative_commons_cc_by_sa.pdf" title="commons:File:GoTN Tamil Development Departments order on creative commons cc by sa.pdf"&gt;instruction&lt;/a&gt; to &lt;a href="https://en.wikipedia.org/wiki/Tamil_University" title="Tamil University"&gt;Tamil University&lt;/a&gt; and "all other government departments and institutions to release all  their publications, archives and collections under Creative Commons by  Share-Alike license".&lt;/p&gt;
&lt;p&gt;The move comes one year after the &lt;a class="text external" href="https://ta.wikipedia.org/s/4o7x"&gt;collaboration&lt;/a&gt; between the Global Tamil Wikimedia Community and the &lt;a href="https://en.wikipedia.org/wiki/Tamil_Virtual_Academy" title="Tamil Virtual Academy"&gt;Tamil Virtual Academy&lt;/a&gt;,  an independent institution set up by the state government in 2001 to  provide online resources for Tamil-language communities around the  world. TVA and the &lt;a href="https://en.wikipedia.org/wiki/Tamil_language" title="Tamil language"&gt;Tamil-language&lt;/a&gt; Wikimedia community collaborated to persuade the government to make the order. Wikimedia India (one of three &lt;a class="text external" href="https://wiki.creativecommons.org/wiki/India" rel="nofollow"&gt;Creative Commons affiliates&lt;/a&gt; in the country) served as an institutional partner, signing the initial  agreement on behalf of the Indian Wikimedia community, and funding a  Wikimedian in Residence at TVA.&lt;/p&gt;
&lt;p&gt;Ravi, who also serves on the TVA committee for outreach, told the &lt;i&gt;Signpost&lt;/i&gt; that the TVA is very keen to share its collection of encyclopedic  resources with Tamil Wikimedia projects. The community contributed  strategic knowledge of free-content licensing, providing precedents for  free content release by other governments in India and other countries,  and helped in the drafting of the actual order. "But it takes a lot of  time, effort, high-profile connections to change how government  institutions work", he said.&lt;/p&gt;
&lt;/div&gt;
&lt;div style="float: right; padding-left: 20px; text-align: justify; "&gt;
&lt;div class="center"&gt;
&lt;div class="floatnone"&gt;&lt;a class="image" href="https://en.wikipedia.org/wiki/File:Tamil_1949.jpg"&gt;&lt;img alt="Tamil 1949.jpg" height="369" src="https://upload.wikimedia.org/wikipedia/commons/thumb/1/10/Tamil_1949.jpg/275px-Tamil_1949.jpg" width="275" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;An example of the distinctive Tamil script&lt;/div&gt;
&lt;/div&gt;
&lt;div class="plainlinks" style="padding-left: 5em; text-align: justify; "&gt;
&lt;table class="cquote"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: left; "&gt;“&lt;/td&gt;
&lt;td&gt;Almost  99% of the time it's about the right officer/minister who cares for our  mission being in charge of the right department at the right time. It's  very hard to bring change through a bottom-up approach. These  precedents help when someone at the top gets interested in changing  things. So, any community that expects to influence public policy should  be prepared to do a lot of groundwork.&lt;/td&gt;
&lt;td style="text-align: right; "&gt;”&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Tamil-language Wikipedian &lt;a href="https://en.wikipedia.org/wiki/User:Thamizhpparithi_Maari" title="User:Thamizhpparithi Maari"&gt;Thamizhpparithi Maari&lt;/a&gt; serves as Assistant Director, TVA and state coordinator of its  computing outreach unit, which the government is funding to encourage  students in the state to use open-source media and software; this  program includes the development of mobile apps and the running of  contests to enhance students' computing skills. He described to the &lt;i&gt;Signpost&lt;/i&gt; the elaborate process of finally gaining legal and administrative  approval for the CC-by-SA release order. Thamizhpparithi has already  started a process of digitising books from the universities to share  with the Tamil wiki community, involving between 400,000 and 500,000  pages in some 200 books, using Google &lt;a href="https://en.wikipedia.org/wiki/Optical_character_recognition" title="Optical character recognition"&gt;optical character recognition&lt;/a&gt; (OCR).&lt;/p&gt;
&lt;p&gt;"This is just the beginning; we expect millions of pages to be uploaded to &lt;a class="extiw" href="https://en.wikisource.org/wiki/ta:%E0%AE%AE%E0%AF%81%E0%AE%A4%E0%AE%B1%E0%AF%8D_%E0%AE%AA%E0%AE%95%E0%AF%8D%E0%AE%95%E0%AE%AE%E0%AF%8D" title="wikisource:ta:முதற் பக்கம்"&gt;Tamil Wikisource&lt;/a&gt;",  Ravi said. Most of the content that will become available for uploading  is in Tamil, although some will be in English and other Indian  languages; this will present significant opportunities for the Tamil  Wikimedia community.&lt;/p&gt;
&lt;/div&gt;
&lt;div style="float: right; padding-left: 20px; text-align: justify; "&gt;
&lt;div class="center"&gt;
&lt;div class="floatnone"&gt;&lt;a class="image" href="https://en.wikipedia.org/wiki/File:Valvai_Historical_Archives_Exhibition_-_Toronto_2011_-_Sivajanapotham.jpg"&gt;&lt;img alt="Valvai Historical Archives Exhibition - Toronto 2011 - Sivajanapotham.jpg" height="205" src="https://upload.wikimedia.org/wikipedia/commons/thumb/6/66/Valvai_Historical_Archives_Exhibition_-_Toronto_2011_-_Sivajanapotham.jpg/275px-Valvai_Historical_Archives_Exhibition_-_Toronto_2011_-_Sivajanapotham.jpg" width="275" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;A rare Tamil-language book in an archival exhibition&lt;/div&gt;
&lt;/div&gt;
&lt;div class="plainlinks" style="padding-left: 5em; text-align: justify; "&gt;
&lt;p&gt;There are about 70 million native speakers of Tamil, and another  eight million second-language speakers. It is an official language in  Tamil Nadu, Sri Lanka (with which the state shares a maritime border),  and Singapore, and is also used in Malaysia and the African island of  Mauritius. The language, written in a distinctive curvilinear script,  has a &lt;a href="https://en.wikipedia.org/wiki/Tamil_literature" title="Tamil literature"&gt;rich literature&lt;/a&gt; of poetry reaching back thousands of years, and of novels over the past few centuries; this is attested by &lt;a href="https://en.wikipedia.org/wiki/Category:Tamil_literature" title="Category:Tamil literature"&gt;a related category&lt;/a&gt; on the English Wikipedia that is already of impressive size.&lt;/p&gt;
&lt;p&gt;The Open Policy Network, a project of Creative Commons, published &lt;a class="text external" href="http://www.shareable.net/blog/open-policy-network-to-give-governments-a-license-to-share" rel="nofollow"&gt;an overview of the value of this kind of work&lt;/a&gt; in 2014; the Network advocates for governments around the world to adopt free content licenses. &lt;a href="https://en.wikipedia.org/wiki/User:Tony1" title="User:Tony1"&gt;T&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span class="mw-headline" id="In_brief"&gt;In brief&lt;/span&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Mobile app provides offline access to 8,000 medical articles in Arabic, Chinese, Persian, and Spanish&lt;/b&gt;: The apps, which supplement a popular English language app, were &lt;a class="text external" href="https://upload.wikimedia.org/wikipedia/commons/7/71/OfflineMed.pdf"&gt;announced&lt;/a&gt; by the WikiProject Med Foundation and Wikimedia Switzerland. More language editions are planned.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Wikimedia Foundation appoints five volunteers to its Board Governance Committee:&lt;/b&gt; Newly appointed trustee Nataliia Tymkiv &lt;a class="text external" href="https://lists.wikimedia.org/pipermail/wikimedia-l/2016-August/084974.html"&gt;announced&lt;/a&gt; the selection of the advisory group. Board governance issues have been  the subject of much discussion since the tumultuous events at the WMF  over the last year. The four members of the BGC are Tymkiv (chair),  Kelly Battles, Christophe Henner, and Dariusz Jemielniak.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;WikiConference North America&lt;/b&gt; will take place October 7–10, 2016 in San Diego. &lt;a class="text external" href="https://wikiconference.org/wiki/2016/Scholarships" rel="nofollow"&gt;Scholarship applications&lt;/a&gt; are open until August 23; &lt;a class="text external" href="https://wikiconference.org/wiki/Submissions" rel="nofollow"&gt;conference submissions&lt;/a&gt; until August 31.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="extiw" href="https://meta.wikimedia.org/wiki/WikiConvention_francophone/2016" title="m:WikiConvention francophone/2016"&gt;WikiConvention Francophone&lt;/a&gt;&lt;/b&gt; will take place in Paris August 19–21.