<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1311 to 1325.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/a-suggested-set-of-values-for-the-digital-humanities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/mapping-the-field-of-digital-humanities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/events/digital-humanities-for-indian-higher-education"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/use-of-open-access-journals-for-publishing-findings"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/use-of-open-access-journals-by-indian-researchers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/may-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/cis-tiss-mou"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop">
    <title>My First Wikipedia Training Workshop – Theatre Outreach Unit, University of Hyderabad</title>
    <link>https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop</link>
    <description>
        &lt;b&gt;On March 8, 2013, a day-long Telugu Wikipedia training workshop was organized by the Centre for Internet and Society's Access to Knowledge (CIS-A2K) team at the Golden Threshold, Nampally, Hyderabad in collaboration with Theatre Outreach Unit, University of Hyderabad. This blog post gives a concise account of the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;CIS-A2K&lt;/a&gt;&lt;/b&gt; had planned a day long &lt;a class="external-link" href="http://te.wikipedia.org"&gt;Telugu Wikipedia&lt;/a&gt; training workshop in collaboration with Telugu Wikipedians at the &lt;a class="external-link" href="http://www.efluniversity.ac.in/"&gt;English and Foreign Languages University (EFLU)&lt;/a&gt;, Hyderabad on March 8, 2013. The intention was to target research students at EFLU who are using Telugu material or working on topics related to Telugu and Andhra Pradesh. This event was also to be part of the Wiki Women’s month events across India. However, this event had to be cancelled in the last minute as a Research Student of EFLU committed suicide on the campus and there was major unrest. The faculty from EFLU though had informed of the possible cancellation of the event earlier, had only confirmed it on March 7, 2013. &lt;b&gt;&lt;a class="external-link" href="http://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:%E0%B0%B0%E0%B0%B9%E0%B1%8D%E0%B0%AE%E0%B0%BE%E0%B0%A8%E0%B1%81%E0%B0%A6%E0%B1%8D%E0%B0%A6%E0%B1%80%E0%B0%A8%E0%B1%8D"&gt;Rahmanuddin Shaik&lt;/a&gt;&lt;/b&gt; (Telugu SIG, &lt;a class="external-link" href="http://meta.wikimedia.org/wiki/Wikimedia_India_chapter"&gt;Wikimedia India Chapter&lt;/a&gt;) and &lt;a class="external-link" href="http://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:Rajasekhar1961"&gt;&lt;b&gt;Dr. Rajasekhar&lt;/b&gt; &lt;/a&gt;(Telugu Wikipedia Administrator) had already blocked an entire day for this training workshop. In fact a lot of background work was already done for the EFLU event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When I got the news of cancellation of the workshop, initially I was very dejected at the thought of informing the two active Telugu Wikipedians about it, which I had to do.  As my tickets were anyhow booked to Hyderabad and there was no point cancelling them, as I was already on my way to catch the flight, I decided to go ahead with my journey. I made some couple of quick calls and with some effort managed to organize a Wikipedia Training Workshop in collaboration with the &lt;a class="external-link" href="http://te.wikipedia.org/wiki/%E0%B0%A5%E0%B0%BF%E0%B0%AF%E0%B1%87%E0%B0%9F%E0%B0%B0%E0%B1%8D_%E0%B0%94%E0%B0%9F%E0%B1%8D%E0%B0%B0%E0%B1%80%E0%B0%9A%E0%B1%8D_%E0%B0%AF%E0%B1%82%E0%B0%A8%E0%B0%BF%E0%B0%9F%E0%B1%8D_%28%E0%B0%9F%E0%B0%BF.%E0%B0%93.%E0%B0%AF%E0%B1%81%29"&gt;Theatre Outreach Unit (TOU)&lt;/a&gt;, &lt;a class="external-link" href="http://www.uohyd.ac.in/"&gt;University of Hyderabad (UoH)&lt;/a&gt;. I was anyhow planning on visiting them to explore an institutional collaboration. The Project Director of TOU Dr. Peddi Ramarao, though agreed to spread the word about the workshop, yet was not sure how many would turn up at such a short notice of one night.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/TOUphoto2forCIS.png" title="TOU Training photo 2" height="364" width="486" alt="null" class="image-inline" /&gt;&lt;/th&gt; &lt;th&gt;
&lt;p&gt;Rahmanuddin and Dr. Rajasekhar giving hands-on training to edit Telugu Wikipedia at Golden Threshold, Hyderabad&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;So on March 8, 2013 Rahmanuddin, Dr. Rajasekhar and I landed at the &lt;a class="external-link" href="http://te.wikipedia.org/wiki/%E0%B0%97%E0%B1%8B%E0%B0%B2%E0%B1%8D%E0%B0%A1%E0%B1%86%E0%B0%A8%E0%B1%8D_%E0%B0%A4%E0%B1%8D%E0%B0%B0%E0%B1%86%E0%B0%B7%E0%B1%8B%E0%B0%B2%E0%B1%8D%E0%B0%A1%E0%B1%8D"&gt;Golden Threshold&lt;/a&gt; hoping against hope to see at least 3 or 4 participants. But alas there were only 2 people when we reached the venue by 10 a.m.. By 10.25 a.m. we had 9 participants, which excited us all. The training workshop began with an introduction of all the participants. Following this a presentation was made on the significance of Wikipedia in the digital era and how Indian language-Wikipedias are pivotal in preserving the vernacular language and culture.  This session was interactive with participants asking many questions. Dr. Peddi Ramarao, later, spoke about his experience of using Wikipedia as a reference tool and how he got introduced to contributing Wikipedia. Further, the discussion went on to the poor quality of articles on Telugu Wikipedia and how the participants can take part in improving the existing articles and contribute new articles. Rahmanuddin and Rajasekhar practically demonstrated the process of editing on &lt;a class="external-link" href="http://te.wikipedia.org"&gt;Telugu Wikipedia&lt;/a&gt;. This was followed by a hands-on session where the participants actively participated in creating their Wikipedia User name on Telugu Wikipedia and did editing of few articles. The training programme was to officially end at Lunch time but even post lunch some of the participants were enthusiastic about learning more nuances of contributing on Telugu Wikipedia. The hands-on session thus continued until 4 p.m.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Post the Wikipedia training programme, I have had interactions with the Project Director of TOU to explore possible future collaborations. TOU, UoH agreed to offer space to host all Telugu Wikipedia meet-ups. As the Golden Threshold space was in the central part of the city, having this infrastructure accessible was a major boost for the Telugu Wikipedia community in Hyderabad. Further, in the discussions we have agreed to collaborate with TOU, UoH in hosting the first mega Telugu Wikipedia community event &lt;i&gt;Telugu Wiki Mahotsavam 2013&lt;/i&gt;.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/TOUphoto3forCIS.png" title="TOU Training photo 3" height="261" width="348" alt="null" class="image-inline" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Telugu Wikipedia Orientation in progress&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;b&gt;Outcomes and Impact:&lt;/b&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Out of the 9 new Users, who were trained during this workshop, 5 people have done more than 5 edits.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;One person has become a very active editor on Telugu Wikipedia with more than 1000 edits in 3 months. A detailed account of this event was put up by this user on Telugu Wikipedia here &lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Because of CIS-A2K’s efforts, Telugu Wikipedians in Hyderabad now have a good meeting space.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The availability of this space has also encouraged the Telugu Wikipedians to meet more often than before. Since March 8, 2013 Telugu Wikipedians had a total of 6 meet-ups, and all these were held at Golden Threshold.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Golden Threshold also became a venue for hosting &lt;i&gt;Telugu Wiki Mahotsavam 2013&lt;/i&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This visit to Hyderabad triggered a discussion about organizing &lt;i&gt;Telugu Wiki Mahotsavam&lt;/i&gt;, which was successfully organized in a month’s time.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Looking back, though this event was done as a last minute measure without many expectations, yet it turned out to be a lucky break! Especially, because this was my first ever event as the CIS-A2K Programme Director. It will remain a very memorable one. More so because it was done in collaboration with two of the active Telugu Wikipedians. Even more so because it has created some positive energy for the Telugu Wikipedia community, which has since then become a home turf.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/17WYq7X"&gt;http://bit.ly/17WYq7X&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop'&gt;https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vishnu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Art</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Telugu Wikipedia</dc:subject>
    
    
        <dc:subject>Open Content</dc:subject>
    
    
        <dc:subject>Communities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Meeting</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-08-19T06:51:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us">
    <title>Indian surveillance laws &amp; practices far worse than US</title>
    <link>https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us</link>
    <description>
        &lt;b&gt;Explosive would be just the word to describe the revelations by National Security Agency (NSA) whistleblower Edward Snowden. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash's column was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-06-13/news/39952596_1_nsa-india-us-homeland-security-dialogue-national-security-letters"&gt;published in the Economic Times&lt;/a&gt; on June 13, 2013. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Now, with the American Civil Liberties Union suing the Obama  administration over the NSA surveillance programme, more fireworks could  be in store. Snowden's expose provides proof of what many working in  the field of privacy have long known. The leaks show the NSA (through  the FBI) has got a secret court order requiring telecom provider Verizon  to hand over "metadata", i.e., non-content data like phone numbers and  call durations, relating to millions of US customers (known as dragnet  or mass surveillance); that the NSA has a tool called Prism through  which it queries at least nine American companies (including Google and  Facebook); and that it also has a tool called Boundless Informant (a  screenshot of which revealed that, in February 2013, the NSA collected  12.61 billion pieces of metadata from India).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nothing Quite Private &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The outrage in the US  has to do with the fact that much of the data the NSA has been granted  access to by the court relates to communications between US citizens,  something the NSA is not authorised to gain access to. What should be of  concern to Indians is that the US government refuses to acknowledge  non-Americans as people who also have a fundamental right to privacy, if  not under US law, then at least under international laws like the  Universal Declaration of Human Rights and the ICCPR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;US companies  such as Facebook and Google have had a deleterious effect on privacy.  In 2004, there was a public outcry when Gmail announced it was using an  algorithm to read through your emails to serve you advertisements.  Facebook and Google collect massive amounts of data about you and  websites you visit, and by doing so, they make themselves targets for  governments wishing to snoop on you, legally or not.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Worse, Indian-Style &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, Google and Twitter have at least challenged a few of the  secretive National Security Letters requiring them to hand over data to  the FBI, and have won. Yahoo India has challenged the authority of the  Controller of Certifying Authorities, a technical functionary under the  IT Act, to ask for user data, and the case is still going on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To  the best of my knowledge, no Indian web company has ever challenged the  government in court over a privacy-related matter. Actually, Indian law  is far worse than American law on these matters. In the US, the NSA  needed a court order to get the Verizon data. In India, the licences  under which telecom companies operate require them to provide this. No  need for messy court processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law we currently have â€” sections 69 and 69B of the Information  Technology Act â€” is far worse than the surveillance law the British  imposed on us. Even that lax law has not been followed by our  intelligence agencies.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Keeping it Safe &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recent reports reveal  India's secretive National Technical Research Organisation (NTRO) â€”  created under an executive order and not accountable to Parliament â€”  often goes beyond its mandate and, in 2006-07, tried to crack into  Google and Skype servers, but failed. It succeeded in cracking  Rediffmail and Sify servers, and more recently was accused by the  Department of Electronics and IT in a report on unauthorised access to  government officials' mails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government argues systems like the Telephone Call  Interception System (TCIS), the Central Monitoring System (CMS) and the  National Intelligence Grid (Natgrid) will introduce restrictions on  misuse of surveillance data, it is a flawed claim. Mass surveillance  only increases the size of the haystack, which doesn't help in finding  the needle. Targeted surveillance, when necessary and proportional, is  required. And no such systems should be introduced without public debate  and a legal regime in place for public and parliamentary  accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government should also encourage the usage of  end-to-end encryption, ensuring Indian citizens' data remains safe even  if stored on foreign servers. Merely requiring those servers to be  located in India will not help, since that information is still  accessible to American agencies if it is not encrypted. Also, the  currently lax Indian laws will also apply, degrading users' privacy even  more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indians need to be aware they have virtually no privacy  when communicating online unless they take proactive measures. Free or  open-source software and technologies like Open-PGP can make emails  secure, Off-The-Record can secure instant messages, TextSecure for  SMSes, and Tor can anonymise internet traffic.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt;http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us&lt;/a&gt; &lt;/span&gt; &lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us'&gt;https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T11:09:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance">
