<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1391 to 1405.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/7th-india-digital-summit-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/i-and-p-partners-meeting.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-january-6-2013-what-is-needed-is-user-centric-design-not-good-intentions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/national-resource-kit-tamil-nadu-chapter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mobile-india-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mining-the-web-collective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age">
    <title>Is freedom of expression under threat in the digital age?</title>
    <link>https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age</link>
    <description>
        &lt;b&gt;This week Index held a high level panel debate in partnership with the Editors Guild of India and the India International Centre to discuss the question “Is freedom of expression under threat in the digital age?” Mahima Kaul reports&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This post by Mahima Kaul was &lt;a class="external-link" href="http://www.indexoncensorship.org/2013/01/india-conference-index/"&gt;published in Index on Censorship&lt;/a&gt; on January 18, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Index on Censorship, in partnership with The Editors Guild of India,  hosted a debate in New Delhi on Tuesday (15 January) asking, “Is freedom  of expression under threat in the digital age?”  Discussing the topic  were Ajit Balakrishnan (founder and Chief Executive of &lt;a href="http://rediff.com/" target="_blank"&gt;rediff.com&lt;/a&gt;),  Index on Censorship CEO Kirsty Hughes, Sunil Abraham (Executive  Director of the centre for Internet and Society), and Professor Timothy  Garton Ash, Director of the Free Speech Debate  project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil  Abraham  questioned the idea of technology specific “internet freedom”  that has been advocated by many not least the US Secretary of State  Hillary Clinton. He said there was for instance much greater freedom and  diversity on Indian TV than in the US.  He also argued that that this  freedom does not seem to extend to a right of access to knowledge, as  demonstrated by the charges brought against open access activist and  developer Aaron Swartz, who committed suicide earlier this month. Swartz  was &lt;a href="http://blog.indexoncensorship.org/2013/01/14/aaron-swartz-reddit/" target="_blank"&gt;facing charges&lt;/a&gt; for allegedly downloading 4.8 million academic articles from subscription-only digital library JSTOR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham  said one unintentional effect of censorship by governments is that it  teaches citizens how to protect themselves online. Finally, he  questioned the Indian government’s draconian laws and arbitrary actions &lt;a href="http://uncut.indexoncensorship.org/2012/08/india-internet-freedom/" target="_blank"&gt;in the digital realm&lt;/a&gt;,  wondering whether this is the authorities’ way of warning future  netizens about “acceptable online behaviour”, to condition the public  not to criticise the government and to create a chilling effect.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img class="wp-image-43807" height="316" src="http://www.indexoncensorship.org/wp-content/uploads/2013/01/indiaevent.jpg" title="indiaevent" width="602" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div id="themename"&gt;&lt;a href="http://www.indexoncensorship.org/theme/digital-media/" rel="tag"&gt;Digital&lt;/a&gt;&lt;/div&gt;
&lt;h1 class="post"&gt;&lt;a href="http://www.indexoncensorship.org/2013/01/india-conference-index/" rel="bookmark"&gt;Is freedom of expression under threat in the digital age?&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;&lt;span class="date"&gt;18 Jan 2013&lt;/span&gt;&lt;/p&gt;
&lt;div class="clearfix buttons-wrap" style="float:left; "&gt;&lt;br /&gt;
&lt;div&gt;
&lt;div class="fb_iframe_widget fb_edge_widget_with_comment fb-like"&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;b&gt;This week Index held a&lt;/b&gt;&lt;b&gt; high level panel&lt;/b&gt;&lt;b&gt; debate  in partnership with the Editors Guild of India and the India  International Centre to discuss the question “Is freedom of expression  under threat in the digital age?” Mahima Kaul reports &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="more-43750"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Index  on Censorship, in partnership with The Editors Guild of India, hosted a  debate in New Delhi on Tuesday (15 January) asking, “Is freedom of  expression under threat in the digital age?”  Discussing the topic were  Ajit Balakrishnan (founder and Chief Executive of &lt;a href="http://rediff.com/" target="_blank"&gt;rediff.com&lt;/a&gt;),  Index on Censorship CEO Kirsty Hughes, Sunil Abraham (Executive  Director of the centre for Internet and Society), and Professor Timothy  Garton Ash, Director of the Free Speech Debate  project.&lt;/p&gt;
&lt;p&gt;Sunil  Abraham  questioned the idea of technology specific “internet freedom”  that has been advocated by many not least the US Secretary of State  Hillary Clinton. He said there was for instance much greater freedom and  diversity on Indian TV than in the US.  He also argued that that this  freedom does not seem to extend to a right of access to knowledge, as  demonstrated by the charges brought against open access activist and  developer Aaron Swartz, who committed suicide earlier this month. Swartz  was &lt;a href="http://blog.indexoncensorship.org/2013/01/14/aaron-swartz-reddit/" target="_blank"&gt;facing charges&lt;/a&gt; for allegedly downloading 4.8 million academic articles from subscription-only digital library JSTOR.&lt;/p&gt;
&lt;p&gt;Abraham  said one unintentional effect of censorship by governments is that it  teaches citizens how to protect themselves online. Finally, he  questioned the Indian government’s draconian laws and arbitrary actions &lt;a href="http://uncut.indexoncensorship.org/2012/08/india-internet-freedom/" target="_blank"&gt;in the digital realm&lt;/a&gt;,  wondering whether this is the authorities’ way of warning future  netizens about “acceptable online behaviour”, to condition the public  not to criticise the government and to create a chilling effect.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.indexoncensorship.org/wp-content/uploads/2013/01/indiaevent.jpg"&gt;&lt;img class="wp-image-43807" height="316" src="http://www.indexoncensorship.org/wp-content/uploads/2013/01/indiaevent.jpg" title="indiaevent" width="602" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom  of expression is always under threat and in need of defending, argued  Timothy Garton Ash. However, he didn’t think the threat was particularly  high today  in the digital realm — rather the threats to privacy were  what were particularly concerning online. With 76.8 per cent of India’s  1.2 billion population connected by mobile phone, there is an  extraordinary opportunity for the prevalence of freedom of expression  brought about by new technologies. But he said there are also a lot of  challenges to free expression in India — and that “swing states” such as  Brazil and India will be very important in determining where the global  conversation goes on freedom of expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajit Balakrishnan,  founder of web portal Rediff.com, explained that many of the problems  that have occurred in the digital realm in India have to do with poor  drafting of legislation. He was particularly concerned about  intermediary liability and explained why and how intermediaries roles  needed protecting. He also explained that government officials have  genuine problems with phrasing, and that when it comes to the  application of these laws, understanding them and when they should be  applied will take another 25 years. He added that the country is  challenged by a legal system ill-equipped for coping with new  technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kirsty Hughes said that freedom of expression is a  universal right, meant to be applied across borders not just within  countries.  She said that while the digital domain allowed a big  expansion in freedom of expression there were risks we are heading  towards a more controlled net, a partially censored net, and a  fragmented net (for instance with Iran attempting to build its own  internet disconnected from the rest of the world). She said that some of  the negative reactions by government to social media in India were seen  to in the UK where there had been a trend towards criminalising  supposedly offensive comment — although the new interim guidelines on  social media prosecutions were a step in the right direction.  Hughes  emphasised three main concerns — state censorship, privatisation of  censorship and the role of big companies, and mass surveillance. She  pointed out that the British government had pushed for extensive  surveillance with the Communications Data Bill, but this has now been  shelved after a critical report from MPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ramanjit Singh Chima,  policy adviser for Google, said that  the question is not about absolute  freedom, but about what is appropriate and lawful. He emphasised that  in the US, judges had strongly defended free expression online as they  saw the digital world as a powerful space for free exprssion.  He  pointed out how effective social media tools, including Google’s own  products, have become in helping during emergency situations like  natural disasters and terrorist attacks. He also pointed out that the  internet is not only about free expression but business as well. The  internet contributes to 1.6 per cent of India’s GDP. Singh Chima said  positive judgements by US  and EU courts protect the users, adding that  regulation for the net should be appropriate for its engineering.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age'&gt;https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-03T10:50:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights">
    <title>Draft International Principles on Communications Surveillance and Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights</link>
    <description>
        &lt;b&gt;These principles were developed by Privacy International and the Electronic Frontier Foundation and seek to define an international standard for the surveillance of communications. The Centre for Internet and Society has been contributing feedback to the principles. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The principles are still in draft form. The most recent version can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net"&gt;here&lt;/a&gt;. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Our goal is that these principles will provide civil society groups, industry, and governments with a framework against which we can evaluate whether current or proposed surveillance laws and practices are consistent with human rights. We are concerned that governments are failing to develop legal frameworks to adhere to international human rights and adequately protect communications privacy, particularly in light of innovations in surveillance laws and techniques.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles are the outcome of a consultation with experts from civil society groups and industry across the world. It began with a meeting in Brussels in October 2012 to address shared concerns relating to the global expansion of government access to communications. Since the Brussels meeting we have conducted further consultations with international experts in communications surveillance law, policy and technology.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are now launching a global consultation on these principles. Please send us comments and suggestions by January 3rd 2013, by emailing rights (at) eff (dot) org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Preamble&lt;/b&gt;&lt;br /&gt;Privacy is a fundamental human right, and is central to the maintenance of democratic societies. It is essential to human dignity and it reinforces other rights, such as freedom of expression and association, and is recognised under international human rights law.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Activities that infringe on the right to privacy, including the surveillance of personal communications by public authorities, can only be justified where they are necessary for a legitimate aim, strictly proportionate, and prescribed by law.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before public adoption of the Internet, well-established legal principles and logistical burdens inherent in monitoring communications generally limited access to personal communications by public authorities. In recent decades, those logistical barriers to mass surveillance have decreased significantly. The explosion of digital communications content and information about communications, or “communications metadata”, the falling cost of storing and mining large sets of data, and the commitment of personal content to third party service providers make surveillance possible at an unprecedented scale.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is universally accepted that access to communications content must only occur in exceptional situations, the frequency with which public authorities are seeking access to information about an individual’s communications or use of electronic devices is rising dramatically—without adequate scrutiny. &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; When accessed and analysed, communications metadata may create a profile of an individual's private life, including medical conditions, political and religious viewpoints, interactions and interests, disclosing even greater detail than would be discernible from the content of a communication alone. &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Despite this, legislative and policy instruments often afford communications metadata a lower level of protection and do not place sufficient restrictions on how they can be subsequently used by agencies, including how they are data-mined, shared, and retained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore necessary that governments, international organisations, civil society and private service providers articulate principles establishing the minimum necessary level of protection for digital communications and communications metadata (collectively "information") to match the goals articulated in international instruments on human rights— including a democratic society governed by the rule of law. The purpose of these principles is to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Provide guidance for legislative changes and advancements related to communications and   communications metadata to ensure that pervasive use of modern  communications technology does not result in an erosion of privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish appropriate      safeguards to regulate access by public authorities (government agencies,      departments, intelligence services or law enforcement agencies) to      communications and communications metadata about an individual’s use of an      electronic service or communication media. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;We call on governments to establish stronger protections as required by their constitutions and human rights obligations, or as they recognize that technological changes or other factors require increased protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles focus primarily on rights to be asserted against state surveillance activities. We note that governments are required not only to respect human rights in their own conduct, but to protect and promote the human rights of individuals in general.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; Companies are required to follow data protection rules and yet are also compelled to respond to lawful requests. Like other initiatives,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; we hope to provide some clarity by providing the below principles on how state surveillance laws must protect human rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Principles&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any limitation to the right to privacy must be prescribed by law. Neither the Executive nor the Judiciary may adopt or implement a measure that interferes with the right to privacy without a previous act by the Legislature that results from a comprehensive and participatory process. Given the rate of technological change, laws enabling limitations on the right to privacy should be subject to periodic review by means of a participatory legislative or regulatory process&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow access to communications or communications metadata by authorised public authorities for investigative purposes and in pursuit of a legitimate purpose, consistent with a free and democratic society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing access to communications or communications metadata by authorised public authorities should limit such access to that which is strictly and demonstrably necessary, in the sense that an overwhelmingly positive justification exists, and justifiable in a democratic society in order for the authority to pursue its legitimate purposes, and which the authority would otherwise be unable to pursue. The onus of establishing this justification, in judicial as well as in legislative processes, is on the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should restrain themselves from adopting or implementing any measure of intrusion allowing access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose that justified establishing that measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Authorities capable of making determinations relating to communications or communications metadata must be competent and must act with independence and have adequate resources in exercising the functions assigned to them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis. Competent authorities must ensure that all formal requirements are fulfilled and must determine the validity of each specific attempt to access or receive communications or communications metadata, and that each attempt is proportionate in relation to the specific purposes of the case at hand. Communications and communications metadata are inherently sensitive and their acquisition should be regarded as highly intrusive. As such, requests should &lt;b&gt;at a minimum&lt;/b&gt; establish a) that there is a very high degree of probability that a serious crime has been or will be committed; b) and that evidence of such a crime would be found by accessing the communications or communications metadata sought; c) other less invasive investigative techniques have been exhausted; and d) that a plan to ensure that the information collected will be only that information reasonably related to the crime and that any excess information collected will be promptly destroyed or returned. Neither the scope of information types, the number or type of persons whose information is sought, the amount of data sought, the retention of that data held by the authorities, nor the level of secrecy afforded to the request should go beyond what is demonstrably necessary to achieve a specific investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Due process requires that governments must respect and guarantee an individual’s human rights, that any interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the general public.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;While criminal investigations and other considerations of public security and safety may warrant limited access to information by public authorities, the granting of such access must be subject to guarantees of procedural fairness. Every request for access should be subject to prior authorisation by a competent authority, except when there is imminent risk of danger to human life. &lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Notwithstanding the notification and transparency requirements that governments should bear, service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request. In specific cases where the public authority wishes to delay the notification of the affected user or in an emergency situation where sufficient time may not be reasonable, the authority should be obliged to demonstrate that such notification would jeopardize the course of investigation to the competent judicial authority reviewing the request. In such cases, it is the responsibility of the public authority to notify the individual affected and the service provider as soon as the risk is lifted or after the conclusion of the investigation, whichever is sooner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public. The government and service providers should provide the maximum possible transparency about the access by public authorities without imperiling ongoing investigations, and with enough information so that individuals have sufficient knowledge to fully comprehend the scope and nature of the law, and when relevant, challenge it. Service providers must also publish the procedure they apply to deal with data requests from public authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests. This mechanism should have the authority to access information about public authorities' actions, including, where appropriate, access to secret or classified information, to assess whether public authorities are making legitimate use of their lawful capabilities, and to publish regular reports and data relevant to lawful access. This is in addition to any oversight already provided through another branch of government such as parliament or a judicial authority. This mechanism must provide – at a minimum – aggregate information on the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. &lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: It is the responsibility of service providers to transmit and store communications and communications metadata securely and to a degree that is minimally necessary for operation. It is essential that new communications technologies incorporate security and privacy in the design phases. In order, in part, to ensure the integrity of the service providers’ systems, and in recognition of the fact that compromising security for government purposes almost always compromises security more generally, governments shall not compel service providers to build surveillance or monitoring capability into their systems. Nor shall governments require that these systems be designed to collect or retain particular information purely for law enforcement or surveillance purposes. Moreover, &lt;i&gt;a priori&lt;/i&gt; data retention or collection should never be required of service providers and orders for communications and communications metadata preservation must be decided on a case-by-case basis. Finally, present capabilities should be subject to audit by an independent public oversight body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: In response to changes in the flows of information and the technologies and services that are now used to communicate, governments may have to work across borders to fight crime. Mutual legal assistance treaties (MLATs) should ensure that, where the laws of more than one state could apply to communications and communications metadata, the higher/highest of the available standards should be applied to the data. Mutual legal assistance processes and how they are used should also be clearly documented and open to the public. The processes should distinguish between when law enforcement agencies can collaborate for purposes of intelligence as opposed to sharing actual evidence. Moreover, governments cannot use international cooperation as a means to surveil people in ways that would be unlawful under their own laws. States must verify that the data collected or supplied, and the mode of analysis under MLAT, is in fact limited to what is permitted. In the absence of an MLAT, service providers should not respond to requests of the government of a particular country requesting information of users if the requests do not include the same safeguards as providers would require from domestic authorities, and the safeguards do not match these principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: To protect individuals against unwarranted attempts to access communications and communications metadata, governments should ensure that those authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress. Any information obtained in a manner that is inconsistent with these principles is inadmissible as evidence in any proceeding, as is any evidence derivative of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation. Financial constraints place an institutional check on the overuse of orders, but the payments should not exceed the service provider’s actual costs for reviewing and responding to orders, as such would provide a perverse financial incentive in opposition to user’s rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Organisations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Article 19 (International)&lt;/li&gt;
