<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1401 to 1415.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mining-the-web-collective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/open-access-to-research-at-sdm-imd.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/internet-driven-developments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/feedback-on-draft-twelfth-five-year-plan"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ip-watch-catherine-saez-december-18-2012-wipo-to-negotiate-treaty-for-the-blind-in-june"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/state-surveillance-and-human-rights-camp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/leslie-chan-lectures-in-tiruvananthapuram-and-mysore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/changing-face-of-citizen-action.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/wipo-sccr-25-day-5-november-23-2012.txt"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mining-the-web-collective">
    <title>Mining the Web Collective</title>
    <link>https://cis-india.org/internet-governance/blog/mining-the-web-collective</link>
    <description>
        &lt;b&gt;In March 2012, Dr Bruno Latour and his team from the Sciences Po Media Lab organized a workshop that assembled a selected group of researchers from India to explore methods of Controversy Mapping. It was hosted by Dr J. Srinivasan, Director of the Divecha Centre for Climate Change at the Indian Institute of Science, Bangalore, India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While  the context of this workshop focussed on deciphering and mapping  opinions related to academic controversies surrounding climate change,  the very same techniques of deploying digital tools to crawl through  associated content on the websphere, maybe used to map any other  controversy that has been actively influencing public and political  opinion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;As  one of the participants in the workshop, in an attempt to make my  interpretation as accessible as possible to a wider inter-disciplinary  audience, below is my own assimilation and  extrapolation of the musings  and discussions that entailed. Further I have drawn out limitations and  future directions towards more viable paradigms that augment the  mapping and democratization of public opinion.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  session drew an outset around how new digital tools could aid  researchers by enabling them to quickly see an individual entity’s data  as well as it’s associated aggregates, and register all of this within a  single view in real-time. Contrasting the traditional methods of data  collection through individual surveys, new digital methods can almost  instantaneously bridge the gap between the individual and the collective  and help us answer the question that Latour poses in his most recent  paper that revisits social theory around the Tardean concept of  reciprocally connected ‘monads’ -- &lt;i&gt;''.... is there an alternative to  the common sense version that distinguishes atoms, interactions and  wholes as successive sequences (whatever the order and the timing)? An  alternative that should not oblige the inquirer to change gears from the  micro to the macro levels ..... but remains fully continuous ...''&lt;/i&gt; [Latour et al , 2012].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Encompassing the Collective&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  geometric basis of the universe as expressed by Edgar Allan Poe, asserts  that the ‘universe.. is a sphere of which the centre is everywhere and  circumference nowhere’ (Eureka, p 20) This is essentially a  post-Euclidean conception of space, in line with the view of early 20th  century physicist Alexander Friedmann who posits that the ‘universe is  not finite in space, but neither does space have any boundary’ and so  the centre of the universe is relative to every single atom — hence  every single observer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  many ways, the process of data collection and visualization that was  carried out at the workshop tried at best to mimic this geometric basis  of space. By starting with a single entity (say, mammals) the empiricist  begins with nothing more than a named 'label'. One then extends the  specification of this entity, by populating a list with an increasing  number of elements. This process of 'learning' about an entity is  essentially an infinite process, as many abstract associations maybe  permitted to enter the list. However, the observer stops this iterative  process at a point when he feels that he has enough knowledge to  describe the entity within the (seemingly finite) 'scope' of study. What  we then have is a highly individualized point of view with respect to  one entity that has a view of all it's associated attributes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is  worth noting here that the attributes themselves can be looked at as  individualized entities, and vice versa, from their own view point,  depending on the way in which one navigates, thereby making the map  invertible. For instance while 'egg-laying' maybe one of the attributes  of a 'mammal', if we navigated to define 'egg-laying' to be our starting  entity, it's view point can contain attributes like 'mammals' and  'birds'. This process is entirely different from the bottom up approach  of constructing a general view by combining individual counterparts. In  fact, there is no one general view here, as the picture is an exploded  graph emanating from a single entity's view point, each to it's own  'umwelt'.[Kaveli et al, 2010].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;(Re)formation of Opinion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  formation of a fundamental percept in the human brain, for instance,  during the cognitive activity of reading a text, is in itself a  bottom-up serial process where individual words progressively make up  semantic associations to form a meaningful structure (just as this  sentence), along with contextual association with previously acquired  knowledge. This capacity limit for information processing [Rene and  Ivanoff, 2005] which is a prerequisite for our highly focussed mechanism  of attention is the reason why we cannot capture the entire star map  within a single glance at the night sky.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Somewhere  down this iterative line of observing an entity, and not having access  to all of its attributes in entirety, leads to over-specification and an  entanglement with isolated systems, thereby falling into a local maxima  as opposed to a global solution. This is the basis of opinion formation  and by envisaging it as a 'closed' object it is transformed into a  percept, open to interpretation and often conflicting with another,  thereby resulting in a controversy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of  the objectives of the controversy mapping workshop was to  transform  the 'immutable' percept surrounding a controversy into a  visual map  that all at once registers weblinked attributes surrounding  it, to give  us a possibly emergent and unbiased picture.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Method to the Madness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  process of framing of a ‘controversial topic’ and the collation of  massive data and links on the internet that surround the topic could  indeed be a cumbersome task. An informed approach is thus required in  order to achieve a meaningful result.&lt;br /&gt;&lt;br /&gt;Firstly, one needs to  consider reliable sources and means of knowledge production that provide  enough fuel to kindle the analysis of the controversy. One needs to  move on from casual matters of opinion or statements (such as “the  cumulative effects of CFC result in ozone layer depletion”) to  identifying a hypothesis or theory that is being actively contested by  academicians and experts through research and publication. This serves  to outline an important preliminary sketch of the controversy that  exists within the community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly,  it is essential to remember that specialized researchers do not exist  in self-centered isolation but often operate in tandem with multiple  stakeholders, investors, donors, sponsors and a diverse audience that  they cater to through articles, books, research projects and published  journals. For instance, several theorists who are into the business of  developing a so-called ‘language of critique’ often ensure through  working group meetings that a selected group of researchers are on the  ‘same page’ while using common words to canvass a spearhead towards  prospective calls from popular journals. At other times, one may  perceive a very direct link between mainstream press and cutting-edge  research. This group comprising allies and endorsers are an important  constituent of the mapping process as they provide key points of entry  into the controversy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further,  as more and more data relating to a controversy is accrued, one must  decipher not only how the position of the controversy is being  dynamically shaped over time along with its stakeholders but also be  able to extrapolate how and why its current position of uncertainty might evolve. This would involve identifying potential points of contention that could respark a debate over  an issue that has reached near closure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mapping the Controversy around ‘Anthropocene’&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img class="image-inline" src="../../accessibility/blog/resolveuid/8d81a93d91444d90a178646db01a002f/@@images/image/large" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The  topic chosen by my group (which consisted of scholars Neesha Dutt,  Muthatha Ramanathan and Prasanna Kolte) was ‘Anthropocene’, a  geo-chronological term that was informally introduced by a Nobel  laureate in the field of atmospheric chemistry, Paul Crutzen, at a  dinner party. ‘Anthropocene’ apparently marks the post industrial period  as a time window that represents the impact that human activities have  had on earth’s ecological systems, thereby affecting climate change. The  widespread acceptance and popularity of the the word has even seen a  move to officially recognize ‘Anthropocene’ as geological unit of time,  complemented by a number of dubious research projects that assume the  ‘anthropocenic’ view of climate change. The tools used were Navicrawler  to populate a massive list of webpages that featured the keyword and  other landing websites that each of the webpages point to. The context  of the websites based on their content were labelled manually and no  native text parsing and analysis was used. An interconnected visual  graph structure was then obtained using Gephi, a software that uses  Force Layout -2 , a graph layout algorithm for network visualization.  [M. Bastian et al, 2009].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Future Directions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Including  a layer of geographical representation to the formation and spread of  an opinion is a key direction towards which opinion mining and  controversy mapping is headed. A limiting factor while crawling articles  over the web using currently available digital tools is the inaccurate  representation of geographical source. An article posted in a popular  science blog in India, may actually have its server hosted in California  and this fact may often be abstracted to our crawler.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore,  apart from  the geographical source of a web article, an interesting  direction would be to employ geo-located public opinion interfaces to  collect a sample set of public opinion related to an issue, across  diverse geographical locations in realtime. This would serve as valuable  layer to overlay onto the controversy web map.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another  constraint of the digital methods referred to here within, is the  medium specific approach that does not look beyond the sample space of  the internet. Listening to and analyzing internet social media dynamics  and combing large data sets to churn out a report is not much of a  challenge. Cross media influences in public and political opinion have  become increasingly clear with television broadcasts and newspaper  reports directly contributing to discussions that happen on internet  forums and websites. Take for instance Blue Fin Labs that started off  within the Cognitive Machines group of MIT Media Lab. Initially known as  the Human Speechome project which used deep machine learning algorithms  to map out relationships between spoken word and context, Blue Fin Labs  now applies the same technique to map internet comments and posts to  corresponding audio-visual stimuli in television broadcasts that caused  those comments to be made on the web.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Video&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data visualization of connecting the social graph to the TV content graph&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/xEZ2W5-l1Zo" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;References&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Cappi,  Alberto (1994). "Edgar Allan Poe's Physical Cosmology". The Quarterly  Journal of the Royal Astronomical Society 35: 177–192&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Castells,  M. (2000). Materials for an exploratory theory of the network society.  British Journal of Sociology Vol. No. 51 Issue No. 1 (January/March  2000).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Edgar Allen Poe (1848) ‘Eureka : A Prose Poem'.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kull, Kaveli 2010. Umwelt. In: Cobley, Paul (ed.), The Routledge Companion to Semiotics. London: Routledge, 348–349.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Latour,  B. et al 2012 “The Whole is Always Smaller Than It’s Parts A Digital  Test of Gabriel Tarde’s Monads” British Journal of Sociology  (forthcoming)&lt;a href="http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf"&gt;http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M.  Bastian, S. Heymann, and M. Jacomy, “Gephi: an open source software for  exploring and manipulating networks,” in International AAAI Conference  on Weblogs and Social Media. Association for the Advancement of  Artificial Intelligence, 2009.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M. E. J. Newman, “Analysis of weighted networks,” 2004, arxiv:cond-mat/0407503.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reynolds,  C. W. (1987) Flocks, Herds, and Schools: A Distributed Behavioral  Model, in Computer Graphics, 21(4) (SIGGRAPH '87 Conference Proceedings)  pp. 25-34.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rene  Marois and Jason Ivanoff, Capacity limits of information processing in  the brain, TRENDS in Cognitive Sciences Vol.9 No.6 June 2005&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;T. M.  J. Fruchterman and E. M. Reingold, “Graph drawing by force-directed  placement,” Softw: Pract. Exper., vol. 21 no. 11, pp. 1129–1164, Nov.  1991.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mining-the-web-collective'&gt;https://cis-india.org/internet-governance/blog/mining-the-web-collective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sharath</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-06T23:48:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary">
    <title>State Surveillance and Human Rights Camp: Summary</title>
    <link>https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary</link>
    <description>
        &lt;b&gt;On December 13 and 14, 2012, the Electronic Frontier Foundation organized the Surveillance and Human Rights Camp held in Rio de Janeiro, Brazil. The meeting examined trends in surveillance, reasons for state surveillance, surveillance tactics that governments are using, and safeguards that can be put in place to protect against unlawful or disproportionate surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The camp also examined different types of data, understanding tools that governments can use to access data, and looked at examples of surveillance measures in different contexts. The camp was divided into plenary sessions and individual participatory workshops, and brought together activists, researchers, and experts from all over the world. Experiences from multiple countries were shared, with an emphasis on the experience of surveillance in Latin America. Among other things, this blog summarizes my understanding of the discussions that took place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The camp also served as a platform for collaboration on the &lt;i&gt;Draft International Principles on Communications Surveillance and Human Rights&lt;/i&gt;. These principles seek to set an international standard for safeguards to the surveillance of communications that recognizes and upholds human rights, and provide guidance for legislative changes related to communications and communications meta data to ensure that the use of modern communications technology does not violate individual privacy.  The principles were first drafted in October 2012 in Brussels, and are still in draft form. A global consultation is taking place to bring in feedback and perspective on the principles.&lt;/p&gt;
&lt;p&gt;The draft principles were institutionalized for a number of reasons including:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Currently there are no principles      or international best standards specifically prescribing necessary and      important safeguards to surveillance of communication data. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Practices around surveillance of      communications by governments and the technology used by governments is      rapidly changing, while legislation and safeguards protecting individual      communications from illegal or disproportionate surveillance are staying      the same, and thus rapidly becoming outdated. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New legislation that allows      surveillance through access to communication data that is being proposed      often attempts to give sweeping powers to law enforcement for access to      data across multiple jurisdictions, and mandates extensive cooperation and      assistance from the private sector including extensive data retention      policies, back doors, and built in monitoring capabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Surveillance of communications is      often carried out with few safeguards in place including limited transparency      to the public, and limited forms of appeal or redress for the individual. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This has placed the individual in a vulnerable position as opaque surveillance of communications is carried out by governments across the world — the abuse of which is unclear. The principles try to address these challenges by establishing standards and safeguards which should be upheld and incorporated into legislation and practices allowing the surveillance of communications.&lt;/p&gt;