    <title>India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis — It is Now Officially Confirmed</title>
    <link>https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance</link>
    <description>
        &lt;b&gt;As of last week, it is officially confirmed that the metadata of everyone´s communications is under the NSA´s microscope. In fact, the leaked data shows that India is one of the countries which is under NSA surveillance the most! &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC. This blog was &lt;a class="external-link" href="http://www.medianama.com/2013/06/223-what-does-nsa-prism-program-mean-to-india-cis-india/"&gt;cross-posted in Medianama&lt;/a&gt; on 24th June 2013. &lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-5905db2c-6115-80fb-3332-1eaa5155c762"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;¨Does the NSA collect any type of data at all on millions or hundreds of millions of  Americans?”, the democratic senator, &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;Ron Wyden, asked James Clapper&lt;/a&gt;&lt;span&gt;, the director of national intelligence a few months ago. “No sir”, replied Clapper.&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;True, the National Security Agency (NSA) does not collect data on millions of Americans. Instead, it collects data on billions of &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Americans, Indians, Egyptians, Iranians, Pakistanis and others&lt;/span&gt;&lt;/a&gt;&lt;span&gt; all around the world.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Leaked NSA surveillance&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Verizon Court Order&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recently, the &lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;Guardian released&lt;/a&gt; a top secret order of the secret Foreign Intelligence Surveillance Court (FISA) requiring Verizon on an “ongoing, daily basis” to hand over information to the NSA on all telephone calls in its systems, both within the US and between the US and other countries. Verizon is one of America's largest telecoms providers and under a top secret court order issued on 25 April 2013, the communications records of millions of US citizens are being collected indiscriminately and in bulk supposedly until 19 July 2013. In other words, data collection has nothing to do with whether an individual has been involved in a criminal or terrorist activity or not. Literally everyone is potentially subject to the same type of surveillance.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://yahoo.usatoday.com/news/washington/2006-05-10-nsa_x.htm"&gt;&lt;span&gt;USA Today reported in 2006&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that the NSA had been secretly collecting the phone call records of millions of Americans from various telecom providers. However, the &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;&lt;span&gt;April 25 top secret order&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is proof that the Obama administration is continuing the data mining programme begun by the Bush administration in the aftermath of the 09/11 terrorist attacks. While content data may not be collected, this dragnet surveillance includes &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt;metadata &lt;/span&gt;&lt;/a&gt;&lt;span&gt;such as the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number and the time and duration of all calls.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Content data may not be collected, but metadata can also be adequate to discover an individual's network of associations and communications patterns. &lt;/span&gt;&lt;a href="https://www.privacyinternational.org/blog/top-secret-nsa-program-spying-on-millions-of-us-citizens"&gt;&lt;span&gt;Privacy and human rights concerns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; rise from the fact that the collection of metadata can result in a highly invasive form of surveillance of citizens´ communications and lives.&lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt; Metadata records can enable the US government to know the identity of every person with whom an individual communicates electronically&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, as well as the time, duration and location of the communication. In other words, metadata is aggregate data and it is enough to spy on citizens and to potentially violate their right to privacy and other human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;PRISM&lt;/span&gt;&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;Recently, a secret NSA surveillance programme, code-named PRISM, was leaked by &lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;The Washington Post&lt;/a&gt;. Apparently, not only is the NSA gaining access to the meta data of all phone calls through the Verizon court order, but it is also tapping directly into the servers of nine leading Internet companies: Microsoft, Skype, Google, Facebook, YouTube, Yahoo, PalTalk, AOL and Apple. However, following these allegations, Google, Microsoft and Facebook recently asked the U.S. government to allow them to &lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;disclose the security requests&lt;/a&gt; they receive for handing over user data. It remains unclear to what extent the U.S. government is tapping into these servers.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Yet it appears that the &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;PRISM online surveillance programme&lt;/span&gt;&lt;/a&gt;&lt;span&gt; enables the NSA to extract personal material, such as audio and video chats, photographs, emails and documents. The &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/prism-gchq-william-hague-statement"&gt;&lt;span&gt;Guardian reported&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that PRISM appears to allow GCHQ, Britain's equivalent of the NSA, to secretly gather intelligence from the same internet companies. Following allegations that GCHQ tried to circumvent UK law by using the PRISM computer network in the US, the British foreign secretary, William Hague, stated that it is “fanciful nonsense” to suggest that GCHQ would work with an agency in another country to circumvent the law. Most notably, William Hague emphasized that reports that GCHQ are gathering intelligence from photos and online sites should not concern people who have nothing to hide! However, this implies that everyone is guilty until proven innocent...when actually, democracy mandates the opposite.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;James R. Clapper, the US Director of National Intelligence, &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;stated&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;“&lt;/span&gt;&lt;span&gt;Information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats. The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;So essentially, Clapper stated that in the name of US national security, the personal data of billions of citizens around the world is being collected. By having access to data stored in the servers of some of the biggest Internet companies in the world, the NSA ultimately has access to the private data of almost all the Internet users in the world. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;And once the NSA has access to tons of data through the Verizon court order and the PRISM surveillance programme, how does it create patterns of intelligence and generally mine huge volumes of data? &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The Guardian released top secret documents about the NSA data mining tool, called &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt;; this tool is used to detail and map by country the volumes of information collected from telephone and computer networks. The focus of the Boundless Informant is to count and categorise the records of communication, known as metadata, and to record and analyse where its intelligence comes from. One of the leaked documents states that the tool is designed to give NSA officials answers to questions like: “What type of coverage do we have on country X”. According to the Boundless Informant documents, the NSA has been collecting 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. During the same month, 97 billion pieces of intelligence from computer networks were collected worldwide. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The following &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;“global heat map”&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reveals how much data is being collected by the NSA from around the world:&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/BoundlessInformantmap.jpg" alt="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" class="image-inline" title="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;The colour scheme of the above map ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). India is notably orange and is thus subject to some of the highest levels of surveillance by the NSA in the world.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;During a mere 30-day period, the largest amount of intelligence was gathered from Iran with more than 14 billion reports, while Pakistan, Jordan and Egypt were next in line in terms of intelligence gathering. Unfortunately, India ranks 5th worldwide in terms of intelligence gathering by the NSA. According to the map above, 6.3 billion pieces of intelligence were collected from India by the NSA from February to March 2013. In other words, India is currently one of the top countries worldwide which is under the US microscope, with &lt;/span&gt;&lt;a href="http://epaper.timesofindia.com/Default/Scripting/ArticleWin.asp?From=Archive&amp;amp;Source=Page&amp;amp;Skin=ETNEW&amp;amp;BaseHref=ETBG/2013/06/12&amp;amp;PageLabel=20&amp;amp;ForceGif=true&amp;amp;EntityId=Ar02002&amp;amp;ViewMode=HTML"&gt;&lt;span&gt;15% of all information&lt;/span&gt;&lt;/a&gt;&lt;span&gt; being tapped by the NSA coming from India during February-March 2013. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance"&gt;&lt;span&gt;Edward Snowden&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is the 29-year-old man behind the NSA leaks...who is responsible for one of the most important leaks in US (and one may argue, global) history.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="350" width="425"&gt;
&lt;param name="src" value="http://www.youtube.com/v/5yB3n9fu-rM"&gt;&lt;embed height="350" width="425" src="http://www.youtube.com/v/5yB3n9fu-rM" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;So what does this all mean for India?&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In his &lt;/span&gt;&lt;a href="http://www.youtube.com/watch?v=Wl5OQz0Ko8c"&gt;&lt;span&gt;keynote speech at the 29th Chaos Communications Congress&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Jacob Appelbaum stated that surveillance should be an issue which concerns “everyone´s department”, especially in light of the NSA spying on citizens all over the world. True, the U.S. appears to have &lt;/span&gt;&lt;a href="http://space.jpl.nasa.gov/msl/Programs/corona.html"&gt;&lt;span&gt;a history in spying on civilians&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and the Corona, Argon, and Lanyard satellites used by the U.S. for photographic surveillance from the late 1950s is proof of that. But how does all this affect India?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;By &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=1&amp;amp;"&gt;&lt;span&gt;tapping into the servers of some of the biggest Internet companies in the world,&lt;/span&gt;&lt;/a&gt;&lt;span&gt; such as Google, Facebook and Microsoft, the NSA does not only gain access to the data of American users, but also to that of Indian users. In fact, the “global heat map” of the controversial &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt; data mining tool clearly shows that India ranked 5th worldwide in terms of intelligence gathering, which means that not only is the NSA spying on Indians, but that it is also spying on India more than most countries in the world. Why is that a problem?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;India has no privacy law. India lacks privacy legislation which could safeguard citizens from potential abuse by different types of surveillance. But the worst part is that, even if India did have privacy laws, that would still not prevent the NSA from tapping into Indians´ data through the servers of Internet companies, such as Google. Moreover, the fact that India lacks a Privacy Commissioner means that the country lacks an expert authority who could address data breaches. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Recent reports that the NSA is tapping into these servers ultimately means that the U.S. government has access to the data of Indian internet users. However, it remains unclear how the U.S. government is handling Indian data, which other third parties may have access to it, how long it is being retained for, whether it is being shared with other third parties or to what extent U.S. intelligence agencies can predict the behaviour of Indian internet users through pattern matching and data mining. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Many questions remain vague, but one thing is clear: through the NSA´s total surveillance programme, the U.S. government can potentially control the data of billions of internet users around the world, and with this control arises the possibility of oppression. It´s not just about the U.S. government having access to Indians´ data, because access can lead to control and according to security expert, &lt;/span&gt;&lt;a href="http://www.wired.com/politics/security/commentary/securitymatters/2008/05/securitymatters_0515"&gt;&lt;span&gt;Bruce Schneier&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;span&gt; “Our data reflects our lives...and those who control our data, control our lives”. &lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How are Indians supposed to control their data, and thus their lives, when it is being stored in foreign servers and the U.S. has the “right” to tap into that data? The NSA leaks mark a significant point in our history, not only because they are resulting in &lt;/span&gt;&lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;&lt;span&gt;corporations seeking data request transparency&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, but also because they are unveiling a major global issue: surveillance is a fact and can no longer can be denied. The massive, indiscriminate collection of Indians´ data, without their prior knowledge or consent, and without the provision of guarantees in regards to how such data is being handled, poses major threats to their right to privacy and other human rights. The potential for abuse is real, especially since &lt;/span&gt;&lt;a href="http://www.statsoft.com/textbook/data-mining-techniques/"&gt;&lt;span&gt;the larger the database, the larger the probability for error&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Mining more data does not necessarily increase security; on the contrary, it increases the potential for abuse, especially since &lt;/span&gt;&lt;a href="http://dspace.flinders.edu.au/xmlui/bitstream/handle/2328/26269/wahlstrom%20on%20the%20impact.pdf;jsessionid=D948EDED21805D871C18E6E4B07DAE14?sequence=1"&gt;&lt;span&gt;technology is not infallible &lt;/span&gt;&lt;/a&gt;&lt;span&gt;and data trails are not always accurate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What does this mean? Well, probably the best case scenario is that an individual is targeted. The worst case scenario is that an individual is imprisoned (or maybe even &lt;/span&gt;&lt;a href="http://www.time.com/time/world/article/0,8599,2097899,00.html"&gt;&lt;span&gt;murdered - remember the drones&lt;/span&gt;&lt;/a&gt;&lt;span&gt;?) because his or her data “says” that he or she is guilty. Is that the type of world we want to live in?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;What can we do now?&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Let´s start from the basics. India needs privacy legislation. India needs privacy legislation now. India needs privacy legislation now, more than ever.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Privacy legislation would regulate the collection, access to, sharing of, retention and disclosure of all personal data within India. Such legislation could also regulate surveillance and the interception of communications, in compliance with the right to privacy and other human rights. A Privacy Commissioner would also be established through privacy legislation, and this expert authority would be responsible for overseeing the enforcement of the Privacy Act and addressing data breaches. But clearly, privacy legislation is not enough. The various privacy laws of European countries have not prevented the NSA from tapping into the servers of some of the biggest Internet companies in the world and from gaining access to the data of millions of citizens around the world. Yet, privacy legislation in India should be a basic prerequisite to ensure that data is not breached within India and by those who may potentially gain access to Indian national databases.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;As a next- but immediate- step, the Indian government should demand answers from the NSA to the following questions:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What type of data is collected from India and which parties have access to it?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How long is such data retained for? Can the retention period be renewed and if so, for how long?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Is data collected on Indian internet users shared with third parties? If so, which third parties can gain access to this data and under what conditions? Is a judicial warrant required?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In addition to the above questions, the Indian government should also request all other information relating to Indians´ data collected through the PRISM programme, as well as proceed with a dialogue on the matter. Governments are obliged to protect their citizens from the abuse of their human rights, especially in cases when such abuse may occur from foreign agencies. Thus, the Indian government should ensure that the future secret collection of Indians´ data is prevented and that Internet companies are transparent and accountable in regards to who has access to their servers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;On an individual level, Indians can protect their data by using encryption, such as &lt;/span&gt;&lt;a href="http://www.gnupg.org/"&gt;&lt;span&gt;GPG encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for their emails and &lt;/span&gt;&lt;a href="https://www.encrypteverything.ca/index.php/Setting_up_OTR_and_Pidgin"&gt;&lt;span&gt;OTR encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for instant messaging. &lt;/span&gt;&lt;a href="https://www.torproject.org/"&gt;&lt;span&gt;Tor&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is free software and an open network which enables online anonymity by bouncing communications around a distributed network of relays run by volunteers all around the world. Tor is originally short for “The Onion Router” and “onion routing” refers to the layers of encryption used. In particular, data is encrypted and re-encrypted multiple times and is sent to randomly selected Tor relays. Each relay decrypts a “layer” of encryption to reveal it only to the next relay in the circuit and the final relay decrypts the last “layer” of encryption. Essentially, Tor reduces the possibility of original data being understood in transit and conceals the routing of it.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;To avoid surveillance, the use of &lt;/span&gt;&lt;a href="https://www.eff.org/https-everywhere"&gt;&lt;span&gt;HTTPS-Everywhere&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the &lt;/span&gt;&lt;a href="https://www.torproject.org/download/download-easy.html"&gt;&lt;span&gt;Tor Browser&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is recommended, as well as the use of combinations of additional software, such as &lt;/span&gt;&lt;a href="https://addons.mozilla.org/en-us/thunderbird/addon/torbirdy/"&gt;&lt;span&gt;TorBirdy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.enigmail.net/home/index.php"&gt;&lt;span&gt;Enigmail&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, OTR and &lt;/span&gt;&lt;a href="https://joindiaspora.com/"&gt;&lt;span&gt;Diaspora&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;a href="https://blog.torproject.org/blog/prism-vs-tor"&gt;&lt;span&gt;Tor hidden services are communication endpoints &lt;/span&gt;&lt;/a&gt;&lt;span&gt;that are resistant to both metadata analysis and surveillance, which is why they are highly recommended in light of the NSA´s surveillance. An XMPP client that ships with an XMPP server and a Tor hidden service is a good example of how to avoid surveillance.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Protecting our data is more important now than ever. Why? Because global, indiscriminate, mass data collection is no longer a hypothesis: it´s a fact. And why is it vital to protect our data? Because if we don´t, we are ultimately sleepwalking into our control and oppression where basic human rights, such as freedom, would be a myth of the past.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; formulated by the Electronic Frontier Foundation and Privacy International on communication surveillance should be taken into consideration by governments and law enforcement agencies around the world. In short, these &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Limitations to the right to privacy must be prescribed by law&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legitimate purpose&lt;/b&gt;: Access to communications or communications metadata should be restricted to authorised public authorities for investigative purposes and in pursuit of a legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Access to communications or communications metadata by authorised public authorities should be restricted to strictly and demonstrably necessary cases&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should be restricted from adopting or implementing measures that allow access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Competent authority&lt;/b&gt;: Authorities must be competent when making determinations relating to communications or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments must respect and guarantee an individual's human rights, that may interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: Service providers are responsible for the secure transmission and retention of communications data or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: Mutual legal assistance processes between countries and how they are used should be clearly documented and open to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should ensure that authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Applying these above principles is a prerequisite, but may not be enough. Now is the time to resist unlawful and non-transparent surveillance. Now is the time for &lt;/span&gt;&lt;span&gt;everyone &lt;/span&gt;&lt;span&gt;to fight for their right to be free.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Is a world without freedom worth living in?&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance'&gt;https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-06T10:20:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/a-suggested-set-of-values-for-the-digital-humanities">
    <title>A suggested set of values for the digital humanities</title>
    <link>https://cis-india.org/raw/a-suggested-set-of-values-for-the-digital-humanities</link>
    <description>
        &lt;b&gt;In a prior blog entry the CIS has started mapping out the field of digital humanities. Subsequent to these first thoughts follows a review in several parts of an alternative publishing project edited by Matthew K. Gold of New Yorks Technology College. It is presented online as a hybrid print/digital publication stream, enabling viewers and readers to comment and highlight sections as they please. In the introductory passage, Matthew Gold addresses questions burning at the back of the research communities mind: Does digital humanities even need theory? Does it have politics?Is it more accessible than other scholarly fields? Does new media usage trivialize the professionalism of DH research?&lt;/b&gt;
        
&lt;p&gt;In
an attempt to answer these questions, which have mostly been
discussed on microblogging platforms, making them nearly impossible
to follow up on (Spiro: 2012), Lisa Spiro has drafted a first set of
values, which could be of use for further discussion. She clearly
states that her proposition is supposed to be exactly that, a work in
progress, open to changes. At the same time it marks a necessary
starting
point for organizing arguments and conversations happening around the
 digital. Spiro
suggests a values statement, which is broader than an ethical
guideline, so that institutions and researching people can set their
own emphasis according to what is important to them. With this, Spiro
articulates what for her, and many others in the field, presents
itself as one of the important set of values when working with
digital humanities: openness, transparency and collaboration, putting
aside classical values of academia, like professionalism and
scholarly authority through specialization. These traditional values
clash with the collaborative crowdsourced approach of the digital
humanities field. With Tom Scheinfeldt, Spiro argues, the digital
humanities community operates much like a “social network,”
nimble and connected: “Digital humanities takes more than tools
from the Internet.&amp;nbsp;It works like the Internet.&amp;nbsp;It
takes its values from the Internet” (Scheinfeldt 2010). So while in
many ways the internet and its hyperlinked, visual approach justify
the way digital humanities work, there is little or no way of
assuring the professionalism of digital humanities research. Spiro
notes the difficulties that might arise in dropping those classical
values of academia, as a lot of academic institutions object to the
motives of open publishing and also find it difficult to assign
credit to individuals when projects are collaborative. In this sense,
the field of digital humanities is influencing the very way in which
academia works, wiling it, to rearrange itself.&lt;/p&gt;
&lt;p&gt;Just
like the &lt;a href="https://cis-india.org/raw/digital-humanities/mapping-the-field-of-digital-humanities" class="internal-link" title="Mapping the field of digital humanities"&gt;field itself is a hybrid&lt;/a&gt;, its value statement should
consider the values of the disciplines it has evolved from. Spiro's
value statement suggests a convergence of values including those of
humanities, libraries, museums and cultural heritage organizations,
as well as networked culture. At the core, all of these fields aspire
to spread advanced knowledge, foster innovation and serve the public.