&lt;li&gt;Bits of Freedom (Netherlands)&lt;/li&gt;
&lt;li&gt;Center for Internet &amp;amp;      Society India (CIS India)&lt;/li&gt;
&lt;li&gt;Derechos Digitales (Chile)&lt;/li&gt;
&lt;li&gt;Electronic Frontier Foundation      (International)&lt;/li&gt;
&lt;li&gt;Privacy International      (International)&lt;/li&gt;
&lt;li&gt;Samuelson-Glushko Canadian      Internet Policy and Public Interest Clinic (Canada)&lt;/li&gt;
&lt;li&gt;Statewatch (UK)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Individuals&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Renata Avila, human rights      lawyer (Guatemala)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Footnotes&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]For more information about the      background to these principles and the process undertaken, see      https://www.privacyinternational.org/blog/towards-international-principles-on-communications-surveillance&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]Universal Declaration of Human      Rights Article 12, United Nations Convention on Migrant Workers Article      14, UN Convention of the Protection of the Child Article 16, International      Covenant on Civil and Political Rights, International Covenant on Civil      and Political Rights Article 17; regional conventions including Article 10      of the African Charter on the Rights and Welfare of the Child, Article 11      of the American Convention on Human Rights, Article 4 of the African Union      Principles on Freedom of Expression, Article 5 of the American Declaration      of the Rights and Duties of Man, Article 21 of the Arab Charter on Human      Rights, and Article 8 of the European Convention for the Protection of      Human Rights and Fundamental Freedoms; Johannesburg Principles on National      Security, Free Expression and Access to Information, Camden Principles on      Freedom of Expression and Equality.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]Martin Scheinin, “Report of the      Special Rapporteur on the promotion and protection of human rights and      fundamental freedoms while countering terrorism,” p11, available at &lt;a href="http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf"&gt;http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf&lt;/a&gt;.      See also General Comments No. 27, Adopted by The Human Rights Committee      Under Article 40, Paragraph 4, Of The International Covenant On Civil And      Political Rights, CCPR/C/21/Rev.1/Add.9, November 2, 1999, available at &lt;a href="http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument"&gt;http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument&lt;/a&gt;.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]Communications metadata may      include information about our identities (subscriber information, device      information), interests, including medical conditions, political and      religious viewpoints (websites visited, books and other materials read,      watched or listened to, searches conducted, resources used), interactions      (origins and destinations of communications, people interacted with,      friends, family, acquaintances), location (places and times, proximities      to others); in sum, logs of nearly every action in modern life, our mental      states, interests, intentions, and our innermost thoughts.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]For example, in the United      Kingdom alone, there are now approximately 500,000 requests for      communications metadata every year, currently under a self-authorising      regime for law enforcement agencies, who are able to authorise their own      requests for access to information held by service providers. Meanwhile,      data provided by Google’s Transparency reports shows that requests for      user data from the U.S. alone rose from 8888 in 2010 to 12,271 in 2011.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]See as examples, a review of      Sandy Petland’s work, ‘Reality Mining’, in MIT’s Technology Review, 2008,      available at &lt;a href="http://www2.technologyreview.com/article/409598/tr10-reality-mining/"&gt;http://www2.technologyreview.com/article/409598/tr10-reality-mining/&lt;/a&gt; and also see Alberto Escudero-Pascual and Gus Hosein, ‘Questioning lawful      access to traffic data’, Communications of the ACM, Volume 47 Issue 3,      March 2004, pages 77 - 82.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]Report of the UN Special      Rapporteur on the promotion and protection of the right to freedom of      opinion and expression, Frank La Rue, May 16 2011, available at &lt;a href="http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf"&gt;http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]The Global Network Initiative      establishes standards to help the ICT sector protect the privacy and free      expression of their users. See &lt;a href="http://www.globalnetworkinitiative.org/"&gt;http://www.globalnetworkinitiative.org/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]As defined by international and      regional conventions mentioned above.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]Where judicial review is waived      in such emergency cases, a warrant must be retroactively sought within 24      hours.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]One example of such a report is      the US Wiretap report, published by the US Court service. Unfortunately      this applies only to interception of communications, and not to access to      communications metadata. See &lt;a href="http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx"&gt;http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx&lt;/a&gt;.      The UK Interception of Communications Commissioner publishes a report that      includes some aggregate data but it is does not provide sufficient data to      scrutinise the types of requests, the extent of each access request, the      purpose of the requests, and the scrutiny applied to them. See &lt;a href="http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top"&gt;http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top&lt;/a&gt;.&lt;/p&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights'&gt;https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:55:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/7th-india-digital-summit-2013">
    <title>7th India Digital Summit 2013 </title>
    <link>https://cis-india.org/internet-governance/blog/7th-india-digital-summit-2013</link>
    <description>
        &lt;b&gt;This summitt organised by Internet and Mobile Association of India is held in New Delhi, January 16 - 17, 2013.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/7th-india-digital-summit-2013'&gt;https://cis-india.org/internet-governance/blog/7th-india-digital-summit-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-01-15T08:53:58Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression">
    <title>Third South Asian Meeting on the Internet and Freedom of Expression</title>
    <link>https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Internet Democracy Project, Voices for Interactive Choice &amp; Empowerment and Global Partners &amp; Associates are organizing this event in Dhaka on January 14 - 15, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh Prakash is moderating the session on "Understanding cyber security and surveillance in South Asia today". Chinmayi Arun is speaking in this panel.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Third South Asian Meeting on the Internet and Freedom of Expression seeks to address the question of how freedom of expression on the Internet is best protected by taking as its starting point two of the biggest challenges for freedom of expression online in South Asia today: hate speech online on the one hand, and cyber security and surveillance on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting seeks to investigate how these challenges affect freedom of expression on the Internet as well as how they can be addressed most effectively while protecting free speech online. It will also touch briefly on the important question of what kind of Internet governance processes are most likely to ensure the desired outcomes materialise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A very short history of the South Asian Meeting on the Internet and Freedom of Expression&lt;/b&gt;&lt;br /&gt;The first South Asian Meeting on the Internet and Freedom of Expression took place in March 2011 in Delhi, and mapped the many challenges for free speech online in our region, as an input into the report on the Internet and freedom of expression of UN Special Rapporteur on Freedom of Expression, Mr. Frank La Rue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second South Asian Meeting, in Kathmandu in November 2011, assessed the extent to which policy and regulation in the South Asian countries complied with the recommendations Mr. La Rue made in his report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This third meeting will now build on these earlier efforts by bringing together experts from civil society, business, the research community and other stakeholder groups from across the region to discuss two of the biggest shared challenges for freedom of expression online in South Asia today in detail: the rising visibility of hate speech on the one hand, and the impact of discourses regarding cyber security and surveillance on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why focus on hate speech and security/surveillance now?&lt;/b&gt;&lt;br /&gt;Since UN Special Rapporteur on Freedom of Expression, Mr. Frank La Rue, presented his report on the Internet and freedom of expression to the UN Human Rights Council in June 2011, the complexity of this topic has received growing recognition. However, not all trends that La Rue had pointed out as directly affecting freedom of expression online – from access to the Internet to cyber attacks – are equally important in the South Asian region. Detailed analysis in several South Asian countries has shown that, though Internet penetration rates remain fairly low, most countries do possess, for example, the political will crucial to improve these figures. The two trends that seem to be of greatest concern in our region are that of the fight against hate speech, and the impact on freedom of expression of cyber security and surveillance measures. The latter is foregrounded for a variety of reasons ranging from the safety of individual users to national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Incidentally, across the region, as in many parts of the world, hate speech and cyber security have also been among the most important reasons governments have quoted to justify greater government control over the Internet. At the national level, this has at times manifested itself through the approval and implementation of legislation that has far-reaching consequences for freedom of speech online, without consulting many of the stakeholders who are affected at any point in time. At the global level, we see a growing number of proposals by governments that would effectively expand their collective powers to regulate the Internet, though with varying levels of involvement of other stakeholders envisioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet while governments' intentions when imposing censorship or approving surveillance measures may at times be in doubt, it is difficult to deny that the Internet has facilitated a new proliferation of hate speech, as well as that it has thrown up new security challenges that couldn't even be imagined before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore our contention that the challenges of hate speech online and of ensuring cyber security in our region are real, and need to be addressed head-on if we are to strengthen and protect the right to freedom of expression online. For this reason, the meeting seeks to investigate both the precise nature of these challenges and what Internet governance mechanisms we need to evolve to ensure that they can be addressed most effectively whilst upholding and strengthening the right to freedom of expression. If we are to take the challenges the threats of hate speech and cyber security policy embody seriously yet also aim to uphold and strengthen the right to freedom of expression online, then what are the solutions we require? And who will need to be responsible for implementing them?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participants&lt;/b&gt;&lt;br /&gt;Taking into account the many parallels in the shape problems of hate speech and cyber security and surveillance take across the South Asian region as a result of shared cultures and historical legacies alike, participants will be invited from Bangladesh, India, Nepal, Pakistan, Afghanistan, Sri Lanka and the Maldives. Moreover, as solutions to these problems will invariably require collaboration among various stakeholders in the Internet governance field in order to be effective, participants will be drawn from a wide variety of stakeholder groups, including civil society, business, government, academia and the media from across the region. In this way, the meeting hopes tofacilitate a South Asia wide, multistakeholder dialogue, to learn, discuss and evolve more detailed thinking on these topics for one and a half days. The meeting will come to an end with a public event at the end of the second day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting will use a variety of formats, including key note presentations, panel discussions, case studies and small group conversations.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;January 14, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.00-09.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Welcome and introductions to participants&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;09.45-10.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Introduction to the meeting: the challenge that hate speech online and cyber security/surveillance pose to freedom of expression on the Internet – Dixie Hawtin&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Intro: Internet governance and human rights issues in general&lt;/li&gt;
&lt;li&gt;Why is this event focussed on hate speech and surveillance?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.15-10.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea/coffee break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.45-12.15&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;The challenge of hate speech on the Internet in South Asia Strengthening the right to freedom of expression to curtail hate speech (Anja Kovacs)&lt;/p&gt;
&lt;p&gt;Three country perspectives, from the Maldives (Mariyath Mohamed), Pakistan (tbc), and Bangladesh (Salim Khan)&lt;br /&gt;Moderator: Bishakha Datta&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.15-13:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.30-14.00&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Keynote: Thinking about a rights-based approach to cyber security and surveillance as it relates to speech – KS Park&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14.00-15.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Understanding cyber security and surveillance in South Asia today With Three country perspectives from Bangladesh (Mohammad Rahman), Nepal (Kailash Prasad Neupane) and India (Chinmayi Arun).&lt;br /&gt;Moderator: Pranesh Prakash&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15.30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea/coffee break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.00-17.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Legal and ethical questions and challenges when addressing cyber security and surveillance: two case studies – Rohan Samarajiva&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;January 15, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.00-9.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction to day 2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.15-9.45&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Cybersecurity, surveillance and hate speech online – key issues that need to be addressed in governance in order to protect Internet freedom of expession. This session will discuss particular issues that have relevance for both cyber security debates and hate speech issues in greater depth. Four topics that will be addressed are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The question of anonimity (KS Park)&lt;/li&gt;
&lt;li&gt;Cross-border cooperation and other jurisdictional issues in context of cloud computing and crossborder data flows and storage (Aditya Rao)&lt;/li&gt;
&lt;li&gt;Domain Names and registration (Babu Ram Aryal)&lt;/li&gt;
&lt;li&gt;Intermediaries as law enforcers (Suman Pradhan)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Moderator: Shahzad Ahmed&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.45-11.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea/coffee break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00-13.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;What kind of solutions could a rights-based approach throw up to the challenges raised so far in the meeting?&lt;/p&gt;
&lt;p&gt;Open discussion in groups and plenary, following key note speaker, Bulbul Monjurul Ahsan&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.00-13.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Summing up and thank you&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.30-15.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15:00 – 16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Meeting participants move to venue for public meeting, tea/coffee break and arrival of wider public&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.00-18.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PUBLIC EVENT: The Internet and freedom of expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Confirmed speakers include: Abu Taher, Info Commissioner; Iftekharuzzaman, Executive Director, Transparency International Bangladesh; Sarah Hossain, Lawyer and Honorary Executive Director, BLAST; Shaheen Anam, Executive Director, Manusher Jonno Foundation; Monjurul Ahsan Bulbul, eminent journalist and CEO, Boishakhi Television; and Rohan Samarajiva, Chair and CEO, LIRNEasia.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;List of Participants&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Aditya Rao, Senior Associate, Amarchand Mangaldas, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ahmed Swapan, Executive Director, VOICE, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Amrit Pant, General Secretary, Computer Association of Nepal &amp;amp; President, Information Technology Development Society, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Anja Kovacs, Project Director, Internet Democracy Project, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Babu Ram Aryal, President, Internet Society, Nepal Chapter, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Binaya Guragain, Coordinator of Programs, Equal Access, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bishakha Datta, Wikimedia Foundation Board Member &amp;amp; Co-founder, Point of View, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chinmayi Arun, Assistant Professor, National Law University Delhi &amp;amp; Fellow, Centre for Internet and Society, India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Dixie Hawtin, Project Manager for Digital Communications and Freedom of Expression, Global Partners and Associates, UK&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Farhana Rumki, Associate Programme Coordinator, VOICE, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kailash Prasad Neupane, Chief of Legal Section, Spokesperson, Secretary and Registrar, Nepal Telecommunications Authority, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Khairuzzaman Kamal, Founder Secretary General of Bangladesh Manobadhikar Sangbadik Forum &amp;amp; Senior Reporter at Bangladesh Sangbad Sangstha, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Khawaza Mainuddin, Executive Editor, ICE Business Times Magazine, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;K S Park, Executive Director, the PSPD Public Interest Law Center &amp;amp; Professor, Korea University Law School, South Korea&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mariyath Mohamed, Journalist, Minivan News, Maldives&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mohammad Nazmuzzaman Bhuian Emon, Associate Professor, Department of Law, University of Dhaka, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mohammad Shahriar Rahman, Assistant Professor, Department of Computer Science and Engineering, University of Asia Pacific &amp;amp; Head, Center for IT Security and Privacy, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Moiyen Zalal Chowdhury, Community Manager, Somewhere.In &amp;amp; Norad Fellow,Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Monjurul Ahsan Bulbul, Chair, International Press Institute &amp;amp; Editor-in-chief and CEO,Boiskakhi TV, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Prasanth Sunganathan, Counsel, Software Freedom Law Centre, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rezaur Rahman Lenin, Research Fellow, VOICE, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Richa Kaul Padte, Writer, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rohan Samarajiva, Chair and CEO, LIRNEasia, Sri Lanka&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Saleem Samad, Columnist &amp;amp; Correspondent at Reporters without Borders, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Salimullah Khan, Writer and Professor, Stamford University, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sana Saleem, Director, Bolo Bhi, Pakistan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Santosh Sigdel, Advocate and Vice President, Internet Society, Nepal Chapter, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shahzad Ahmed, Country Director, Bytes for All, Pakistan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shehla Rashid Shora, Project Officer, Internet Democracy Project, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shehnaz Banu, Media and Communication Officer, Alliance for Social Dialogue, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Soheil Zafar, Editor, Unmochan Blog &amp;amp; TV Producer and Researcher, 71 Television, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suman Lal Pradhan, CEO, Websurfer, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sushma Luthra, Event Coordinator, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Syeda Fedous Jana, Managing Director and Co-Founder of Somewhere.In, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tahmina Rahman, Director Bangladesh and South Asia Region, Article 19, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vasana Wickremasena, Executive Director, Centre for Integrated Communication Research and Advocacy, Sri Lanka&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression'&gt;https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-17T07:16:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac">