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;New help page takes aim at common newbie obstacle:&lt;/b&gt; Many  articles carry banners, to flag problems with the articles. New  contributors often lack an understanding of how to go about removing the  banners, if they address the underlying issues. In recent months, &lt;a href="https://en.wikipedia.org/wiki/User:Fuhghettaboutit" title="User:Fuhghettaboutit"&gt;Fuhghettaboutit&lt;/a&gt; created a &lt;a href="https://en.wikipedia.org/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal"&gt;help page to explain the process&lt;/a&gt;, and advocated for linking to the page from the templates. The help page now gets &lt;a class="text external" href="https://tools.wmflabs.org/pageviews/?project=en.wikipedia.org&amp;amp;platform=all-access&amp;amp;agent=user&amp;amp;start=2016-06-15&amp;amp;end=2016-08-11&amp;amp;pages=Help:Maintenance_template_removal"&gt;several thousand views per day&lt;/a&gt;, suggesting that it is filling a significant gap.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Machine-assisted translation of Wikipedia articles&lt;/b&gt;, which has increased with the introduction of the Wikimedia Foundation's Content Translation Tool (covered by the &lt;i&gt;Signpost&lt;/i&gt; in a &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Wikipedia_Signpost/2015-06-24/Op-ed" title="Wikipedia:Wikipedia Signpost/2015-06-24/Op-ed"&gt;June 2015 op-ed&lt;/a&gt;, in &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Wikipedia_Signpost/2016-06-05/News_and_notes" title="Wikipedia:Wikipedia Signpost/2016-06-05/News and notes"&gt;June 2016&lt;/a&gt;, and in &lt;a class="text external" href="https://en.wikipedia.org/w/index.php?title=Special:Search&amp;amp;limit=500&amp;amp;offset=0&amp;amp;profile=default&amp;amp;search=%22content+translation%22+prefix%3AWikipedia%3AWikipedia+Signpost%2F201&amp;amp;searchToken=5yn9eoje6p9s87ndybhp1ci6l"&gt;various other pieces&lt;/a&gt;), has sparked a controversy in recent weeks. See here: &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Administrators%27_noticeboard/CXT" title="Wikipedia:Administrators' noticeboard/CXT"&gt;Wikipedia:Administrators' noticeboard/CXT&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Wikidata RfC on defining data quality underway:&lt;/b&gt; &lt;a class="extiw" href="https://www.wikidata.org/wiki/User:Alessandro_Piscopo"&gt;Alessandro Piscopo&lt;/a&gt;,  a guest of Wikimedia Germany, asserts that: "to achieve high quality,  it is important to define first what data quality is on this knowledge  base." Join the discussion: &lt;a class="extiw"&gt;Wikidata:Requests for comment/Data quality framework for Wikidata&lt;/a&gt;. &lt;a href="https://en.wikipedia.org/wiki/User:Peteforsyth" title="User:Peteforsyth"&gt;P&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="https://en.wikipedia.org/wiki/Wikipedia:Wikipedia_Signpost/2016-08-18/News_and_notes"&gt;Read the original here&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/the-signpost-august-18-2016-pete-forsyth-and-tony-focus-on-india'&gt;https://cis-india.org/a2k/news/the-signpost-august-18-2016-pete-forsyth-and-tony-focus-on-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-08-22T03:15:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/first-round-table-on-innovation-ip-and-competition">
    <title>First Round-table on Innovation, IP and Competition</title>
    <link>https://cis-india.org/a2k/news/first-round-table-on-innovation-ip-and-competition</link>
    <description>
        &lt;b&gt;The First Annual Roundtable on Innovation, Intellectual Property and Competition was organized by the recently established Centre for Innovation, Intellectual Property &amp; Competition (CIIPC) at the National Law University, Delhi. Dr. Arul George Scaria and Prof. Yogesh Pai are the co-directors of this Centre. The event was held on April 1 and 2, 2016 at India Habitat Centre, New Delhi. Nehaa Chaudhari and Anubha Sinha participated in the event.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The round-table offered&amp;nbsp;a unique forum for academia, policy makers, industry stakeholders and academically-minded practitioners on emerging issues at the interface of innovation, intellectual property &amp;amp; competition law and policy. The attempt is to create a balanced and open discussion on some of the intensely debated issues across the world, while taking particular note of recent developments in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The full day round-table on April 2 deliberated on the following sub-themes in four different sessions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Innovation Economics: What can it Teach IP Policy-making in India?&lt;/li&gt;
&lt;li&gt;Assessing the Role of Patents and Competition Policy in Technology Markets: Perspectives from Business and Regulation&lt;/li&gt;
&lt;li&gt;Intellectual Property and Competition Law in India: Issues of Jurisdiction &amp;amp; Role of Courts&lt;/li&gt;
&lt;li&gt;DIPP Discussion Paper on SEPs: FRAND in India from a Comparative Perspective&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;Download the &lt;a href="https://cis-india.org/a2k/blogs/annual-round-table-on-innovation-intellectual-property-and-competition-1" class="internal-link"&gt;Programme Schedule&lt;/a&gt;&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/first-round-table-on-innovation-ip-and-competition'&gt;https://cis-india.org/a2k/news/first-round-table-on-innovation-ip-and-competition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-04-25T07:42:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/first-meeting-on-a-national-policy-for-web-access-for-all">
    <title>First Meeting on a National Policy for Web Accessibility</title>
    <link>https://cis-india.org/accessibility/blog/first-meeting-on-a-national-policy-for-web-access-for-all</link>
    <description>
        &lt;b&gt;The first meeting to discuss having a national policy for web accessibility to ensure universal and inclusive participation was held at the Centre for Internet and Society's office on 7 November 2008. It was aimed at formulating an action plan to work with the government and other private and public bodies to ensure conformity to accessibility standards for web sites.&lt;/b&gt;
        
&lt;p&gt;The first meeting to discuss making compliance with web accessibility standards a part of the national policy agenda was held today (7 November 2008) at the CIS office. Fifteen participants representing organizations from the disability sector, media and law firms came together to discuss the why, what and how of mandatory compliance with web accessibility standards for Indian government web sites.&lt;/p&gt;
&lt;p&gt;The meeting started off with brief introductions of the participants, followed by a presentation by Rahul Gonsalves introducing the concept of and need for web accessibility standards amongst web developers. In his presentation, Rahul gave some examples of the kinds of problems faced by different users of the net and simple solutions to solve these problems. Speaking from the perspective of a web designer, he pointed out that while the total cost of creating an accessible web site is merely about 2-3% more than a normal web site, revamping an existing web site to make it conform to accessibility standards is a more complicated and expensive task. He further clarified that for a website to be accessible, it is not merely enough that it is created in accordance with accessibility standards; all future additions and modifications must be made with accessibility in mind. Hence, persons working on the web site should be initiated into creating accessible web pages.&lt;/p&gt;
&lt;p&gt;The second presentation of the day was by Jayna Kothari of Ashira Law Services. Jayna, a lawyer who is well known for taking up disability related cases in Bangalore, talked about the Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act 1995 (PWD Act) and highlighted provisions of the United Nations Convention on the Rights of Persons with Disabilities which came into force in May 2008. She began by talking about the right to access information being a fundamental right guaranteed by Article 19 of our constitution and gave references to various sections in the PWD Act. The Act calls for the setting up of  Central and State Co-ordination Committees to ensure that action is taken to give effect to the provisions of the PWD Act and that an accessible, barrier free  and inclusive environment is created for persons with disabilities in all spheres such as health, education, employment, transportation, etc. Jayna also highlighted that article 9 of the UNCRPD called for persons with disabilities to have an equal right to access to information and communication. Hence the mandate was not restricted to government web sites only. She opined that we could potentially work with the State and Central Co-ordination Committees to include web accessibility on their agenda of urgent requirements.&lt;/p&gt;