&lt;p&gt;A summary of the draft principles is below. As the principles are still a working draft, the most up to date version of the principles can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net/"&gt;here&lt;/a&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Summary of the Draft International Principles on Communications Surveillance and Human Rights&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any surveillance of communications undertaken by the government must be codified by statute. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow surveillance of communications for legitimate purposes.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing surveillance of communications should limit such measures to what is demonstrably necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Surveillance of communications should only be undertaken to the extent that is adequate for fulfilling legitimate and necessary purposes. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Any authorization for surveillance of communications must be made by a competent and independent authority. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: All measures of surveillance of communications must be specific and proportionate to what is necessary to achieve a specific purpose. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments undertaking surveillance of communications must respect and guarantee an individual’s human rights. Any interference with an individual's human rights must be authorized by a law in force.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Governments undertaking surveillance of communications must allow service providers to notify individuals of any legal access that takes place related to their personal information. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The governments ability to survey communications and the process for surveillance should be transparent to the public. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: Governments must establish an independent oversight mechanism to ensure transparency and accountability of lawful surveillance measures carried out on communications. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: In order to enable service providers to secure communications securely, governments cannot require service providers to build in surveillance or monitoring capabilities.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: When governments work with other governments across borders to fight crime, the higher/highest standard should apply. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should provide sufficient penalties to dissuade against unwarranted surveillance of communications.  &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of the surveillance on communications should be borne by the government undertaking the surveillance.&lt;/p&gt;
&lt;h3&gt;Types of Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conversations during the camp reviewed a number of practices related to surveillance of communications, and emphasized the importance of establishing the draft principles. Setting the background to various surveillance measures that can be carried out by the government, the different categories of communication data that can be easily accessed by governments and law enforcement were discussed. For example, law enforcement frequently accesses information such as IP address, account name and number, telephone number, transactional records, and location data.  This data can be understood as 'non-content' data or communication data, and in many jurisdictions can easily be accessed by law enforcement/governments, as the requirements for accessing communication data are lower than the requirements for accessing the actual content of communications. For example, in the United States a court order is not needed to access communication data whereas a judicial order is needed to access the content of communications.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in the UK law enforcement can access communication data with authorization from a senior police officer.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was discussed how it is concerning that communication data can be accessed easily, as it provides a plethora of facts about an individual. Given the sensitivity of communication data and the ability for personal information to be derived from the data, the ease that law enforcement is accessing the data, and the unawareness of the individual about the access- places the privacy of users at risk.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ways of Accessing Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ways in which governments and law enforcement access information and associated challenges was discussed, both in terms of the legislation that allows for access and the technology that is used for access.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Technology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this discussion it was pointed out that in traditional forms of accessing data governments are no longer effective for a number of reasons. For example, in many cases communications and transactions, etc., that take place on the internet are encrypted. The ubiquitous use of encryption means more protection for the individual in everyday use of the internet, but serves as an obstacle to law enforcement and governments, as the content of a message is even more difficult to access. Thus, law enforcement and governments are using technologies like commercial surveillance software, targeted hacking, and malware to survey individuals. The software is sold off the shelf at trade shows by commercial software companies to law enforcement and governments. Though the software has been developed to be a useful tool for governments, it was found that in some cases it has been abused by authoritarian regimes. For example in 2012, it was found that  FinSpy, a computer espionage software made by the British company Gamma Group was being used to target political dissidents by the Government of Bahrain. FinSpy has the ability to capture computer screen shots, record Skype chats, turn on computer cameras and microphones, and log keystrokes.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to intercept communications or block access to sites, governments and ISPs also  rely on the use of deep packet inspection (DPI).&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Deep packet inspection is a tool traditionally used by internet service providers for effective management of the network. DPI allows for ISP's to monitor and filter data flowing through the network by inspecting the header of a packet of data and the content of the packet.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; With this information it is possible to read the actual content of packets, and identify the program or service being used.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DPI can be used for the detection of viruses, spam, unfair use of bandwidth, and copyright enforcement.  At the same time, DPI can allow for the possibility of unauthorized data mining and real time interception to take place, and can be used to block internet traffic whether it is encrypted or not.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Governmental requirements for deep packet inspection can in some cases be found in legislation and policy. In other cases it is not clear if it is mandatory for ISP's to provide DPI capabilities, thus the use of DPI by governments is often an opaque area. Recently, the ITU has sought to define an international standard for deep packet inspection known as the "Y.2770" standard. The standard proposes a technical interoperable protocol for deep packet inspection systems, which would be applicable to "application identification, flow identification, and inspected traffic types".&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussions also examined similarities across legislation and policy which allows governments legal access to data. It was pointed out that legislation providing access to different types of data is increasingly becoming outdated, and is unable to distinguish between communications data and personal data. Thus, relevant legislation is often based on inaccurate and outdated assumptions about what information would be useful and what types of safeguards are necessary. For example, it was discussed how US surveillance law has traditionally established safeguards based on assumptions like: surveillance of data on a personal computer is more invasive than access to data stored in the cloud, real-time surveillance is more invasive than access to stored data, surveillance of newer communications is more invasive than surveillance of older communications, etc. These assumptions are no longer valid as information stored in the cloud, surveillance of older communications, and surveillance of stored data can be more invasive than access to newer communications, etc. It was also discussed that increasingly relevant legislation also contains provisions that have generic access standards, unclear authorization processes, and provide broad circumstances in which communication data and content can be accessed. The discussion also examined how governments are beginning to put in place mandatory and extensive data retention plans as tools of surveillance. These data retention mandates highlight the changing role of internet intermediaries including the fact that they are no longer independent from political pressure, and no longer have the ability to easily protect clients from unauthorized surveillance.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. EFF. Mandatory Data Retention: United States. Available at: &lt;a class="external-link" href="https://www.eff.org/issues/mandatory-data-retention/us"&gt;https://www.eff.org/issues/mandatory-data-retention/us&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Espiner, T. Communications Data Bill: Need to Know. ZDNet. June 18th 2012. &lt;a class="external-link" href="http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/"&gt;http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Perlroth, M. Software Meant to Fight Crime is Used to Spy on Dissidents. The New York Times. August 30th 2012. Available at: &lt;a class="external-link" href="http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0"&gt;http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Wawro, A. What is Deep Packet Inspection?. PCWorld. February 1st 2012. Available at: &lt;a class="external-link" href="http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html"&gt;http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Geere, D. How deep packet inspection works. Wired. April 27th 2012. Available at: &lt;a class="external-link" href="http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works"&gt;http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Kassner. M. Deep Packet Inspection: What You Need to Know. Tech Republic. July 27th 2008. Available at: &lt;a class="external-link" href="http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609"&gt;http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Anonyproz. How to Bypass Deep Packet Inspection Devices or ISPs Blocking Open VPN Traffic. Available at: &lt;a class="external-link" href="http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;amp;_a=viewarticle&amp;amp;amp;kbarticleid=138"&gt;http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;_a=viewarticle&amp;amp;kbarticleid=138&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Chirgwin. R. Revealed: ITU's deep packet snooping standard leaks online: Boring tech doc or Internet eating monster. The Register. December 6th 2012. Available at: &lt;a class="external-link" href="http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/"&gt;http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary'&gt;https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T16:02:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2012-bulletin">
    <title>December 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2012-bulletin</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society wish you all a great year ahead. In the December 2012 newsletter, we bring you the draft early chapters of our “National Resource Kit” project for persons with disabilities (covering four southern states); and accessibility-related comments on the Twelfth Five Year Plan; the draft research on pervasive technologies and access to knowledge that we presented at the Global Congress on Intellectual Property and the Public Interest in Brazil; our comments on the privacy implications of including RFID tags in the proposed Rule 138A of the Motor Vehicle Rules, a report on the open access lectures delivered by Prof. Leslie Chan during his tour of India, reports of Wikipedia-related workshops conducted across three cities, and news and media coverage.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS is seeking applications for the posts of &lt;a href="https://cis-india.org/jobs/programme-officer-indian-initiatives"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge — Indic Language Initiatives), &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Project), &lt;a href="https://cis-india.org/about/jobs/research-manager"&gt;Research Manager&lt;/a&gt; (Digital Humanities project), and &lt;a href="https://cis-india.org/jobs/programme-officer-access-to-knowledge-and-openness"&gt;Policy&lt;/a&gt; Associate (Access to Knowledge and Openness) and Policy Associate (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;CIS received a grant of INR 54,83,200 from the Hans Foundation for Creating a National Kit of Laws, Policies and Programs for Persons with Disabilities on August 16, 2012. Anandhi Vishwanathan from CIS and Shruti Ramakrishnan from the Centre for Law and Policy Research are the researchers presently working for this project. Early draft chapters have been published. Feedback and comments are invited from the readers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-tamil-nadu-chapter-call-for-comments"&gt;The Tamil Nadu Chapter&lt;/a&gt; (by Shruti Ramakrishnan, December 30, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-karnataka-chapter"&gt;The Karnataka Chapter&lt;/a&gt; (by Shruti Ramakrishnan, December 30, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kerala-chapter-call-for-comments"&gt;The Kerala Chapter&lt;/a&gt; (by Anandi Vishwanathan, December 31, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-andhra-pradesh-call-for-comments"&gt;The Andhra Chapter&lt;/a&gt; (by Anandi Vishwanathan, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Feedback&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/feedback-on-draft-twelfth-five-year-plan"&gt;Comments and Feedback on the Draft Twelfth Five Year Plan with respect to Persons with Disabilities&lt;/a&gt; (by Rahul Cherian, December 28, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/ip-watch-catherine-saez-december-18-2012-wipo-to-negotiate-treaty-for-the-blind-in-june"&gt;WIPO To Negotiate Treaty For The Blind In June; ‘Still Some Distance To Travel’&lt;/a&gt; (by Catherine Saez, Intellectual Property Watch, December 18, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/times-of-india-city-mumbai-madhavi-rajadhyaksha-december-20-2012-disability-groups-in-india-welcome-progress-on-treaty-for-blind-persons"&gt;Disability groups in India welcome progress on treaty for blind persons&lt;/a&gt; (by Madhavi Rajadhyaksha, December 20, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/wipo-to-convene-conference-to-finalise-tvi-next-year"&gt;WIPO to Convene a Diplomatic Conference in Morocco to Finalise TVI&lt;/a&gt; (by Rahul Cherian, December 24, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/global-congress-on-ip"&gt;2012 Global Congress on Intellectual Property and the Public Interest&lt;/a&gt; (FGV Law School, Rio de Janeiro, December 15 – 17, 2012). The Second Global Congress on Intellectual Property and the Public Interest was organized by Fundação Getulio Vargas, American University Washington College of Law, Columbia University, Open AIR, and ICSTD. Sunil Abraham and Pranesh Prakash participated in the event. Pranesh was one of the moderators in the Roundtable Discussion on Priority Policy Forums, Research and Analysis Needs and Commitments.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Research for the Global Congress&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;For the 2012 Global Congress on Intellectual Property and Public Interest event, CIS conducted research. Jadine Lannon (based on research by Annapoornima and Rohan George and with help from Yogesh Kumar did research on documentation of phones and their patent, Amba Kak did research on copyright and mobile licensing, Vikrant Vasudev conducted research on patent pools and valuation methods, Hans Varghese Mathews did research on mathematical models of patent pools and Nehaa Chaudhuri did research on analysis of 3Gand 4G patent pools.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/random-hacks-of-kindness-december-2012-report"&gt;Random Hacks of Kindness Global December 2012 — A Report&lt;/a&gt; (by Yogesh Londhe, December 10, 2012). Event was hosted at CIS office in Bangalore. CIS, Amnesty International India Office, Greenpeace India Office, HasGeek, Yahoo Research &amp;amp; Development and SimpleTechLife sponsored the event held in CIS office in Bangalore on December 1 and 2, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;‘&lt;a href="https://cis-india.org/news/i-and-n-partners-meeting-rio"&gt;Information &amp;amp; Networks’ Partners’ Meeting&lt;/a&gt; (organised by International Development Research Centre, Canada in Rio de Janeiro, December 11 – 12, 2013). Sunil Abraham spoke in session on Open Business and IP.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/leslie-chan-gives-five-talks-in-india"&gt;Open Access Champion Leslie Chan Delivers Five Talks in India&lt;/a&gt; (Department of Library &amp;amp; Information Science, University of Kerala, National Institute of Interdisciplinary Science &amp;amp; Technology, CSIR, Indian Institute of Information Technology and Management – Kerala, Manasa Media Centre, Mysore University Library and SDM Institute for Management Development, December 17 – 20, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;Access to Knowledge&lt;/a&gt; (Wikipedia Project)&lt;/b&gt;&lt;br /&gt;Beginning from September 1, 2012, Wikimedia Foundation has &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of three members based in Delhi: &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-workshop-at-nmait"&gt;Wikipedia Workshop at NMAIT&lt;/a&gt; (NMAIT, Karkala Taluk, December 21, 2012, co-organised in association with Metawings Institute).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-workshop-at-srm-chennai"&gt;Wikipedia Workshop at SRM&lt;/a&gt; (SRM University, Chennai, December 17, 2012, co-organised in association with Metawings Institute).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/marathi-wiki-workshop-at-tiss"&gt;Marathi Wiki Workshop at TISS&lt;/a&gt; (Tata Institute of Social Sciences, Mumbai, December 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/non-unicode-iscii-text-can-be-converted-to-unicode"&gt;Non Unicode ISCII Text Can be Converted to Unicode Now!&lt;/a&gt; (by Subhashish Panigrahi, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/new-avenues"&gt;New Avenues: Media Wiki Groups&lt;/a&gt; (by Noopur Raval, December 28, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News / Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-iit-kharagpur"&gt;A Report of Odia Wikipedia Workshop at IIT, Kharagpur&lt;/a&gt; (Samaja, Odia daily, Kolkata edition, December 3, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Videos&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-state-of-tech-talk-by-erik-moeller"&gt;Wikipedia: State of Tech — A Talk by Erik Moeller&lt;/a&gt; (CIS, Bangalore, November 12, 2012). Erik Moeller, Vice President of Engineering and Product Development at the Wikimedia Foundation gave a talk.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/art-in-the-open-source-age"&gt;Art in the Open Source Age — A Talk by Gene Kogan&lt;/a&gt; (CIS, Bangalore, November 30, 2012). Gene Kogan, a programmer and digital artist gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;HasGeek&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://fifthelephant.in/2012/"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://droidcon.in/2011"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://androidcamp.hasgeek.com/"&gt;Android Camp&lt;/a&gt;, etc. HasGeek is supported by CIS and works out from CIS office in Bengaluru.&lt;/p&gt;