    <title>Response to RTI on Decisions of the Cyber Regulation Advisory Committee</title>
    <link>https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac</link>
    <description>
        &lt;b&gt;The Department of Electronics &amp; Information Technology, Ministry of Communications &amp; Information Technology responded to a right to information (RTI) application filed by Saket Bisani on behalf of the Centre for Internet &amp; Society on July 13, 2012 through notification No. 14(110)/2012-ESD, dated October 3, 2010.&lt;/b&gt;
        &lt;p class="Bodytext21" style="text-align: center; "&gt;&lt;b&gt;No. 14(110)/2012-ESD&lt;/b&gt;&lt;br /&gt;M/o Communiciations &amp;amp; Information Technology &lt;br /&gt; Department of Electronics &amp;amp; Information Technology &lt;br /&gt; Electronics Niketan, 6, CGO Complex &lt;br /&gt; New Delhi-110003&lt;/p&gt;
&lt;p class="Heading11" style="text-align: right; "&gt;&lt;b&gt;Dated:3.10.2012&lt;/b&gt;&lt;/p&gt;
&lt;p class="Heading11" style="text-align: center; "&gt;&lt;b&gt;Subject: RTI application received from Shri Saket Biswani&lt;/b&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;With reference to your RTI application dated 13.7.12 requesting for the following information.&lt;/p&gt;
&lt;p class="Bodytext21"&gt;&lt;span&gt;Question&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;a) Please provide me a list of the dates of each meeting of the CRAC held from October 18, 2000 till July 13, 2012?&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;b) Please provide me copies of the minutes of every meeting held by the Cyber Regulation Advisory Committee from October 18, 2000 till July 13, 2012.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;c) Provide me the list of all policy decisions that the CRAC has advised the Central Government on under section 88(3) (a) of the Information Technology.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;d) Provide me a list of all policy decisions that the CRAC has advised the Central Government on under section 88(3)(a) of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;The information as received from the custodian of the information is placed below:&lt;/p&gt;
&lt;p class="Bodytext21"&gt;&lt;span&gt;Answer&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext21"&gt;a) The meetings of CRAC were held on 6&lt;sup&gt;th&lt;/sup&gt; March, 2001 and 17-18 March, 2001.&lt;/p&gt;
&lt;p class="Bodytext21"&gt;b) Minutes of these two meetings of CRAC are attached.&lt;/p&gt;
&lt;p class="Bodytext21"&gt;c) No such advice was given by CRAC to DeitY under section 88(3)(a).&lt;/p&gt;
&lt;p class="Bodytext21"&gt;d) Information is attached.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: right; "&gt;&lt;img src="https://cis-india.org/home-images/Sign.png" alt="Kaushik Signature" class="image-inline" title="Kaushik Signature" /&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: right; "&gt;(A.K. Kaushik) &lt;br /&gt;Additional Director &amp;amp; CPIO &lt;br /&gt;(E-Security &amp;amp; Cyber Laws)&lt;/p&gt;
&lt;p align="left" class="Bodytext21"&gt;To: Shri Saket Bisani&lt;br /&gt; No. 194, 2&lt;sup&gt;nd&lt;/sup&gt; 'C' Cross, &lt;br /&gt;Domlur 2&lt;sup&gt;nd&lt;/sup&gt; Stage &lt;br /&gt;Bangalore-560 071&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;&lt;b&gt;Minutes of the First Meeting of the Cyber Regulation Advisory Committee (CRAC) held on March 6, 2001, at Electronics Niketan,&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;under&lt;/b&gt;&lt;b&gt; the Chairmanship of Hon’ble Minister* (IT) Shri Pramod Mahajan.&lt;/b&gt;&lt;/p&gt;
&lt;p class="Bodytext31" style="text-align: center; "&gt;(&lt;i&gt;List of Participants enclosed as Annexure-A&lt;/i&gt;)&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The chairman welcomed the participants to the First Meeting of the Committee. In his opening remarks he hoped that the Committee would play a constructive role in the implementation of the Information Technology Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;While introducing the Agenda (circulated ahead of the meeting), Controller of Certifying Authorities (CCA) made a short presentation on proposed "Regulation.; under section 89 of the IT Act" consisting of 18 proposed Regulations, Smart Card as token carrying Keys, and various suggested Amendments to the IT ACT 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;During the ensuing discussions, participants sought some time to study and collate associated inputs from their respective colleagues/specialists before offering any concrete suggestions/recommendations. Chairman agreed to the suggestions and postponed the meeting to 11:00 AM on the March 17, 2001 at the same venue. Based on the recommendation of Secretary (IT), members were requested to forward their inputs, if any, through e-mail within a weeks time to the following:&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;For Regulations wider section 89 of IT Act&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;For amendments to IT Act 2000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Shri K.N. Gupta (CCA) &lt;br /&gt;Room No. 4006,&lt;br /&gt;Electronics Niketan&lt;br /&gt;6 CGO Complex&lt;br /&gt;New Delhi 110003&lt;br /&gt;e-mail:&lt;a class="mail-link" href="mailto:kgupta@mit.gov.in"&gt;kgupta@mit.gov.in&lt;/a&gt;&lt;br /&gt;Tele: 436 3073&lt;br /&gt;Fax: 439 5982&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Shri A.B. Saha (Member Secretary)&lt;br /&gt;Room No. 2055,&lt;br /&gt;Electronics Niketan&lt;br /&gt;6 CGO Complex&lt;br /&gt;New Delhi 110003&lt;br /&gt;e-mail:&lt;a class="mail-link" href="mailto:saha@mit.gov.in"&gt;saha@mit.gov.in&lt;/a&gt;&lt;br /&gt;Tele: 436 0958&lt;br /&gt;Fax: 436 2924&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;Meeting ended with a vote of thanks to the Chair.&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Minutes of the Second Meeting of the Cyber Regulation Advisory Committee (CRAC) held on 17-18 March, 2001 at Electronics Niketan, New Delhi under the Chairmanship of Hon'ble Minister (IT), Shri Pramod Mahajan.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;(&lt;i&gt;List of Participants enclosed as Annexure-A&lt;/i&gt;)&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The chairman welcomed the participants to the second meeting of the Committee to consider further the draft regulations proposed by the Controller of Certifying Authority (CCA).        '    " ~&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;During the ensuing discussions, following general recommendations/decisions were arrived at governing the overall formulation of the regulations that are necessary to bring about infrastructure facilitating activities envisaged under the IT Act 2000:&lt;/li&gt;
&lt;/ol&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;a)  Any regulation to be framed by the Controller draws its authority only from Section 89(2) of the Act. Moreover,    such regulations should complement the Rules already framed under the Section 87 of the Act.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;b) To keep pace with the changing technology and standards, CCA may publicly notify/modify necessary specifications of technology, standards and procedures at regular interval (say, January of every year). Moreover, to adhere to the "principles of minimal governance", if any particular necessity emerges for inclusion of newer manifestations of any existing standard/technology/procedure, Controller should respond within ninety (90) days after receiving any specific request in writing, failing which it will deemed to have obtained his concurrence.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;c) The commercial practices/interests may form the essential pedestal for the certification process. Aspects of cross-certification may preferably be left to the purview of the concerned market forces. However, the necessary interoperability will essentially be "market-driven" and not "authority-driven". This will also ensure that formulated rules and regulations stay in tune with market realities.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;d) Strict adherence to open standards should be ensured to avoid emergence of monopoly of any kind.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;e) Considering cost sensitiveness of the requisite digital signature certificate, families of technologies varying in convenience, reliability, availability, robustness, etc. may be allowed to inter-operate. However, CCA may undertake public awareness campaign to promote desirable best practices from time to time.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;f)  The minimal regulations facilitating activities envisaged in the Act is desirable. Some of the proposed provisions can also be ensured in the form of "terms &amp;amp; conditions" governing the operations of Certifying Authorities.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;g)   Emergence of guidelines governing smooth functioning may be better left to publications brought out by industry associations, public-minded professionals etc. Formulating rules and regulations in these regards should be minimal.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;3. After framing the draft compilation of the requisite regulations in accordance with the conventional legal form in terms of content as well as structure with the assistance of the Ministry of Law, the regulations may be brought to the Ministry of Information Technology for approval.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;4 The Committee considered the 18 regulations proposed in Agenda Item No.1 and the statement reproduced below contains the decision taken against each proposal.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;SI&lt;/th&gt;&lt;th&gt;Item&lt;/th&gt;&lt;th&gt;Conclusions &lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Regulation 1&lt;br /&gt;Standardising on two key-pairs for PKI in the country.&lt;br /&gt;Key-pair generation for subscribers by CAs.&lt;/td&gt;
&lt;td&gt;Regulation not required. &lt;br /&gt;Encryption Key pair not part of the IT Act. &lt;br /&gt;Already covered under Rule 3, 4 &amp;amp; 5 of notified CA Rules.&lt;br /&gt;Subscriber should be at liberty to bring his key pair that CA may verify before acceptance. (Section 40 of the Act)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Regulation 2&lt;br /&gt;Encryption key-pair of subscribers to be maintained by CAs in a database and made available to enforcement and law agencies under directions of the Controller.&lt;/td&gt;
&lt;td&gt;Regulation not required.&lt;br /&gt;IT Act is silent regarding encryption.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Regulation 3&lt;br /&gt;Disclosure Record of CA.&lt;/td&gt;
&lt;td&gt;Disclosure may be done every six months. &lt;br /&gt;Necessary format for disclosure may be notified from time to time. (Para 2(f) above)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Regulation 4&lt;br /&gt;Encryption Key Pair of CA to be made available to the Controller.&lt;/td&gt;
&lt;td&gt;Regulation not required in accordance to conclusions against 1 &amp;amp; 2 above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Regulation 5&lt;br /&gt;Cross-Certification with foreign CAs.&lt;/td&gt;
&lt;td&gt;As per recommendation 2(c) above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Regulation 6&lt;br /&gt;Terms and Conditions subject to which license shall be issued by the Controller to the prospective CAs.&lt;/td&gt;
&lt;td&gt;Can be merged with regulation 11.&lt;br /&gt;As per the recommendation mentioned in 2(c) above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Regulation 7&lt;br /&gt;Standards that may be considered for different activities associated with the CAs functions including standardization of contents of the Certificates to be issued by CAs and standardization of the Certificate Revocation List.&lt;/td&gt;
&lt;td&gt;As per the recommendation 2(b) above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Regulation 8&lt;br /&gt;Information to be made publicly available by a CA on its website.&lt;br /&gt;Notice of suspension or revocation of license.&lt;/td&gt;
&lt;td&gt;CA must harness all form of networks and other practical media, and not only Internet, for disclosure to its subscriber and other interested parties.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Regulation 9&lt;br /&gt;Standardisation of Certificate Practice Statement.&lt;/td&gt;
&lt;td&gt;Agreed.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Regulation 10&lt;br /&gt;Compromise of subscribers Digital Signature Key-Pair&lt;/td&gt;
&lt;td&gt;Agreed.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;Regulation 11 &lt;br /&gt; Description of classes of Certificates.&lt;/td&gt;
&lt;td&gt;Shall be merged with regulation 6 above. &lt;br /&gt;In addition to 3 classes of certificates as identified by international bodies, the regulation should be open to additional classes of certificates, if required.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Regulation 12 &lt;br /&gt;Cross-Certification of CAs.&lt;/td&gt;
&lt;td&gt;It should be market-driven. (Recommendation 2(c) above).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;Regulation 13&lt;br /&gt;Incorporation of Controllers Public Key Certificate as the "root” in all web browsers in the country.&lt;/td&gt;
&lt;td&gt;Regulation not required.&lt;br /&gt;Need for integrating Controller's root key in&lt;br /&gt;the browsers may not be feasible.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Regulation 14&lt;br /&gt;Minimum key length for CAs and subscribers.&lt;/td&gt;
&lt;td&gt;Agreed for the provision of 1024 bits for subscriber/end-user and 2048 bits for CAs key pair.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;Regulation 15&lt;br /&gt;Audit of applicants to include manpower audit as well.&lt;br /&gt;Liability of CAs towards subscribers on account of their negligence.&lt;/td&gt;
&lt;td&gt;Regulation not required.&lt;br /&gt;Audit provision has already been covered&lt;br /&gt;under Rule 31 of CA rules notified by MIT.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Regulation 16&lt;br /&gt;Storage of Key-Pairs of CAs. &lt;br /&gt;Distribution of Key-Pairs / Certificates of subscribers by CAs.&lt;/td&gt;
&lt;td&gt;Not to be regulated. &lt;br /&gt;Recommendation 2(e) above shall be followed.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;Regulation 17&lt;br /&gt;Documents to be submitted to the Controller along with the application for obtaining license to operate as CA.&lt;/td&gt;
&lt;td&gt;Already covered under rule 10 of CA rules notified by MIT. Any additional information can be sought through the recourse of public notices from time to time.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;Regulation 18&lt;br /&gt;Upon acceptance of PKC by a subscriber, the PKC shall be published by the CA as required under the IT Act for access by the subscribers and relying parties.&lt;br /&gt;The CA will ensure the transmission of PKC and CRLs to the National Repository to be maintained by the Controller.&lt;/td&gt;
&lt;td&gt;Agreed.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;Meeting ended with a vote of thanks to the Chair.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="right" class="Bodytext1"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;span&gt;Annexure - A&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: left; "&gt;&lt;span&gt;First sitting of the second meeting of the “Cyber Regulation Advisory Committee” held on 17th March 2001 to consider adjourned agenda of the first meeting held on 6ft March 2001&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;&lt;span&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;List of Participants&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sh Pramod Mahajan, Minister, Information Technology                  - Chairman&lt;/li&gt;
&lt;li&gt;Sh.S.C Jain , Secretary, Legislative Department&lt;/li&gt;
&lt;li&gt;Sh Vinay Kohli, Secretary, Ministry of Information Technology&lt;/li&gt;
&lt;li&gt;Sh. N. Parameswaran, DDG(LR), Department of Telecommunications&lt;/li&gt;
&lt;li&gt;Dr. Jaimini Bhagwati, Ministry of Finance&lt;/li&gt;
&lt;li&gt;Maj.Gen. M. G. Datar, Addl.D.G, IT, Army HQ, Ministry of Defence&lt;/li&gt;
&lt;li&gt;Sh Mukesh Mittal, Dy Secy, Ministry of Home Affairs&lt;/li&gt;
&lt;li&gt;Sh T A Khan, Sr. Dir, NIC, Ministry of Commerce&lt;/li&gt;
&lt;li&gt;Sh. K.R Ganapathy,CGM-IC,RBI&lt;/li&gt;
&lt;/ol&gt;
&lt;p align="left" class="Bodytext1"&gt;10. Sh.S.R-Mittal,Adviser,DIT, Reserve Bank of India&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;11. Sh Dewang Mehta, President, NASSCOM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;12. Sh Amitabh Singhal, President, Internet Service Providers Association&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;13. Sh LN Behra, DIG, Director, Central Bureau of Investigation&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;14. Sh K N Gupta, Controller of Certifying Authority&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;15. Sh. Qamar Ahmed. Addl.C.P/Crime, DG Police by rotation from the States&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;16. Prof. R S Sirohi. I1T Delhi, Director, IIT Delhi&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;17. Sh.Sanjay Dhawan, ExecDirector,KPMG, Representing CII&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;18. Sh. M.A.J.Jeyaseelan, Secretary, FICCI&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;19. Sh. Subimal Bhattacharjee, Vice President ARGUS, Representing ASSOCHAM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;20.  Sh A B Saha, Senior Director, Ministry of IT                        - Member Convener&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt; &lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: left; "&gt;&lt;span&gt;First sitting of  the second meeting of the “Cyber Regulation Advisory Committee” held on  18th March 2001 to consider adjourned agenda of the first meeting held  on 6ft March 2001&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;&lt;span&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;List of Participants&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sh Pramod Mahajan, Minister, Information Technology                  - Chairman&lt;/li&gt;
&lt;li&gt;Sh.N.L. Meenu, Jt. Secretary, Legislative Department&lt;/li&gt;
&lt;li&gt;Sh Vinay Kohli, Secretary, Ministry of Information Technology&lt;/li&gt;
&lt;li&gt;Sh. N. Parameswaran, DDG(LR), Department of Telecommunications&lt;/li&gt;
&lt;li&gt;Dr. Jaimoni Bhagwati, Ministry of Finance&lt;/li&gt;
&lt;li&gt;Maj.Gen. M G Datar, Ministry of Defence&lt;/li&gt;
&lt;li&gt;Sh Mukesh Mittal, Dy Secy, Ministry of Home Affairs&lt;/li&gt;
&lt;li&gt;Sh T A Khan, Sr. Dir, NIC, Ministry of Commerce&lt;/li&gt;
&lt;li&gt;Sh. K.R Ganapathy,CGM-IC,RBI&lt;/li&gt;
&lt;/ol&gt;
&lt;p align="left" class="Bodytext1"&gt;10.  Sh Dewang Mehta, President, NASSCOM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;11.  Sh Amitabh Singhal, President, Internet Service Providers Association&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;12. Sh LN Behra, DIG, Director, Central Bureau of Investigation&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;13. Sh K N Gupta, Controller of Certifying Authority&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;14. Sh. Dinesh Bhatt, Dy. Police Commissioner, Delhi&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;15. Prof. R S Sirohi. I1T Delhi, Director, IIT Delhi&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;16. Sh.Sanjay Dhawan, ExecDirector,KPMG, Representing CII&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;17. Sh. M.A.J.Jeyaseelan, Secretary, FICCI&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;18. Sh. Subimal Bhattacharjee, Vice President ARGUS, Representing ASSOCHAM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;19.  Sh A B Saha, Senior Director, Ministry of IT                        - Member Convener&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;div&gt;&lt;/div&gt;
&lt;span&gt; &lt;/span&gt; &lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac'&gt;https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-09T15:26:26Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/i-and-p-partners-meeting.pdf">
    <title>I &amp; P Partners Meeting at Rio</title>
    <link>https://cis-india.org/openness/blog-old/i-and-p-partners-meeting.pdf</link>
    <description>