&lt;p&gt;Mr Ganesh of Samarthanam Trust for the Disabled talked about intervention at the level of educational organizations and training institutes. He said that instead of merely discussing strategies which are designed to target the Government and get its attention, we also need to work on building awareness amongst the coming generation of web site developers and appeal to schools, training institutes like the NIIT and other educational organizations and centres of learning to disseminate awareness about accessibility right from the beginning. The approach, in other words, has to be both top-down and bottom-up. Ushajee Peri from the Alternative Law Forum (ALF) talked briefly about the Right to Information Act (2005) and said that since the right to information is a fundamental right, we need to carefully analyse provisions of the Act under which we could push for web accessibility.&lt;/p&gt;
&lt;p&gt;Mr. L. Subramani from the Deccan Herald talked in brief about media strategy and about how publications could help in creating awareness and pressure. Finally, Meenu Bambani from MPhasiS talked about the 11th Five Year Plan and cited various provisions from it which called for specific measures for disabled persons. After an entire chapter devoted to disability, nothing has as yet been achieved in the year since the plan came into force, even though India has ratified the UNCRPD. Meenu called for immediate action to push the Government for implementation of the chapter on disability in the 11th Five Year Plan. As per the plan, each Government department was to allocate 3% of its funds for supporting disabled persons; this has not been done so far. Meenu believes that 3 December, which is usually celebrated as the World Disabilities Day, should this year be spent in introspection on what we have not achieved and on how we can push the state and government authorities to take their international and national commitments with respect to disabled persons seriously.&lt;/p&gt;
&lt;p&gt;There was also a brief discussion on how laws in different countries accommodated web accessibility. For instance in the USA, Section 508 requires web sites of all federal agencies to comply with web accessibility guidelines. In the UK, the Code of Conduct which was brought out by the Disabilities Rights Commission (DRC) under the Disabilities Discrimination Act 2002 (DDA) mandates that persons with disabilities should have the right to access goods, services, facilities and premises on an equal basis as others. Section 2.14 lists the different kinds of services and 2.17 specifically says that a website is a provision of service and hence should be accessible. PAS 78 lays down guidelines for web developers for creating accessible web sites. While some participants expressed curiosity about the actual number of disabled persons using the internet in India, it was generally understood that only by making web sites more accessible could we widen the net of disabled users and enhance universal access and participation.&lt;/p&gt;
&lt;p&gt;Another area for intervention was presented by Sunil Abraham in the form of a discussion on the national policy for Open Standards. Sunil said that CIS had given an addendum to the response to the draft national policy on open standards which specifically dealt with web accessibility for disabled and elderly persons. By ensuring that WCAG compliance is inserted in the presentation layer of the Government Interoperability Framework (GIF), which the Government is shortly expected to release, we could make a definite and substantial intervention.&lt;/p&gt;
&lt;p&gt;The final conclusions of the meeting were that there were different areas and scopes for intervention and they all had to be simultaneously pursued by different groups. Everyone agreed that we should try and work with the National Informatics Centre (NIC) to make all government web sites accessible. Almost all participants felt that while it was not possible to impose web accessibility standards on private entities, we need not restrict ourselves to government web sites in our recommendations and should include at least public listed companies as well. Mr. Subramani felt that working with NASSCOM might be useful for that. Finally it was also decided that an appeal for web accessibility would be put out by CIS at the Walkathon to be organized by Samarthanam on 6 December, since it would be a good platform for spreading awareness and gaining support amongst disabled users, public authorities, organizations and the public at large.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/first-meeting-on-a-national-policy-for-web-access-for-all'&gt;https://cis-india.org/accessibility/blog/first-meeting-on-a-national-policy-for-web-access-for-all&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Meeting</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-08-25T08:38:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/first-asia-pacific-workshop-on-empirical-methods-in-innovation-intellectual-property-and-competition">
    <title>First Asia Pacific Workshop on Empirical Methods in Innovation, Intellectual Property and Competition</title>
    <link>https://cis-india.org/a2k/news/first-asia-pacific-workshop-on-empirical-methods-in-innovation-intellectual-property-and-competition</link>
    <description>
        &lt;b&gt;Rohini Lakshané took part in a workshop organized by Centre for Innovation Intellectual Property &amp; Competition in New Delhi from March 9 to 11, 2017. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The workshop was open for legal academicians (who are working in the areas of intellectual property law and/or competition law) and regulators working with intellectual property law and competition law issues in the Asia-Pacific region. &lt;a class="external-link" href="http://cis-india.org/a2k/files/ciipc-asia-pacific-workshop-on-empirical-methods-in-innovation-ip-and-competition"&gt;Click here&lt;/a&gt; for the Agenda. More details on Spicy IP Blog &lt;a class="external-link" href="https://spicyip.com/wp-content/uploads/2017/01/CIIPC_Call-for-Applications_First-Asia-Pacific-Workshop-on-Empirical-Methods-in-Innovation-IP-and-Competition.pdf"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/first-asia-pacific-workshop-on-empirical-methods-in-innovation-intellectual-property-and-competition'&gt;https://cis-india.org/a2k/news/first-asia-pacific-workshop-on-empirical-methods-in-innovation-intellectual-property-and-competition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-03-14T14:14:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata">
    <title>FinFisher in India and the Myth of Harmless Metadata</title>
    <link>https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals. &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;In light of PRISM, the Central Monitoring System (CMS) and other such surveillance projects in India and around the world, the question of whether the collection of metadata is “harmless” has arisen.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; In order to examine this question, FinFisher&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; — surveillance spyware — has been chosen as a case study to briefly examine to what extent the collection and surveillance of metadata can potentially violate the right to privacy and other human rights. FinFisher has been selected as a case study not only because its servers have been recently found in India&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; but also because its “remote monitoring solutions” appear to be very pervasive even on the mere grounds of metadata.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;FinFisher in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is spyware which has the ability to take control of target computers and capture even encrypted data and communications. The software is designed to evade detection by anti-virus software and has versions which work on mobile phones of all major brands.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In many cases, the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Citizen Lab researchers have found three samples of FinSpy that masquerades as Firefox.