Digital humanities therefore should have a claim to those values,
while at the same time rejecting essentialism, as “values
reveal the ideologies and interests of those who hold them” (Spiro:
2012). Spiro suggests openness, collaboration, diversity and
experimentation as the core values, when working in the digital
humanities. Openness and collaboration go hand in hand, just as
digital humanities go hand in hand with internet methodology.
Experimentation makes space for open methodology and leaves room for
trial and error. Combined with openness and collaboration, this
creates valuable learning opportunities for the whole field of
digital humanities. By holding on to a value of diversity, Spiro
means to make a note of the fact that, contrary to popular belief,
equality has &lt;em&gt;not
&lt;/em&gt;yet
been achieved in many social fields and one should remember that
although ones own reality might seem to include everyone equally,
others might have different stories to tell.&lt;/p&gt;
&lt;p&gt;
Remembering
that no position has a claim to be objective, digital humanities can
certainly go forth to become a inclusive way of spreading knowledge
to those, who have up until now been kept from it by diverse
gatekeepers. At the same time, “situated knowledge”, as Donna
Haraway called the concept of remembering your own ideologies and
speaking position (Haraway: 1988),  a dialog can take place more
easily, without having to claim ones own experiences to be able to
speak for all.&lt;/p&gt;
&lt;p&gt;
Still,
one should not assume that the field of digital humanities is a
candy-coloured wonderland of anything goes. These values all are
criticized in some field or other, which reminds us that the digital
humanities have far to go. Creating knowledge in open space does not
mean that it is equally accessible to all. So basic community and
access work must go hand in hand with steady open source research
collaborations.&lt;/p&gt;
&lt;p&gt;
In
summary, Spiro's opening commentary on values in digital humanities
will and has surely already been helpful as a reminder, and maybe
this is as defined as one should get when it comes to a set of values
that is supposed to be applicable to such a large and diverse field.
However, all work in digital humanities often faces the problem of
justifying their work, once professionalism and expertise is no
longer regarded as a proof of worth. So, getting back to the
questions at the beginning of this article, yes, digital humanities
has politics, just as every research has politics. And it is one of
its values and challenges, to make these transparent without failing
to prove a point and add to the creation of knowledge, online and
off.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;continue reading on the topic: &lt;a href="https://cis-india.org/raw/digital-humanities/archive-practice-and-digital-humanities" class="internal-link" title="Archive Practice and Digital Humanities"&gt;archivial practice in digital humanities&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Literature:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gold
2012 &lt;/strong&gt;Mathew
K. Gold “The Digital Humanities Moment” &lt;em&gt;Debates
in the Digital Humanities. &lt;/em&gt;Open
Access Edition. Accessed 13 June 2013.
&lt;u&gt;&lt;a href="http://dhdebates.gc.cuny.edu/debates"&gt;http://dhdebates.gc.cuny.edu/debates&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Haraway
1988:&lt;/strong&gt;
Donna Haraway “Situated Knowledges: The Science Question in
Feminism and the Privilege of&lt;/p&gt;
&lt;p&gt;Partial
Perspective.” &lt;em&gt;Feminist&lt;/em&gt;
&lt;em&gt;Studies&lt;/em&gt;,
Vol. 14, No. 3. (Autumn, 1988), pp. 575-599- Accessed 13 June 2013
&lt;u&gt;&lt;a href="http://www.staff.amu.edu.pl/~ewa/Haraway,%20Situated%20Knowledges.pdf"&gt;http://www.staff.amu.edu.pl/~ewa/Haraway,%20Situated%20Knowledges.pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Scheinfeldt
2010: &lt;/strong&gt;Tom
Scheinfeldt “Stuff Digital Humanists Like”. Accessed 13 June
2013.
&lt;u&gt;&lt;a href="http://www.foundhistory.org/2010/12/02/stuff-digital-humanists-like/"&gt;http://www.foundhistory.org/2010/12/02/stuff-digital-humanists-like/&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Spiro
2012: &lt;/strong&gt;Lisa
Spiro “&lt;em&gt;This
Is Why We Fight:&lt;/em&gt;
Defining the Values of the Digital Humanities” &lt;em&gt;Debates
in the Digital Humanities. &lt;/em&gt;Open
Access Edition. Accessed 13 June 2013.
&lt;u&gt;&lt;a href="http://dhdebates.gc.cuny.edu/debates/text/13"&gt;http://dhdebates.gc.cuny.edu/debates/text/13&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/a-suggested-set-of-values-for-the-digital-humanities'&gt;https://cis-india.org/raw/a-suggested-set-of-values-for-the-digital-humanities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sara</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-03T09:41:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/mapping-the-field-of-digital-humanities">
    <title>Mapping the field of digital humanities</title>
    <link>https://cis-india.org/raw/digital-humanities/mapping-the-field-of-digital-humanities</link>
    <description>
        &lt;b&gt;This blog is the first in a series of blog entries evolving around digital humanities. As the research proceeds, arising questions will be addressed and attempted to map out, so that we are left with an annotated bibliography of the field which will help create parameters on how to approach research in that sector. In this first episode of the blog series, the introductory volume simply called Digital_Humanities (Anne Burdick, Johanna Drucker, Peter Lunenfeld, Todd Presner, Jeffrey Schnapp) will be combined with Patrik Svensson's Landscape of Digital Humanities, so as to assert what it is, we're dealing with, when talking about digital humanities.&lt;/b&gt;
        
&lt;p&gt;Entering
into the field of digital humanities, it quickly becomes clear that
pinpointing an exact definition will be a difficult thing to do.
Evolving from the traditional field of humanities, it still does not
seem to be compliant to the same standards or discuss the same
issues. The attempt to map out the field, hence, is just a collection
of definitions which have no pretence of being overarching but do
include some of the more cited authors, who have attempted to define
the terms of research that digital humanities are based upon.&lt;/p&gt;
&lt;p&gt;The
recently published volume &lt;em&gt;Digital_Humanities&lt;/em&gt;
(Burdick et. al.: 2012), which is available freely online in an
open-access edition&lt;sup&gt;&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;/sup&gt;,
provides a very well structured overview of the shift from humanities
to digital humanities. The book states that, contrary to popular
belief, humanities is not so much a field in crisis, but rather a
field which is evolving to become more inclusive and thus relevant to
everyday life. Within humanities research there has been a
&lt;em&gt;“fundamental
shift in the perception of the core creative activities of being
human, in which the values and knowledge of the humanities are seen
as crucial for shaping every domain of culture and society” 
&lt;/em&gt;(Burdick
et. Al: 2012) The
book argues that with the digitalization of human life, the
humanities have taken a turn away from mere text-based information
and included media which allow for more collaborative and generative
work in which the visual is fundamental.&lt;/p&gt;
&lt;p&gt;While
this book has interesting case studies and addresses questions of
authorship, collaboration and alternative publishing, it serves well
as an introduction into the field, but does not give a satisfactory
overview of authors working on these topics.&lt;/p&gt;
&lt;p&gt;So
possibly more worthwhile from a theoretical perspective as opposed to
the practical approach Burdick et. al. take, is Patrik Svenssons
essay on &lt;em&gt;The
Landscape of Digital Humanities.&lt;/em&gt;
This essay was published in 2010, prior to the &lt;em&gt;Digital_Humanities
&lt;/em&gt;volume,
which might explain Svenssons need to elaborate on the new ways in
which digital humanities are perceived. Svensson argues that digital
humanities are a field in a loose sense, and inclusive in a sense
that the field covers different  activities in the intersection
between humanities and digital technologies.&lt;/p&gt;
&lt;p&gt;In
an attempt to map out the sectors of the field, Svensson mentions
Tara McPherson's (2009) differentiation between computing humanities
(which mainly use digital tools, infrastructure and archives),
blogging humanities (focussing on networked media and peer-to-peer
reviews and learning) and multimodal humanities (which use scholarly
tools, databases and networked writing all combined in visual and
aural media). Davidson (2008) offers another aspect of
differentiation, distinguishing between humanities 1.0 and 2.0 in
accordance to the development of the internet itself as the central
medium of digitalization. &lt;em&gt;“&lt;/em&gt;&lt;em&gt;Humanities
2.0 is distinguished from monumental, first-generation, data-based
projects not just by its interactivity but also by openness about
participation grounded in a different set of theoretical premises,
which decenter knowledge and authority"&lt;/em&gt;
&amp;nbsp;(Davidson 2008,&amp;nbsp;711–12).