        &lt;b&gt;Sunil Abraham made a presentation on Open Business and IP.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/i-and-p-partners-meeting.pdf'&gt;https://cis-india.org/openness/blog-old/i-and-p-partners-meeting.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-01-07T12:22:36Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds">
    <title>Clash of the cyberworlds </title>
    <link>https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds</link>
    <description>
        &lt;b&gt;In an increasingly digital world, the issue of Internet freedom and governance has become hugely contested. Censorship and denial of access occur across the political spectrum of nations, even in liberal democracies. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Latha Jishnu, Dinsa Sachan and Moyna was published in &lt;a class="external-link" href="http://www.downtoearth.org.in/content/clash-cyberworlds?page=0,0"&gt;Down to Earth magazine's January 15, 2013 issue&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In run-up to the just-concluded World Conference on International Telecommunications in Dubai, there was a frenzied campaign to ensure that governments kept their hands off the Internet. It was feared the International Telecommunications Union, a UN body, was aiming to take control of the Internet. That hasn’t happened. But the outcome in Dubai has highlighted once again the double speak on freedom by countries that claim to espouse it and by corporations interested in protecting their interests, says Latha Jishnu, who warns that the major threat to the Internet freedom comes from the wide-ranging surveillance measures that all governments are quietly adopting. Dinsa Sachan speaks to institutions and officials to highlight the primacy of cyber security for nations, while Moyna tracks landmark cases that will have a bearing on how free the Net remains in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For months now a little-known UN agency, the International Telecommunication Union (ITU), has been looming large in cyberspace, portrayed as an evil force plotting to take over the Internet and threatening to destroy its freedom by rewriting archaic regulations. ITU, set up in 1865, is primarily a technical body that administers a 24-year-old treaty, International Telecommunication Regulations (ITRs), which are basic principles that govern the technical architecture of the global communication system.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ITU.png" alt="ITU" class="image-inline" title="ITU" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;How did the 193-nation ITU, which regulates radio spectrum, assigns satellite orbits and generally works to improve telecom infrastructure in the developing world, turn into everyone’s favourite monster in the digital world? The provocation was ITU’s World Conference on International Telecommunications (WCIT) in Dubai, where ITRs were proposed to be revised. Leaked documents of the proposals made to ITU had shown that statist countries like Russia and China, known for their crackdown on Internet freedom, had put forward proposals to regulate digital “crime” and “security” aspects that are currently not regulated at the global level for want of consensus on balancing enforcement with protection of individual rights. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Other proposals were about technical coordination and the setting up of  standards that enable all the devices, networks and software across the  Internet to communicate and connect with one another. Although ITU  secretary general Hamadoun I Touré had emphasised that the Dubai WCIT  was primarily attempting to chart “a globally agreed-upon roadmap that  offers future connectivity to all, and ensures sufficient communications  capacity to cope with the exponential growth in voice, video and data”,  there was widespread scepticism among developed countries.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt;Online subversion in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;AT the seventh annual meeting of the Internet Governance  Forum in Baku, Azerbaijan, last November, Minister for Communications  and Information Technology Kapil Sibal was a star turn. He made an  elevating speech about the need to put in place a “collaborative,  consultative, inclusive and consensual” system for dealing with policies  involving the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India, with 125 million Internet users—a number that “is  likely to grow to about half a billion over the next few years”—would be  a key player in the cyberworld of tomorrow, he promised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the minister, Internet governance was an  oxymoron because the concept of governance was for dealing with the  physical world and had no relevance in cyberspace. These were high  sounding words that crashed against the reality of India’s paranoia over  online subversion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For starters, Sibal flew into a media blitz over Google’s  transparency Report which ranked India second globally in accessing  private details of its citizens. Even if it was a far second behind the  US, it was an embarrassing revelation for the government which appears  to have been rather enthusiastic in seeking information on the users of  its various services. Such user data would include social networking  profiles, complete gmail accounts and search terms used. In the first  half of 2012, India made 2,319 requests related to 3,467 users compared  with 7,969 requests by the US. Globally, Google clocked a total of  20,938 requests for user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few days down the line there was a public explosion  over the arrest of two young women in Palghar, near Mumbai, for posting a  prosaic comment on Facebook over Bal Thackeray’s death. Thanks to the  deliberately vague wording of Section 66A of the IT Act, such arrests  have become common and Rajya Sabha devoted a whole afternoon to discuss  the impugned legislation and seek its withdrawal. Sibal’s response has  been to issue guidelines on the use of this Section which civil society  organisations say will do nothing to sort out matters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there are the IT (Intermediaries Guidelines) Rules,  2011, issued under Section 79 of the IT Act, which have been used  indiscriminately by business interests to shut down websites, resulting  in unbridled censorship of the Internet time and again. Although a  motion for its annulment was moved in Parliament by Rajya Sabha member P  Rajeeve, it was withdrawn after Sibal promised to talk to all  stakeholders. A host of MPs have termed the rules a violation of right  to freedom of speech besides going against the laws of natural justice.  The promised meeting of stakeholders has not yielded any results and  censorship on grounds of possible online piracy continues. In this  regard, India is more restrained than the US which has pulled down huge  numbers of domains on the ground they were violating intellectual  property by selling pirated goods.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/userdata.png" alt="User Data" class="image-inline" title="User Data" /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Western global powers, behemoth Internet companies, private telecom corporations and almost the entire pack of civil liberties organisations came together in a frenzied campaign to ensure that ITU kept its hands off the Internet. Massive online petitions were launched, backed by Internet companies such as search engine Google and social networking service Facebook. The Internet, they said, should not become an ITU remit because it would change the multi-stakeholder approach, which currently marks the way the Internet is governed, and replace it with government control that would curb digital freedom. Not only did the US administration oppose the revision of ITRs, the US Congress also passed a rare unanimous resolution against the WCIT proposals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the end, it was an anti-climax: nothing much came of these proposals. Although WCIT was marked by high drama—a walkout by the US and six European countries, a show of hands on a contested but innocuous resolution and an unexpected vote—the “final acts” (&lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf&lt;/a&gt;) or the changes in ITRs make no mention of the I word. Not once. The 30-page document states at the outset that “these regulations do not address the content-related aspects of telecommunications” —an indirect reference to the Internet.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/32_20130115.jpg" alt="World Internet Usage" class="image-inline" title="World Internet Usage" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Ultimately, it was a triumph of the US-led position even if 89 of the 144 eligible countries signed it. Most of the developed countries refused to sign it. Nor, unexpectedly, did India, and thereby hangs a curious tale. Officials who were privy to the negotiations told Down To Earth that India was all set to sign the new ITRs when its delegation got last-minute instructions from Delhi not to endorse them. “It was unexpected and a let-down for India and our global allies,” confesses an official of the Ministry of Communications &amp;amp; IT. “There was nothing in the final document that we had objections to.” According to the grapevine, Minister for Communications and Information Technology Kapil Sibal was facing pressure from two sides: the US Administration and domestically from civil society, Internet service providers and the private telecom players who had objected to India’s proposals on ITRs. The US is known to be keeping a close eye on what India decides to do on the new treaty which it can still ratify.&lt;/p&gt;
&lt;p&gt;In the Dubai treaty, the only ITR that does impinge on the Net is (Article 5B) on unsolicited bulk electronic communications or spam. But even here, what it merely states is that member-states should endeavour to take necessary measures to prevent the “propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In many ways, what took place during the hectic days before and during the December 3-14 WCIT was in a broad sense a replay of the Cold War scenario of the good (freedom-loving countries) versus evil (authoritarian or autocratic regimes), although alliance may have shifted in the two blocs. What is clear is that a larger geopolitical fight is playing out with the Internet as disputed terrain. American analysts themselves have pointed out that the “US got most of what it wanted. But then it refused to sign the document and left in a huff.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even the innocuous Article 5A, which calls on members “to ensure the security and robustness of international telecommunication networks”, was interpreted by US delegation head Terry Kramer as a means that could be used by some governments to curb free speech!&lt;br /&gt;&lt;br /&gt;As an outraged Saudi delegate said, “It is unacceptable that one party to the conference gets everything they want and everybody else must make concessions. And after having made many concessions, we are then asked to suppress the language which was agreed to. I think that that is dangerous. We are on a slippery slope.” The final outcome: all the contentious issues were relegated to resolutions, which have no legal basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the US has managed to get its way on most issues: protecting the mammoth profits of its Internet companies and ensuring that control of the Internet address system, now done by a group based in the US, will not be shared with other ITU members. And, the likes of Google (2011 profit: $37.9 billion) and Facebook will not have to pay telecom companies for use of their networks to deliver content.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Challenges of securing cyberworld&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;E-commerce in India, where every tenth person is online, is on the rise—and, consequently, crime on the Internet. In 2011, the country’s nodal agency for handling cyber crime, Indian Computer Emergency Response Team, tackled 13,301 incidences of security breach. The incidents ran the gamut from website intrusions, phishing to network probing and virus attacks. Further, in 2009, 2010, 2011 and 2012 (until October), there were 201, 303, 308 and 294 cyber attacks respectively on sites owned by the Indian government. Most notably, hacker group Anonymous defaced the website of Union Minister of Communications and Information Technology, Kapil Sibal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To beef up cyber security, the Union ministry plans to pump in Rs 45 crore in 2012-13. It also put up a draft cyber security policy for public comments in 2011. Currently, cases involving cyber security and crime are handled under the IT Act of 2000 (Amendment 2008) and the Indian Penal Code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But will the government go about its business of securing the Net in a responsible manner? There is scepticism. Section 69 of the Act gives any government agency the right to “intercept, monitor or decrypt” information online. Chinmayi Arun, assistant professor of law at National Law University in Delhi, said at the Internet Governance Conference held at FICCI in October that crimes like defamation are not on the same page as cyber terrorism, and “we have to question whether they warranty invasion of privacy”. She added that the workings of the surveillance system has to be made more open to build public trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at Centre for Internet and Society (CIS) in Bengaluru, draws attention to a fundamental flaw in the section. “Government is allowed to wire tap under the Telegraph Act, 1885. But the Act lays out specific guidelines for such an action. For example, you can only tap phones in the case of a ‘public emergency’ or ‘public safety’ situation. The IT Act does not put such limitations on interception of information,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cyber security and ITU&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few months prior to the controversial World Conference on International Telecommunications in Dubai, countries, including Russia and Arab states, had proposed measures that would, through International Telecommunication Union (ITU), grant disproportional power to countries to control the Internet in the name of security measures. Several proposals, most notably those of India and Arab States, explicitly stated in the proposed Article 5A that countries should be able to “undertake appropriate measures, individually or in cooperation with other Member States” to tackle issues relating to “confidence and security of telecommunications/ICTs”. It raised alarm among civil society. US-based think tank Center for Democracy and Technology (CDT) said in its report dated September, 2012, that cyber security does not fall under the ambit of International Telecom Regulations, and some countries would misuse such privileges for “intrusive or repressive measures”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposal by African member states recommended that nations should “harmonise their laws” on data retention. In other words, intermediaries would have to retain public data for a long period so that governments can access it whenever they please. With regard to this, CDT noted, “Not only do national laws on data retention vary greatly, but there is ongoing controversy about whether governments should impose data retention mandates at all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A clause in the Arab proposal on routing said, “A Member State has the right to know how its traffic is routed.” Currently, the way Internet works, senders and recipients do not know how data between their computers travels or is routed. However, enabling countries to have control over routing has its dangers. CDT notes, “(This) would simply not work and could fundamentally disrupt the operation of the Internet.” Internet traffic travels over an IP network. While travelling, it is fragmented into small packets. Packets generally take a different path across interconnected networks in many different countries before reaching the recipient’s computer. CDT notes providing routing information to countries would require “extensive network engineering changes, not only creating huge new costs, but also threatening the performance benefits and network efficiency of the current system”. Although routing was not part of India’s proposal, Ram Narain, deputy director general at the department of telecommunications, told Down To Earth it was one of the country’s concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, to civil society’s partial relief, such draconian cyber security clauses were not adopted in the new itr treaty. Two clauses added to the treaty, Article 5A and 5B, address some cyber security concerns. Titled “Security and robustness of networks”, Article 5A urges countries to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks”. Article 5B talks about keeping tabs on spam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanth Sugathan, senior advocate with Software Freedom Law Centre, an international network of lawyers, says while he would have preferred that the two clauses were kept out of the new treaty, they do not seem harmful. “They are a much toned down version of what Arab states and Russia had suggested,” he says.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is one reason India, Brazil and other democracies from the developing world also want a change in ITRs. They want the Internet behemoths to pay for access to their markets so that such revenues can be used to build their own Internet infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the furious debate on keeping the Net free of international control even hawk-eyed civil society organisations prefer to ignore the monetary aspects of Net control. Some analysts believe that maintaining the status quo is not so much about protecting the values of the Internet as about safeguarding interests, both monetary and hegemonistic. Such an assessment may not be wide of the mark if one joins the dots. Google, says a Bloomberg report of December 10, “avoided about $2 billion in worldwide income taxes in 2011 by shifting $9.8 billion in revenues into a Bermuda shell company, almost double the total from three years before”. It also said that the French, Italian, British and Australian governments are probing Google’s tax avoidance in its borderless operations.&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Top10Internet.png" alt="Top 10 Internet" class="image-inline" title="Top 10 Internet" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;What is clear, however, is that a number of countries for reasons springing from different motivations, appear determined to undermine America’s control of the outfits that now define how the Internet works. Although the US maintains that ICANN (Internet Corporation for Assigned Names and Numbers) is a private, non-profit corporation, it is overseen by the US Commerce Department. According to People’s Daily, what the US spouts about Net freedom is so much humbug. In an August 2012 report, the leading Chinese daily claimed the US “controls and owns all cyberspaces in the world, and other countries can only lease Internet addresses and domain names from the US, leading to American hegemonic monopoly over the world’s Internet”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also highlighted a fact that has slipped below the radar. During the Iraq invasion, the US government asked ICANN to terminate services to Iraq’s top-level domain name “.iq” and thereafter all websites with the domain name “.iq” disappeared overnight. It charges the US with having “taken advantage of its control over the Internet to launch an invisible war against disobedient countries and to intimidate and threaten other countries”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this may be true, the irony is that China, with its great firewall of censorship, is in no shape to position itself as a champion of freedom. Like other authoritarian countries, it will do everything to police the Net and control it.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The right of countries and peoples to access the Net was highlighted in Dubai when some African countries raised the issue of US control of the global Internet. Some of these, such as Sudan, have long been complaining about Washington’s sanctions that entail denial of Internet services. ITU officials point out that Resolution 69, first passed in the 2008 meeting, invoked again in 2010 and dusted off once again for the WCIT negotiations, invoked “human rights” to argue for “non-discriminatory access to modern telecom/ ICT facilities, services and applications”. Says Paul Conneally, head of Communications &amp;amp; Partnership Promotion at ITU, “The real target of these resolutions are US sanctions imposed on nations that are deemed bad actors. These sanctions mean that people in those countries—not just the government, mind you, but everyone, innocent and guilty alike—are denied access to Internet services such as Google, Sourceforge, domain name registrars such as GoDaddy, software and services from Oracle, Windows Live Messenger, etc.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The catalogue of Sudan’s complaints shows at least 27 instances in 2012 when companies from Google to Microsoft and Paypal to Oracle cut off their services to the African country. This might explain why major companies would be opposed to the resolution on a right to access Internet services. Such a right would allow countries to use ITRs to compel them to provide services they might otherwise have preferred not to. But so far all such sanctions appear to have been a decision of the US Administration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem of the digital divide, in fact, did not get the headlines it should have. Africa accounts for just 7 per cent of the 2.4 billion people who use the Net worldwide and penetration in the region is just 15.6 per cent of the population. Compare this with North America where over 78 per cent are linked to the digital world and Touré’s logic about the ITU’s mandate appears reasonable.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;&lt;span&gt;When Apple censors the drone war&lt;/span&gt;&lt;/b&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;NETIZENS know that the Internet suffers from the  depredations of government, hackers and viruses. But not many are aware  that companies are as prone to taking legitimate stuff off the Net on  the flimsiest grounds. In the case of Apple it could have been misplaced  patriotism or plain business sense that prompted it to block an app  which monitors drone strike locations in November last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img align="left" alt="image" class="standalone-image" height="279" src="http://www.downtoearth.org.in/dte/userfiles/images/36_20130115.jpg" width="141" /&gt;The  App Store rejected the product, calling it “objectionable and crude”.  