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International. FinFisher products are sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A few months ago, it was reported that command and control servers for FinSpy backdoors, part of Gamma International´s FinFisher “remote monitoring solutions”, were found in a total of 25 countries, including India.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The following map, published by the Citizen Lab, shows the 25 countries in which FinFisher servers have been found.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Map.png" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;The above map shows the results of scanning for characteristics of FinFisher command and control servers&lt;/i&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="JUSTIFY"&gt;FinFisher spyware was not found in the countries coloured blue, while the colour green is used for countries not responding. The countries using FinFisher range from shades of orange to shades of red, with the lightest shade of orange ranging to the darkest shade of red on a scale of 1-6,  and with 1 representing the least active servers and 6 representing the most active servers in regards to the use of FinFisher. On a scale of 1-6, India is marked a 3 in terms of actively using FinFisher.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Research published by the Citizen Lab reveals that FinSpy servers were recently found in India, which indicates that Indian law enforcement agencies may have bought this spyware from Gamma  Group and might be using it to target individuals in India.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;According to the Citizen Lab, FinSpy servers in India have been detected through the HostGator operator and the first digits of the IP address are: 119.18.xxx.xxx. Releasing complete IP addresses in the past has not proven useful, as the servers are quickly shut down and relocated, which is why only the first two octets of the IP address are revealed.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Citizen Lab's research reveals that FinFisher “remote monitoring solutions” were found in India, which, according to Gamma Group's brochures, include the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy: &lt;/b&gt;hardware or software which monitors targets that regularly change location, use encrypted and anonymous communications channels and reside in foreign countries. FinSpy can remotely monitor computers and encrypted communications, regardless of where in the world the target is based. FinSpy is capable of bypassing 40 regularly tested antivirus systems, of monitoring the calls, chats, file transfers, videos and contact lists on Skype, of conducting live surveillance through a webcam and microphone, of silently extracting files from a hard disk, and of conducting a live remote forensics on target systems. FinSpy is hidden from the public through anonymous proxies.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy Mobile:&lt;/b&gt; hardware or software which remotely monitors mobile phones. FinSpy Mobile enables the interception of mobile communications in areas without a network, and offers access to encrypted communications, as well as to data stored on the devices that is not transmitted. Some key features of FinSpy Mobile include the recording of common communications like voice calls, SMS/MMS and emails, the live surveillance through silent calls, the download of files, the country tracing of targets and the full recording of all BlackBerry Messenger communications. FinSpy Mobile is hidden from the public through anonymous proxies.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly USB: &lt;/b&gt;hardware which is inserted into a computer and which can automatically install the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the headquarters and its functionality can be concealed by placing regular files like music, video and office documents on the device. As the hardware is a common, non-suspicious USB device, it can also be used to infect a target system even if it is switched off.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly LAN: &lt;/b&gt;software which can deploy a remote monitoring solution on a target system in a local area network (LAN). Some of the major challenges law enforcement faces are mobile targets, as well as targets who do not open any infected files that have been sent via email to their accounts. FinFly LAN is not only able to deploy a remote monitoring solution on a target´s system in local area networks, but it is also able to infect files that are downloaded by the target, by sending fake software updates for popular software or to infect the target by injecting the payload into visited websites. Some key features of the FinFly LAN include: discovering all computer systems connected to LANs, working in both wired and wireless networks, and remotely installing monitoring solutions through websites visited by the target. FinFly LAN has been used in public hotspots, such as coffee shops, and in the hotels of targets.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly Web:&lt;/b&gt; software which can deploy remote monitoring solutions on a target system through websites. FinFly Web is designed to provide remote and covert infection of a target system by using a wide range of web-based attacks. FinFly Web provides a point-and-click interface, enabling the agent to easily create a custom infection code according to selected modules. It provides fully-customizable web modules, it can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly ISP:&lt;/b&gt; hardware or software which deploys a remote monitoring solution on a target system through an ISP network. FinFly ISP can be installed inside the Internet Service Provider Network, it can handle all common protocols and it can select targets based on their IP address or Radius Logon Name. Furthermore, it can hide remote monitoring solutions in downloads by targets, it can inject remote monitoring solutions as software updates and it can remotely install monitoring solutions through websites visited by the target.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Although FinFisher is supposed to be used for “lawful interception”, it has gained notoriety for targeting human rights activists.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; &lt;span&gt;According to &lt;/span&gt;Morgan Marquis-Boire, a security researcher and technical advisor at the Munk School and a security engineer at Google, FinSpy has been used in Ethiopia to target an opposition group called Ginbot.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Researchers have argued that FinFisher has been sold to Bahrain's government to target activists, and such allegations were based on an examination of malicious software which was emailed to Bahraini activists.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Privacy International has argued that FinFisher has been deployed in Turkmenistan, possibly to target activists and political dissidents.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Many questions revolving around the use of FinFisher and its “remote monitoring solutions” remain   vague, as there is currently inadquate proof of whether this spyware is being used to target individuals by law enforcement agencies in the countries where command and control servers have been found, such as India.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; However, FinFisher's brochures which were circulated in the ISS world trade shows and leaked by WikiLeaks do reveal some confirmed facts: Gamma International claims that its FinFisher products are capable of taking control of target computers, of capturing encrypted data  and of evading mainstream anti-virus software.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; Such products are exhibited in the world's largest surveillance trade show and probably sold to law enforcement agencies around the world.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;This alone unveils a concerning fact: spyware which is so sofisticated that it even evades encryption and anti-virus software is currently in the market and law enforcement agencies can potentially use it to target activists and anyone who does not comply with social conventions.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;A few months ago, two Indian women were arrested after having questioned the shutdown of Mumbai for Shiv Sena patriarch Bal Thackeray's funeral.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Thus, it remains unclear what type of behaviour is targeted by law enforcement agencies and whether spyware, such as FinFisher, would be used in India to track individuals without a legally specified purpose.