What can be derived from both of these approaches is a shift towards
interactivity, non-arboric knowledge growth and multimedial
presentation.&lt;/p&gt;
&lt;p&gt;This
very vague categorization provides the problem of different research
projects or institutions dealing with different aspects of digital
humanities might have to compete for funds, as they are perceived to
cover one field while actually working on very diverse topics.
Svensson
(2009a) argues that humanities computing provides the core, while
digital humanities includes the various disciplines. This binary
shows up the problems of telling the history of humanities computing
as digital humanities. So the connection between the disciplines and
the core is somewhat difficult because of the epistemic investment
humanities computing has in technology as a tool and method, which
defines it as a field. Digital humanities are not always
institutionalized, and institutionalized fields like games studies
etc. do not necessarily see themselves as part of digital humanities.
This results from traditional ways of seeing academics, which has
difficulties grasping the emergence of alternative ways of the
digital. Digital humanities however, become a place for change and
action, as Svensson argues with Davidson (2009). So digital
humanities can be seen as 1. a developing field which lets humanities
embrace the digital and create new tools to analyze it in an emergent
nature or 2. a set of tools which implement technologies to make new
knowledge from cultural inheritance (which is far more static, also
according to Svensson).&lt;/p&gt;
&lt;p&gt;However,
research areas such as cyberculture studies and critical digital
studies (digital culture and the cultural construction of information
technology as  a study object) are excluded from digital humanities
studies, which often centralize around libraries, as they evolve
around alternative ways of teaching and spreading knowledge.&lt;/p&gt;
&lt;p&gt;
Digital
humanities according to Svensson has five fruitful parameters of
engagement, which can be analyzed: information technology as a tool,
as a study object, as an expressive medium, as an experimental
laboratory and an activist venue. So there are general ways of
categorizing the field, although, as this article suggests, it could
be difficult to include all research aspects by mapping the field too
closely.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;continue reading on the topic: &lt;a href="https://cis-india.org/raw/a-suggested-set-of-values-for-the-digital-humanities" class="internal-link" title="A suggested set of values for the digital humanities"&gt;values in digital humanities&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Literature:&lt;/p&gt;
&lt;p&gt;&lt;a name="davidson2008"&gt;&lt;/a&gt;
&lt;strong&gt;Burdick
et. Al 2012 &lt;/strong&gt;Anne
Burdick, Johanna Drucker, Peter Lunenfeld, Todd Presner, Jeffrey
Schnapp “Digital_Humanities”. MIT Press 2010. accessed 1 June
2013.
&lt;u&gt;&lt;a href="http://mitpress.mit.edu/sites/default/files/titles/content/9780262018470_Open_Access_Edition.pdf"&gt;http://mitpress.mit.edu/sites/default/files/titles/content/9780262018470_Open_Access_Edition.pdf&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Davidson
2008&lt;/strong&gt;&amp;nbsp;Davidson,
Cathy N. "Humanities 2.0: Promise, Perils,
Predictions".&amp;nbsp;&lt;cite&gt;&lt;em&gt;Publications
of the Modern Language Association of America (PMLA)&lt;/em&gt;&lt;/cite&gt;&amp;nbsp;123:3
(2008), 707-717.&lt;/p&gt;
&lt;p&gt;&lt;a name="davidson2009"&gt;&lt;/a&gt;
&lt;strong&gt;Davidson
2009&lt;/strong&gt;&amp;nbsp;Davidson,
Cathy N. "Innovation AND Tradition". HASTAC Discussion
Forum on the Future of the Digital Humanities, 03 February 2009.
Accessed 1 June
2013.&amp;nbsp;&lt;u&gt;&lt;a href="http://www.hastac.org/forums/hastac-scholars-discussions/future-digital-humanities"&gt;http://www.hastac.org/forums/hastac-scholars-discussions/future-digital-humanities&lt;/a&gt;&lt;/u&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="mcpherson2008"&gt;&lt;/a&gt;
&lt;strong&gt;McPherson
2008&lt;/strong&gt;&amp;nbsp;McPherson,
Tara. "Dynamic Vernaculars: Emerent Digital Forms in
Contemporary Scholarship". Lecture presented to HUMLab Seminar,
Umeå University, 4 March
2008.&amp;nbsp;&lt;u&gt;&lt;a href="http://stream.humlab.umu.se/index.php?streamName=dynamicVernaculars"&gt;http://stream.humlab.umu.se/index.php?streamName=dynamicVernaculars&lt;/a&gt;&lt;/u&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="svensson2009a"&gt;&lt;/a&gt;
&lt;strong&gt;Svensson
2009&lt;/strong&gt;&amp;nbsp;Svensson,
Patrik. "Humanities computing as digital humanities".&amp;nbsp;&lt;cite&gt;&lt;em&gt;Digital
Humanities Quarterly&lt;/em&gt;&lt;/cite&gt;,
3:3 (2009).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Svensson
2010 &lt;/strong&gt;Svensson,
Patrik. “The Landscape of Digital Humanities”. &lt;cite&gt;&lt;em&gt;Digital
Humanities Quarterly&lt;/em&gt;&lt;/cite&gt;,4:1
&lt;u&gt;&lt;a href="http://digitalhumanities.org/dhq/vol/4/1/000080/000080.html"&gt;http://digitalhumanities.org/dhq/vol/4/1/000080/000080.html&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div id="sdfootnote1"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc"&gt;1&lt;/a&gt;http://mitpress.mit.edu/sites/default/files/titles/content/9780262018470_Open_Access_Edition.pdf&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/mapping-the-field-of-digital-humanities'&gt;https://cis-india.org/raw/digital-humanities/mapping-the-field-of-digital-humanities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sara</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-03T09:40:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access">
    <title>Facebook, Google deny spying access</title>
    <link>https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access</link>
    <description>
        &lt;b&gt;The CEOs of Facebook and Google on Saturday categorically denied that the US National Security Agency had "direct access" to their company servers for snooping on Gmail and Facebook users. But both acknowledged that the companies complied with the 'lawful' requests made by the US government and shared user data with sleuths.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Javed Anwer was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-09/internet/39849496_1_facebook-ceo-mark-zuckerberg-user-data-ceo-larry-page"&gt;published in the Times of India&lt;/a&gt; on June 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a post titled "What the ...?" Google's official blog, CEO &lt;a href="http://timesofindia.indiatimes.com/topic/Larry-Page"&gt;Larry Page&lt;/a&gt; wrote, "We have not joined any program that would give the US  governmentâ€”or any other governmentâ€”direct access to our servers. We  had not heard of a program called PRISM until yesterday."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few hours later, Facebook CEO &lt;a href="http://timesofindia.indiatimes.com/topic/Mark-Zuckerberg"&gt;Mark Zuckerberg&lt;/a&gt; responded. "Facebook is not and has never been part of any program to  give the US or any other government direct access to our servers... We  hadn't even heard of PRISM before yesterday," he wrote on his page at  the social media site.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a few PowerPoint slides  allegedly leaked by an NSA official, nine technology companies - Google,  AOL, Apple, Yahoo, Microsoft, Skype, Facebook, YouTube and PalTalk -  are providing the US government easy access to user data. While all  companies have denied being part anything called PRISM, Facebook and  Google have been most vocal about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few hours after Facebook  and Google statements, the New York Times said in a report that  technology companies had "opened discussions with national security  officials about developing technical methods to more efficiently and  securely share the personal data of foreign users".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In some cases, they (companies) changed their computer systems to do so," noted the NYT report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statements by the CEOs have done little to allay privacy fears.  "The denials from the companies look highly coordinated, including  similar phrases in all their responses. I don't think they are lying  outright, though the NYT report suggests that they are telling a  half-truth. They may not provide the US government 'direct access' to  all their servers, but may be providing indirect access, or may just be  responding to very broad FISA orders," said Pranesh Prakash, a policy  director with Centre for Internet and Society in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Friday US president &lt;a href="http://timesofindia.indiatimes.com/topic/Barack-Obama"&gt;Barack Obama&lt;/a&gt; had tacitly acknowledged NSA surveillance programmes aimed at non-US  citizens. "You can't have a hundred per cent security and also then have  a hundred per cent privacy and zero inconvenience. You know, we're  going to have to make some choices as a society," he told reporters in  the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Page and Zuckerberg also called on the governments to be  more open about surveillance programmes. "The level of secrecy around  the current legal procedures undermines the freedoms we all cherish,"  wrote Page.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Added Zuckerberg, "We strongly encourage all  governments to be much more transparent about all programs aimed at  keeping the public safe. It's the only way to protect everyone's civil  liberties and create the safe and free society we all want over the long  term."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access'&gt;https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-07-02T10:18:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system">
    <title>Indian Government Quietly Brings In Its 'Central Monitoring System': Total Surveillance Of All Telecommunications</title>
    <link>https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system</link>
    <description>
        &lt;b&gt;There's a worrying trend around the world for governments to extend online surveillance capabilities to encompass all citizens -- often justified with the usual excuse of combatting terrorism and/or child pornography.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.techdirt.com/articles/20130508/09302923002/indian-government-quietly-brings-its-central-monitoring-system-total-surveillance-all-communications.shtml"&gt;published in &lt;b&gt;tech dirt&lt;/b&gt;&lt;/a&gt; on June 8, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The latest to join this unhappy club is India, which has put in place what sounds like &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms"&gt;a massively intrusive system&lt;/a&gt;, as this article from The Times of India makes clear:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;The government last month quietly began rolling out a  project that gives it access to everything that happens over India's  telecommunications network -- online activities, phone calls, text  messages and even social media conversations. Called the Central  Monitoring System, it will be the single window from where government  arms such as the National Investigation Agency or the tax authorities  will be able to monitor every byte of communication.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;This project has been under development for two years, but in almost total secrecy:  &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;"In the absence of a strong privacy law that promotes  transparency about surveillance and thus allows us to judge the utility  of the surveillance, this kind of development is very worrisome," warned  Pranesh Prakash, director of policy at the Centre for Internet and  Society. "Further, this has been done with neither public nor  parliamentary dialogue, making the government unaccountable to its  citizens."&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt; That combination of total surveillance and zero transparency is a  dangerous one, providing the perfect tool for monitoring and controlling  political and social dissent.  If India wishes to maintain its claim to  be "the world's largest democracy", its government would do well to  introduce some safeguards against abuse of the new system, such as  strong privacy laws, as well as engaging the Indian public in an open  debate about &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;what exactly such extraordinary surveillance powers might be used for&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system'&gt;https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-02T09:12:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta">