Drones+ (see photo) is an application that simply adds a location to a  map every time a drone strike is reported in the media and added to a  database maintained by the UK’s Bureau of Investigative Journalism. Josh  Begley, a graduate student at New York University, who developed the  app, says it shows no visuals of war or classified information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All it does is to keep its users informed about when and  where drone attacks are taking place in Pakistan and Afghanistan. “This  is behavior I would expect of a company in a repressive country like  China, not an iconic American company in the heart of Silicon Valley,”  says a petition to the company CEO. Did Apple’s censorship have anything  to do with the fact that it received huge contracts from the Pentagon?  US legislators have joined the protests against Apple.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most brazen act of corporate censorship occurred in  August 2012 with NASA’s livestream coverage of the Curiosity rover’s  landing on Mars in the space agency’s $2.5 billion mission. A news  agency, Scripps, coolly claimed as its own the public domain video  posted on NASA’s official YouTube channel that documented the epic  landing (see our opening visuals). “This video contains content from  Scripps Local News, who has blocked it on copyright grounds. Sorry about  that,” said a message on NASA’s blackened screen. So much for the  strict US laws aimed at curbing online piracy!&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Touré noted that the revised ITRs would see greater transparency in global roaming charges, lead to “more investment in broadband infrastructure” and help those with disabilities. But he was hopeful that the new treaty signed in Dubai would make it possible for the 4.5 billion people still offline to be connected. “When all these people come online, we hope they will have enough infrastructure and connectivity so that traffic will continue to flow freely,” Touré said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But should ITU govern the Net? Not in its entirety, according to experts. For one, ITU until the Dubai meeting was far from being transparent and does not allow participation of civil society or other stakeholders in its negotiations unless they are part of the official delegation of the member-states. In fact, even critics of the current system, who think the system is lopsided and hypocritical, believe ITU needs to reform itself and confine to the carrier/infrastructure layer of the Internet. Nor should it get into laying down standards which is done by Internet Engineering Task Force (IETF) and the naming and numbering that is managed by ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Conneally counters this by asking what would happen if the US decided to deny domain name root zone to Iran because of its bad human rights record. “Suppose it ordered Verisign to remove .IR from the DNS root and make it non-functional. Would we want ICANN/the Internet governance regime to be used as a political/strategic tool to reform Iran? What happens to global interoperability when the core infrastructure gets used in that way?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Who then should ensure that the Internet is run in a free and open manner? Should it be the Internet Governance Forum (IGF)? But IGF is to be an open consultative forum that cannot by itself govern. It brings in participation for any or all Internet-related policy processes but it by itself was never supposed to do policy or governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parminder Jeet Singh, executive director of ItforChange, says whoever governs is the government for that purpose. “This truism is significant in the present context, because there is an attempt by those who really control/ govern the Internet at present, largely through illegitimate and often surreptitious ways, to confuse issues around Internet governance in all ways possible, including through abuse of established language and political principles and concepts.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITforChange is a Bengaluru institution working on information society theory and practice, especially from the standpoint of equity, social justice and gender equality, and it is that perspective which informs Singh’s suggestions. “What we need are safeguards as, for instance, with media regulation. The Internet, of course, is much more than media. It is today one of the most important factors that can and will influence distribution of economic, social and political power. Without regulation it will always be that those who currently dominate it will take away the biggest pie.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;&lt;span&gt;Surveillance club&lt;/span&gt;&lt;/b&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Eight Indian companies are among the 700 members of  European Telecommunications Standards Institute. The group works with  government and law enforcement agencies to integrate surveillance  capabilities into communications infrastructure. It also hosts regular  meetings on lawful interception&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt; Wipro Technologies &lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt; Associate Service Providers&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;•  HCL Technologies Limited&lt;/td&gt;
&lt;td&gt;• Associate Consultancy for Co./Partnership&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Accenture Services Pvt Ltd&lt;/td&gt;
&lt;td&gt;• Observers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• CEWiT&lt;/td&gt;
&lt;td&gt;• Associate Research Body&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Saankhya Labs Pvt Ltd&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Sasken Communication&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Technologies&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• SmartPlay Technologies&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Associate Consultancy for Co./Partnership&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• TEJAS NETWORKS LTD&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Other critics of the current system concede that bringing governments on board, especially authoritarian and statist powers which the digital world threatens, would give them perverse incentives to control it. But this threat should be met not by insisting that the Internet needs no governance or regulation, but by safeguards that ensure equitable access and benefits, Singh stresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the jury is out on the question whether the new ITRs will make any material difference to the way, and if at all, the Net will come under added government oversight and intervention, developments elsewhere show that ITU is not the main threat to digital freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The irony is that while cyber security is contentious in ITU, other international organisations, such as the UN Office on Drugs and Crime (UNODC) and a clutch of influential telecom industry associations, are pushing for surveillance programmes that ensure policing of a high order with sophisticated infrastructure to monitor online communications. A host of countries already have such systems in place and are pressuring countries like India to fall in line.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A UNODC report, titled ‘The use of the Internet for terrorist purposes’, has detailed how countries can and should use new technology for online surveillance—all in the name of anti-terrorism. The report discusses sensitive issues such as blocking websites and using spyware to bypass encryption and also urges countries to cooperate on an agreed framework for data retention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, powerful industry bodies, such as ATIS (Alliance for Telecommunications Industry Solutions) and the European Telecommunications Standards Institute (ETSI), are reported to be working with government and law enforcement agencies to integrate surveillance capabilities into communications infrastructure, according to Future Tense, a project which looks at emerging technologies and how these affect society, policy and culture. It says India is under pressure from another industry organisation, the Telecommunications Industry Association (TIA), “to adopt global standards for surveillance”, calling on the country’s government to create a “centralized monitoring system” and “install state-of-the-art legal intercept equipment”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TIA is a Washington-based trade group which brings together companies such as Nokia, Siemens Networks and Verizon Wireless, and is focused on issues related to electronic surveillance and is developing standards for intercepting VOIP and data retention alongside with ETSI and ATIS. At least seven Indian companies are members of ETSI, which is said to hold international meetings on data interception thrice a year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Add to this chilling list the International Chamber of Commerce. It is reported to be seeking the establishment of surveillance centre hubs of several countries to help governments intercept communications and obtain data that is stored in cloud servers in foreign jurisdictions. Given this backdrop why are the US and its cohorts creating a ruckus on ITRs?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would also mean that by focusing on ITRs and ITU as a major threat to Internet freedom civil society may be jousting at windmills.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Malice and freedom of speech&lt;/h2&gt;
&lt;p&gt;&lt;i&gt;Two suits highlight the challenge of treading between the two&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the many legal cases in India related to the use and misuse of the world wide web, two stand out for involving web giants and provoking sharp reaction. These are the cases registered in Delhi district courts in December 2011, objecting to chunks of content—portraying prominent political figures and religious places among others in a certain light—hosted on websites. One was filed by a Delhi journalist, Vinai Rai, requesting the court to press criminal charges against 21 web agencies, including Google, Facebook and Yahoo! India. The other, filed by a social activist, M A A Qasmi, was a civil suit requesting action against 22 web agencies. Both mentioned that the content on the websites was inflammatory, threat to national integrity, unacceptable, and created enmity, hatred and communal discord.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Source: Google Transparency Report" height="233" src="http://www.downtoearth.org.in/dte/userfiles/images/37_20130115.jpg" title="Source: Google Transparency Report" width="457" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A year on, tangible impact has not been much. The number of accused in the civil case has come down to seven web agencies and in the criminal case the government is yet to issue summons to the companies concerned (see ‘The case so far’). However, these litigations are seen as landmarks in the recent history of the Internet and its interaction with societies and governments. The cases—especially off-the-record comments by the judiciary suggesting blanket ban and pre-screening of all content—provoked a debate on the freedom of expression and Indian cyber laws.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The case so far &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;JANUARY 13, 2012:&lt;/b&gt; Delhi High Court dismisses petition by Google and Facebook asking to be absolved of criminal charges filed in district court&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;JANUARY 20:&lt;/b&gt; High Court asks for reply from Delhi Police in response to plea by Yahoo! India challenging district court summons&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;FEBRUARY 16:&lt;/b&gt; Court refuses to stay proceedings against Facebook and Google but allows them to be  represented by counsel&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MARCH:&lt;/b&gt; Court dismisses  criminal charges against Yahoo! India  and Microsoft but says the charges  can be revived if new evidence comes  to light. Sets aside summons&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Malicious content exists on the web and may even need to be taken down, but the laws used to remove malicious content can also be used to curb political speech, thus, infringing on the right to freedom of expression, says Prasanth Sugathan, senior advocate with Software Freedom Law Centre, an international network of lawyers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some like Pranesh Prakash of non-profit Centre for Internet and Society believe the IT Rules are at odds with the IT Act and give powers for censorship. He explains that the IT Act, 2000, provides for protection of intermediaries; web browsers, social networking sites and websites cannot be held responsible for what a third party publishes on their forums—“similar to the way in which we cannot sue a telephone agency or a post office for someone else making use of these platforms to harass or defame another person”. But the IT rules of 2011 watered down this protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supreme Court advocate and cyber law expert Pavan Duggal explains how. The Act states once a complaint is made against certain content, the web agency hosting it must notify the person who put up the content, verify the content and judge whether it needs to be removed. But the rules state that once the web agency is notified it must remove the content within 36 hours or it could be prosecuted for not acting on the complaint. The rules have gone beyond the Act’s scope, especially vis-a-vis privacy and data protection, leaving no scope for hearing out the accused, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disjunct between the Act and the rules is being contested in  various spheres, including Parliament. But there is a bright side too.  Duggal believes the cases have brought pertinent issues, like free  speech and privacy concerns, into the public domain. Ramanjeet Chima,  policy adviser for Google, says freedom of expression is paramount for  Google but the recognition of local sentiments is also being given equal  weightage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior advocate Sidharth Luthra, who was representing Facebook in the  Delhi High Court, wonders whether the existing Indian laws are in tune  with the ever-changing online world. Unwilling to comment on the case,  he says the law is limited in its scope, while technology is not.  Refusing to comment on the cases, the Google adviser emphasised the need  to use the existing provisions of big web agencies to address  grievances regarding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet “is not the wild wild west”; all content, users and  viewers can be traced, Duggal cautions. Since the Internet can impact  political issues government is increasingly looking for ways to control  it. “There is no ideal solution but it is evident that some monitoring  and regulation are required, and in all parts of the world all regimes  are in the process of addressing this,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds'&gt;https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-15T06:57:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-january-6-2013-what-is-needed-is-user-centric-design-not-good-intentions">
    <title>What's Needed Is User-Centric Design, Not Good Intentions </title>
    <link>https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-january-6-2013-what-is-needed-is-user-centric-design-not-good-intentions</link>
    <description>
        &lt;b&gt;The inadequacy of essentials and conveniences around us results from a slack approach to both design and execution. We know we are deficient in execution, but we need to be more aware of deficiencies in approach and design. Good intentions, while important, cannot substitute for good systems design and execution.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Shyam Ponappa's column was published in &lt;a class="external-link" href="http://organizing-india.blogspot.in/2013/01/whats-needed-is-user-centric-design-not.html"&gt;Organizing India Blogspot&lt;/a&gt; on January 6, 2013 and in the &lt;a class="external-link" href="http://www.business-standard.com/india/news/shyam-ponappa-design-not-good-intentions/497562/"&gt;Business Standard&lt;/a&gt; on January 3, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Things That Work…&lt;/b&gt;&lt;br /&gt;Simple aspects of  everyday living that actually work in India can leave one wonderstruck.  Like the daily newspapers, organised and delivered seamlessly,  reasonably early in the day, almost regardless of where one lives  provided it’s a city or town. Or the availability of milk, eggs, bread,  vegetables, fruit, and whatever else for daily provisions. And this  despite the supposed shortcomings of our logistics and organisation in  the context of wholesale and retail markets. Some of the revolutions  that we’ve lived through in the last two decades include the  manifestation of such wonders, like the phenomenal and ubiquitous growth  in the supply of dairy and poultry products.&lt;br /&gt; &lt;br /&gt; On a different plane, as  it were, are the changes in the quality of automobiles and the  improvements in India’s roads, although patchy and considerably lagging.  Likewise, there have been revolutions in mobile communications and in  air travel, disregarding anomalies such as the horror of Mumbai airport  on private airlines, with its incompetent cab mafia on arrival, and a  disorganised and demeaning crush on departure, squeezing past crowded  boarding gates. (This is the state of the commercial capital? Woe betide  us — but I digress...) Another source of wonder is the performance of  the Indian Railways. Much abused by exploitative politicians, given  short shrift on everything from cleanliness and toilets to much else,  overloaded by hapless passengers in desperate need of transportation.  One can only marvel at these services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;…And Things That Don’t&lt;/b&gt;&lt;br /&gt;And yet, there are  debilitating areas that seem utterly intractable, like sanitation,  water, power supply and communications services for data (apart from  voice).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Comparing the state of  sanitation or power with the railways, one might say the latter had the  benefit of being set up as an integrated system since the 1850s,  although deprived in recent times of systematic development and  investment, and so reduced to decrepitude. By contrast, sanitation has  been playing catch-up on our old, established society, behind the curve  for hundreds of years, never having had the advantage of installation as  &lt;i&gt;ab initio&lt;/i&gt; systems. Open drains are an Indian feature, even in  Delhi. A similar situation obtains in power supply, where the  contradictions and inequities of piecemeal, encapsulated interventions  that tried to address power generation first were followed by sporadic  efforts to address transmission and distribution, with realpolitik all  the while playing to the users’ self-indulgence of having it all without  paying for it. This sense of entitlement without accountability has  resulted in the vicious circle of “free power” that leads to no power,  annihilating possibilities for improvement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In communications  services for data (broadband), we have a different kind of problem. For  one, governments, citizens and activists don’t seem to get it that these  services are as essential to infrastructure as energy and  transportation. There is no logic to their exclusion, but it has taken  the National Telecom Policy of 2012 (NTP-2012) to announce the objective  that telecom is part of infrastructure, although the associated  benefits, such as lower interest rates, are yet to follow.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User-Centric Systems&lt;/b&gt;&lt;br /&gt;The malady with sectors such as power, communications and transport is that solutions seem to be designed without an integrated, end-to-end, goal-oriented perspective favouring users. For instance, otherwise successful initiatives like the Delhi Metro provide services from an islanded “product perspective” that is simply not user-centric in its orientation. This results in insufficient feeder buses, inadequate parking at the Metro stations, a gaggle of disorganised cycle-rickshaws at stations like Mayur Vihar, and so on. Instead of being an unadulterated blessing, a Metro station in the neighbourhood becomes a curse, because user needs are not treated as being central to the delivery of the service. Passengers are left floundering while people in the environs (like the denizens of Mayur Vihar) are left to fend for themselves. There is also the question of capacity and demand. Again, the “product perspective” results in overcrowding and other inconveniences. On the flip side, well-meaning though misguided critics attack attempts to build capacity in anticipation of demand, as was the Metro by proponents of a Bus Rapid Transit system pushing for the latter as a silver bullet instead of as an adjunct.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What Could Have Been, But Isn’t Yet&lt;br /&gt;&lt;/b&gt;&lt;span&gt;The Unique  Identification Authority of India’s Aadhaar augured a potentially  revolutionary electronic enabler. In practice, however, its design has  been baffling. A brilliant concept – abstracting a smart identification  number from a smart card – has been reduced to an identifier for cash  transfers to bank accounts. The question is, why to bank accounts and  not to transactions, whether for retail or for services, activated by a  mobile phone? Kenya’s M-Pesa was the pioneer for mobile money transfer,  subsequently enhanced to include interest earned on virtual accounts.&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt; Introduced in India by ICICI Bank with Vodafone in November 2012 and  State Bank of India in January 2013, not only would this be much more  practicable as the majority of our population doesn’t have bank  accounts, it would cost far less, while being much more convenient for  users. It would obviate setting up millions of physical micro-accounts  at relatively high cost at banks, as well as giving users proximate  access to products and services.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Another puzzling aspect  is the contradictory, sometimes changing signals about Aadhaar. It is  supposedly voluntary, yet reportedly mandatory now for marriage  registrations, yet not accepted by banks for account opening, nor by  some mobile phone operators, nor for passport applications, nor for  driver’s licences. And inexplicably, except as a ruse to garner votes  from non-citizens, it is for all residents (who choose to apply?), and  although it could include citizenship information, it doesn’t.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It is best to start out  right, recognising that we need user-centric, end-to-end systems design  and execution, and apply this approach across the board going forward.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. &lt;a class="external-link" href="http://on.ft.com/UpzONs"&gt;http://on.ft.com/UpzONs&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-january-6-2013-what-is-needed-is-user-centric-design-not-good-intentions'&gt;https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-january-6-2013-what-is-needed-is-user-centric-design-not-good-intentions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2013-01-25T11:26:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/national-resource-kit-tamil-nadu-chapter">