&lt;h3&gt;Upcoming Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://metarefresh.in/2013/"&gt;Meta Refresh&lt;/a&gt; (MLR Convention Centre, JP Nagar, Bangalore, February 22 and 23, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;Analysis of Central Motor Vehicle Rules&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules"&gt;Comments on the Proposed Rule 138A of the Central Motor Vehicle Rules, 1989&lt;/a&gt; Concerning Radio Frequency Identification Tags (by Bhairav Acharya, December 3, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Columns/Op-eds&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-december-2-2012-sunil-abraham-online-censorship"&gt;Online Censorship: How Government should Approach Regulation of Speech&lt;/a&gt; (by Sunil Abraham, Economic Times, December 5, 2012).&lt;/li&gt;
&lt;li&gt;The Worldwide Web of Concerns (by Pranesh Prakash, &lt;a href="https://cis-india.org/internet-governance/blog/deccan-chronicle-pranesh-prakash-december-10-2012-the-worldwide-web-of-concerns"&gt;Deccan Chronicle&lt;/a&gt;, and &lt;a href="https://cis-india.org/internet-governance/blog/asian-age-column-december-10-2012-pranesh-prakash-the-worldwide-web-of-concerns"&gt;Asian Age&lt;/a&gt;, December 10, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-hindu-opinion-lead-december-15-2012-chinmayi-arun-the-trouble-with-hurried-solutions"&gt;The Trouble with Hurried Solutions&lt;/a&gt; (by Chinmayi Arun, The Hindu, December 15, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-december-29-2012-tomorrow-today"&gt;Tomorrow, Today&lt;/a&gt; (Nishant Shah, The Indian Express, December 29, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/meeting-of-network-of-internet-and-society-centers"&gt;Meeting of the Network of Internet &amp;amp; Society Centers&lt;/a&gt; (organised by Berkman Center for Internet &amp;amp; Society, Alexander von Humboldt Institute for Internet &amp;amp; Society, Center for Technology &amp;amp; Society, KEIO University SFC, the MIT Media Lab, the MIT Center for Civic Media, NEXA Center for Internet &amp;amp; Society and CIS, Cambridge, Massachusetts, December 6 – 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/events/dml-conference-2013"&gt;DML Conference 2013&lt;/a&gt; (Sheraton Chicago Hotel &amp;amp; Towers - Chicago, Illinois, March 14 – 16, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/second-international-e-governance-conference-at-baghdad"&gt;Second International e-Governance Conference&lt;/a&gt; (organized by the National Committee for Corporate Governance Electronic Iraq and the United Nations Development Programme, Rashid Hotel, Baghdad, December 2, 2012). Sunil Abraham presented on "Review of the Legal Environment in Iraq for Effective e-Governance".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/seminar-artist-talks-outresourcing-with-the-transmediale-collective"&gt;Seminar/Artist Talks : "Outresourcing" with the Transmediale Collective&lt;/a&gt; (organised by the Berlin - Transmediale new media collective, December 3, 2012, Bangalore). Sharath Chandra Ram presented a White Paper. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;World Conference on International Telecommunications (organised by ITU, December 3 – 14). Chinmayi Arun participated as a civil society representative.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-driven-developments"&gt;Internet Driven Developments: Structural Changes and Tipping Points&lt;/a&gt; (organised by Berkman Center for Internet &amp;amp; Society, Cambridge, Massachusetts at Harvard University, December 6 – 8, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/"&gt;Annual Conference on Human Rights 2012&lt;/a&gt; (organised by Estonian Institute of Human Rights and Google). Malavika Jayaram participated as a panelist.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/state-surveillance-and-human-rights-camp"&gt;State Surveillance and Human Rights Camp&lt;/a&gt; (Sheraton Rio Hotel &amp;amp; Resort, Rio, Brazil, December 13 and 14, 2012). Elonnai Hickok made a presentation on MLATS and International Cooperation for Law Enforcement Purposes.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.youtube.com/watch?v=VC9G_tbxI9Y"&gt;Economic Impact of Internet in India&lt;/a&gt; (organised by Aspen Institute India, December 21, 2012). Chinmayi Arun attended this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transcripts-of-wcit-2012"&gt;Transcripts from WCIT-12&lt;/a&gt; (by Snehashish Ghosh, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/section-66-a-information-technology-act-2000-cases"&gt;Section 66-A, Information Technology Act, 2000: Cases&lt;/a&gt; (by Snehashish Ghosh, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/internet-driven-developments"&gt;Internet-driven Developments — Structural Changes and Tipping Points&lt;/a&gt; (by Elonnai Hickok, December 28, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary"&gt;State Surveillance and Human Rights Camp: Summary&lt;/a&gt; (by Elonnai Hickok, December 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/mining-the-web-collective"&gt;Mining the Web Collective&lt;/a&gt; (by Sharath Chandra Ram, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/technology-culture-and-events-in-south-east-asia"&gt;Technology Culture and Events in South East Asia — A Presentation by Preetam Rai&lt;/a&gt; (CIS, Bangalore, December 18, 2012). Preetam Rai gave a lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job"&gt;66A ‘cut &amp;amp; paste job’&lt;/a&gt; (by GS Mudur, Telegraph, December 3, 2012). Pranesh Prakash and Snehashish Ghosh are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-6-2012-surabhi-agarwal-ayodhya-trending-on-twitter-sparks-censorship-concerns"&gt;Ayodhya trending on Twitter sparks censorship concerns&lt;/a&gt; (by Surabhi Agarwal, December 6, 2012). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-sci-tech-internet-december-10-2012-vasudha-venugopal-debate-on-section-66a"&gt;Debate on Section 66A rages on&lt;/a&gt; (Vasudha Venugopal, The Hindu, December 10, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-india-times-december-13-2012-kim-arora-hacktivists-deface-bsnl-website"&gt;Hacktivists deface BSNL website&lt;/a&gt; (by Kim Arora, The Times of India, December 13, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-16-2012-surabhi-agarwal-govt-likely-to-issue-guidelines-to-clarify-it-rules-soon"&gt;Govt likely to issue guidelines to clarify IT rules soon&lt;/a&gt; (by Surabhi Agarwal, LiveMint, December 16, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate"&gt;The freedom of expression debate: The State must mend fences with The Web&lt;/a&gt; (by Rahul Jayaram, India Today, December 18, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dna-bangalore-december-19-2012-the-it-act-is-fine-but-its-interpretation-is-not"&gt;‘The IT Act is fine, but its interpretation is not’&lt;/a&gt; (DNA, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-22-2012-kim-arora-no-fear-of-losing-internet-freedom-till-jan-15"&gt;No fear of losing internet freedom till Jan 15: Experts&lt;/a&gt; (by Kim Arora, The Times of India, December 22, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-december-27-2012-surabhi-agarwal-un-agrees-to-review-agencies-governing-internet"&gt;UN agrees to review agencies governing Internet&lt;/a&gt; (by Surabhi Agarwal, LiveMint, December 27, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-29-2012-delhi-gang-rape"&gt;Delhi gang rape: What Facebook, Twitter expose about govt&lt;/a&gt; (The Times of India, December 31, 2012). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid"&gt;A note of dissent on cash transfers and UID&lt;/a&gt; (The Hindu, December 31, 2012). Sunil Abraham was one of the signatories.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-december-31-2012-javed-anwer-and-rukmini-shrinivasan-the-year-social-media-came-of-age-in-india"&gt;The year social media came of age in India&lt;/a&gt; (by Javed Anwer and Rukmini Shrinivasan, The Times of India, December 31, 2012). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;Newspaper Column&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-december-11-2012-inflation-control-through-structural-reforms"&gt;Inflation Control Through Structural Reforms&lt;/a&gt; (by Shyam Ponappa, Business Standard, December 11, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/about/telecom/telecom-knowledge-repository/knowledge-and-capacity-around-telecom-policy"&gt;Building Knowledge and Capacity around Telecommunication Policy in India&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Ford Foundation has given a grant of USD 2,00,000 to CIS to build expertise in the area of telecommunications in India. The knowledge repository deals with these modules: Introduction to Telecommunications, Telecommunications Infrastructure and Technologies, Government of India Regulatory Framework for Telecom, Telecommunication and the Market, Universal Access and Accessibility, The International Telecommunications Union and other international bodies, Broadcasting, Emerging Topics and Way Forward. Dr. Surendra Pal, Satya N Gupta, Paranjoy Guha Thakurta, Payal Malik, Dr. Rakesh Mehrotra and Dr. Nadeem Akhtar are the expert reviewers.&lt;/p&gt;
&lt;p&gt;The following are the new outputs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/licensing-framework-for-telecom"&gt;Licensing Framework for Telecom: A Historical Overview&lt;/a&gt; (by Snehashish Ghosh, December 31, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/market-structure-in-telecom-industry"&gt;Market Structure in the Telecom Industry&lt;/a&gt; (by Snehashish Ghosh, December 31, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/blog/indian-express-december-8-2012-nishant-shah-not-just-fancy-television"&gt;Not Just Fancy Television&lt;/a&gt; (by Nishant Shah, Indian Express, December 8, 2012): Nishant Shah reviews Ben Hammersley's book "64 Things You Need to Know for Then: How to Face the Digital Future Without Fear ", published by Hodder &amp;amp; Stoughton.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/cnn-december-8-2012-oliver-joy-what-does-it-mean-to-be-a-digital-native"&gt;What does it mean to be a digital native?&lt;/a&gt; (by Oliver Joy, CNN, December 8, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. The policy research programmes have resulted in outputs such as the &lt;a href="https://cis-india.org/about/advocacy/accessibility/blog/e-accessibility-handbook"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/dnbook"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/position-papers"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos, etc. We conducted policy research for the Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="https://cis-india.org/about/a2k/blog/cis-analysis-july2011-treaty-print-disabilities"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="https://cis-india.org/about/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/about/internet-governance/front-page/blog/cis-feedback-to-nia-bill"&gt;NIA Bill&lt;/a&gt;, etc. CIS is accredited as an observer at WIPO, and has given policy briefs to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="https://cis-india.org/about/accessibility/blog/national-award"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="https://cis-india.org/about/news/nirmita-nivh-award"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2012-bulletin'&gt;https://cis-india.org/about/newsletters/december-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-01-16T05:15:27Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india">
    <title>Open Access Champion Leslie Chan Delivers Five Talks in India</title>
    <link>https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india</link>
    <description>
        &lt;b&gt;Professor Leslie Chan, a champion of Open Access (OA) and Associate Director of the Centre for Critical Development Studies at the University of Toronto Scarborough visited Tiruvananthapuram and Mysore in December 2012 for a series of lectures. Well known advocate for OA in India and the developing world, Professor Subbiah Arunachalam, accompanied him on these tours.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Leslie gave five talks in over three days at the Department of Library &amp;amp; Information Science, University of Kerala, on the morning of December 17, at the National Institute of Interdisciplinary Science &amp;amp; Technology, CSIR on the afternoon of December 17 at the Indian Institute of Information Technology and Management – Kerala on Decemeber 18 followed by a discussion with Satish Babu, President of the Computer Society of India and Director of ICFOSS in the afternoon, a talk at Manasa Media Centre, Mysore University Library on December 19, and a talk at SDM Institute for Management Development on December 20, 2012, which was more of a discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking on “Opportunities for Knowledge Management in the Open Access Environment” at the Indian Institute of Information Technology and Management–Kerala, Leslie Chan said, “the recognition of what constitutes scholarship is still very narrow and the quality of the content is secondary. It is the brand of the journal that is still the driving force behind every western journal.” He further said that there was a tension brewing among open access, quality control and the means of measuring impact. Market forces had infiltrated the realm of knowledge as well, for it was the companies that were increasingly taking over journals that were originally published by scholarly societies.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;His presentation touched upon what is OA and its key benefits, growth of OA in the last ten years, and opportunities for information and library professionals. See the presentation slides below.&lt;/p&gt;
&lt;table class="vertical listing" style="text-align: left; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="470px" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/lesliechan/slideshelf" width="615px"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;At the Mysore University Library, Leslie gave a lecture on Emerging Trends in Scholarly Communications and Impact Measures in the Open Knowledge Environment. He dealt with the key issues of changing contexts of research discovery and dissemination in the digital environment, why greater openness is good for science, the tensions between openness, quality measures, impact and policies, collaboration and competition, interdisciplinary research, deluge of research data. Prof. Chan touched upon some key problems like the broken scholarly communication system, emerging tools not being used effectively to serve scholarship, and the need to re-design scholarly communications and impact measures. See the presentation slides below.&lt;/p&gt;
&lt;table class="vertical listing" style="text-align: left; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="356" marginheight="0" marginwidth="0" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/15766851" width="427"&gt; &lt;/iframe&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;a href="http://www.slideshare.net/lesliechan/emerging-trends-in-scholarly-communication-and-impact-measures-in-the-open-knowledge-environment-15766851" target="_blank" title="Emerging Trends in Scholarly Communication and Impact Measures in the Open Knowledge Environment"&gt;Emerging Trends in Scholarly Communication and Impact Measures in the Open Knowledge Environment &lt;/a&gt;&lt;/b&gt;from &lt;b&gt;&lt;a href="http://www.slideshare.net/lesliechan" target="_blank"&gt;University of Toronto Scarborough&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Therafter, Prof. Chan visited Shri Dharmasthala Manjunatheshwara Institute for Management Development and addressed scientists, librarians and academicians. There were discussions on how open access journals and repositories can help improve the visibility of an institution's research strengths, help attract research collaborators for authors and increase the return on investment. Prof. Chan was particularly critical of the current trends, in evaluating both researchers and their institutions using impact factor of journals in which they publish their research papers as the yardstick. &lt;a href="https://cis-india.org/openness/blog-old/open-access-to-research-at-sdm-imd.pdf" class="internal-link"&gt;Read the press coverage by Star of Mysore&lt;/a&gt; (PDF, 462 Kb).&lt;/p&gt;
&lt;table class="listing" style="text-align: left; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/ChanVisit2.png/@@images/1e62aaa1-5947-49ca-b8fe-436d9b1c4010.png" alt="Prof. Chan Tour" class="image-inline" title="Prof. Chan Tour" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;Prof. Subbiah Arunachalam accompanied Prof. Leslie in his tours to Tiruvananthapuram and Mysore&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Leslie's tour to Tiruvananthapuram and Mysore which saw him deliver a series of lectures along with open forum discussions has triggered a fresh awakening to seriously debate on open access initiatives. The event was well covered by the media with the Hindu doing an exclusive interview with him.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: left; "&gt;More pictures of Prof. Chan's visit can be seen &lt;a class="external-link" href="https://picasaweb.google.com/sunilmysore/ProfChanVisit?authuser=0&amp;amp;feat=directlink"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: left; " /&gt;
&lt;p style="text-align: left; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See “Call for efforts to promote open access platforms, The Hindu, December 19, 2012, available at &lt;a class="external-link" href="http://bit.ly/10LEiBU"&gt;http://bit.ly/10LEiBU&lt;/a&gt;, last accessed on December 31, 2012.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See "In defence of Open Access systems", The Hindu, December 31, 2012, available at&lt;a class="external-link" href="http://bit.ly/VZfmz6"&gt; http://bit.ly/VZfmz6&lt;/a&gt;, last accessed on January 2, 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india'&gt;https://cis-india.org/openness/blog-old/leslie-chan-gives-five-talks-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-01-02T05:35:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait">
    <title>A Wikipedia Workshop at NMAIT</title>