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, India lacks privacy legislation which could safeguard individuals from potential abuse, while sections 66A and 69 of the Information Technology (Amendment) Act, 2008, empower Indian authorities with extensive surveillance capabilites.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;While it remains unclear if Indian law enforcement agencies are using FinFisher spy products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they could potentially have severe consequences on individuals' right to privacy and other human rights.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;The Myth of Harmless Metadata&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;Over the last months, it has been reported that the Central Monitoring System (CMS) is being implemented in India, through which all telecommunications and Internet communications in the country are being centrally intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the omission of privacy legislation and Indian authorities are currently capturing the metadata of communications.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret  National Security Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook, YouTube, PalTalk, AOL and Apple.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that the NSA has collected metadata on a global level.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is “data about data” or “information about information”.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Furthermore, metadata is considered valuable due to its following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource discovery&lt;/li&gt;
&lt;li&gt;Organizing electronic resources&lt;/li&gt;
&lt;li&gt;Interoperability&lt;/li&gt;
&lt;li&gt;Digital Identification&lt;/li&gt;
&lt;li&gt;Archiving and preservation&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Metadata can be used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and reformat information for Web applications. Interoperability is promoted through metadata, as describing a resource with metadata allows it to be understood by both humans and machines, which means that data can automatically be processed more effectively. Digital identification is enabled through metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and preservation of large volumes of digital data.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance projects, such as PRISM and India's CMS, collect large volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; However, the fact that such surveillance projects may not have access to content data might potentially create a false sense of security.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; When Microsoft released its report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the  disclosed data was metadata, while relatively very little content data was allegedly disclosed.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;imilarily, Google's transparency report reveals that the company disclosed large volumes of metadata to law enforcement agencies, while restricting its disclosure of content data.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such reports may potentially provide a sense of security to the public, as they reassure that the content of  personal emails, for example, has not been shared with the government, but merely email addresses – which might be publicly available online anyway. However, is content data actually more “harmful” than metadata? Is metadata “harmless”? How much data does metadata actually reveal?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Guardian recently published an article which includes an example of how individuals can be tracked through their metadata. In particular, the example explains how an individual is tracked – despite using an anonymous email account – by logging in from various hotels' public Wi-Fi and by leaving trails of metadata that include times and locations. This example illustrates how an individual can be tracked through metadata alone, even when anonymous accounts are being used.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wired published an article which states that metadata can potentially be more harmful than content data because “unlike our words, metadata doesn't lie”. In particular, content data shows what an individual says – which may be true or false – whereas metadata includes what an individual does. While the validity of the content within an email may potentially be debateable, it is undeniable that an individual logged into specific websites – if that is what that individuals' IP address shows. Metadata, such as the browsing habits of an individual, may potentially provide a more thorough and accurate profile of an individual than that individuals' email content, which is why metadata can potentially be more harmful than content data.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, voice content is hard to process and written content in an email or chat communication may not always be valid. Metadata, on the other hand, provides concrete patterns of an individuals' behaviour, interests and interactions. For example, metadata can potentially map out an individuals' political affiliation, interests, economic background, institution, location, habits and the people that individual interacts with. Such data can potentially be more valuable than content data, because while the validity of email content is debateable, metadata usually provides undeniable facts. Not only is metadata more accurate than content data, but it is also ideally suited to automated analysis by a computer. As most metadata includes numeric figures, it can easily be analysed by data mining software, whereas content data is more complicated.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, provide solid proof that the collection of metadata can potentially be “harmful”. In particular, FinFly LAN can be deployed in a target system in a local area network (LAN) by infecting files that are downloaded by the target, by sending fake software updates for popular software or by infecting the payload into visited websites. The fact that FinFly LAN can remotely install monitoring solutions through websites visited by the target indicates that metadata alone can be used to acquire other sensitive data.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFly Web can deploy remote monitoring solutions on a target system through websites. Additionally, FinFly Web can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; FinFly ISP can select targets based on their IP address or Radius Logon Name. Furthermore, FinFly ISP can remotely install monitoring solutions through websites visited by the target, as well as inject remote monitoring solutions as software updates.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; In other words, FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, can target individuals, take control of their computers and their data, and capture even encrypted data and communications with the help of metadata alone.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The example of FinFisher products illustrates that metadata can potentially be as “harmful” as content data, if acquired unlawfully and without individual consent.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; Thus, surveillance schemes, such as PRISM and India's CMS, which capture metadata without individuals' consent can potentially pose a major threat to the right to privacy and other human rights.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Privacy can be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; Furthermore, privacy is at the core of human rights because it protects individuals from abuse by those in power.&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; The unlawful collection of metadata exposes individuals to the potential violation of their human rights, as it is not transparent who has access to their data, whether it is being shared with third parties or for how long it is being retained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It is not clear if Indian law enforcement agencies are actually using FinFisher products, but the Citizen Lab did find FinFisher command and control servers in the country which indicates that there is a high probability that such spyware is being used.