    <title>National Resource Kit - Tamil Nadu Chapter</title>
    <link>https://cis-india.org/accessibility/blog/national-resource-kit-tamil-nadu-chapter</link>
    <description>
        &lt;b&gt;The Tamil Nadu chapter draft is put up for comments.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/national-resource-kit-tamil-nadu-chapter'&gt;https://cis-india.org/accessibility/blog/national-resource-kit-tamil-nadu-chapter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-01-23T10:58:50Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mobile-india-2013">
    <title>Mobile Broadband: Leveraging for Business Transformation </title>
    <link>https://cis-india.org/news/mobile-india-2013</link>
    <description>
        &lt;b&gt; Mobile India 2013 is being held at the Chancery Pavillion, Bangalore on 9 January 2013. Sunil Abraham is speaking at this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Mobile India 2013  is the one of the first premier conferences and will be the curtain raiser for Mobile Broadband revolution in the country. It is associated with The Fifth International Conference on COMmunication Systems NETworkS (COMSNETS), the world’s premier international conference on networking and communications technology innovation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Keynote Speeches&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Keynote - 1: Prof. Bhaskar Ramamurthi &lt;/b&gt;, Director, IIT     Madras will deliver the joint keynote speech for COMSNETS 2013 and     Mobile India 2013.     &lt;br /&gt; &lt;b&gt; Keynote - 2 : &lt;a href="http://comsnets.org/mobile_session1.html#1"&gt;Sanjay Nayak &lt;/a&gt; &lt;/b&gt;, Chief Executive Officer &amp;amp; Managing Director, Tejas     Networks.&lt;a href="http://www.tejasnetworks.com/"&gt; Tejas Networks&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile India 2013 will try to unravel the mysteries in the       following sessions.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 1: Enterprises on the move&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"For a preview, read &lt;a href="http://yourstory.in/2012/12/enterprises-on-the-move/"&gt; http://yourstory.in/2012/12/enterprises-on-the-move/ &lt;/a&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enterprises are exploring ways to leverage the power of smart       devices, the cloud, and broadband to be agile, flexible, and       productive. The IT managers in organizations are challenged to       support variety of devices (viz. BYOD) within the organization, at       the same time providing the required organizational security and       performance support to the employees. This session will deliberate       on the challenges and opportunities of today's networked world for       enterprises on the move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://comsnets.org/mobile_session1_2.html#1"&gt; Ashvin           Vellody &lt;/a&gt;, Director - Management Consulting, KPMG India; &lt;a href="http://comsnets.org/mobile_session1_2.html#2"&gt; Dr. K.K.           Ramakrishnan &lt;/a&gt;, Distinguished Member of the Technical         Staff, AT&amp;amp;T Labs Research, USA; &lt;a href="http://comsnets.org/mobile_session1.html#5"&gt; Puneet           Gupta &lt;/a&gt;, AVP and Head of Mobility Research, Infosys SET         Labs; Sai Pratyush, Head-Enterprise Products, Tata Teleservices;         &lt;a href="http://comsnets.org/mobile_session1.html#4"&gt; E.           Manikandan &lt;/a&gt;, Head-Channels and Alliances, Ramco Systems;         &lt;a href="http://comsnets.org/mobile_session1.html#3"&gt; Umesh           Sachdev &lt;/a&gt;, Co-founder and CEO, Uniphore ; &lt;a href="http://comsnets.org/mobile_session1_3.html#4"&gt; Yathish,           L, N. &lt;/a&gt;, CTO, Huawei Technologies &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session1.html#2"&gt; Swami           Krishnan &lt;/a&gt;, VP and Head-Marketing, Sasken Communication         Technologies &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 2: Massively Open Online Education&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"For a preview, read &lt;a href="http://yourstory.in/2012/12/massively-open-online-education/"&gt; http://yourstory.in/2012/12/massively-open-online-education/ &lt;/a&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online and Internet based education has permeated in to schools       and colleges today. Massively Open On-line Course (MOOC)       initiatives such as National Programme on Technology Enhanced       Learning (NPTEL) in India and those by leading institutions such       as MIT and Stanford in the US are democratizing education and       making it available globally over the Internet. In India, the       Government has been an early adopter and both academia and       industry have begun taking this initiative further. However,       limited access to wired broadband and computers have restricted       reach for providing online education. Can the ubiquitous mobile       solve this problem? &lt;br /&gt; In this session, experts will deliberate in detail on the       opportunities and challenges in providing education through mobile       networks and wireless devices. Are these scalable and monetizable?       What are the implications for traditional educational       methodologies? What are the transformations this will bring to the       publishing industry?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://comsnets.org/mobile_session2.html#3"&gt; Dr. Gautam           Shroff &lt;/a&gt;, VP and Chief Scientist, TCS; &lt;a href="http://comsnets.org/mobile_session2.html#2"&gt;Srikanth B.           Iyer &lt;/a&gt;, COO, Pearson Education Services; &lt;a href="http://comsnets.org/mobile_session2.html#4"&gt; Rohit Kumar &lt;/a&gt;, MD, Elsevier India; Sunil Abraham, Executive Director,         Centre for Internet and Civil Society; &lt;a href="http://comsnets.org/mobile_session1_2.html#3"&gt; Arun           Prabhudesai &lt;/a&gt;, CTO, myopencourses.com &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session2.html#1"&gt; Prof. D.           Manjunath &lt;/a&gt;, Professor, IIT Bombay &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 3: Innovation Workshop&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the concluding session of the day, a workshop on mobile       innovations will be conducted wherein several start-up firms will       show case their unique innovations in the mobile space and share       their experiences on ideation, fund mobilization, monetization       models, and scale-up for sustainability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://www.mintm.com/"&gt; MintM &lt;/a&gt; (&lt;a href="http://comsnets.org/mobile_session3.html#2"&gt; Sachin Garg &lt;/a&gt;, Founder); &lt;a href="http://www.robots-alive.com/"&gt; Robots           Alive &lt;/a&gt;(&lt;a href="http://comsnets.org/mobile_session3.html#3"&gt; Abheek Bose &lt;/a&gt;, Founder); &lt;a href="http://www.twaang.com/"&gt;Twaang &lt;/a&gt; &lt;br /&gt;(&lt;a href="http://comsnets.org/mobile_session3.html#4"&gt; Vishnu           Raned &lt;/a&gt;, Founder);&lt;a href="http://www.janacare.com/"&gt; JanaCare &lt;/a&gt;, (&lt;a href="http://comsnets.org/mobile_session3.html#5"&gt; Sidhant           Jena &lt;/a&gt;, Co-founder), &lt;a href="http://www.astralpad.com/"&gt;AstralPad &lt;/a&gt;(Rahul Singh) &lt;br /&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session3.html#1"&gt; Madanmohan Rao &lt;/a&gt;, Director-Research, &lt;a href="http://comsnets.org/Yourstory.in"&gt; Yourstory.in &lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Event Chairs&lt;/h2&gt;
&lt;p&gt;Dr. V. Sridhar (&lt;a class="mail-link" href="mailto:sridhar.varadharajan@sasken.com"&gt;sridhar.varadharajan@sasken.com&lt;/a&gt;), Sasken Communication Technologies, India &lt;br /&gt;S.R. Raja (&lt;a class="mail-link" href="mailto:rajaraghavan.setlur@sasken.com"&gt;rajaraghavan.setlur@sasken.com&lt;/a&gt;)&lt;/p&gt;
&lt;h3&gt;&lt;a href="http://in.eregnow.com/ticketing/register/mobileindia2013"&gt;Register here for Mobile India 2013 &lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mobile-india-2013'&gt;https://cis-india.org/news/mobile-india-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-15T08:40:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mining-the-web-collective">
    <title>Mining the Web Collective</title>
    <link>https://cis-india.org/internet-governance/blog/mining-the-web-collective</link>
    <description>
        &lt;b&gt;In March 2012, Dr Bruno Latour and his team from the Sciences Po Media Lab organized a workshop that assembled a selected group of researchers from India to explore methods of Controversy Mapping. It was hosted by Dr J. Srinivasan, Director of the Divecha Centre for Climate Change at the Indian Institute of Science, Bangalore, India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While  the context of this workshop focussed on deciphering and mapping  opinions related to academic controversies surrounding climate change,  the very same techniques of deploying digital tools to crawl through  associated content on the websphere, maybe used to map any other  controversy that has been actively influencing public and political  opinion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;As  one of the participants in the workshop, in an attempt to make my  interpretation as accessible as possible to a wider inter-disciplinary  audience, below is my own assimilation and  extrapolation of the musings  and discussions that entailed. Further I have drawn out limitations and  future directions towards more viable paradigms that augment the  mapping and democratization of public opinion.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  session drew an outset around how new digital tools could aid  researchers by enabling them to quickly see an individual entity’s data  as well as it’s associated aggregates, and register all of this within a  single view in real-time. Contrasting the traditional methods of data  collection through individual surveys, new digital methods can almost  instantaneously bridge the gap between the individual and the collective  and help us answer the question that Latour poses in his most recent  paper that revisits social theory around the Tardean concept of  reciprocally connected ‘monads’ -- &lt;i&gt;''.... is there an alternative to  the common sense version that distinguishes atoms, interactions and  wholes as successive sequences (whatever the order and the timing)? An  alternative that should not oblige the inquirer to change gears from the  micro to the macro levels ..... but remains fully continuous ...''&lt;/i&gt; [Latour et al , 2012].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Encompassing the Collective&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  geometric basis of the universe as expressed by Edgar Allan Poe, asserts  that the ‘universe.. is a sphere of which the centre is everywhere and  circumference nowhere’ (Eureka, p 20) This is essentially a  post-Euclidean conception of space, in line with the view of early 20th  century physicist Alexander Friedmann who posits that the ‘universe is  not finite in space, but neither does space have any boundary’ and so  the centre of the universe is relative to every single atom — hence  every single observer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  many ways, the process of data collection and visualization that was  carried out at the workshop tried at best to mimic this geometric basis  of space. By starting with a single entity (say, mammals) the empiricist  begins with nothing more than a named 'label'. One then extends the  specification of this entity, by populating a list with an increasing  number of elements. This process of 'learning' about an entity is  essentially an infinite process, as many abstract associations maybe  permitted to enter the list. However, the observer stops this iterative  process at a point when he feels that he has enough knowledge to  describe the entity within the (seemingly finite) 'scope' of study. What  we then have is a highly individualized point of view with respect to  one entity that has a view of all it's associated attributes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is  worth noting here that the attributes themselves can be looked at as  individualized entities, and vice versa, from their own view point,  depending on the way in which one navigates, thereby making the map  invertible. For instance while 'egg-laying' maybe one of the attributes  of a 'mammal', if we navigated to define 'egg-laying' to be our starting  entity, it's view point can contain attributes like 'mammals' and  'birds'. This process is entirely different from the bottom up approach  of constructing a general view by combining individual counterparts. In  fact, there is no one general view here, as the picture is an exploded  graph emanating from a single entity's view point, each to it's own  'umwelt'.[Kaveli et al, 2010].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;(Re)formation of Opinion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  formation of a fundamental percept in the human brain, for instance,  during the cognitive activity of reading a text, is in itself a  bottom-up serial process where individual words progressively make up  semantic associations to form a meaningful structure (just as this  sentence), along with contextual association with previously acquired  knowledge. This capacity limit for information processing [Rene and  Ivanoff, 2005] which is a prerequisite for our highly focussed mechanism  of attention is the reason why we cannot capture the entire star map  within a single glance at the night sky.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Somewhere  down this iterative line of observing an entity, and not having access  to all of its attributes in entirety, leads to over-specification and an  entanglement with isolated systems, thereby falling into a local maxima  as opposed to a global solution. This is the basis of opinion formation  and by envisaging it as a 'closed' object it is transformed into a  percept, open to interpretation and often conflicting with another,  thereby resulting in a controversy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of  the objectives of the controversy mapping workshop was to  transform  the 'immutable' percept surrounding a controversy into a  visual map  that all at once registers weblinked attributes surrounding  it, to give  us a possibly emergent and unbiased picture.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Method to the Madness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  process of framing of a ‘controversial topic’ and the collation of  massive data and links on the internet that surround the topic could  indeed be a cumbersome task. An informed approach is thus required in  order to achieve a meaningful result.&lt;br /&gt;&lt;br /&gt;Firstly, one needs to  consider reliable sources and means of knowledge production that provide  enough fuel to kindle the analysis of the controversy. One needs to  move on from casual matters of opinion or statements (such as “the  cumulative effects of CFC result in ozone layer depletion”) to  identifying a hypothesis or theory that is being actively contested by  academicians and experts through research and publication. This serves  to outline an important preliminary sketch of the controversy that  exists within the community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly,  it is essential to remember that specialized researchers do not exist  in self-centered isolation but often operate in tandem with multiple  stakeholders, investors, donors, sponsors and a diverse audience that  they cater to through articles, books, research projects and published  journals. For instance, several theorists who are into the business of  developing a so-called ‘language of critique’ often ensure through  working group meetings that a selected group of researchers are on the  ‘same page’ while using common words to canvass a spearhead towards  prospective calls from popular journals. At other times, one may  perceive a very direct link between mainstream press and cutting-edge  research. This group comprising allies and endorsers are an important  constituent of the mapping process as they provide key points of entry  into the controversy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further,  as more and more data relating to a controversy is accrued, one must  decipher not only how the position of the controversy is being  dynamically shaped over time along with its stakeholders but also be  able to extrapolate how and why its current position of uncertainty might evolve. This would involve identifying potential points of contention that could respark a debate over  an issue that has reached near closure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mapping the Controversy around ‘Anthropocene’&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img class="image-inline" src="../../accessibility/blog/resolveuid/8d81a93d91444d90a178646db01a002f/@@images/image/large" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The  topic chosen by my group (which consisted of scholars Neesha Dutt,  Muthatha Ramanathan and Prasanna Kolte) was ‘Anthropocene’, a  geo-chronological term that was informally introduced by a Nobel  laureate in the field of atmospheric chemistry, Paul Crutzen, at a  dinner party. ‘Anthropocene’ apparently marks the post industrial period  as a time window that represents the impact that human activities have  had on earth’s ecological systems, thereby affecting climate change. The  widespread acceptance and popularity of the the word has even seen a  move to officially recognize ‘Anthropocene’ as geological unit of time,  complemented by a number of dubious research projects that assume the  ‘anthropocenic’ view of climate change. The tools used were Navicrawler  to populate a massive list of webpages that featured the keyword and  other landing websites that each of the webpages point to. The context  of the websites based on their content were labelled manually and no  native text parsing and analysis was used. An interconnected visual  graph structure was then obtained using Gephi, a software that uses  Force Layout -2 , a graph layout algorithm for network visualization.  [M. Bastian et al, 2009].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Future Directions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Including  a layer of geographical representation to the formation and spread of  an opinion is a key direction towards which opinion mining and  controversy mapping is headed. A limiting factor while crawling articles  over the web using currently available digital tools is the inaccurate  representation of geographical source. An article posted in a popular  science blog in India, may actually have its server hosted in California  and this fact may often be abstracted to our crawler.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore,  apart from  the geographical source of a web article, an interesting  direction would be to employ geo-located public opinion interfaces to  collect a sample set of public opinion related to an issue, across  diverse geographical locations in realtime. This would serve as valuable  layer to overlay onto the controversy web map.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another  constraint of the digital methods referred to here within, is the  medium specific approach that does not look beyond the sample space of  the internet. Listening to and analyzing internet social media dynamics  and combing large data sets to churn out a report is not much of a  challenge. Cross media influences in public and political opinion have  become increasingly clear with television broadcasts and newspaper  reports directly contributing to discussions that happen on internet  forums and websites. Take for instance Blue Fin Labs that started off  within the Cognitive Machines group of MIT Media Lab. Initially known as  the Human Speechome project which used deep machine learning algorithms  to map out relationships between spoken word and context, Blue Fin Labs  now applies the same technique to map internet comments and posts to  corresponding audio-visual stimuli in television broadcasts that caused  those comments to be made on the web.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Video&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data visualization of connecting the social graph to the TV content graph&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/xEZ2W5-l1Zo" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;References&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Cappi,  Alberto (1994). "Edgar Allan Poe's Physical Cosmology". The Quarterly  Journal of the Royal Astronomical Society 35: 177–192&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Castells,  M. (2000). Materials for an exploratory theory of the network society.  British Journal of Sociology Vol. No. 51 Issue No. 1 (January/March  2000).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Edgar Allen Poe (1848) ‘Eureka : A Prose Poem'.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kull, Kaveli 2010. Umwelt. In: Cobley, Paul (ed.), The Routledge Companion to Semiotics. London: Routledge, 348–349.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Latour,  B. et al 2012 “The Whole is Always Smaller Than It’s Parts A Digital  Test of Gabriel Tarde’s Monads” British Journal of Sociology  (forthcoming)&lt;a href="http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf"&gt;http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M.  Bastian, S. Heymann, and M. Jacomy, “Gephi: an open source software for  exploring and manipulating networks,” in International AAAI Conference  on Weblogs and Social Media. Association for the Advancement of  Artificial Intelligence, 2009.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M. E. J. Newman, “Analysis of weighted networks,” 2004, arxiv:cond-mat/0407503.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reynolds,  C. W. (1987) Flocks, Herds, and Schools: A Distributed Behavioral  Model, in Computer Graphics, 21(4) (SIGGRAPH '87 Conference Proceedings)  pp. 25-34.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rene  Marois and Jason Ivanoff, Capacity limits of information processing in  the brain, TRENDS in Cognitive Sciences Vol.9 No.6 June 2005&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;T. M.  J. Fruchterman and E. M. Reingold, “Graph drawing by force-directed  placement,” Softw: Pract. Exper., vol. 21 no. 11, pp. 1129–1164, Nov.  1991.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mining-the-web-collective'&gt;https://cis-india.org/internet-governance/blog/mining-the-web-collective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sharath</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-06T23:48:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary">