    <link>https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society, Delhi collaborated with Metawings Institute to spread the words about Wikipedia for Indian languages. A one-day workshop was organized to educated the students on contributing to Wikipedia on December 21, 2012. About 170 engineering students took part in this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The workshop began with interaction with the students about their understanding. I asked few questions like what is Wikipedia, who edits articles on Wikipedia, is it paid or free, did they ever try to edit Wikipedia, etc. I took them through a presentation to explain basics of Wikipedia, five pillars, notability and copyright issues related to vandalism. One of the students were called to create his user account. Students were showed the simpler sign up process. To explain how articles are edited we introduced errors in the article on Bengaluru and &lt;a href="http://en.wikipedia.org/w/index.php?title=Bangalore&amp;amp;diff=529072240&amp;amp;oldid=529071146"&gt;made it the capital of India for few minutes&lt;/a&gt;! Students were explained how Wikipedia editors correct mistakes like these in real time and correct facts are published in Wikipedia. A majority of the students asked about the authenticity of articles which is open to anyone. So I got a chance to refresh the page and show how the error introduced was reverted within a few minutes.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/openness/blog-old/ParticipantsatKarkala.png" alt="Participants at Karkala" class="image-inline" title="Participants at Karkala" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center; "&gt;Above is a picture of the participants from the Wikipedia Workshop at Karkala&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The session went on with such interaction and students were explained more about the importance of citing references to add credibility to the facts they can add on Wikipedia articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We also had Dr. Ashok Kumar, prof, Computer science department, a wikipedian and columnist for Kannada newspaper &lt;a href="http://www.udayavani.com/"&gt;Udaya Vani&lt;/a&gt;. Dr. Kumar &lt;a href="http://meta.wikimedia.org/wiki/File:Wikipedia_Outreach_Document_-_Kannada.pdf"&gt;introduced&lt;/a&gt; Kannada Wikipedia to the students. At the end of the session I had a discussion with him about organizing more workshops for Kannada Wikipedia and supporting participant students. Special thanks to &lt;a href="http://www.metawinggroups.com/"&gt;Metawings&lt;/a&gt; for finding the venue and supporting for the event.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait'&gt;https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-01-04T16:30:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/open-access-to-research-at-sdm-imd.pdf">
    <title>Open access to research discussed at SDM-IMD</title>
    <link>https://cis-india.org/openness/blog-old/open-access-to-research-at-sdm-imd.pdf</link>
    <description>
        &lt;b&gt;Published in Star of Mysore on December 23, 2012.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/open-access-to-research-at-sdm-imd.pdf'&gt;https://cis-india.org/openness/blog-old/open-access-to-research-at-sdm-imd.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-01-02T03:57:41Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/internet-driven-developments">
    <title>Internet-driven Developments — Structural Changes and Tipping Points </title>
    <link>https://cis-india.org/internet-governance/blog/internet-driven-developments</link>
    <description>
        &lt;b&gt;A symposium on Internet Driven Developments: Structural Changes and Tipping Points was held in Cambridge, Massachusetts at Harvard University from December 6 to 8, 2012. The symposium was sponsored by the Ford Foundation and the MacArthur Foundation and was hosted by the Berkman Center for Internet &amp; Society. In this blog post, I summarize the discussions that took place over the two days and add my own personal reflections on the issues.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The symposium served as an inaugural event for the &lt;i&gt;Global Network of Interdisciplinary Centers&lt;/i&gt;, which currently includes as its members:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Berkman Center for Internet and Society at Harvard University&lt;/li&gt;
&lt;li&gt;The Alexander von Humboldt Institute for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;The Centre for Internet and Society, Bangalore &lt;/li&gt;
&lt;li&gt;The Center for Technology &amp;amp; Society at the Fundacao Getulio Vargas Law School, Keio University&lt;/li&gt;
&lt;li&gt;The MIT Media Lab and its Center for Civic Media&lt;/li&gt;
&lt;li&gt;The NEXA Center for Internet &amp;amp; Society at Politicnico di Torino. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Individuals and researchers from the Centers focused on understanding the effects of internet and society. The participants were brought together to explore the past, present, and future tipping points of the internet, to identify knowledge gaps, and to find areas of collaboration and future action between institutes and individuals. Specifically, the symposium set out to examine fundamental questions about the internet, identify structural changes that are occurring because of the internet, and the forces that are catalyzing these changes. Questions asked and discussed included:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What forces are changing production and service models? &lt;/li&gt;
&lt;li&gt;What forces are influencing entrepreneurship and innovation? and &lt;/li&gt;
&lt;li&gt;What forces are changing political participation?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Production and Service Models&lt;/h2&gt;
&lt;h3&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When participants discussed the changes that are happening to production and service models, concepts such as big data, algorithms, peer based models of production, and intermediaries were identified as actors and tools that are driving change in production and service models in the context of the internet. For example, big data and algorithms are being used to alter the nature, scope, and reach of business by allowing for the personalization and customization of services. To this end, many organizations have incorporated customer participation into business models, and provide platforms for feedback and input. The personalization of services has placed greater emphasis on the voice of the customer, allowing customers to guide and influence business by voicing preferences, satisfaction levels, etc. In this way, consumers can determine what type of service they want, and can also make political statements through their choices and feedback. In the process, however, such platforms generate and depend on large amounts of data and thus raise concerns about privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps that were identified during the conversation included how to predict what would make a participatory platform and peer based model successful, and how these platforms can be effectively researched. When looking at big data, a knowledge gap that was identified included how to ensure that data are collected ethically and accurately, as well as the related question: once large data sets are collected, how can the data be analyzed and used in a meaningful way?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also discussion about the increasingly critical and powerful role that intermediaries serve within the scope of the internet as they act as the platform provider and regulator for internet content. Intermediaries both allow for content to be posted on the internet, and determine what information is accessed through the filtering of web searches.  Increasingly, governments are seeking to regulate intermediaries and create strict rules of compliance with governmental mandates. At the same time governments are placing the responsibility and liability of regulating what content is posted on internet on intermediaries, essentially placing them in the role of an adjudicator. This is one example of how the relationship between the private sector, the government, and the individual is changing, because it is only recently that private intermediaries have been held responsible first to governments, and only secondarily to customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps identified in the discussion on intermediaries included understanding and researching how intermediaries decide to filter content found through searches. On what basis is each filter done? Are there actors influencing this process? And what are the economics behind the process?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When reflecting on how the internet is changing and influencing the production of goods and services, I personally would add to the points discussed in the meeting the fact that the internet has also impacted the job economy.  Reports show that jobs in the extraction and manufacturing sector are decreasing, as the internet has created a mandatory new tech oriented skill set that often outweighs the need for other skill sets.  This change is far reaching as the job economy influences what skills students choose to learn, why and for what purposes individuals migrate across borders for employment, and in what industries governments invest money towards domestic development. In addition to changing the nature of skills in demand, the nature of the services themselves is changing. Though services are becoming more personalized and tailored to the individual, this personalization is automated, and replacing the ‘human touch’ that was once prized in business. Whether customers care if the service they are given is generated by an algorithm or delivered by an individual may depend on a person’s preference, but the European Union has seen this shift as being significant enough to address automated decision making in Article 15 of the EU directive, which provides individuals the right to not be subject to a decision which legally impacts him/her which is based only on automated processing of data. This directive encompasses decisions such as evaluation of a person’s performance at work, creditworthiness, reliability, conduct, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The internet has also increased the cost of small mistakes made by businesses, as any mistake will now potentially impact millions of customers. The impact of any mistake makes risk management much more important and difficult, as businesses must seek to anticipate and mitigate any and all mistakes. The internet has also created a new level of dependency on the network, as businesses shift all of their services and functions over to the internet. Thus, if the network goes down, businesses will lose revenue and customers. This level of dependency on the network that exists today is different from past reliance’s on technology — in the sense that in the past there was not one single type of technology that would be essential for many businesses to run. The closest analogue was transportation: if trucks, trains, or ships were unavailable, multiple industries would be impacted. The difference is that those who relied on rail could shift temporarily to ships or trucks. Those relying on the network have no alternatives. Furthermore, past technologies were constantly evolving in the resources they depended on — from coal to gas, etc, but for the internet, it seems that the resource is not evolving, so much as expanding as increased bandwidth and connectivity are the solution to allowing technological evolution and innovation through the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As discussed above, intermediaries are becoming key and powerful players, but they also seem to be increasingly placed between a rock and a hard place, as governments around the world are asking national and multinational intermediaries to filter content that violates national laws in one context, but not another context. Furthermore, intermediaries are increasingly being asked to comply with law enforcement requests for access to data that is often not within the jurisdiction of the requesting country. The difficult position intermediaries are placed in demonstrates how the architecture of the internet is borderless but the regulation and use of the internet is still tied to borders and jurisdiction.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Entrepreneurship and Innovation&lt;/h2&gt;
&lt;h3&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When discussing entrepreneurship and innovation it was pointed out by participants that grey markets and market failures are important indicators for possibilities of new business models and forms of innovation. Because of that, it is important to study what has failed and why when identifying new possibilities and trends. The importance of policies and laws that allow for innovation and entrepreneurship was also highlighted.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;When thinking about entrepreneurship and innovation on the internet and forces driving them, it seems clear that tethering, conglomerating, and organizing information from multiple sources is one direction that innovation is headed. Services are coming out that have the ability to search the internet based on individual preferences and provide more accurate data quickly. This removes the need for individuals to search the internet at length to find the information or products they want. Along the same lines, it seems that there is a greater trend towards personalization. Services are finding new and innovative ways to bring individuals customized products. Another trend is the digitization of all services — from moving libraries online, to bookstores online, to grocery stores online. Lastly, there is a constant demand for new applications to be developed. These can range from applications enabling communication through social networking, to applications that act as personal financial consultants, to applications that act as personal trainers. The ability for concepts, trends, etc to go viral on the internet has also added another dimension to entrepreneurship and innovation as any individual can potentially become successful by something going viral. The ability for something to go viral on the internet does not just impact entrepreneurship and innovation, but also impacts political participation and production and service models.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Political Participation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Discussions also centered on how political participation is changing as the internet is being used as a new platform for participation. For example, it is now possible for individuals to leverage their voice and message to local and global communities. Furthermore, this message can be communicated on a seemingly personal scale. Individuals from one community are able to connect to communities from another location — both local and abroad, and to work together to catalyze change. Messages and communications can be spread easily to millions of people and can go viral.  This ability has changed and created new public spheres, where anyone can contribute to a dialogue from anywhere.  Empowerment is shifting as well, because the internet allows for new power structures to be created by any actor who knows how to leverage the network. These factors allow for more voices to be heard and for greater citizen participation. The role of the youth in political movements was also emphasized in the discussions. On the other hand governments have responded by more heavily regulating speech and content on the internet when dissenting voices and campaigns are seen as a threat. It was also brought out that though emerging forms of online political participation have been heralded by many for achievements such as facilitating democracy, transparency, and bringing a voice to the silenced — many have warned that analysis of these political forms of participation overlook individual contributions and time. Other critiques that were discussed included the fact that digital revolutions also exclude individuals who do not have access to the internet or to platforms/applications and overlook actions and movements that take place offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Knowledge gaps that were identified included understanding the basics of the change that is happening in political participation through the internet. For example, it is unclear who the actors are that determine the conditions and scope for these changes, and like participatory forms of business, what enables and mobilizes change. Furthermore, it is unclear who specifically benefits from these changes and how, and who participates in the changes — and in what capacity. Additionally, much of the change has been quantified in the dialogue of the ‘global’ — global voices, global movements — but that dialogue ignores the local.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Personal Thoughts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In addition to the discussions on political participation, I believe the internet has created the possibility for ‘social governance’. To address situations in which there is no particular law against an action, but individuals come together and speak out against actions that they see on the internet that they believe should be stopped or changed. Depending on the extent individuals choose to enforce these decisions, this can be potentially dangerous as individuals are essentially rewriting laws and social norms without subjecting them to the crucible of consensus decision-making or review. In addition, forms of political participation are not changing just in terms of how the individual engages politically with states and governments, but also in the ways that politicians are engaging with citizens. For example, politicians are using Facebook and Twitter as means to communicate and gather feedback from supporters. Politicians are also using technology to reach more individuals with their messages — from experimenting with 3D holograms, to web casting, to using technology like CCTV cameras to prove transparency. The impact of this could be interesting, as technology is becoming a mediating tool that works in both directions between citizens and governments. Is this changing the traditional understandings of the State and the relationship between the State and the citizen?&lt;/p&gt;