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This probability is highly concerning not only because the specific spy products have such advanced capabilities that they are even capable of capturing encrypted data, but also because India currently lacks privacy legislation which could safeguard individuals.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Thus, it is recommended that Indian law enforcement agencies are transparent and accountable if they are using spyware which can potentially breach their citizens' human rights and that privacy legislation is enacted into law. Lastly, it is recommended that all surveillance technologies are strictly regulated with regards to the protection of human rights and that Indian authorities adopt the principles on communication surveillance formulated by the Electronic Frontier Foundation and Privacy International.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; The above could provide a decisive first step in ensuring that India is the democracy it claims to be.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Robert Anderson (2013), &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;a class="external-link" href="http://bit.ly/fnkGF3"&gt;http://bit.ly/fnkGF3&lt;/a&gt;&lt;a href="http://www.finfisher.com/FinFisher/en/index.php"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Michael Lewis, &lt;i&gt;“FinFisher Surveillance Spyware Spreads to Smartphones”, &lt;/i&gt;&lt;span&gt;The Star: Business, 30 August 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sF2IQ"&gt;http://bit.ly/14sF2IQ&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Marcel Rosenbach, &lt;i&gt;“Troublesome Trojans: Firm Sought to Install Spyware Via Faked iTunes Updates”, &lt;/i&gt;&lt;span&gt;Der Spiegel, 22 November 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sETVV"&gt;http://bit.ly/14sETVV&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Intercept Review, &lt;i&gt;Mozilla to Gamma: stop disguising your FinSpy as Firefox, &lt;/i&gt;&lt;span&gt;02 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/131aakT"&gt;http://bit.ly/131aakT&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Intercept Review, &lt;i&gt;LI Companies Review (3) – Gamma, &lt;/i&gt;&lt;span&gt;05 April 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/Hof9CL"&gt;http://bit.ly/Hof9CL&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy Mobile: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19pPObx"&gt;http://bit.ly/19pPObx&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly USB: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cJSu4h"&gt;http://bit.ly/1cJSu4h&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Jeremy Kirk, &lt;i&gt;“FinFisher Spyware seen Targeting Victims in Vietnam, Ethiopia”, &lt;/i&gt;&lt;span&gt;Computerworld: IDG News, 14 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J8BwW"&gt;http://bit.ly/14J8BwW&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Reporters without Borders: For Freedom of Information (2012), &lt;i&gt;The Enemies of the Internet: Special Edition: Surveillance, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/10FoTnq"&gt;http://bit.ly/10FoTnq&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Privacy International, &lt;i&gt;FinFisher Report, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/QlxYL0"&gt;http://bit.ly/QlxYL0&lt;/a&gt;&lt;span&gt;&lt;a href="https://www.privacyinternational.org/finfisherreport"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013,&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Adi Robertson, &lt;i&gt;“Paranoia Thrives at the ISS World Cybersurveillance Trade Show”, &lt;/i&gt;&lt;span&gt;The Verge, 28 December 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/tZvFhw"&gt;http://bit.ly/tZvFhw&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. BBC News, &lt;i&gt;“India arrests over Facebook post criticising Mumbai shutdown”, &lt;/i&gt;&lt;span&gt;19 November 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/WoSXkA"&gt;http://bbc.in/WoSXkA&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Indian Ministry of Law, Justice and Company Affairs, &lt;i&gt;The Information Technology (Amendment) Act, 2008, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/19pOO7t"&gt;http://bit.ly/19pOO7t&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Phil Muncaster, &lt;i&gt;“India introduces Central Monitoring System”, &lt;/i&gt;&lt;span&gt;The Register, 08 May 2013,&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt;http://bit.ly/ZOvxpP&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Glenn Greenwald &amp;amp; Ewen MacAskill, &lt;i&gt;“NSA PRISM program taps in to user data of Apple, Google and others”, &lt;/i&gt;&lt;span&gt;The Guardian, 07 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1baaUGj"&gt;http://bit.ly/1baaUGj&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. BBC News, &lt;i&gt;“Google, Facebook and Microsoft seek data request transparency”, &lt;/i&gt;&lt;span&gt;12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/14UZCCm"&gt;http://bbc.in/14UZCCm&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. National Information Standards Organization (2004), &lt;i&gt;Understanding Metadata, &lt;/i&gt;&lt;span&gt;NISO Press, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/LCSbZ"&gt;http://bit.ly/LCSbZ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. The Hindu, &lt;i&gt;“In the dark about 'India's PRISM'”, &lt;/i&gt;&lt;span&gt;16 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bJCXg3"&gt;http://bit.ly/1bJCXg3&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;&lt;/a&gt; ; Glenn Greenwald, &lt;/span&gt;&lt;i&gt;“NSA collecting phone records of millions of Verizon customers daily”, &lt;/i&gt;&lt;span&gt;The Guardian, 06 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/16L89yo"&gt;http://bit.ly/16L89yo&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Microsoft: Corporate Citizenship, &lt;i&gt;2012 Law Enforcement Requests Report,&lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/Xs2y6D"&gt;http://bit.ly/Xs2y6D&lt;/a&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Google, &lt;i&gt;Transparency Report&lt;/i&gt;&lt;span&gt;, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J7hKp"&gt;http://bit.ly/14J7hKp&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Guardian US Interactive Team, &lt;i&gt;A Guardian Guide to your Metadata, &lt;/i&gt;&lt;span&gt;The Guardian, 12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZJLkpy"&gt;http://bit.ly/ZJLkpy&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Matt Blaze, &lt;i&gt;“Phew, NSA is Just Collecting Metadata. (You Should Still Worry)”, &lt;/i&gt;&lt;span&gt;Wired, 19 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bVyTJF"&gt;http://bit.ly/1bVyTJF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files,&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Shalini Singh, &lt;i&gt;“India's surveillance project may be as lethal as PRISM”, &lt;/i&gt;&lt;span&gt;The Hindu, 21 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/15oa05N"&gt;http://bit.ly/15oa05N&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Cyberspace Law and Policy Centre, &lt;i&gt;Privacy, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/14J5u7W"&gt;http://bit.ly/14J5u7W&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.cyberlawcentre.org/genl0231/privacy.htm"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Bruce Schneier, &lt;i&gt;“Privacy and Power”, &lt;/i&gt;&lt;span&gt;Schneier on Security, 11 March 2008, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/i2I6Ez"&gt;http://bit.ly/i2I6Ez&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Elonnai Hickok, &lt;i&gt;“Draft International Principles on Communications Surveillance and Human Rights”, &lt;/i&gt;&lt;span&gt;The Centre for Internet and Society, 16 January 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata'&gt;https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-13T11:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy_uidfinancialinclusion">
    <title>Financial Inclusion and the UID</title>
    <link>https://cis-india.org/internet-governance/privacy_uidfinancialinclusion</link>
    <description>
        &lt;b&gt;Since 2009, when Nandan Nilekani began to envision and implement the Unique Identification Project,