    <title>State Surveillance and Human Rights Camp: Summary</title>
    <link>https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary</link>
    <description>
        &lt;b&gt;On December 13 and 14, 2012, the Electronic Frontier Foundation organized the Surveillance and Human Rights Camp held in Rio de Janeiro, Brazil. The meeting examined trends in surveillance, reasons for state surveillance, surveillance tactics that governments are using, and safeguards that can be put in place to protect against unlawful or disproportionate surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The camp also examined different types of data, understanding tools that governments can use to access data, and looked at examples of surveillance measures in different contexts. The camp was divided into plenary sessions and individual participatory workshops, and brought together activists, researchers, and experts from all over the world. Experiences from multiple countries were shared, with an emphasis on the experience of surveillance in Latin America. Among other things, this blog summarizes my understanding of the discussions that took place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The camp also served as a platform for collaboration on the &lt;i&gt;Draft International Principles on Communications Surveillance and Human Rights&lt;/i&gt;. These principles seek to set an international standard for safeguards to the surveillance of communications that recognizes and upholds human rights, and provide guidance for legislative changes related to communications and communications meta data to ensure that the use of modern communications technology does not violate individual privacy.  The principles were first drafted in October 2012 in Brussels, and are still in draft form. A global consultation is taking place to bring in feedback and perspective on the principles.&lt;/p&gt;
&lt;p&gt;The draft principles were institutionalized for a number of reasons including:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Currently there are no principles      or international best standards specifically prescribing necessary and      important safeguards to surveillance of communication data. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Practices around surveillance of      communications by governments and the technology used by governments is      rapidly changing, while legislation and safeguards protecting individual      communications from illegal or disproportionate surveillance are staying      the same, and thus rapidly becoming outdated. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New legislation that allows      surveillance through access to communication data that is being proposed      often attempts to give sweeping powers to law enforcement for access to      data across multiple jurisdictions, and mandates extensive cooperation and      assistance from the private sector including extensive data retention      policies, back doors, and built in monitoring capabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Surveillance of communications is      often carried out with few safeguards in place including limited transparency      to the public, and limited forms of appeal or redress for the individual. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This has placed the individual in a vulnerable position as opaque surveillance of communications is carried out by governments across the world — the abuse of which is unclear. The principles try to address these challenges by establishing standards and safeguards which should be upheld and incorporated into legislation and practices allowing the surveillance of communications.&lt;/p&gt;
&lt;p&gt;A summary of the draft principles is below. As the principles are still a working draft, the most up to date version of the principles can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net/"&gt;here&lt;/a&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Summary of the Draft International Principles on Communications Surveillance and Human Rights&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any surveillance of communications undertaken by the government must be codified by statute. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow surveillance of communications for legitimate purposes.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing surveillance of communications should limit such measures to what is demonstrably necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Surveillance of communications should only be undertaken to the extent that is adequate for fulfilling legitimate and necessary purposes. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Any authorization for surveillance of communications must be made by a competent and independent authority. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: All measures of surveillance of communications must be specific and proportionate to what is necessary to achieve a specific purpose. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments undertaking surveillance of communications must respect and guarantee an individual’s human rights. Any interference with an individual's human rights must be authorized by a law in force.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Governments undertaking surveillance of communications must allow service providers to notify individuals of any legal access that takes place related to their personal information. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The governments ability to survey communications and the process for surveillance should be transparent to the public. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: Governments must establish an independent oversight mechanism to ensure transparency and accountability of lawful surveillance measures carried out on communications. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: In order to enable service providers to secure communications securely, governments cannot require service providers to build in surveillance or monitoring capabilities.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: When governments work with other governments across borders to fight crime, the higher/highest standard should apply. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should provide sufficient penalties to dissuade against unwarranted surveillance of communications.  &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of the surveillance on communications should be borne by the government undertaking the surveillance.&lt;/p&gt;
&lt;h3&gt;Types of Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conversations during the camp reviewed a number of practices related to surveillance of communications, and emphasized the importance of establishing the draft principles. Setting the background to various surveillance measures that can be carried out by the government, the different categories of communication data that can be easily accessed by governments and law enforcement were discussed. For example, law enforcement frequently accesses information such as IP address, account name and number, telephone number, transactional records, and location data.  This data can be understood as 'non-content' data or communication data, and in many jurisdictions can easily be accessed by law enforcement/governments, as the requirements for accessing communication data are lower than the requirements for accessing the actual content of communications. For example, in the United States a court order is not needed to access communication data whereas a judicial order is needed to access the content of communications.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in the UK law enforcement can access communication data with authorization from a senior police officer.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was discussed how it is concerning that communication data can be accessed easily, as it provides a plethora of facts about an individual. Given the sensitivity of communication data and the ability for personal information to be derived from the data, the ease that law enforcement is accessing the data, and the unawareness of the individual about the access- places the privacy of users at risk.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ways of Accessing Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ways in which governments and law enforcement access information and associated challenges was discussed, both in terms of the legislation that allows for access and the technology that is used for access.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Technology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this discussion it was pointed out that in traditional forms of accessing data governments are no longer effective for a number of reasons. For example, in many cases communications and transactions, etc., that take place on the internet are encrypted. The ubiquitous use of encryption means more protection for the individual in everyday use of the internet, but serves as an obstacle to law enforcement and governments, as the content of a message is even more difficult to access. Thus, law enforcement and governments are using technologies like commercial surveillance software, targeted hacking, and malware to survey individuals. The software is sold off the shelf at trade shows by commercial software companies to law enforcement and governments. Though the software has been developed to be a useful tool for governments, it was found that in some cases it has been abused by authoritarian regimes. For example in 2012, it was found that  FinSpy, a computer espionage software made by the British company Gamma Group was being used to target political dissidents by the Government of Bahrain. FinSpy has the ability to capture computer screen shots, record Skype chats, turn on computer cameras and microphones, and log keystrokes.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to intercept communications or block access to sites, governments and ISPs also  rely on the use of deep packet inspection (DPI).&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Deep packet inspection is a tool traditionally used by internet service providers for effective management of the network. DPI allows for ISP's to monitor and filter data flowing through the network by inspecting the header of a packet of data and the content of the packet.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; With this information it is possible to read the actual content of packets, and identify the program or service being used.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DPI can be used for the detection of viruses, spam, unfair use of bandwidth, and copyright enforcement.  At the same time, DPI can allow for the possibility of unauthorized data mining and real time interception to take place, and can be used to block internet traffic whether it is encrypted or not.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Governmental requirements for deep packet inspection can in some cases be found in legislation and policy. In other cases it is not clear if it is mandatory for ISP's to provide DPI capabilities, thus the use of DPI by governments is often an opaque area. Recently, the ITU has sought to define an international standard for deep packet inspection known as the "Y.2770" standard. The standard proposes a technical interoperable protocol for deep packet inspection systems, which would be applicable to "application identification, flow identification, and inspected traffic types".&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussions also examined similarities across legislation and policy which allows governments legal access to data. It was pointed out that legislation providing access to different types of data is increasingly becoming outdated, and is unable to distinguish between communications data and personal data. Thus, relevant legislation is often based on inaccurate and outdated assumptions about what information would be useful and what types of safeguards are necessary. For example, it was discussed how US surveillance law has traditionally established safeguards based on assumptions like: surveillance of data on a personal computer is more invasive than access to data stored in the cloud, real-time surveillance is more invasive than access to stored data, surveillance of newer communications is more invasive than surveillance of older communications, etc. These assumptions are no longer valid as information stored in the cloud, surveillance of older communications, and surveillance of stored data can be more invasive than access to newer communications, etc. It was also discussed that increasingly relevant legislation also contains provisions that have generic access standards, unclear authorization processes, and provide broad circumstances in which communication data and content can be accessed. The discussion also examined how governments are beginning to put in place mandatory and extensive data retention plans as tools of surveillance. These data retention mandates highlight the changing role of internet intermediaries including the fact that they are no longer independent from political pressure, and no longer have the ability to easily protect clients from unauthorized surveillance.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. EFF. Mandatory Data Retention: United States. Available at: &lt;a class="external-link" href="https://www.eff.org/issues/mandatory-data-retention/us"&gt;https://www.eff.org/issues/mandatory-data-retention/us&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Espiner, T. Communications Data Bill: Need to Know. ZDNet. June 18th 2012. &lt;a class="external-link" href="http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/"&gt;http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Perlroth, M. Software Meant to Fight Crime is Used to Spy on Dissidents. The New York Times. August 30th 2012. Available at: &lt;a class="external-link" href="http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0"&gt;http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Wawro, A. What is Deep Packet Inspection?. PCWorld. February 1st 2012. Available at: &lt;a class="external-link" href="http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html"&gt;http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Geere, D. How deep packet inspection works. Wired. April 27th 2012. Available at: &lt;a class="external-link" href="http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works"&gt;http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Kassner. M. Deep Packet Inspection: What You Need to Know. Tech Republic. July 27th 2008. Available at: &lt;a class="external-link" href="http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609"&gt;http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Anonyproz. How to Bypass Deep Packet Inspection Devices or ISPs Blocking Open VPN Traffic. Available at: &lt;a class="external-link" href="http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;amp;_a=viewarticle&amp;amp;amp;kbarticleid=138"&gt;http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;_a=viewarticle&amp;amp;kbarticleid=138&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Chirgwin. R. Revealed: ITU's deep packet snooping standard leaks online: Boring tech doc or Internet eating monster. The Register. December 6th 2012. Available at: &lt;a class="external-link" href="http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/"&gt;http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary'&gt;https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T16:02:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2012-bulletin">
    <title>December 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2012-bulletin</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society wish you all a great year ahead. In the December 2012 newsletter, we bring you the draft early chapters of our “National Resource Kit” project for persons with disabilities (covering four southern states); and accessibility-related comments on the Twelfth Five Year Plan; the draft research on pervasive technologies and access to knowledge that we presented at the Global Congress on Intellectual Property and the Public Interest in Brazil; our comments on the privacy implications of including RFID tags in the proposed Rule 138A of the Motor Vehicle Rules, a report on the open access lectures delivered by Prof. Leslie Chan during his tour of India, reports of Wikipedia-related workshops conducted across three cities, and news and media coverage.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS is seeking applications for the posts of &lt;a href="https://cis-india.org/jobs/programme-officer-indian-initiatives"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge — Indic Language Initiatives), &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Project), &lt;a href="https://cis-india.org/about/jobs/research-manager"&gt;Research Manager&lt;/a&gt; (Digital Humanities project), and &lt;a href="https://cis-india.org/jobs/programme-officer-access-to-knowledge-and-openness"&gt;Policy&lt;/a&gt; Associate (Access to Knowledge and Openness) and Policy Associate (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;CIS received a grant of INR 54,83,200 from the Hans Foundation for Creating a National Kit of Laws, Policies and Programs for Persons with Disabilities on August 16, 2012. Anandhi Vishwanathan from CIS and Shruti Ramakrishnan from the Centre for Law and Policy Research are the researchers presently working for this project. Early draft chapters have been published. Feedback and comments are invited from the readers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-tamil-nadu-chapter-call-for-comments"&gt;The Tamil Nadu Chapter&lt;/a&gt; (by Shruti Ramakrishnan, December 30, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-karnataka-chapter"&gt;The Karnataka Chapter&lt;/a&gt; (by Shruti Ramakrishnan, December 30, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments"&gt;The Kerala Chapter&lt;/a&gt; (by Anandi Vishwanathan, December 31, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-andhra-pradesh-call-for-comments"&gt;The Andhra Chapter&lt;/a&gt; (by Anandi Vishwanathan, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Feedback&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/feedback-on-draft-twelfth-five-year-plan"&gt;Comments and Feedback on the Draft Twelfth Five Year Plan with respect to Persons with Disabilities&lt;/a&gt; (by Rahul Cherian, December 28, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/ip-watch-catherine-saez-december-18-2012-wipo-to-negotiate-treaty-for-the-blind-in-june"&gt;WIPO To Negotiate Treaty For The Blind In June; ‘Still Some Distance To Travel’&lt;/a&gt; (by Catherine Saez, Intellectual Property Watch, December 18, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/times-of-india-city-mumbai-madhavi-rajadhyaksha-december-20-2012-disability-groups-in-india-welcome-progress-on-treaty-for-blind-persons"&gt;Disability groups in India welcome progress on treaty for blind persons&lt;/a&gt; (by Madhavi Rajadhyaksha, December 20, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/wipo-to-convene-conference-to-finalise-tvi-next-year"&gt;WIPO to Convene a Diplomatic Conference in Morocco to Finalise TVI&lt;/a&gt; (by Rahul Cherian, December 24, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/global-congress-on-ip"&gt;2012 Global Congress on Intellectual Property and the Public Interest&lt;/a&gt; (FGV Law School, Rio de Janeiro, December 15 – 17, 2012). The Second Global Congress on Intellectual Property and the Public Interest was organized by Fundação Getulio Vargas, American University Washington College of Law, Columbia University, Open AIR, and ICSTD. Sunil Abraham and Pranesh Prakash participated in the event. Pranesh was one of the moderators in the Roundtable Discussion on Priority Policy Forums, Research and Analysis Needs and Commitments.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Research for the Global Congress&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;For the 2012 Global Congress on Intellectual Property and Public Interest event, CIS conducted research. Jadine Lannon (based on research by Annapoornima and Rohan George and with help from Yogesh Kumar did research on documentation of phones and their patent, Amba Kak did research on copyright and mobile licensing, Vikrant Vasudev conducted research on patent pools and valuation methods, Hans Varghese Mathews did research on mathematical models of patent pools and Nehaa Chaudhuri did research on analysis of 3Gand 4G patent pools.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/random-hacks-of-kindness-december-2012-report"&gt;Random Hacks of Kindness Global December 2012 — A Report&lt;/a&gt; (by Yogesh Londhe, December 10, 2012). Event was hosted at CIS office in Bangalore. CIS, Amnesty International India Office, Greenpeace India Office, HasGeek, Yahoo Research &amp;amp; Development and SimpleTechLife sponsored the event held in CIS office in Bangalore on December 1 and 2, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;‘&lt;a href="https://cis-india.org/news/i-and-n-partners-meeting-rio"&gt;Information &amp;amp; Networks’ Partners’ Meeting&lt;/a&gt; (organised by International Development Research Centre, Canada in Rio de Janeiro, December 11 – 12, 2013). Sunil Abraham spoke in session on Open Business and IP.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/leslie-chan-gives-five-talks-in-india"&gt;Open Access Champion Leslie Chan Delivers Five Talks in India&lt;/a&gt; (Department of Library &amp;amp; Information Science, University of Kerala, National Institute of Interdisciplinary Science &amp;amp; Technology, CSIR, Indian Institute of Information Technology and Management – Kerala, Manasa Media Centre, Mysore University Library and SDM Institute for Management Development, December 17 – 20, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;Access to Knowledge&lt;/a&gt; (Wikipedia Project)&lt;/b&gt;&lt;br /&gt;Beginning from September 1, 2012, Wikimedia Foundation has &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of three members based in Delhi: &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-workshop-at-nmait"&gt;Wikipedia Workshop at NMAIT&lt;/a&gt; (NMAIT, Karkala Taluk, December 21, 2012, co-organised in association with Metawings Institute).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-workshop-at-srm-chennai"&gt;Wikipedia Workshop at SRM&lt;/a&gt; (SRM University, Chennai, December 17, 2012, co-organised in association with Metawings Institute).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/marathi-wiki-workshop-at-tiss"&gt;Marathi Wiki Workshop at TISS&lt;/a&gt; (Tata Institute of Social Sciences, Mumbai, December 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/non-unicode-iscii-text-can-be-converted-to-unicode"&gt;Non Unicode ISCII Text Can be Converted to Unicode Now!&lt;/a&gt; (by Subhashish Panigrahi, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/new-avenues"&gt;New Avenues: Media Wiki Groups&lt;/a&gt; (by Noopur Raval, December 28, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News / Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-iit-kharagpur"&gt;A Report of Odia Wikipedia Workshop at IIT, Kharagpur&lt;/a&gt; (Samaja, Odia daily, Kolkata edition, December 3, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Videos&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-state-of-tech-talk-by-erik-moeller"&gt;Wikipedia: State of Tech — A Talk by Erik Moeller&lt;/a&gt; (CIS, Bangalore, November 12, 2012). Erik Moeller, Vice President of Engineering and Product Development at the Wikimedia Foundation gave a talk.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/art-in-the-open-source-age"&gt;Art in the Open Source Age — A Talk by Gene Kogan&lt;/a&gt; (CIS, Bangalore, November 30, 2012). Gene Kogan, a programmer and digital artist gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;HasGeek&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://fifthelephant.in/2012/"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://droidcon.in/2011"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://androidcamp.hasgeek.com/"&gt;Android Camp&lt;/a&gt;, etc. HasGeek is supported by CIS and works out from CIS office in Bengaluru.&lt;/p&gt;