&lt;h2&gt;Conclusion and ways forward&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussions also pulled out dichotomies that apply to the internet and illustrate tensions arising from different forces. These dichotomies can be shaped by individuals and actors attempting to regulate the internet, as for example with new models of regulation vs. old models of regulation,  private vs. public, local vs. global,  owned vs. unowned, and zoned vs. unzoned. These dichotomies can be shaped by how the internet is used. For example, fair vs. unfair, just vs. unjust, represented vs. silenced, and uniform vs. diverse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Common questions being asked and areas for potential research that came out of these discussions included information communication and media, how to address different and at times contradictory policies and levels of development in different countries, and what is the impact of big data on different sectors and industries like e-health and journalism? What is the importance of ICT in creating economic progress? How is the Internet changing the nature of democracy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When discussing ways forward and areas for future collaboration it was brought out that exploring ways to leverage open data, ways to effectively use and build off of perspectives and experiences from other contexts and cultures, and ways to share resources across borders including funding, human presence, and expertise were important questions to answer. Common challenges that were identified by participants ranged from cyber security and the rise of state and non-state actors in cyber warfare, finding adequate funding to support research, sustaining international collaborations, ensuring that research is meaningful and can translate into useful resources for policy and law makers, and ensuring that projects are designed with a long-term objective and vision in mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions, presentations, and contributions by participants during the two day symposium were interesting and important as they demonstrated just how multi-faced the internet is, and how it is never one dimensional. How the internet is researched, how it is used, and how it is regulated will be constantly changing. Whether this change is a step forward, or a re-invention of what has already been done, is up to all who use the internet including the individual, the corporation, the researcher, the policy maker, and the government.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/internet-driven-developments'&gt;https://cis-india.org/internet-governance/blog/internet-driven-developments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-28T15:34:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/feedback-on-draft-twelfth-five-year-plan">
    <title>Comments and Feedback on the Draft Twelfth Five Year Plan with respect to Persons with Disabilities</title>
    <link>https://cis-india.org/accessibility/blog/feedback-on-draft-twelfth-five-year-plan</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society was one of the ten organizations representing people with disabilities that sent comments and feedback on the draft twelfth five year plan. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We write to you on behalf of the organizations representing people with disabilities listed at the end of this document. At the outset, we would like to thank you for circulating the Draft Twelfth Five Year Plan with respect to persons with disabilities in advance in order to gain the feedback and the perspective of all interested parties and stakeholders, including persons with disabilities. However, we would like to bring to your attention that while the entire budgetary allocation has been given to us in this draft, the specifics of the allocation i.e. the detailed break up has not been given, and so any input that we may have may be insufficient in the absence of this information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The World Health Organization estimates that globally about 1 billion people (or 14% of the population) live with some form of disability of who nearly 200 million experience considerable difficulties in functioning.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; Given the large prevalence of disability of approximately 14% of the population, it is submitted that the statistics of the 2001 census which states that only 2.11 % of the population is disabled is wholly inaccurate. If the financial outlay is based on the flawed assumption that only 2.11% of the population is disabled, we fear that the financial outlay will be substantially less than is necessary to meet the actual needs of people with disabilities. Therefore we recommend that the Twelfth V Year Plan should be based on realistic numbers of the persons with disabilities in the country. It is recommended that at least 5% of the total outlay for the Twelfth Plan should be for disability related projects. It is also recommended that a reality check is done on the benefits available to persons with disabilities such as pensions. Unless this is done, the benefits available to persons with disabilities is wholly inadequate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We would like to point out that the document you had circulated does not give the status of the implementation of the various schemes that were proposed under the Eleventh V Year. Without the status of implementation of schemes proposed earlier, we are concerned that merely reiterating the same schemes for the upcoming Plan period may lead to suboptimal usage of the allocated funds particularly with respect to those schemes that have not been implemented to the maximum extent possible. We therefore request you to include the status of implementation of the various schemes that were proposed in the earlier Plan period to enable transparency in this exercise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before we give specific input and comments on the financial outlay, we would like to point out our grievance in the wording of Sec. 24.218&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; of the draft which states that persons with disabilities have &lt;i&gt;&lt;span&gt;"&lt;span style="text-decoration: underline;"&gt;un-evolved capacities&lt;/span&gt;"&lt;/span&gt;&lt;/i&gt; and we strongly believe that this approach that persons with disabilities will completely obscure the optimistic approaches sought to be achieved by this Plan. While it is appreciated that persons with disabilities need some protection, using terminology like "unevolved capacity" is just reaffirming a protectionist attitude as well as patronizing one. We hope that this terminology will be removed from the document. We also point out that in point number 24.227 the United Nations Convention on the Rights of Persons with Disabilities is wrongly mentioned as "United Nations Conference on Rehabilitation of Persons with Disabilities (UNCRPD)". This error must be rectified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Be that as it may, the undersigned would like to place on record our appreciation for the inclusion of many aspects into the above mentioned document. We would also like to bring your attention to several aspects given below which we believe should be covered in the Twelfth V Year Plan (hereinafter referred to as "the Plan").&lt;/p&gt;
&lt;h3 align="left" class="Heading11"&gt;Specific Input&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I. Detection of Disability&lt;/b&gt;&lt;br /&gt;Early detection of disabilities in babies and children is critical to determine what types of early intervention and rehabilitation is required to be provided. The Plan must provide financial outlay for the following with respect to detection of disabilities for further action:&lt;/p&gt;
&lt;table align="left"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="left"&gt;
&lt;p align="center"&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;span&gt;At birth screening&lt;/span&gt;&lt;/span&gt; - Every baby born should be examined in detail using a standard examination checklist, to detect anomalies. The checklist should focus on detecting anomalies so that further follow up on developmental delay could be identified for at risk cases which could further lead to interventions. At birth screening must be made mandatory and the mother and child should not be discharged from hospitals without completing this procedure. Special attention must be taken to screen high risk babies (such as babies born to mothers who have diabetes, high blood pressure, thyroid deficiency, pre-term babies, babies with history of perinatal hypoxia, neonatal infections, low birth weight babies, etc.). The screening should be done free of cost and appropriate allocation should be done for the training of medical professionals and soliciting of equipment for this purpose.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;span&gt;Additional Screening&lt;/span&gt;&lt;/span&gt; In addition, screening by health workers, medical officers and doctors are required at stages like vaccinations, routine check ups, etc. The Plan must include allocation for training programs to be formulated and appropriate training must be given to all health care workers on how to diagnose disabilities and how to determine developmental milestones. Allocation of funds must be made to train doctors at maternity clinics/hospitals on conducting adequate checks/tests for early detection of developmental delays and disabilities If any disability is suspected, the child must be referred to the medical officer. There must be recognition of the fact that failure to detect disabilities at the early stage may lead to secondary disabilities. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Universal screening camps&lt;/span&gt; - The Plan itself must provide financial outlay to enable each state to organize bi annual universal screening camps for all school going children in the state to detect disabilities. The screening must be conducted for all disabilities. These camps must include the necessary manpower /specialists (including audiologist /speech therapist, clinical child psychologist, physiotherapist, etc.) and equipment required to detect all types of disabilities in babies. Appropriate budgetary allocations need to be in place. Universal screening camps must be held in conjunction with setting up of early intervention centres failing which the children identified to have disabilities will tend to face social stigma. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Registration of Births of Children with Disabilities&lt;/span&gt;: In accordance with the Persons with Disabilities Act, the Registrar General appointed under section 3 of the Births and Deaths Registration Act, 1969 shall whilst carrying out the superintendence duties of registering births and deaths in the country ensure, including by issuing general directions to all Chief Registrars and other concerned officials, that the registration of births and deaths of all children with disabilities is undertaken in accordance with the procedure specified in the Births and Deaths Registration Act of 1969.&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;&lt;b&gt;II. Early Intervention &lt;/b&gt;&lt;br /&gt;Early intervention has been touched upon in the policy document. However, there is not enough emphasis on this area. The importance of early intervention is well established. Early intervention provides support for infants and young children with disabilities, their families and communities, in order to promote the child's development and inclusion. Without early intervention it is extremely difficult for children with disabilities to be integrated into mainstream society. Delay in diagnosis and treatment results in irreversible damage to the child's development. Early intervention could be in the form of medical intervention and/or variety of disability specific rehabilitation intervention like different therapies and specialized training (specialized training or therapy). Early intervention would also include:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Counseling and training of parents of children with disability.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Early stimulation for High risk babies&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Early Intervention for Developmental Delay, Speech &amp;amp; Hearing Problems, Visual Problems, Autism Intervention etc.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Parental guidance for supporting activities of daily living.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;It is critical that early intervention centres are set up in each district in the country. The State of Kerala has created a blue print for setting up early intervention centres in each district in the State. This document is attached separately for your information. The Plan should incorporate salient features from this document. Point 24.226 must be modified accordingly.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III. Education&lt;/b&gt;&lt;br /&gt;While the Plan places emphasis on education in point 24.222 a most critical aspect has been left out. Training of teachers to impart education to children with disabilities in an inclusive school setup is extremely critical if such children are to get a meaningful education. In this connection the Plan should provide financial outlay for ensuring that both mainstream teachers and teachers in special schools are provided the necessary training for imparting education to children with disabilities. The salary of all such teachers should be on par with regular teachers. The Plan should also provide for refresher training to be imparted to teachers in this connection. In addition to the above, the Plan should provide adequate financial outlay to ensure that all educational materials are provided to children with disabilities in the accessible formats they require including in Braille, Daisy, etc. It is also critical to ensure that schools are made accessible such that children with disabilities have equal access to 4 all parts of the school. Moreover, it is imperative that adequate accessible transportation is provided to enable children with disabilities to reach the school. In this connection, point 24.245 is adequately modified. The Plan should also ensure that children with disabilities have access to schools at every taluk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In point 24.222 there is a mention of setting up a national accessible library. This is an extremely encouraging move. However, the national accessible library is not mentioned in the responsibilities of any of the Ministry. We recommend that the national accessible library is included in the responsibilities of the Ministry of Social Justice and Empowerment. The Plan makes no mention of the HEPSN scheme and capacity building in colleges and universities. This should be addressed explicitly. In addition, the Plan makes no mention of the role of the UGC. Given the fact that the UGC is responsible for higher education in India, it needs to promote inclusive higher education through adequate capacity building through incentivizing the setting up of resource centers and accessible content creation. It could also interface with organizations like the National Assessment Accreditation Council (NAAC) that is responsible for accrediting colleges and universities to ensure that the provision of certain minimum standards / disabled student registration be made compulsory to receive accreditation and consequent larger share of UGC grants. Financial support for college / university professors (human / technological) needs to be specifically mentioned and augmented over the Xlth plan outlays. Several existing plans including the ADIP Scheme and the IEDC Scheme need to be brought in line with practical realities and the amounts payable under such Scheme should be significantly enhanced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV. Employment&lt;br /&gt;&lt;/b&gt;Point 24.221 rightly highlights reservation as being critical. However, the Plan does not tackle the issue of the huge backlog in this area that has crept in over the year. The Plan must deal with this issue on a priority basis. The Plan should also provide for bridge training to be provided to persons with disabilities to enable them to be equipped to perform their respective roles after they are recruited to mainstream jobs. In this connection it is critical that all government offices must be made accessible (both in terms of physical accessibility and also in terms of accessibility of the electronic infrastructure) failing which disabled employees will not be able work from these offices. Point 24.225 should be therefore adequately modified to reflect this. The Plan should provide for setting up of career guidance cells in every district for persons with disabilities. The Plan should provide financial outlay to ensure that they necessary assistive aids such as computer screen reading software is made available at government offices free of cost for employees with visual impairment. Lastly the Plan should also provide financial outlay to ensure that accessible transport is provided to persons with disabilities to travel to and from the work place. In the alternative the Plan should provide for additional payments to be made to ensure that persons with disabilities can make their own arrangements to take the mode of transport they are most comfortable in to come and go from their workplace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;V. Accessibility&lt;/b&gt;&lt;br /&gt;Access to the physical environment as well as to information, technology and communication is an essential requirement for integration of persons with disability into mainstream society. It is critical to recognize that the lack of provision of accessibility is the same as discrimination against persons with disabilities. The provision of accessibility both by the Government and by the private sector is therefore critical and the Plan must make an effective strategy to ensure that both these stakeholders provide the necessary accessibility to persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While accessibility is tackled in a general manner in point 24.225, this has not been adequately tackled in the responsibilities of the Ministries in the subsequent pages of the document. The responsibilities of each of the Ministries with respect to accessibility must be explicitly specified in the document. While the Ministry of Communication and Information Technology has been allotted some responsibilities, this does not cover access to content, access to telecommunication services or access to broadcasting. For further information on access to content, telecommunication services and broadcasting see Annexure A. In addition, point 24.225 mentions that only important government buildings must be made accessible. This approach is fraught with danger and the Plan must provide for all government buildings and buildings accessible to the public in general must be made accessible. The Government must also formulate a set of standards for accessibility.