    <title>Governance in the Age of the Internet and Free Trade Agreements</title>
    <link>https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at this event organized by Thai Netizen Network on June 8, 2013 at Queen Sirikit National Convention Center. The Ministry of Information and Communication  and the National Science and Technology Development Agency were co-hosts for the event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://internetsociety.org/inet-bangkok/"&gt;Click to read the details of the event published on Internet Society website&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the age of accelerated international trade and the promotion of free  flowing cross-border data transactions, countries and regions are  working towards forming a commonly agreed modus operandi and protocols.  These protocols seek to facilitate the growth of e-trade, ensure a  secure data flow(economic transactions) and protection of its data in  the network. In the recent, there has been strong attention by consumers  and businesses with the growing scope and content of these agreements  addressing Intellectual Property (IP). Emerging trend studies show that  there is a growing practices to incorporate mutually exclusive  arrangements without involving other stakeholders which happens in  closed door negotiations i.e. government to government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the European’s Anti-Counterfeiting Trade Agreement  (ACTA) proposal and the U.S. Trans-Pacific Partnership Agreement (TPP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bigger concern raised by other stakeholders has been the secrecy  of these arrangements and the insufficient protection of consumers and  citizens rights in its consideration. So far, the lack of legitimacy and  proportionality of legal policy measures has created unintended  consequences and collateral damages in far reaching manners whether  socially, economically or technologically. Citing practices of filtering  technology, deep packet inspection, and Internet cut-off, are  introduced by internet service providers to meet legal requirements.  Activities in question may vary from country to country, some focus on  violations of intellectual property, some on the control of political  voices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notably, list of concerns have been raised explicitly by UN Special  Rapporteur to adhere to the promotion and protection of the right to  freedom of opinion and expression were recommended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This workshop is aim to create discussion on the related topics among  stakeholders both in Thailand and in the region of the direct and  indirect implications of various developments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Target:&lt;/b&gt; Regulators, consumer rights, human rights activities, Lawyers&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Expected Outcomes&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Understanding the dynamics of free trade agreements (i.e. APEC, TPP,  and    ACTA) and its implications on Internet regulations, national  sovereignty, and civil rights from various perspectives. (Big picture)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Basic understanding of how various policy and technology related  measures or solutions (i.e. digital rights management technology and  deep-packet inspection) are used to address Intellectual Property (IP)  and how it directly impacts freedom of expression and individual  privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Looking Ahead: The developments and upcoming legislations/regulation  challenges in both Thailand and the region i.e. new draft of  Computer-related Crime Act, new draft of Copyright Act, and the Personal  Data Protection Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li&gt;Konstantinos Komaitis, Policy Advisor, Internet Society, Geneva&lt;/li&gt;
&lt;li&gt;Nakorn Serirak, Policy Advisor, Thai Netizen Network, Bangkok&lt;/li&gt;
&lt;li&gt;Sawatree Suksri, Lecturer, Faculty of Law, Thammasat University, Bangkok&lt;/li&gt;
&lt;li&gt;Lokman Tsui, Policy Advisor, Google Asia Pacific, Hong Kong&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Moderator&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Mike Hayes, Chair, International MA Program in Human Rights, Mahidol University&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click the PDFs below to download the full details and the presentation:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/governance-in-the-age-of-internet-and-fta.pdf" class="internal-link"&gt;Governance in the Age of the Internet and Free Trade Agreements&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/internet-and-open-public-data-ppp.pdf" class="internal-link"&gt;Internet and Open Public Data&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta'&gt;https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-07-03T05:04:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/events/digital-humanities-for-indian-higher-education">
    <title>Digital Humanities for Indian Higher Education</title>
    <link>https://cis-india.org/openness/events/digital-humanities-for-indian-higher-education</link>
    <description>
        &lt;b&gt;The Access to Knowledge team from the Centre for Internet and Society in collaboration with HEIRA-CSCS, Tumkur University, CILHE-TISS and CCS (IISc) is hosting a one day Digital Humanities consultation on July 13, 2013 at the Indian Institute of Science in Bangalore.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: Following is a draft text which will be updated soon.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The digital age has had a huge impact on higher education in the last decade, transforming the modalities of both teaching and research. Consequently the very foundations of the systems of knowledge production and dissemination are being re-examined. This is due to the impact that the digital turn has had on already established systems, and to the exciting possibilities that it offers for radically transforming these systems. In tertiary education for instance, one of the ways in which the digital impact has made itself felt is to move the classroom online or to make resources freely available online, thereby providing access for new constituencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For researchers, digital archiving and digital publishing has made possible the same widening of access, while also enabling innovative ways of reading traditional objects of inquiry through the use of computational methods. While these developments are not confined to a specific domain of knowledge, the term most often used to reference them has been ‘Digital Humanities’. The term has gained currency worldwide perhaps because of the seeming incongruity of the relationship between the conventional humanities disciplines and what is deemed a technological development. This is a relationship that has not only produced new approaches to old material, but perhaps — even more significantly — reconfigured the objects and domains of inquiry themselves, and re-tooled the modes by which we conduct our research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The five host institutions have engaged with each other in different collaborative initiatives over the years. Most significant among them have been (a) the exploration of integration, inter-disciplinarity and dialogue between the natural sciences and the social sciences/humanities; and (b) the production and deployment of critical resources in Indian languages in the higher education sector. We seek to bring these interests together in the proposed consultation aimed at setting agendas for digital humanities in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exploring the possible connections between the human sciences and the digital domain could throw up many productive directions for the higher education system. One of the biggest challenges facing the system in India today is the issue of access and the quality of that access. In the coming decade, Indian higher education is estimated to achieve a Gross Enrolment Ratio of at least 20% (from the existing 12%). This immense new inflow into the education system poses significant institutional and pedagogic challenges. With English emerging as the global language for knowledge production, there is pressure on the Indian higher education system to move towards English-based teaching and learning. Simultaneously, here is a cognitive issue: of effective comprehension. Students who are first-generation learners are finding it increasingly difficult to negotiate with the English-only curriculum that presents itself to many as an insurmountable hurdle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A new set of possibilities could open up if one were to examine this issue from the perspective of the Indian languages. For over 150 years these languages have been used in all modern institutions and practices (from banking to statecraft) and have developed their own concept ecologies and rich traditions of public intellectual discourse. Currently these languages and practices are being thrust into the background by the globalization of higher education. Re-inserting them into our classrooms and institutional arrangements would be crucial from two perspectives: a) providing newer avenues for students to re-negotiate curricular content which is predominantly in English and b) infusing new source materials into social, political, economic and cultural research on India, thereby increasing the relevance and dynamism of Indian social sciences and humanities. Needless to say, technology will play a major role in this context. Not only will technology figure prominently in addressing the question of access, equity and outreach, it will also help in bringing hitherto inaccessible intellectual resources into easily available and distributable forms. Also crucial to the question of access is the scalability that digital technology offers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through this interdisciplinary consultation, we hope to chart out the possible directions for digital humanities in India, which would include, among others, a strong engagement with Indian languages as well as a rethinking of how the sciences and the humanities could intersect. All of this is likely to hold paradigm-changing consequences for higher education: involving for example online learning, technologically enhanced learning, archival practices, new research methodologies, and the production of new and locally relevant knowledges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite participants to make short presentations of 15 minutes each reflecting on the questions raised in this note, and bringing to the table issues raised by the initiatives in which they have taken part so far.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/events/digital-humanities-for-indian-higher-education'&gt;https://cis-india.org/openness/events/digital-humanities-for-indian-higher-education&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2013-06-07T11:30:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/use-of-open-access-journals-for-publishing-findings">
    <title>Use of Open Access Journals for Publishing Findings</title>
    <link>https://cis-india.org/openness/blog-old/use-of-open-access-journals-for-publishing-findings</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/use-of-open-access-journals-for-publishing-findings'&gt;https://cis-india.org/openness/blog-old/use-of-open-access-journals-for-publishing-findings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-04T10:25:00Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/use-of-open-access-journals-by-indian-researchers">
    <title>Use of Open Access Journals by Indian Researchers</title>