the UID authority has promoted the UID/Aadhaar scheme as a tool of development for India - arguing that an identity will assist in bringing benefits to the poor, promote financial inclusion in India, and allow for economic and social development. In this blog entry I will focus on the challenges and possibilities of the UID number providing the residents of India a viable method of access to financial services across the country.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Why the UID could bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their strategy document “Exclusion to Inclusion with Micro payments” the UIDAI argues that a few&amp;nbsp;of many challenges to successful financial inclusion in India for the poor have been: lack of identity,&amp;nbsp;lack of accessibility of financial outlets, unreliability of infrastructure, high costs of banking, and the&amp;nbsp;common presence of a middle man. For Indian banks the UID sites challenges such as: the high cost of&amp;nbsp;transactions for banks servicing clients in rural areas, lack of infrastructure, costly processes of cash&amp;nbsp;management, and high costs of IT.(UIDAI, 2010)The UID's solution to these obstacles is a system of&amp;nbsp;financial services and micro payments based off of an individuals UID number, in which an individual&amp;nbsp;with a UID number would be able to: open a bank account, make a payment, withdraw money, deposit&amp;nbsp;money, and send remittances. The hope is that this system will allow banks to scale up their branch&amp;nbsp;less banking, and reach out to larger populations. Residents having a bank account linked to their UID&amp;nbsp;number is also key to the UID's larger scheme for subsidy delivery to the poor. Until all consumers who&amp;nbsp;rely on government subsidies have a bank account linked to their UID number, the UID will not be&amp;nbsp;able to implement a system of direct transfer of cash subsidies.(CNBC-TV18, 2011) For example, the&amp;nbsp;UIDAI has started conducting a pilot disbursement of funds under the Mahatma Gandhi National Rural&amp;nbsp;Employment Guarantee Scheme (MNREGS) to Jharkhand through Union Bank, ICICI Bank and Bank&amp;nbsp;of India branches.(IBN-Live, 2011)&lt;/p&gt;
&lt;h3&gt;How the UID will bring financial inclusion&lt;/h3&gt;
&lt;p&gt;In their vision, the UIDAI has designed a system that involves bank branches enrolling individuals,&amp;nbsp;bank branches establishing relationships with BC organizations, the use of Micro ATM's, and the use of&amp;nbsp;the UID numbers for authentication in all financial transactions. In short the system of financial&amp;nbsp;inclusion would work as follows:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 1. Enroll and obtain UID number&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An individual enrolls for a UID number. During enrollment an individual shares his/her KYC&amp;nbsp;information with the UIDAI. The UIDAI verifies the individuals KYC information, along with their&amp;nbsp;other information, and issues the individual a UID number. If an individual already has a bank account&amp;nbsp;at the time of enrollment they have the option to link their UID number to their bank account [1]&lt;/p&gt;
&lt;p&gt;In India every bank must verify and confirm an individuals KYC information. This is to help reduce&amp;nbsp;tax evasion and fraud. In December 2011, India's Ministry of Finance recognized the Aadhaar number&amp;nbsp;has an officially valid identification to satisfy the KYC norms for opening bank accounts. By verifying&amp;nbsp;an individuals KYC information at the enrollment stage the UIDAI is hoping reduce the amount of&amp;nbsp;paperwork and time needed for an individual to open a bank account. In addition to satisfying KYC&amp;nbsp;norms, the Government of India has also recognized the Aadhaar number as an acceptable form of&amp;nbsp;identity for the purpose of obtaining a mobile connection. By having the UID number accepted for&amp;nbsp;establishing both mobile connections and bank accounts, financial inclusion through mobile banking is&amp;nbsp;encouraged as it allows for individuals who previously had no identity, to join the financial system and&amp;nbsp;mobile network – thus allowing bank accounts to be more accessible than before, and aiding banks by&amp;nbsp;simplifying the process of account opening.(Akhand Tiawari, Anurodh Giri, 2011)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Step 2. Open UID Enabled Bank Account&lt;/strong&gt;&lt;br /&gt;Now that the individual has a UID number they can open a bank account by presenting their UID&amp;nbsp;number and thumb print to the bank branch for authentication. Currently the one bank enrolling citizens&amp;nbsp;and issuing UID numbers and UID based ATM cards is the Bank of India.(Aggarwal, 2011) Bank of&amp;nbsp;Maharashtra, State Bank of India and Indian Overseas Bank are currently waiting for approval from the&amp;nbsp;UIDAI.(Chavan, 2011) In this scenario the UID number will be the only form of identification needed&amp;nbsp;to open a bank account.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.Make financial transactions with UID number&lt;/strong&gt;&lt;br /&gt;Once a UID Enabled Bank Account (UEBA) is opened, individuals can begin making financial&amp;nbsp;transactions using their UID number and fingerprint. Individuals can access their UEBA through BC&amp;nbsp;institutions. With a UEBA individuals have the option of using four basic banking services:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Store cash for savings through electronic deposits and withdraw only small amounts of cash&lt;/li&gt;&lt;li&gt;Make payments&lt;/li&gt;&lt;li&gt;Send and receive remittances&lt;/li&gt;&lt;li&gt;Acquire balance and transaction history&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Transactions completed through the UID-enabled bank account work similarly to a prepaid mobile&amp;nbsp;system. BC organizations, or Bank Correspondents, are organizations such as SHGs, kirana stores,&amp;nbsp;dairy agents that larger banks develop a business relationship with. The BC organizations handle all&amp;nbsp;transactions at the local level. Using BC organizations as financial outlets is meant to increase the&amp;nbsp;penetration of financial outlets and make financial services more accessible in rural areas. How the&amp;nbsp;process works is: a BC institution begins by depositing a certain amount of money with a larger&amp;nbsp;banking institution. This ‘ prepaid balance’ paid by the BC institution changes with every transaction&amp;nbsp;the BC institution makes. For example, when an individual makes a deposit it decreases as that money&amp;nbsp;is then transferred into an individuals account, and increases when an individual withdraws money,&amp;nbsp;because of the transaction fee that is charged to the individual. When the individual is making a&amp;nbsp;deposit, he pays physical cash to the BC, who in turn makes an electronic transfer from the BC account&amp;nbsp;to the individual's account. When making a withdrawal, the electronic transfer is made from the&amp;nbsp;individual's account to the BC account, and the BC hands out physical cash to the customer, (UIDAI,&amp;nbsp;2010).&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The micro ATM that is to be used at BC institutions is a hand held device, in this case a mobile phone,&amp;nbsp;attached to a finger print reader. The micro ATM is meant to replace larger ATM’s and reduce the cost&amp;nbsp;that banks incur when establishing full fledged ATM machines. The hand held device will be remotely&amp;nbsp;accessed to the central server of the bank. Currently Italian tech company Telit Communication SpA, is&amp;nbsp;hoping to provide the GSM wireless M2M modules that will allow the wireless device and the wired&amp;nbsp;server to communicate with each other. (Kanth, 2011) The most significant difference between the&amp;nbsp;micro ATM system and the traditional ATM system is that the BC employee executes the transaction.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Though having BC employees carry out financial transactions might eliminate the possibility of a&amp;nbsp;fraudulent ATM being set up, it opens many possibly corrupt doors. How will it be ensured that the&amp;nbsp;transaction is completed without fraud, and how can it be ensured that the Micro-ATM is not&amp;nbsp;fraudulent, or that the BC organization itself is not fraudulent. Though this scenario might sound&amp;nbsp;unlikely, the UID has already experienced difficulties with fake enrollment centers being set up, such as&amp;nbsp;in Pune. (Gadkari, 2011), fake UID papers being issued, as was done in Patna(Tripathi, 2011) and&amp;nbsp;enrollment centers illegally outsourcing work, as the IT company Tera Software was found doing&amp;nbsp;(Prajakta, 2011). If these scenarios have all been tried, it is not unreasonable to see the same being tried&amp;nbsp;with financial institutions.