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We would also like to point out that the recommendation under the obligations of the Ministry of Railways to provide one coach for persons with disabilities is blatant discrimination and is "ghettoisation" of persons with disabilities. It is submitted that this is the same as asking any other minority community to use only a particular coach on the train and is in violation of Article 14, Article 15 and Article 21 of the Constitution. This provision will prevent persons with disabilities from having equal access to the air conditioned coaches, first class coaches and will also prevent persons with disabilities from travel on an equal basis with others. The Ministry of Railways should instead be mandated to ensure that every coach is made accessible for persons with disabilities. In addition, the Plan requires the Ministry of Railways only to make multilevel and multiple platform railways stations to be made accessible. This is blatantly discriminatory to rural India. We therefore recommend that all railway stations are made accessible, including toilets, rest rooms etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;VI. Independent Living&lt;/b&gt;&lt;br /&gt;In point 24.226, the Plan does touch upon the subject of Independent Living. However, there needs to be detailed specifications on the manner in which Independent Living for persons with disabilities are provided. The setting up of Independent Living Centres is extremely crucial in light of Article 19 of the United Nations Convention on the Rights of Persons with Disabilities. While this is not something which can be achieved overnight, the Government can begin by commissioning the setting up of one independent living centres or townships in each State over the next 5 years, which are fully accessible, and thus creating a model which can be replicated easily in the years to come. This would include independent living for persons with physical disability as well as psychosocial disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has come to our attention that there has been a report filed by a committee under the Chairmanship of Additional Secretary, Department of Rural Development, Ministry of Rural Development, to make recommendations on the criteria for grant of benefits under the Indira Gandhi National Disability Pension Scheme. While the Scheme already includes "severe" and "multiple" disabilities, the Committee has also recommended the specific inclusion of autism and cerebral palsy. While the committee report itself is not available, this information is available in the press note . Choosing specific categories should not be encouraged whereas disability should be acknowledged based on the definition for persons with disabilities as provided by UNCRPD.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A crucial aspect to a real development of an individual with disability is not just pension but the support and assistance that he or she requires to live independently by effectively functioning and contributing in the family and community. In this respect, there is a huge requirement for personal assistants for persons with severe and profound disabilities. The National Social Assistance program should look at allocating funds to be disbursed for the payment of personal assistants for persons with disabilities rather than mere pension.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;VII. Identity Cards and BPL Cards&lt;br /&gt;&lt;/b&gt;We urge that the Plan takes all steps to ensure that identity cards are made available to all persons with disabilities in the country to ensure that they can easily access all the benefits available to them. These cards should be recognized throughout the country and accepted by all departments and authorities. We also urge that the Plan redoubles it efforts to ensure that BPL Cards are given to the applicable persons with disabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In conclusion, we appreciate the initiative of the Government to double the financial outlay for persons with disabilities in the Twelfth V Year Plan to Rs. 32684 crores. However, there are significant areas that must be tackled as mentioned above if there has to be meaningful progress of persons with disabilities. We humbly request the Government to consider the points given above when finalizing the Plan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are happy to provide you any additional information in this connection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thank you and best regards,&lt;br /&gt;Prepared by&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Inclusive Planet Centre for Disability Law and Policy&lt;/b&gt;&lt;br /&gt;Rahul Cherian and Amba Salelkar&lt;/p&gt;
&lt;p&gt;With Input From:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Centre for Internet and Society&lt;br /&gt;Nirmita Narasimhan &lt;br /&gt;&lt;a class="mail-link" href="mailto:nirmita@cis-india.org"&gt;nirmita@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Xavier's Resource Center for the Visually Challenged &lt;br /&gt;Sam Taraporevala&lt;br /&gt;&lt;a class="mail-link" href="mailto:sam@xrcvc.org"&gt;sam@xrcvc.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Daisy Forum of India&lt;br /&gt;Dipendra Manocha&lt;br /&gt;&lt;a class="mail-link" href="mailto:dipendra.manocha@gmail.com"&gt;dipendra.manocha@gmail.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Andhjan Kalyan Trust &lt;br /&gt;Praful Vyas &lt;br /&gt; &lt;a class="mail-link" href="mailto:aktrust.drj@gmail.com"&gt;aktrust.drj@gmail.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Parivaar &lt;br /&gt;J.P. Gadkari&lt;br /&gt;&lt;a class="mail-link" href="mailto:jpgadkari@gmail.com"&gt;jpgadkari@gmail.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Ummeed Child Development Centre&lt;br /&gt;&lt;a class="mail-link" href="mailto:vibha.krishnamurthy@ummeed.org"&gt;vibha.krishnamurthy@ummeed.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;National Centre for Autism, India &lt;br /&gt;Merry Barua&lt;br /&gt;&lt;a class="mail-link" href="mailto:actionforautism@gmail.com"&gt;actionforautism@gmail.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Network of Persons with disAbility Organisations&lt;br /&gt;Srinivasulu&lt;br /&gt;&lt;a class="mail-link" href="mailto:npdoap@gmail.com"&gt;npdoap@gmail.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Disabilities Legislative Unit, South&lt;br /&gt;&lt;a class="mail-link" href="mailto:dlu.south@gmail.com"&gt;dlu.south@gmail.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;National Platform for the Rights of the Disabled&lt;br /&gt;A. Muralidharan &lt;br /&gt;&lt;a class="mail-link" href="mailto:nprd.in@gmail.com"&gt;nprd.in@gmail.com&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://whqlibdoc.who.int/publications/2011/9789240685215jeng.pdf"&gt;http://whqlibdoc.who.int/publications/2011/9789240685215jeng.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr2name="&gt;2&lt;/a&gt;]. Protection acknowledging that Persons with Disabilities have 'un-evolved' capacities as a consequence of their disabilities and thereby have rights to protection; on the part of parents, community and the State from abuse and from participation in activities likely to cause them harm.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;ANNEXURE A - Access to Content, Telecommunication Services and Broadcasting&lt;/h2&gt;
&lt;h3&gt;Access to Content&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Objective&lt;/b&gt;&lt;br /&gt;All published content, whether printed or electronic, must be made available in accessible formats at the same time as it is first published and with no extra cost or hardship to persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Strategy/ activities&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Books for education- both at the school and university levels, must be made available in accessible electronic formats. This could be a target to be achieved in five years. CBSE and state board syllabi in all languages may be made available in accessible electronic formats.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Funds may be outlayed towards digitizing public libraries.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Government may frame schemes for funding disability organizations which are engaged in converting books into accessible formats, as is done in other countries like USA.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All the public libraries should have the facility to provide books in accessible formats to its disabled readership.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Government may promote open access and open education resources amongst educational, scientific and research organizations and libraries and stress the need for accessibility.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All government information must be available in accessible formats which can be accessed on multiple platforms like computers or mobile phones, including information provided through RTIs, etc.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All archives containing digital copies of books must be able to provide a requested book in an accessible format, even where they have been unable to completely digitize their archives in an accessible manner. However, the long term target must be to have all archives completely accessible.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Access to Telecommunication Services&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Objective:&lt;/b&gt;&lt;br /&gt;To ensure that every person with a disability has access to basic telephone and broadband services both in rural as well as urban areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Strategy/ Activities:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Public Kiosks and Common Service Centres set up by the Government must have at least one machine which is fitted with assistive technology for every ward.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Each school and college with an ICT centre must have at least one computer befitted with assistive technology and should be manned by a trained instructor who can guide students in using them.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Research and development must be funded in open source and cloud based solutions like screen readers and operating systems which will facilitate universal access at no cost to user. These research projects must necessarily have persons with disabilities to advise on the efficacy and design of the product.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Assistive technologies for computers and mobile phones must be developed in local languages and be made available at low cost.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Schemes may be launched to provide funds to persons with disabilities to purchase assistive technologies for their computers or handsets.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Each household with a person with disability must have a broadband connection and telephone connection.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;At least 1 public pay phone in each area must be accessible with texting facility.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A national toll free emergency number must be set up like Reach 112 in Europe.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;TRAI must include persons with disabilities in its periodic survey to gauge their access to telecommunication services. Similarly the DoT and DIT must make available data on ICT access for persons with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A Code of Good practice should be evolved for servicing disabled customers which contains both minimum as well as best practices to be adhered to by service providers.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Service providers/ operators:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Should make their services accessible for persons with disabilities. Information about their accessible services must be available on their web site, which should also adhere to WCAG standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Should collect data on the number of their disabled customers and frame at least 1 or 2 schemes for persons with different disabilities and provide basic accommodations like accessible billing and accessible customer care. They could have a public relations officer to service the complaints of disabled customers.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;The charter of the Universal Service Obligation Fund must be expanded to include 'persons with disabilities' as an underserved community and all ongoing projects must be made inclusive.&lt;/li&gt;
&lt;li&gt;The DoT must make special mention of persons with disabilities in the Telecom Policy and also formulate specific policies to connect them with accessible telecom services.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Access to Broadcasting&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Objective&lt;/b&gt;&lt;br /&gt;To provide broadcasting access to persons with various disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Strategy/ Activities:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;It must be made mandatory for all television programming to be recorded with clearly legible and appropriate audio descriptions and closed captioning.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All films must have clearly legible and appropriate closed captioning and audio description, and sign language tracks recorded and this must be made a prerequisite for obtaining a censor certificate.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All new theatres must have facilities for patrons to access closed captioning/audio descriptions/sign language, without which they should not be granted licenses. Existing theatres should be granted a period of 1 year within which such facilities should be obtained. These facilities should be available at no extra charge beyond that of the ticket to patrons.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In the ongoing compulsory digitalization of cable television in India, all set top boxes being procured must be made accessible to persons with vision/cognitive disabilities. Optional voice navigation must be made mandatory for all set top boxes being sold/imported into India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All new television receivers/set top boxes must have built-in decoder circuitry or capability designed to display closed captioned video programming, the transmission and delivery of video description services, and the conveyance of emergency information. Existing patrons should be allowed to exchange their television receivers/set top boxes for accessible ones.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All new television sets sold or imported in India must be equipped with built-in closed caption decoder circuitry or capability designed to display closed-captioned video programming/ audio descriptions, and have the capability to decode and make available the transmission and delivery of video/audio description services, and have the capability to decode and make available emergency information in a manner that is accessible to individuals who are disabled.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Inclusive Planet Centre for Disability Law and Policy&lt;/b&gt;&lt;br /&gt;12/21 Custain Beach Road, Santhome, &lt;br /&gt;Chennai - 600 004. &lt;br /&gt;Tel: +91-44-24611313 &lt;br /&gt;Fax: +91-44-24617924&lt;br /&gt;&lt;a class="external-link" href="http://www.inclusiveplanet.org.in"&gt;www.inclusiveplanet.org.in&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/feedback-on-draft-twelfth-five-year-plan'&gt;https://cis-india.org/accessibility/blog/feedback-on-draft-twelfth-five-year-plan&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rahul Cherian</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2012-12-28T15:33:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ip-watch-catherine-saez-december-18-2012-wipo-to-negotiate-treaty-for-the-blind-in-june">
    <title>WIPO To Negotiate Treaty For The Blind In June; ‘Still Some Distance To Travel’ </title>
    <link>https://cis-india.org/news/ip-watch-catherine-saez-december-18-2012-wipo-to-negotiate-treaty-for-the-blind-in-june</link>
    <description>
        &lt;b&gt;In a swift 15 minute session this morning delegates at the World Intellectual Property Organization extraordinary assembly agreed to convene a high-level meeting in Morocco in June to finalise a treaty on international exceptions to copyrights on books in special formats for visually impaired people. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Catherine Saez was &lt;a class="external-link" href="http://www.ip-watch.org/2012/12/18/wipo-to-negotiate-treaty-for-the-blind-in-june-still-some-distance-to-travel/"&gt;published&lt;/a&gt; in Intellectual Property Watch on December 18, 2012. Rahul Cherian is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;After long informal discussions yesterday with the assembly chair, Ambassador Uglješa Zvekić of Serbia, the decision &lt;a href="http://www.ip-watch.org/weblog/wp-content/uploads/2012/12/WIPO-EGA-Decisions-Dec-2012.pdf" target="_blank"&gt;document&lt;/a&gt; [pdf] was issued this morning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WIPO Director General Francis Gurry said, “It is a great decision. Of  course we are all aware that there is still some distance to travel  before we have a treaty, but this decision, I think, places us one  further step along the road and in a very good position to be able to  deliver the objective, namely a very positive outcome of this exercise,  with a good treaty that improves the situation of visually impaired  persons and the print disabled.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The General Assembly decided that a diplomatic conference should be  convened in June 2013, in Morocco, with a mandate to negotiate and  conclude a treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, the WIPO Standing Committee on Copyright and Related  Rights (SCCR) will meet in a special session for five days in February  to expedite further text-based work on the draft treaty, &lt;a href="http://www.wipo.int/edocs/mdocs/copyright/en/sccr_25/sccr_25_2.pdf" target="_blank"&gt;document SCCR/25/2&lt;/a&gt; [pdf] “in order to reach sufficient level of agreement on the text.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The assembly also directs "the Preparatory Committee to meet at the  end of the February SCCR meeting to decide, if needed whether additional  work is required with the objective of holding a successful Conference  in June 2013," the decision says. It also states that the preparatory  committee will invite observers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The assembly decision has five paragraphs. With respect to paragraph 4  of the decision (on the special work session in February), Zvekić said,  “we agreed to state for the record that in this paragraph, the phrase  ‘additional work’ means additional work by either the SCCR or the  preparatory committee, so that the preparatory committee can decide that  either itself, the SCCR, or both may have additional work to do in  order to prepare a revised text for the diplomatic conference.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Document SCCR/25/2, which contains the draft articles as approved by  the last SCCR session in November, "will constitute the substantive  articles of the Basic Proposal for the Diplomatic Conference," the  decision says, “with the understanding that any Member State and the  special delegation of the European Union may make proposals at the  Diplomatic Conference.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The assembly also established a preparatory committee, which met at  the close of the assembly this morning to work on modalities of the  diplomatic conference, such as the draft rules of procedure, the list of  states and organisations to be invited, and the agenda, dates, venue  and other organisational questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Blue Sky with Some Clouds&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new consensus on a diplomatic conference and on a legally binding treaty to create exceptions and limitations to copyright for the benefit of visually impaired people cannot eclipse the fact that the draft text still reflects profound divisions between countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February, delegates will have to tackle remaining issues, such as the inclusion of the three step test and commercial availability, on which they currently are at a standstill. Both inclusions are favoured by developed countries, in an effort to protect their right holders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yesterday morning, the delegation of Barbados said the treaty should be effective, and “while acknowledging the importance of safeguards,” it is important that “provisions in the text would not unduly restrict authorised entities from making accessible formats available under national law exceptions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Provisions should not render the text nugatory through exposing authorised entities to possible liability and making their work administratively burdensome,” the delegate said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a &lt;a href="http://www.ip-watch.org/weblog/wp-content/uploads/2012/12/WBU-press-release-18-Dec-2012.doc" target="_blank"&gt;press release&lt;/a&gt; [doc] issued today by the World Blind Union (WBU), Maryanne Diamond, leader of the WBU Right To Read campaign, said, "The decision of the WIPO Extraordinary General Assembly today is a very significant milestone on the road to a treaty. It means governments have kept the work on track to agree a binding and effective treaty in 2013, which if completed would allow blind people to access many thousands more books."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The work is far from over, though. We urge all parties to now negotiate a simple, binding and effective treaty. A good treaty will really help us to end the book famine in which only some one to seven percent of books are ever made accessible to us," the release said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul Cherian, from Indian WBU member Inclusive Planet, also said in the release that "the objective of this treaty must be that of helping blind and print disabled people to get accessible format books, especially in developing countries. To achieve this goal, it must be workable and simply worded so that blind and print disabled people and their organisations can use it to really make a difference."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently in many countries, copyright law prevents charities from making accessible copies of books, and from sending them to others in countries speaking the same language, the release said. "The WIPO treaty sought by the World Blind Union would remove these copyright barriers and open up a new world of reading to blind people."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ip-watch-catherine-saez-december-18-2012-wipo-to-negotiate-treaty-for-the-blind-in-june'&gt;https://cis-india.org/news/ip-watch-catherine-saez-december-18-2012-wipo-to-negotiate-treaty-for-the-blind-in-june&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>WIPO</dc:subject>
    