    <link>https://cis-india.org/openness/blog-old/use-of-open-access-journals-by-indian-researchers</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/use-of-open-access-journals-by-indian-researchers'&gt;https://cis-india.org/openness/blog-old/use-of-open-access-journals-by-indian-researchers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-04T04:32:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf">
    <title>Internet Institute Agenda</title>
    <link>https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf'&gt;https://cis-india.org/internet-governance/blog/agenda-internet-institute.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-03T05:42:17Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/may-2013-bulletin">
    <title>May 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/may-2013-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) welcomes you to the fifth issue of its newsletter for 2013. We bring you an overview of our research, report of events held by us and announcement of upcoming ones, events we participated in, and recent media coverage.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis"&gt;Celebrating 5 Years of CIS&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;CIS is now 5 years old and we just celebrated this by holding an open exhibition in our offices in Bangalore and Delhi from May 20 to 23, showcasing our work and accomplishments over the period. We had about 170 visitors from the general public coming in to our office. Renowned artists like Tara Kelton, Kiran Subbaiah, Navin Thomas, Abhishek Hazra and Sharath Chandra Ram exhibited their work. The four day event attracted press coverage: &lt;a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts"&gt;Bangalore Mirror&lt;/a&gt; (May 18, 2013), &lt;a href="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet"&gt;DNA&lt;/a&gt; (May 19, 2013), &lt;a href="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"&gt;Hindu&lt;/a&gt; (May 22, 2013), &lt;a href="https://cis-india.org/news/prajavani-may-24-2013-report-on-pavanaja-talk-at-cis"&gt;Prajavani&lt;/a&gt; (May 23, 2013), &lt;a href="https://cis-india.org/news/udayavani-may-25-2013-report-on-cis-5-years-celebration"&gt;Udayavani&lt;/a&gt; (May 25, 2013) and &lt;a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die"&gt;Bangalore Mirror&lt;/a&gt; (May 31, 2013). &lt;a href="https://cis-india.org/internet-governance/blog/cis-5-years-all-posters.zip"&gt;Download all posters that were part of the exhibition here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013"&gt;&lt;b&gt;Google Policy Fellowship&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;CIS is inviting applications for the Google Policy Fellowship programme. Google is providing a USD 7,500 stipend to the India fellow who will be selected by July 1, 2013. The Fellowship focus areas include Access to Knowledge, Openness in India, Freedom of Expression, Privacy, and Telecom. Send in your applications for the position by June 15, 2013.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt; CIS invites applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project), and &lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. One is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another for developing a screen reader and text-to- speech synthesizer for Indian languages. CIS is also working with the World Blind Union and other similar organisations to develop a Treaty for the Visually Impaired helped by the WIPO:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;br /&gt;&lt;/b&gt;Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapters on Sikkim and Odisha:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-sikkim-chapter-call-for-comments"&gt;The Sikkim Chapter&lt;/a&gt; (by Manojna Yeluri, May 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-odisha-call-for-comments"&gt;The Odisha Chapter&lt;/a&gt; (by Anandhi Viswanathan, May 31, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: &lt;i&gt;All of these are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Banking Accessibility&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/survey-on-banking-accessibility"&gt;Survey on Banking Accessibility&lt;/a&gt; (by Vrinda Maheshwari, May 30, 2013). G3ict is a survey on accessibility of financial services in banks for persons with disabilities around the world. The survey is available &lt;a href="http://www.surveygizmo.com/s3/1187917/Survey-on-Banking-Accessibility"&gt;here&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/global-accessibility-awareness-day-event"&gt;Global Accessibility Awareness Day&lt;/a&gt; (May 9, 2013, TERI, Southern Regional Centre, Domlur, Bangalore).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two year grant of INR 26,000,000 to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to Knowledge (Wikipedia)&lt;/b&gt;&lt;br /&gt;Beginning from September 1, 2012, Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of three members based in Bangalore: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and one team member &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt; who is working from Delhi office. &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;, Programme Officer has left the organisation. April 24, 2013 was her last working day.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/resources/access-to-knowledge-work-plan"&gt;Access to Knowledge Work Plan&lt;/a&gt; (April 2013 - June 2014): CIS has announced its detailed plan detailed plan with projection of outcomes and expected impact of the A2K programme activities. The document has been made in consultation with various stakeholders and keeping in mind the objectives, opportunities and challenges faced by each of the Indian language Wikimedia projects. Feel free to share any feedback.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;WMF-A2K Revised Budget (draft) and Utilization (Sept 2012 - Feb 2013): In our effort to increase transparency with the working of CIS-A2K programme, we are &lt;a href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Grant_Budget_and_Utilization_Sept12_-Feb13.pdf"&gt;sharing&lt;/a&gt; with you the A2K Programme Budget along with the Utilization for the period Sept. 2012 to February 2013. The proposed revisions to the budget along with some notes are &lt;a href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Revised_Budget_%28draft%29_and_Utilization_Sept_12-Feb_13.pdf"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Grant_Budget_and_Utilization_Sept12_-Feb13.pdf"&gt;WMF-A2K Grant Budget and Utilization&lt;/a&gt; (Sept 2012 – February 2013): CIS has given an open disclosure of the Access to Knowledge budget to Wikimedia India and the global community.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/cis-signs-mou-with-tiss"&gt;CIS Signs MOU with TISS, Mumbai&lt;/a&gt;: has signed a MoU with TISS as part of which we will collaboratively work towards building Digital Knowledge Partnerships with select higher education institutions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;India Access to Knowledge IRC can be accessed here: &lt;a href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/IRC/13th_May"&gt;May 13, 2013&lt;/a&gt; (All Language Discussion) and &lt;a href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/IRC/26th_May"&gt;May 26, 2013&lt;/a&gt; (Odia Language Discussion). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-needs-assessment"&gt;Odia Wikipedia: Needs Assessment&lt;/a&gt; (by Subhashish Panigrahi, May 11, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/access-to-knowledge-work-plan-synopsis-of-feedback-by-wikipedians"&gt;Access to Knowledge Work Plan: Synopsis of Feedback by Wikipedians&lt;/a&gt; (by Nitika Tandon, May 20, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-introductory-session"&gt;Wikipedia Introductory Session organized for Data and India portal consultants&lt;/a&gt; (by Subhashish Panigrahi, May 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop-udupi-april-29-2013"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (April 29, 2013, Govinda Pai Research Centre, MGM College Udupi). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/kannada-irc-meet-may-7-2013"&gt;Kannada IRC Meet&lt;/a&gt; (organised by the Wikipedia Community, May 7, 2013). Dr. U.B. Pavanaja participated in this.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/digital-humanities-for-indian-higher-education"&gt;Digital Humanities for Indian Higher Education&lt;/a&gt; (co-organised in collaboration with HEIRA-CSCS, Tumkur University, CILHE-TISS and CCS (IISc), Indian Institute of Science, Bangalore, July 13, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Press Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/prajavani-may-24-2013-report-on-cis-celebrates-5-years"&gt;CIS Celebrates 5 Years: A Report in Prajavani&lt;/a&gt; (Prajavani, May 23, 2013). Prajavani published a report of Dr. U.B. Pavanja’s talk “From Palm Leaf to Tablet – Journey of Kannada”.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/udayavani-may-25-2013-cis-celebrates-5-years"&gt;CIS Celebrates 5 Years: A Report in Udayavani&lt;/a&gt; (Udayavani, May 25, 2013). Udayavani published a report of the evening programme hosted as part of the Centre for Internet and Society's 5 year celebrations in its Bangalore edition.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Access to Knowledge (Previously IP Reforms)&lt;/span&gt;&lt;br /&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/unfortunate-rise-of-india-slapp-suit"&gt;On the Unfortunate Rise of the Indian SLAPP Suit&lt;/a&gt; (by Ujwala Uppaluri, May 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;Research Papers&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/current-science-vol-101-10-1287-s-gunasekharan-s-arunachalam-use-of-open-access-journals-by-indian-researchers"&gt;Use of Open Access Journals by Indian Researchers&lt;/a&gt; (by Subbiah Gunasekharan and Prof. Subbiah Arunachalam, May 27, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/use-made-of-open-access-journals-by-indian-researchers-to-publish-their-findings"&gt;Use made of Open Access Journals by Indian Researchers to Publish their Findings&lt;/a&gt; (by Madhan Muthu and Prof. Subbiah Arunachalam, May 28, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Comments&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/comments-on-draft-icar-open-access-policy"&gt;Draft ICAR Open Access Policy&lt;/a&gt; (by Nehaa Chaudhari, May 28, 2013). The comments were submitted to the Indian Council for Agricultural Research.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Hosted&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/rhok-bangalore-2013"&gt;RHoK Global Event&lt;/a&gt; (Centre for Internet and Society, Bangalore, June 1 – 2, 2013). A report of the event would be published soon.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes. We began two new projects earlier this year. The first one, with Privacy International, London to facilitate research and events around surveillance, and freedom of speech and expression and the second one with Citizen Lab, Munk School of Global Affairs, University of Toronto on mapping of cyber security actors in South Asia and South East Asia:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cyber Stewards Project&lt;/b&gt;&lt;br /&gt;Laird Brown, a strategic planner and writer with core competencies on brand analysis, public relations and resource management and Purba Sarkar who in the past worked as a strategic advisor in the field of SAP Retail are working in this project.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Video Interview&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian"&gt;An Interview with Christopher Soghoian&lt;/a&gt; (May 28, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/events/geo-politics-of-information-controls"&gt;The Geopolitics of Information Controls: A Presentation by Masashi Crete-Nishihata&lt;/a&gt; (TERI, Bangalore, June 19, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world"&gt;Comparative Analysis of DNA Profiling Legislations from Across the World&lt;/a&gt; (by Srinivas Atreya, May 23, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting"&gt;3rd Privacy Round Table meeting&lt;/a&gt; (co-organised with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India, Chennai, May 18, 2013). Maria Xynou participated in this event and gives an overview of the discussions and recommendations.