&lt;h3&gt;Upcoming Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://metarefresh.in/2013/"&gt;Meta Refresh&lt;/a&gt; (MLR Convention Centre, JP Nagar, Bangalore, February 22 and 23, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;Analysis of Central Motor Vehicle Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules"&gt;Comments on the Proposed Rule 138A of the Central Motor Vehicle Rules, 1989&lt;/a&gt; Concerning Radio Frequency Identification Tags (by Bhairav Acharya, December 3, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Columns/Op-eds&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-december-2-2012-sunil-abraham-online-censorship"&gt;Online Censorship: How Government should Approach Regulation of Speech&lt;/a&gt; (by Sunil Abraham, Economic Times, December 5, 2012).&lt;/li&gt;
&lt;li&gt;The Worldwide Web of Concerns (by Pranesh Prakash, &lt;a href="https://cis-india.org/internet-governance/blog/deccan-chronicle-pranesh-prakash-december-10-2012-the-worldwide-web-of-concerns"&gt;Deccan Chronicle&lt;/a&gt;, and &lt;a href="https://cis-india.org/internet-governance/blog/asian-age-column-december-10-2012-pranesh-prakash-the-worldwide-web-of-concerns"&gt;Asian Age&lt;/a&gt;, December 10, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-hindu-opinion-lead-december-15-2012-chinmayi-arun-the-trouble-with-hurried-solutions"&gt;The Trouble with Hurried Solutions&lt;/a&gt; (by Chinmayi Arun, The Hindu, December 15, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-december-29-2012-tomorrow-today"&gt;Tomorrow, Today&lt;/a&gt; (Nishant Shah, The Indian Express, December 29, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/meeting-of-network-of-internet-and-society-centers"&gt;Meeting of the Network of Internet &amp;amp; Society Centers&lt;/a&gt; (organised by Berkman Center for Internet &amp;amp; Society, Alexander von Humboldt Institute for Internet &amp;amp; Society, Center for Technology &amp;amp; Society, KEIO University SFC, the MIT Media Lab, the MIT Center for Civic Media, NEXA Center for Internet &amp;amp; Society and CIS, Cambridge, Massachusetts, December 6 – 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/events/dml-conference-2013"&gt;DML Conference 2013&lt;/a&gt; (Sheraton Chicago Hotel &amp;amp; Towers - Chicago, Illinois, March 14 – 16, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/second-international-e-governance-conference-at-baghdad"&gt;Second International e-Governance Conference&lt;/a&gt; (organized by the National Committee for Corporate Governance Electronic Iraq and the United Nations Development Programme, Rashid Hotel, Baghdad, December 2, 2012). Sunil Abraham presented on "Review of the Legal Environment in Iraq for Effective e-Governance".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/seminar-artist-talks-outresourcing-with-the-transmediale-collective"&gt;Seminar/Artist Talks : "Outresourcing" with the Transmediale Collective&lt;/a&gt; (organised by the Berlin - Transmediale new media collective, December 3, 2012, Bangalore). Sharath Chandra Ram presented a White Paper. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;World Conference on International Telecommunications (organised by ITU, December 3 – 14). Chinmayi Arun participated as a civil society representative.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-driven-developments"&gt;Internet Driven Developments: Structural Changes and Tipping Points&lt;/a&gt; (organised by Berkman Center for Internet &amp;amp; Society, Cambridge, Massachusetts at Harvard University, December 6 – 8, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/"&gt;Annual Conference on Human Rights 2012&lt;/a&gt; (organised by Estonian Institute of Human Rights and Google). Malavika Jayaram participated as a panelist.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/state-surveillance-and-human-rights-camp"&gt;State Surveillance and Human Rights Camp&lt;/a&gt; (Sheraton Rio Hotel &amp;amp; Resort, Rio, Brazil, December 13 and 14, 2012). Elonnai Hickok made a presentation on MLATS and International Cooperation for Law Enforcement Purposes.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.youtube.com/watch?v=VC9G_tbxI9Y"&gt;Economic Impact of Internet in India&lt;/a&gt; (organised by Aspen Institute India, December 21, 2012). Chinmayi Arun attended this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transcripts-of-wcit-2012"&gt;Transcripts from WCIT-12&lt;/a&gt; (by Snehashish Ghosh, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/section-66-a-information-technology-act-2000-cases"&gt;Section 66-A, Information Technology Act, 2000: Cases&lt;/a&gt; (by Snehashish Ghosh, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-driven-developments"&gt;Internet-driven Developments — Structural Changes and Tipping Points&lt;/a&gt; (by Elonnai Hickok, December 28, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary"&gt;State Surveillance and Human Rights Camp: Summary&lt;/a&gt; (by Elonnai Hickok, December 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/mining-the-web-collective"&gt;Mining the Web Collective&lt;/a&gt; (by Sharath Chandra Ram, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/technology-culture-and-events-in-south-east-asia"&gt;Technology Culture and Events in South East Asia — A Presentation by Preetam Rai&lt;/a&gt; (CIS, Bangalore, December 18, 2012). Preetam Rai gave a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job"&gt;66A ‘cut &amp;amp; paste job’&lt;/a&gt; (by GS Mudur, Telegraph, December 3, 2012). Pranesh Prakash and Snehashish Ghosh are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-6-2012-surabhi-agarwal-ayodhya-trending-on-twitter-sparks-censorship-concerns"&gt;Ayodhya trending on Twitter sparks censorship concerns&lt;/a&gt; (by Surabhi Agarwal, December 6, 2012). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-sci-tech-internet-december-10-2012-vasudha-venugopal-debate-on-section-66a"&gt;Debate on Section 66A rages on&lt;/a&gt; (Vasudha Venugopal, The Hindu, December 10, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-india-times-december-13-2012-kim-arora-hacktivists-deface-bsnl-website"&gt;Hacktivists deface BSNL website&lt;/a&gt; (by Kim Arora, The Times of India, December 13, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-16-2012-surabhi-agarwal-govt-likely-to-issue-guidelines-to-clarify-it-rules-soon"&gt;Govt likely to issue guidelines to clarify IT rules soon&lt;/a&gt; (by Surabhi Agarwal, LiveMint, December 16, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate"&gt;The freedom of expression debate: The State must mend fences with The Web&lt;/a&gt; (by Rahul Jayaram, India Today, December 18, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dna-bangalore-december-19-2012-the-it-act-is-fine-but-its-interpretation-is-not"&gt;‘The IT Act is fine, but its interpretation is not’&lt;/a&gt; (DNA, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15"&gt;No fear of losing internet freedom till Jan 15: Experts&lt;/a&gt; (by Kim Arora, The Times of India, December 22, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet"&gt;UN agrees to review agencies governing Internet&lt;/a&gt; (by Surabhi Agarwal, LiveMint, December 27, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape"&gt;Delhi gang rape: What Facebook, Twitter expose about govt&lt;/a&gt; (The Times of India, December 31, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid"&gt;A note of dissent on cash transfers and UID&lt;/a&gt; (The Hindu, December 31, 2012). Sunil Abraham was one of the signatories.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india"&gt;The year social media came of age in India&lt;/a&gt; (by Javed Anwer and Rukmini Shrinivasan, The Times of India, December 31, 2012). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;Newspaper Column&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-december-11-2012-inflation-control-through-structural-reforms"&gt;Inflation Control Through Structural Reforms&lt;/a&gt; (by Shyam Ponappa, Business Standard, December 11, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/about/telecom/telecom-knowledge-repository/knowledge-and-capacity-around-telecom-policy"&gt;Building Knowledge and Capacity around Telecommunication Policy in India&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Ford Foundation has given a grant of USD 2,00,000 to CIS to build expertise in the area of telecommunications in India. The knowledge repository deals with these modules: Introduction to Telecommunications, Telecommunications Infrastructure and Technologies, Government of India Regulatory Framework for Telecom, Telecommunication and the Market, Universal Access and Accessibility, The International Telecommunications Union and other international bodies, Broadcasting, Emerging Topics and Way Forward. Dr. Surendra Pal, Satya N Gupta, Paranjoy Guha Thakurta, Payal Malik, Dr. Rakesh Mehrotra and Dr. Nadeem Akhtar are the expert reviewers.&lt;/p&gt;
&lt;p&gt;The following are the new outputs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/licensing-framework-for-telecom"&gt;Licensing Framework for Telecom: A Historical Overview&lt;/a&gt; (by Snehashish Ghosh, December 31, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/market-structure-in-telecom-industry"&gt;Market Structure in the Telecom Industry&lt;/a&gt; (by Snehashish Ghosh, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/blog/indian-express-december-8-2012-nishant-shah-not-just-fancy-television"&gt;Not Just Fancy Television&lt;/a&gt; (by Nishant Shah, Indian Express, December 8, 2012): Nishant Shah reviews Ben Hammersley's book "64 Things You Need to Know for Then: How to Face the Digital Future Without Fear ", published by Hodder &amp;amp; Stoughton.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/cnn-december-8-2012-oliver-joy-what-does-it-mean-to-be-a-digital-native"&gt;What does it mean to be a digital native?&lt;/a&gt; (by Oliver Joy, CNN, December 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. The policy research programmes have resulted in outputs such as the &lt;a href="https://cis-india.org/about/advocacy/accessibility/blog/e-accessibility-handbook"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/dnbook"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/position-papers"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos, etc. We conducted policy research for the Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="https://cis-india.org/about/a2k/blog/cis-analysis-july2011-treaty-print-disabilities"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="https://cis-india.org/about/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/about/internet-governance/front-page/blog/cis-feedback-to-nia-bill"&gt;NIA Bill&lt;/a&gt;, etc. CIS is accredited as an observer at WIPO, and has given policy briefs to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="https://cis-india.org/about/accessibility/blog/national-award"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="https://cis-india.org/about/news/nirmita-nivh-award"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2012-bulletin'&gt;https://cis-india.org/about/newsletters/december-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-01-16T05:15:27Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india">
    <title>Open Access Champion Leslie Chan Delivers Five Talks in India</title>
    <link>https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india</link>
    <description>
        &lt;b&gt;Professor Leslie Chan, a champion of Open Access (OA) and Associate Director of the Centre for Critical Development Studies at the University of Toronto Scarborough visited Tiruvananthapuram and Mysore in December 2012 for a series of lectures. Well known advocate for OA in India and the developing world, Professor Subbiah Arunachalam, accompanied him on these tours.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Leslie gave five talks in over three days at the Department of Library &amp;amp; Information Science, University of Kerala, on the morning of December 17, at the National Institute of Interdisciplinary Science &amp;amp; Technology, CSIR on the afternoon of December 17 at the Indian Institute of Information Technology and Management – Kerala on Decemeber 18 followed by a discussion with Satish Babu, President of the Computer Society of India and Director of ICFOSS in the afternoon, a talk at Manasa Media Centre, Mysore University Library on December 19, and a talk at SDM Institute for Management Development on December 20, 2012, which was more of a discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking on “Opportunities for Knowledge Management in the Open Access Environment” at the Indian Institute of Information Technology and Management–Kerala, Leslie Chan said, “the recognition of what constitutes scholarship is still very narrow and the quality of the content is secondary. It is the brand of the journal that is still the driving force behind every western journal.” He further said that there was a tension brewing among open access, quality control and the means of measuring impact. Market forces had infiltrated the realm of knowledge as well, for it was the companies that were increasingly taking over journals that were originally published by scholarly societies.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;His presentation touched upon what is OA and its key benefits, growth of OA in the last ten years, and opportunities for information and library professionals. See the presentation slides below.&lt;/p&gt;
&lt;table class="vertical listing" style="text-align: left; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="470px" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/lesliechan/slideshelf" width="615px"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;At the Mysore University Library, Leslie gave a lecture on Emerging Trends in Scholarly Communications and Impact Measures in the Open Knowledge Environment. He dealt with the key issues of changing contexts of research discovery and dissemination in the digital environment, why greater openness is good for science, the tensions between openness, quality measures, impact and policies, collaboration and competition, interdisciplinary research, deluge of research data. Prof. Chan touched upon some key problems like the broken scholarly communication system, emerging tools not being used effectively to serve scholarship, and the need to re-design scholarly communications and impact measures. See the presentation slides below.&lt;/p&gt;
&lt;table class="vertical listing" style="text-align: left; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="356" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/15766851" width="427"&gt; &lt;/iframe&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;a href="http://www.slideshare.net/lesliechan/emerging-trends-in-scholarly-communication-and-impact-measures-in-the-open-knowledge-environment-15766851" target="_blank" title="Emerging Trends in Scholarly Communication and Impact Measures in the Open Knowledge Environment"&gt;Emerging Trends in Scholarly Communication and Impact Measures in the Open Knowledge Environment &lt;/a&gt;&lt;/b&gt;from &lt;b&gt;&lt;a href="http://www.slideshare.net/lesliechan" target="_blank"&gt;University of Toronto Scarborough&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Therafter, Prof. Chan visited Shri Dharmasthala Manjunatheshwara Institute for Management Development and addressed scientists, librarians and academicians. There were discussions on how open access journals and repositories can help improve the visibility of an institution's research strengths, help attract research collaborators for authors and increase the return on investment. Prof. Chan was particularly critical of the current trends, in evaluating both researchers and their institutions using impact factor of journals in which they publish their research papers as the yardstick. &lt;a href="https://cis-india.org/openness/blog-old/open-access-to-research-at-sdm-imd.pdf" class="internal-link"&gt;Read the press coverage by Star of Mysore&lt;/a&gt; (PDF, 462 Kb).&lt;/p&gt;
&lt;table class="listing" style="text-align: left; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/ChanVisit2.png/@@images/1e62aaa1-5947-49ca-b8fe-436d9b1c4010.png" alt="Prof. Chan Tour" class="image-inline" title="Prof. Chan Tour" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;Prof. Subbiah Arunachalam accompanied Prof. Leslie in his tours to Tiruvananthapuram and Mysore&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Leslie's tour to Tiruvananthapuram and Mysore which saw him deliver a series of lectures along with open forum discussions has triggered a fresh awakening to seriously debate on open access initiatives. The event was well covered by the media with the Hindu doing an exclusive interview with him.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: left; "&gt;More pictures of Prof. Chan's visit can be seen &lt;a class="external-link" href="https://picasaweb.google.com/sunilmysore/ProfChanVisit?authuser=0&amp;amp;feat=directlink"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: left; " /&gt;
&lt;p style="text-align: left; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See “Call for efforts to promote open access platforms, The Hindu, December 19, 2012, available at &lt;a class="external-link" href="http://bit.ly/10LEiBU"&gt;http://bit.ly/10LEiBU&lt;/a&gt;, last accessed on December 31, 2012.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See "In defence of Open Access systems", The Hindu, December 31, 2012, available at&lt;a class="external-link" href="http://bit.ly/VZfmz6"&gt; http://bit.ly/VZfmz6&lt;/a&gt;, last accessed on January 2, 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india'&gt;https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-01-02T05:35:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait">
    <title>A Wikipedia Workshop at NMAIT</title>
    <link>https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society, Delhi collaborated with Metawings Institute to spread the words about Wikipedia for Indian languages. A one-day workshop was organized to educated the students on contributing to Wikipedia on December 21, 2012. About 170 engineering students took part in this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The workshop began with interaction with the students about their understanding. I asked few questions like what is Wikipedia, who edits articles on Wikipedia, is it paid or free, did they ever try to edit Wikipedia, etc. I took them through a presentation to explain basics of Wikipedia, five pillars, notability and copyright issues related to vandalism. One of the students were called to create his user account. Students were showed the simpler sign up process. To explain how articles are edited we introduced errors in the article on Bengaluru and &lt;a href="http://en.wikipedia.org/w/index.php?title=Bangalore&amp;amp;diff=529072240&amp;amp;oldid=529071146"&gt;made it the capital of India for few minutes&lt;/a&gt;! Students were explained how Wikipedia editors correct mistakes like these in real time and correct facts are published in Wikipedia. A majority of the students asked about the authenticity of articles which is open to anyone. So I got a chance to refresh the page and show how the error introduced was reverted within a few minutes.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/openness/blog-old/ParticipantsatKarkala.png" alt="Participants at Karkala" class="image-inline" title="Participants at Karkala" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;Above is a picture of the participants from the Wikipedia Workshop at Karkala&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The session went on with such interaction and students were explained more about the importance of citing references to add credibility to the facts they can add on Wikipedia articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We also had Dr. Ashok Kumar, prof, Computer science department, a wikipedian and columnist for Kannada newspaper &lt;a href="http://www.udayavani.com/"&gt;Udaya Vani&lt;/a&gt;. Dr. Kumar &lt;a href="http://meta.wikimedia.org/wiki/File:Wikipedia_Outreach_Document_-_Kannada.pdf"&gt;introduced&lt;/a&gt; Kannada Wikipedia to the students. At the end of the session I had a discussion with him about organizing more workshops for Kannada Wikipedia and supporting participant students. Special thanks to &lt;a href="http://www.metawinggroups.com/"&gt;Metawings&lt;/a&gt; for finding the venue and supporting for the event.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait'&gt;https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-01-04T16:30:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