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Challenges to a system of authentication for financial transactions with the biometric based UID number&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Not withstanding the fact that financial inclusion cannot be achieved only through an identity, focusing&amp;nbsp;on the identity component of financial inclusion - in the report Low Cost Secure Transaction Model for&amp;nbsp;Financial Services, published by Nitin Munjal, Ashish Paliwal, and Rajat Moona, from the Indian&amp;nbsp;Institute of Technology, the authors note that present challenges in India to financial inclusion through&amp;nbsp;access to financial institutions include(Munjal, Nitin Paliwal, Ashish Moona, 2011):&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Currently financial transactions require network connectivity to take place. For financial transactions made in rural areas this has lead to both high costs for each transaction and to high fixed IT costs.&lt;/li&gt;&lt;li&gt;Current financial schemes such as mobile banking depend on network connectivity, making the network indispensable, yet 70% of the Indian population is rurally located with limited or no network connectivity.&lt;/li&gt;&lt;li&gt;Current financial service outlets are densely located in urban areas and not rural areas. Rural populations are financially excluded, as in most cases the completion of financial transaction require the presence of financial outlets.&lt;/li&gt;&lt;li&gt;Currently there are no easy safeguards to protect against fake ATMS or fraud, because the current Financial Service Model is based on blind trust of the service outlet – this allows for high rates of fake ATM’s being installed and fraud.&lt;/li&gt;&lt;li&gt;For an individual to access financial services, an identity is required. In most cases the poor lack an identity.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Clearly there are many obstacles that the UID identity card must overcome to successfully authenticate&amp;nbsp;individuals in financial transactions and facilitate financial inclusion. For the system to be successful&amp;nbsp;the UID must at the minimum do the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Accurately generate unique numbers&lt;/li&gt;&lt;li&gt;Capture accurate personal information&lt;/li&gt;&lt;li&gt;Ensure security of the database&lt;/li&gt;&lt;li&gt;Ensure that the technology is secure and accurate&lt;/li&gt;&lt;li&gt;Ensure that only necessary information is collected&lt;/li&gt;&lt;li&gt;Verify BC centers&lt;/li&gt;&lt;li&gt;Provide a secure network that can handle large numbers of transactions&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Possible ways in which the system can go wrong include:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Inaccurate authentication&lt;/li&gt;&lt;li&gt;Delays in authentication&lt;/li&gt;&lt;li&gt;Fraud at the level of the BC institution&lt;/li&gt;&lt;li&gt;Over collection of personal information by banks&lt;/li&gt;&lt;li&gt;Linking of databases by banks, or other agencies&lt;/li&gt;&lt;li&gt;Network failure&lt;/li&gt;&lt;li&gt;Down time of the database&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Though UID enabled bank accounts have yet to be officially established the UID is already&amp;nbsp;experiencing many of the listed difficulties. For instance, in an Indian Express article published on June&amp;nbsp;15th, it was reported that banks are issuing additional UID forms that ask if individuals have credit&amp;nbsp;cards, operate mobile or internet banking accounts, own a two wheeler or four wheeler, or live in a&amp;nbsp;rented or personally owned accommodation. (Indian Express, 2011) Even more alarming is a recent&amp;nbsp;news item from the Deccan Herald, which details the efforts that have been taken by NATGRID to&amp;nbsp;access banking clients personal information, and NATGRID's proposal to tie banking information to a&amp;nbsp;linked database containing information from bank accounts, railways, airlines, stock exchanges,&amp;nbsp;income tax, credit card, immigration records, and telecom service providers. (Arun, 2011)The banks&lt;br /&gt;have refused to give NATGRID access to clients personal information, but the ease at which NATGRID&amp;nbsp;could track and collect information about individuals with the UID is chilling – especially if the UID is&amp;nbsp;linked to almost every bank account in India. Several news reports have also shared experiences of&amp;nbsp;confusion, inconsistent requirements, and unorganized enrollment centers, which place doubt in the&amp;nbsp;accuracy of the information collected and the accuracy of the UID numbers issued.(Tripathi, 2011).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Looking at the technology and operational design of the UEBA system, though the scheme relies on&amp;nbsp;mobile networks, it fails to eliminate the need for connectivity to the central server, because&amp;nbsp;authentication of individuals biometric must be done through comparison of one fingerprint to the&amp;nbsp;central server of all fingerprints. This will not only complicate the effectiveness of delivery of services,&amp;nbsp;as it is possible for connectivity to be limited and slow, but it will also incur large network overhead&amp;nbsp;costs for each transaction that is verified. Furthermore, even though the use of BC institutions as&amp;nbsp;financial service outlets is meant to increases the availability of financial outlets, a dependency is&amp;nbsp;created on BC institutions – as they must be present for any financial transaction to take place.&lt;br /&gt;Additionally, individuals have no way of authenticating and verifying BC institutions. As mentioned&amp;nbsp;earlier this allows for possible scenarios of fraud. Additionally, the UID has not provided any&amp;nbsp;alternative method of identification in the case that the network or technology fails, or if an individuals&amp;nbsp;biometrics are incorrectly rejected.&lt;/p&gt;
&lt;h3&gt;Could the SCOSTA standard be an option?&lt;/h3&gt;
&lt;p&gt;Many developing countries, like Kenya and Brazil, that face similar challenges to financial inclusion&amp;nbsp;have looked towards smart cards as secure methods for authenticating individuals. In 2003 India also&amp;nbsp;implemented a smart card approach to identity management. The SCOSTA standard smart card was&amp;nbsp;introduced with the MNIC national identification scheme. Though the scheme was eventually dropped&amp;nbsp;by the Indian Government, the SCOSTA smart card standard is still a valid option for authentication&amp;nbsp;of individuals in financial transactions. A SCOSTA standard based approach for financial inclusion&amp;nbsp;would include:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Authentication of an individuals key, pass-phrase, and pin. This is known as public keyinfrastructure. This will allow a person to protect their password and easily replace it if stolen.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure would not depend on connectivity to thenetwork. This would allow for financial inclusion of populations not connected to networks and not be fully dependent on working networks.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Authentication through public key infrastructure establishes mutual trust of user and institution. This would lower the presence of fraudulent institutions and corrupt transactions.&lt;/li&gt;&lt;li&gt;&amp;nbsp;Connection to a central server is not required for the authentication of an individual in a financial transaction. This will lower the cost of transactions and lower IT overhead costs (ibid Munjal, Nitin Paliwal, Ashish Moona, 2011)&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Though it is hard to say that a fool proof system of authentication can easily be made, and that system&amp;nbsp;will indeed promote financial inclusion, when comparing the biometric UID number with the SCOSTA&amp;nbsp;standard smart card, there are many benefits to the SCOSTA standard such as ability of individuals to&amp;nbsp;verify banking institutions, no need for connectivity to the central server, and the ability to easily&amp;nbsp;replace lost or stolen pins and passwords. No matter what standard is implemented though, it is&amp;nbsp;important to clearly look at the current implementation, technological, and operational challenges that&amp;nbsp;identification schemes face and the possible ramifications of such challenges before adapting it as a&amp;nbsp;ubiquitous system.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy_uidfinancialinclusion'&gt;https://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-23T10:36:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