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore"&gt;Consilience – 2013&lt;/a&gt; (co-organised with the Law and Technology Committee of National Law School of India University, Bangalore, May 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/towards-a-global-network-of-internet-and-society-cultures"&gt;ICT, Law and Innovation: Recent Developments, Challenges and Lessons Learned&lt;/a&gt; (organised by Bilgi University, Istanbul, May 2013). Chinmayi Arun was a speaker on the Internet Governance panel at Towards a Global Network of Internet and Society Centres.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;India’s Politics of Free Expression (co-sponsored by the Asian Studies Centre, Free Speech Debate, the Oxford India Society and Ideas for India Oxbridge Exchange, May 31, 2013 at Nissan Lecture Theatre, St. Antony’s College, Oxford). Chinmayi Arun was a speaker at the &lt;a href="https://cis-india.org/news/sant-ox-ac-uk-may-31-2013-bapsybanoo-marchioness-winchester-lectures"&gt;Bapsybanoo Marchioness of Winchester Lectures&lt;/a&gt; on 'India's Politics of Free Expression'.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table-mumbai"&gt;Privacy Round Table, Mumbai&lt;/a&gt; (Mayfair Banquets, Mumbai, June 15, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt;The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers!&lt;/a&gt; (by Maria Xynou, May 2, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/mumbai-mirror-anand-holla-may-4-2013-sex-on-the-go"&gt;Sex on-the-go&lt;/a&gt; (by Anand Holla, Mumbai Mirror, May 4, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-business-line-may-5-2013-cis-anniversary"&gt;CIS anniversary&lt;/a&gt; (Hindu Business Line, May 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations"&gt;Central Monitoring System to make government privy to phone calls, text messages and social media conversations&lt;/a&gt; (by Indu Nandakumar, May 7, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator"&gt;Messaging apps find another foe in India’s market regulator&lt;/a&gt; (Quartz, May 8, 2013). Elonnai Hickok is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication"&gt;India's Rs 400-crore Central Monitoring System to snoop on all communication&lt;/a&gt; (Tech 2, May 9, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother"&gt;Is India's government becoming Big Brother?&lt;/a&gt; (by Talia Ralph and Jason Overdorf, May 9, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground"&gt;Worldwide Playground&lt;/a&gt; (Telegraph, May 15, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-18-2013-ngo-invites-public-to-peruse-its-accounts"&gt;NGO invites public to peruse its accounts&lt;/a&gt; (by Vandana Kamath, May 18, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security"&gt;Online privacy should not come at the cost of security: Sunil Abraham&lt;/a&gt; (by Anirban Sen, May 19, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet"&gt;A lifetime of five years on the internet&lt;/a&gt; (by Subir Ghosh, DNA, May 19, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"&gt;CIS highlights changes ushered in by the Internet&lt;/a&gt; (Hindu, May 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/asian-correspondent-chan-myae-khine-may-22-2013-burma-to-host-internet-freedom-forum"&gt;Burma to host first Internet freedom forum&lt;/a&gt; (by Chan Myae Khine, Asian Correspondent, May 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/businesswire-may-30-2013-inet-bangkok-to-explore-internet-impact-on-thailand-economy-and-society"&gt;INET Bangkok to Explore Internet’s Impact on Thailand’s Economy and Society&lt;/a&gt; (BusinessWire, May 30, 2013). Sunil Abraham is participating in this conference. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/bangalore-mirror-vandana-kamath-may-31-2013-shooting-cyber-cafes-before-they-die"&gt;Shooting cyber cafes before they die&lt;/a&gt; (by Bangalore Mirror, May 31, 2013). CIS’s film on Cyber Cafes is mentioned in this article.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;CIS in partnership with the Ford Foundation is executing a project on Internet Access. It covers the history of the internet, technologies involved, principle and values of internet access, broadband market and universal access and will touch upon various polices and regulations which has an impact on internet access and bodies and mechanism which are responsible for formulation policies related to internet access. The blog posts and modules will be published in a new website: &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Ongoing Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society"&gt;Institute on Internet and Society&lt;/a&gt; (supported by Ford Foundation, Golden Palms Resort, Bangalore, June 8 – 14, 2013). The &lt;a href="http://internet-institute.in/repository/agenda-revised-by-sv"&gt;agenda&lt;/a&gt; for the event has been finalised.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The following unit was published recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/network-connections-modes-of-access"&gt;Network Connections and Modes of Access&lt;/a&gt; (by Srividya Vaidyanathan, May 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility of telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/business-standard-may-9-2013-shyam-ponappa-configuring-a-non-toothless-trai"&gt;Configuring a 'Non-Toothless' Regulator&lt;/a&gt; (TRAI) (by Shyam Ponappa, Business Standard, May 9, 2013 and Organizing India Blogspot, May 10, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;br /&gt; &lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/may-2013-bulletin'&gt;https://cis-india.org/about/newsletters/may-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-08-13T11:51:46Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security">
    <title>Online privacy should not come at the cost of security: Sunil Abraham</title>
    <link>https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security</link>
    <description>
        &lt;b&gt;Sunil Abraham, Centre for Internet and Society’s executive director, on privacy laws and Internet penetration.&lt;/b&gt;
        &lt;p&gt;Anirban Sen's article was &lt;a class="external-link" href="http://www.livemint.com/Industry/xcmVySyl90ivZknOK9YIBI/Online-privacy-should-not-come-at-the-cost-of-security-Suni.html"&gt;published in LiveMint &lt;/a&gt;on May 19, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;div class="text" id="U191282072761AmC"&gt;
&lt;hr /&gt;
&lt;p class="text" style="text-align: justify; "&gt;The Centre for Internet and Society (CIS), a research thinktank that primarily focuses on issues of Internet governance, is pushing to revise the provisions of the Information Technology (IT) Act and make a stronger case for privacy laws and free speech in India, an issue that has caused widespread concern after the government tried to restrict access to more than a 100 websites last year with little justification.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We want to revise the IT Act...that’s the toughest one and that’s not going to happen very soon because the government is treating it like an ego battle now. They no longer listen to the others,” said &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Sunil Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of CIS.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The IT Act has been at the centre of debate, with some of its provisions such as Section 66A, which criminalizes “causing annoyance or inconvenience” online or electronically, coming under criticism from rights advocates for being too vague and subject to interpretation.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;CIS, which will complete five years on Monday and is organizing a four-day event focusing on issues such as cyber security, surveillance in India and privacy, said it also was working towards creating a privacy law for India within the next 3-4 years. India, which is estimated to have Internet penetration of just 10%, is the third-largest Internet market in the world.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re getting closer and closer to that (privacy law),” said Abraham, adding that privacy should not come at the cost of security.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;Over the past five years, Bangalore-based CIS has also been part of some government committees such as the Justice AP Shah Committee, which focused on privacy laws in India, and is also currently working on the country’s telecom policy. The non-government organization, which receives grants from international bodies such as the Wikimedia Foundation, has also worked on policies for the government of Iraq and is currently also doing policy work for the government of Burma.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“Five years ago we were making noise from outside the room, we were not inside any policy making space. That has also changed. From an organization that was mostly outside the room, we’re increasingly being trusted by our own government,” said Abraham, who was one of the most vocal critics of the government’s unique identification (UID) project when it was first launched. Abraham had raised concerns over its overtly broad scope and issues over privacy in the project.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;For CIS, one of the biggest achievements over the past five years was being part of the policy framework for the government of India’s draft national policy on open standards for e-governance, said Abraham, adding that the organization was working towards increasing Internet penetration in the country, especially in rural areas.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re hoping that every single mobile phone user in the country will become an Internet user. We’re planning for that future,” he said.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The CIS event starting on Monday will include speakers such as legal researcher and advocate &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Lawrence Liang"&gt;Lawrence Liang&lt;/a&gt;&lt;/span&gt; and &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Vibodh Parthasarathi"&gt;Vibodh Parthasarathi&lt;/a&gt;&lt;/span&gt;, an associate professor at the Centre for Culture, Media and Governance at the Jamia Millia Islamia university. Both Liang and Parthasarathi are members of the board at CIS.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security'&gt;https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-02T02:27:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/cis-tiss-mou">
    <title>CIS Signs MOU with TISS, Mumbai</title>
    <link>https://cis-india.org/a2k/blogs/cis-tiss-mou</link>
    <description>
        &lt;b&gt;The Access to Knowledge (A2K) team from the Centre for Internet and Society (CIS) has signed a MOU with the Tata Institute of Social Science (TISS), Mumbai. &lt;/b&gt;
        &lt;div id="content-core"&gt;
&lt;div class="plain" id="parent-fieldname-text"&gt;
&lt;p style="text-align: justify; "&gt;Institutional partnerships  (especially in the higher education  context) is a cross-cutting  activity across A2K's various language plans  and also the pilot  project. A2K Team is happy to share with you an  important outcome on  this front.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K has  signed a MoU with TISS as  part of which we will collaboratively work  towards building Digital  Knowledge Partnerships with select higher  education institutions. The  objective is to enhance digital literacy in  the Indian languages and  facilitate collaborative knowledge production  and free dissemination.  A2K along with TISS will co-design and jointly  implement relevant  training programmes to achieve this. Further, within  TISS campuses we  will endeavour to bring teaching-learning processes  onto free and open  digital platforms, including Indian language  Wikipedias. The A2K team  would like to acknowledge the pivotal role  played by our Adviser Dr.  Tejaswini Niranjana in buildig this  collaboration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We'll keep you posted as and  when new  developments shape up and would like to actively involve Mumbai   Wikipedians in planning, designing and rolling out Wikipedia training   programmes.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/cis-tiss-mou'&gt;https://cis-india.org/a2k/blogs/cis-tiss-mou&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-07-04T04:15:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