   <dc:date>2012-12-21T11:50:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/state-surveillance-and-human-rights-camp">
    <title>State Surveillance and Human Rights Camp</title>
    <link>https://cis-india.org/news/state-surveillance-and-human-rights-camp</link>
    <description>
        &lt;b&gt;A two-day conference was held in Rio on December 13 and 14 at Sheraton Rio Hotel &amp; Resort. Elonnai Hickok participated in the event and made a presentation on MLATS and International Cooperation for Law Enforcement Purposes.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://wiki.surveillancehumanrights.org/Rights_Camp_Brazil"&gt;Click here&lt;/a&gt; to see the Wiki page of the event. See Elonnai's presentation&lt;a href="https://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf" class="internal-link"&gt; here&lt;/a&gt; [PDF, 313 Kb].&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;DAY 1: Mapping Out Government Surveillance Problems &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;8:30 - 9:00 &lt;b&gt;Registration&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;9:00 - 9:10 &lt;b&gt;Welcome/Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from Spanish to English and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: Kinds of Data, Ways of Getting It &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;09:10 - 10:30&lt;/p&gt;
&lt;p&gt;Chair: Enrique Chaparro, Fundacion Via Libre [Argentina, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Metadata, online identifiers, and technologies of surveillance &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/seth-schoen"&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Surveillance  is getting      easier and cheaper for many reasons, not least because  people are using      electronic communications more than ever before,  and there are so many      facts out there to be noticed about the ways  devices are talking to each      other. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I will  talk about the kinds      of things that refer to people and their  devices, with a particular focus      on telecommunications metadata and  transactional records that are      described as "non-content" and may  receive lower levels of legal      protection. I'll discuss who is in a  position to record this information,      some of the things that can be  learned from it, and why traffic analysis      is powerful and  difficult to defend against. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I'll  try to explain concepts      like MAC address, IP address, account name  and number, telephone number,      IMEI, IMSI, transient identifiers,  log files, transactional records,      locational privacy, and  associational privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Cell_Phone_Location_Tracking" title="Cell Phone Location Tracking"&gt;How law enforcement agencies use cell phone location tracking technology in criminal cases&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;Hanni Fakhoury, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;With  the rise of      smartphones, the U.S. government's use of cell site  location data to      pinpoint our exact location has grown more  widespread (and precise) over      time. For years, U.S. courts  permitted the government to get this location      data without a search  warrant under a tortured interpretation of federal      electronic  privacy statutes and an even more alarming constitutional argument:       that we don't have any privacy in data we turn over to third parties,  like      cell phone companies. This talk will review what location data  is and why      the police want it, how they can get it under U.S. law,  and legal and      practical steps that need to be taken to safeguard  our privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Deep_packet_inspection:_What_it_is,_how_it_works,_and_how_it_is_used_for_surveillance" title="Deep packet inspection: What it is, how it works, and how it is used for surveillance"&gt;Deep packet inspection: What it is, how it works, and how it is used for surveillance&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Chris Parsons, Doctoral Candidate, University of Victoria [Canada, EN]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;We are  in the midst of a      standardization revolution, a mass translation  of discordant analogue      signal types to interoperable digital  transmission standards. All this      digitized consumer traffic passes  through the gateways of Internet Service      Providers’ (ISPs). ISPs  function as communicative bottlenecks, ideally      positioning them to  monitor, mine, and modify data using the Deep Packet      Inspection  (DPI) appliances situated within their networks. Some uses of      these  appliances could reshape the conditions of communication in       democracies, blocking or modifying data transmissions in near real time. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In  this presentation I      discuss the technical capabilities of deep  packet inspection and its      significance for increased private and  public surveillance capabilities.      Drawing from case material from  academic and advocacy work, I identify how      the technology has been  used for ISP-level surveillance, for copyright      purposes, for  national security purposes, and for advertising purposes.      Moreover,  I address how advocates in differing nations have opposed      various  uses of the technology, why they have done so, and conditions that       facilitate domestic resistance to deep packet inspections' uses. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Advances_in_online_spying:_Commercial_surveillance_software,_targeted_hacking_and_beyond" title="Advances in online spying: Commercial surveillance software, targeted hacking and beyond"&gt;Advances in online spying: Commercial surveillance software, targeted hacking and beyond&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Morgan Marquis-Boire, Google [New Zealand, EN]&lt;/p&gt;
&lt;p&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Against  an increasingly      security-aware online community, the traditional  tools of blocking, filtering,      and wiretapping have become less  effective. Nervous regimes turn to the      largely unregulated $5  billion a year industry in Internet surveillance      tools. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once  the realm of the black      market and intelligence agencies, the latest  computer spyware is now sold      at trade shows for dictator pocket  change. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This  talk will detail the      cat and mouse game between authoritarian  regimes and dissidents, as well      as ongoing efforts to map out the  relationship between surveillance      software companies and  governments. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;10:30 - 10:40 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round I &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;10:40 - 11:50&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Format:&lt;/i&gt; Interactive sessions with active participat0ion from the audience.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 1: Mobile privacy threats &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This  workshop addresses the      ways governments are tracking mobile  devices’ location and use, and why      it’s been harder to protect  communications privacy on mobile devices than      on PCs. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;&lt;br /&gt;Hanni Fakhoury, Electronic Frontier Foundation&lt;/a&gt; [United States, EN]&lt;a href="https://www.eff.org/about/staff/seth-schoen"&gt;&lt;br /&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN/PT]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Enrique Chaparro, Fundación Vía Libre [Argentina, EN/ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 2: Training activists about state surveillance capabilities &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this workshop we’ll talk      about some of new surveillance  technologies that states are deploying, and      the tactics that are  used to legitimize the surveillance. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Going  beyond just ‘what is      used and how’, we speak to some political  tactics that advocates have used      to resist these tools on practical  and principled levels, some of the      conditions that contribute to  successes, and ways of mobilizing effective      strategies against  expansions of state surveillance. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitator:&lt;a href="http://www.christopher-parsons.com"&gt;&lt;br /&gt;Chris Parsons, University of Victoria&lt;/a&gt; [Canada, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Workshop_Tactics_for_Opposing_Surveillance" title="Workshop Tactics for Opposing Surveillance"&gt;Workshop 3: Tactics for opposing state sponsored malware and surveillance&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This  workshop will review      the different tactics government and  non-government actors have employed      to stop authoritarian regimes  from making use of surveillance technology      built in the United  States and Europe to spy on their citizens. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We  will discuss corporate      responsibility, export controls, as well as  the role of security research      and user education campaigns. The  workshop will end with a brainstorm of      at least one concrete action  each workshop attendee can take. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN]&lt;br /&gt;Morgan Marquis-Boire [New Zealand, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Silvio Rhatto, Sarava Group [Brazil, PT]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporting Back Session &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;11:50 - 12:40 Chair:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteurs:&lt;br /&gt;Enrique Chaparro, Fundación Vía Libre [Argentina, EN/ES]&lt;br /&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Report:Training_activists" title="Report:Training activists"&gt;Training Activists about State Surveillance Capabilities&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Silvio Rhatto, Sarava Group [Brazil, PT]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Format: Each rapporteur has 10 minutes to report back about the  results of their workshop discussion and 20 minutes to answer questions.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;12:40 - 2:00 &lt;b&gt;Lunch&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Legal and Policy Plenary: Government Access to People’s Data &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;2:00 - 3:20&lt;/p&gt;
&lt;p&gt;Chair: Pedro Paranaguá, Advisor for Internet Policy to the Workers’ Party in the Brazilian Chamber of Deputies [Brazil, PT/EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Different_data,_different_rules%3F_How_the_law_has_assigned_varying_levels_of_privacy_protection_to_different_categories_of_personal_information" title="Different data, different rules? How the law has assigned varying levels of privacy protection to different categories of personal information"&gt;Different  data, different rules? How the law has assigned varying levels of  privacy protection to different categories of personal information&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Kevin Bankston, Center for Democracy and Technology [United States, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Using  the example of US law,      this presentation will map the different  legal protections that have      traditionally been applied to different  types surveillance of different      types of data, and consider how to  redraw that map in light of new      technologies. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Speaking  generally, US surveillance      law has been written based on the  assumptions that: (1) surveillance of      data on your computer is more  invasive than access to your data in the      cloud;(2) real-time  surveillance is more invasive than access to stored      data; (3)  surveillance of the content of communications is more invasive      than  surveillance of non-content meta-data; (4) surveillance of newer       communications is more invasive than surveillance of older  communications. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;These  assumptions have long      defined which types of surveillance are most  strongly regulated against      and which types of data are most  strongly protected by law. Changing      technology has made these  assumptions about invasiveness and privacy      increasingly obsolete,  assuming that they ever made sense at all. But if      these  distinctions are outdated, what if any legal distinctions between       different types of surveillance or data should replace them? How, if at       all, can the law sensibly distinguish between personal  communications and      communications data in which we have a  reasonable expectation of privacy,      and that which we do not? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Internet_companies_as_an_agent_of_the_state_%26_european_mandatory_telecommunications_data_retention" title="Internet companies as an agent of the state &amp;amp; european mandatory telecommunications data retention"&gt;Internet companies as an agent of the state &amp;amp; european mandatory telecommunications data retention&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this short presentation I      will introduce European (i.e. based on EU  legislation) regime of mandatory      retention of telecommunication  data for law enforcement purposes,      explaining its political  context, implementation and negative impact on      human rights  standards (not just privacy-related!). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Using  case studies of Poland      and Germany I will present two strikingly  different approaches to storing      telecommunication data and law  enforcement, thus questioning the necessity      and proportionality of  this controversial measure. I will also touch      briefly on pending  political developments (including the revision of the      Data  Retention Directive and the reform of data protection law in the EU),       explaining what the stakes are, what European civil society  organisations      are fighting for and why it is such an important  fight. Finally, I will      explain how the debate about mandatory data  retention feeds into a broader      discussion about the role of  Internet intermediaries, including both their      independence from  political pressure and protection of their clients from       surveillance executed by “private police.” &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Crossborder access to citizen's data and cloud computing in the investigation of criminal cases: Regional trends &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Marcos Salt, profesor de derecho penal y procesal penal de la universidad de Buenos Aires (UBA) [Argentina, ES]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;During  the brief      presentation, I will present practical examples of the  problems caused by      the application by analogy of the rules on  physical evidence to obtain      digital evidence. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I try  to show that this      trend is inconvenient to both for efficiency in  the investigation of      crimes by the state as to the validity of  individual rights. I will place      special reference to cross-border  access to citizen's data in the cloud. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from Spanish to English and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Background_on_lawful_interception_mandates_and_government_access_to_encryption_keys" title="Background on lawful interception mandates and government access to encryption keys"&gt;Background on lawful interception mandates and government access to encryption keys&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/seth-schoen"&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this session, I'll      discuss some of the history of fights over  government surveillance powers      and government access in the United  States, starting in the early 1990s      and continuing to the present  day. These issues have centered on three      main themes: restrictions  on cryptography and privacy tools, obligations      for communications  intermediaries to acquire and implement surveillance      capabilities,  and mandatory retention of telecommunications data. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;One  interesting point is      that many of the same themes keep recurring:  the powers that the      government is seeking today are often similar  to those it sought two      decades ago. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Another  interesting point is      that the government has not always been  successful in expanding its      surveillance powers. Many of its  proposals never became law and there are      still plenty of issues  left to fight over. But governments around the      world are continuing  to having a major effect on the design of technology,      getting  wiretapping interfaces and backdoors added to communications       systems and discouraging deployments of strong encryption. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/MLATS_and_International_Cooperation_for_Law_Enforcement_Purposes" title="MLATS and International Cooperation for Law Enforcement Purposes"&gt;MLATS and International Cooperation for Law Enforcement Purposes&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Elonnai Hickok, Center for Internet &amp;amp; Society India [India, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this session I will be      looking at the challenges, requisite  safeguards, and possible solutions in      the context of international  cooperation for fighting crime. In doing so I      will look closely at  the proposed principle of safeguards for      international cooperation. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The  objective of this      session will be to explore ways of improving  MLATS and international law      enforcement cooperation in order to  ensure that basic safeguards can be      built into the process of  international cooperation. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Format: 10-15 minutes for each five speakers to introduce legal issues and 20 minutes of discussions&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;3:10 - 3:20 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round II&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3:20 - 4:30&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 1: Electronic surveillance demonstrations &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this workshop, we'll take      a look at a few electronic surveillance  devices (including an ordinary      laptop) and look at some of what  they can intercept. Technological      infrastructure permitting, we may  have a live demonstration of      intercepting or modifying users'  Internet communications. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We'll  also consider low-cost      surveillance techniques and discuss what  kinds of demonstrations have the      most pedagogical value for making  users aware of particular threats. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitator:&lt;br /&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN/ES/PT]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Workshop 2: Legal framework regarding compelled disclosure of communications, subscriber information, and cryptographic keys &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this workshop we will      cover various examples of compelled  disclosure of private information      (from subscriber information and  content of communication to cryptographic      keys) in the context of  law enforcement, focusing on their legal aspects.      We will briefly  present various legal frameworks, discussing both the      examples of  legal safeguards (“good practices”) and their shortcomings      that  allow for government surveillance. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We  will also look at various      human rights implications of these  measures and (potential / existing)      role of private companies from  the perspective of their compliance with      such measures (incl. when  requested by non-democratic regimes). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;br /&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;br /&gt;Elonnai Hickok, Center for Internet &amp;amp; Society India [India, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;&lt;br /&gt;Hanni Fakhoury, Electronic Frontier Foundation&lt;/a&gt; [United States, EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 3: What data is most private? What surveillance is most invasive? How if at all should laws treat them differently? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This  workshop will build on      the discussion that began in the law &amp;amp;  policy plenary, discussing how      certain surveillance laws have  applied different legal protections to      different types of data and  surveillance, and questioning whether such      distinctions make sense  in light of new technology. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The  workshop will address      that question from legal, personal, and  political perspectives.      Participants will share with each other  details of how the laws in their      countries treat different types of  data and different types of      surveillance, to facilitate shared  understanding of the existing legal      frameworks and to identify  existing gaps and discrepancies in current      legal protections. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Based  on their own personal      experiences as Internet users and as  advocates, participants will then      discuss what data in their lives  they consider most private and what types      of surveillance they find  most invasive, and reflect on how if at all the      law should  distinguish between them. Finally, participants will discuss      the  politics of these different frameworks: both how gaps and weaknesses       in existing frameworks threaten the ability of advocates to  politically      organize in the face of government surveillance, and  how we can best work      through the political process and change those  frameworks to better      reflect current technology and human rights  norms. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;br /&gt;Kevin Bankston, Center for Democracy and Technology [United States, EN]&lt;br /&gt;Danilo Doneda, Fundação Getúlio Vargas [Brazil, PT/EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Beatriz Busaniche, Fundación Vía Libre [Argentina, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporting Back Session &amp;amp; Closing Meeting Day 1 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4:30 - 5:20&lt;/p&gt;
&lt;p&gt;Chair:&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;&lt;br /&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteurs:&lt;br /&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN/ES/PT]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Report:Demonstrating_Surveillance" title="Report:Demonstrating Surveillance"&gt;Demonstrating Surveillance&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;Hanni Fakhoury, Electronic Frontier Foundation&lt;/a&gt; [United States, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Report:Compelled_Disclosure" title="Report:Compelled Disclosure"&gt;Compelled Disclosure of Communications, Subscriber Information &amp;amp; Cryptographic Keys&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Beatriz Busaniche, Fundación Vía Libre [Argentina, ES]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; What Data is Most Private? What Surveillance is Most Invasive? Should Laws Treat Different Data Differently? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;8:30 pm &lt;b&gt;Dinner&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;DAY 2: Challenges and Mapping Out Possible Solutions&lt;/b&gt;&lt;br /&gt;8:55 - 9:00 Welcome&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: Surveillance in Latin America&lt;/b&gt;&lt;br /&gt;9:00 - 10:20&lt;/p&gt;
&lt;p&gt;Chair: Camila Marques, Lawyer, ARTIGO 19 [Brazil, PT]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Colombia&lt;/b&gt;&lt;br /&gt;Carlos Eduardo Huertas, Semana [Colombia, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Cuba&lt;/b&gt;&lt;br /&gt;“Mario Hernandez” [Cuba, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in the Northern Triangle&lt;/b&gt;&lt;br /&gt;Renata Avila, Global Voices [Guatemala, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Peru&lt;/b&gt;&lt;br /&gt;Yonsi Solis, Global Voices [Peru, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Mexico&lt;/b&gt;&lt;br /&gt;Caracol Azul, [Mexico, ES]&lt;i&gt;&lt;br /&gt;This session will have simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Keynote: Challenges Posed By Electronic Surveillance &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10:20 - 10:40&lt;br /&gt;Frank La Rue, United Nations Special Rapporteur on Freedom of Expression [Guatemala, ES]&lt;br /&gt;Increasing pressure (legal and political) on private parties to help carry out the state’s surveillance mandate.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;10:40 - 11:00 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: International Surveillance &amp;amp; Human Rights Principles: Challenges and Opportunities in Latin America &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;11:00 - 11:50&lt;/p&gt;
&lt;p&gt;Chair: Carly Nyst, Privacy International [Australia/UK, EN]&lt;br /&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Explanation of the Principles: Background, purpose, need, challenges and opportunities&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Chilean and Latin American perspectives&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Alberto Cerda, Derechos Digitales [Chile, ES]&lt;i&gt;&lt;br /&gt;Simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Expansion of Brazilian law enforcement powers to access users’ digital information &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Pablo Ortellado, GPOPAI [Brasil, PT/EN]&lt;i&gt;&lt;br /&gt;Simultaneous interpretation from Portuguese to Spanish and English&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance and regional human rights standards &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Juan Camilo Rivera, Comisión Colombiana de Juristas [Colombia, ES]&lt;i&gt;&lt;br /&gt;Simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round III &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;11:50 - 1:00&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Workshop_1:_International_surveillance_and_human_rights_principles:_Perspectives_from_Latin_America" title="Workshop 1: International surveillance and human rights principles: Perspectives from Latin America"&gt;Workshop 1: International surveillance and human rights principles: Perspectives from Latin America&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facilitator:&lt;br /&gt;Alberto Cerda, Derechos Digitales [ES] &amp;amp; Carly Nyst, Privacy International [UK, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Juan Camilo Rivera, Comisión Colombiana de Juristas [Colombia, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Technical_community_activism" title="Technical community activism"&gt;Workshop 2: Technical community activism&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;What is the technology community doing to defend privacy?&lt;/p&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Enrique_Chaparro" title="Enrique Chaparro"&gt;Enrique Chaparro, Fundación Vía Libre [Argentina, ES&lt;/a&gt; ]&lt;br /&gt;João Carlos Caribé, Movimento Mega (aka Mega Não) [Brazil, PT/EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;a href="https://www.eff.org/about/staff/eva-galperin"&gt;&lt;br /&gt;Eva Galperin, Electronic Frontier Foundation [USA, EN]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: Hands-on Activism &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;2:40 - 3:50 p.m.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Chair: Rebecca Bowe,      Electronic Frontier Foundation [United States, EN] &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;What is meant by Hands-On       Activism? As you’ll learn from our panelists, there are many strategies       that can be utilized to push back against a surveillance practice  or      proposal. We’ll cover the most effective ways to obtain public  records;      strategies for generating interest in digital rights  issues; fresh and      extraordinary approaches to creative campaigning,  and tactics used by an      international nonprofit to tackle privacy  issues with online campaigns. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Raising digital awareness in Peru &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Marco_Sifuentes" title="Marco Sifuentes"&gt;Marco Sifuentes, Instituto Prensa y Sociedad [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Peru has a very active and       influential online community. It can affect the course of elections,  prove      the president wrong and stop law projects. It can work very  well on      "real world" matters. But when it comes to online issues,  it's      been hard to raise awareness on the Peruvian general public  and even on      the media. What went wrong? However, in the past year,  some digital topics      have received a lot of coverage. Some not. What  changed? I’ll share Peru's      experience in the hope that every  participant can compare it with his or      her own country's situation. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Online organizing for human rights &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Fabiola_Carrion" title="Fabiola Carrion"&gt;Fabiola Carrion, Access [Peru, ES/EN] &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A recent addition to the      Access  Team, Fabiola will begin her presentation by talking about her own       experiences in organizing and advocacy, arguing that the struggle for       human rights is increasingly moving online. She will discuss new  tools of      organizing, and the importance of combining technology,  policy, and      grassroots advocacy tactics to affect holistic change  in internet policy      debates. Her presentation will include a series  of short case studies from      around the world where Access, along  with its various allies, have      successfully campaigned for a free  and open internet. Her presentation      will conclude with a discussion  of lessons learned and best practices for      online organizing,  particularly around issues of surveillance and due      process. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Surveillance and secrecy: Strategy and tactics - Using the law to uncover abuse of LEAs’ surveillance powers &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Geoff_King" title="Geoff King"&gt;Geoff King, Lawyer [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Open government laws, though       riddled with exemptions, are powerful tools for shedding light on the       governmental operations. One way in which these laws can be used is  to      uncover the existence of law enforcement surveillance, as well  details      about the tools used to achieve such surveillance. This  portion of the presentation      will explore how journalists and  activists can employ successful      transparency strategies in the face  of various procedural pitfalls. It      will also give concrete  examples of how such strategies have paid off in      the recent past. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Materials:Law_to_Uncover_Surveillance" title="Materials:Law to Uncover Surveillance"&gt;Presentation      Materials&lt;/a&gt;&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Creative campaigning: tactical media mashup&lt;/b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Vladan_Joler" title="Vladan Joler"&gt;&lt;br /&gt;Vladan Joler, Share Foundation [Serbia, EN] &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Explore the beautiful world      of tactical media as a creative tool for getting your message out there. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;From creative campaigning      during  Serbian protests in the 90s to “lo fi” media interventions,       protests inside computer games, media pranks and parasite media tactics  to      social media bots and Twitter bombs. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Materials:Tactical_Media" title="Materials:Tactical Media"&gt;Presentation      Materials&lt;/a&gt;&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese&lt;/i&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Rights_Camp_Brazil#top"&gt;Return to Top&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3:50 - 4:10 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round IV &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4:10 - 5:10&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Workshop_1:_What_the_international_surveillance_and_human_rights_principles_are_asking_the_governments_to_do%3F" title="Workshop 1: What the international surveillance and human rights principles are asking the governments to do?"&gt;Workshop 1: What the international surveillance and human rights principles are asking the governments to do?&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This session will be used to      call  out exactly what the International Surveillance and Human Rights       Principles are asking governments to change or legislative/policy  actions      they are asking governments to take. This will hopefully be  useful in      helping individuals and organizations understand what  aspects to highlight      and push when proposing the principles and  why. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;br /&gt;Elonnai Hickok, Center for Internet &amp;amp; Society India [India, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Graciela Selaimen, NUPEF [Brasil, EN/ES/PT]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/index.php?title=Workshop_2:_Creative_campaigning:_tactical_media_mashup_%26_anti-surveillance_campaigns&amp;amp;action=edit&amp;amp;redlink=1" title="Workshop 2: Creative campaigning: tactical media mashup &amp;amp; anti-surveillance campaigns (page does not exist)"&gt;Workshop 2: Creative campaigning: tactical media mashup &amp;amp; anti-surveillance campaigns&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;What are activists around      the  world doing to counter surveillance proposals and practices? And what       could they be doing, with just a little more knowledge and  inspiration? At      this session, workshop facilitators will share  stories about successful      campaigns launched around the world in  response to government      surveillance. How did a humorous Twitter  hashtag about a proponent of      surveillance legislation rise to  “trending” status on Twitter? How did a      small team of digital  rights activists in Argentina manage to position      themselves as one  of the most trusted media sources on issues relating to      privacy in  the digital realm? How did a small group of activists manage to       reach biggest world media and how are activists creating their own  media?      We’ll then open it up for a group discussion in which  participants can      share their own stories of effective tactics from  around the world, and      explore ideas for collaborating and  harnessing the knowledge gleaned from      our collective experiences. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/rebecca-bowe"&gt;Rebecca Bowe, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;br /&gt;Vladan Joler, Share Foundation [Serbia, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Hisham Almiraat, Global Voices Advocacy [Morocco, EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporting Back Session &amp;amp; Closing Remarks &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;5:10 - 6:00&lt;/p&gt;
&lt;p&gt;Chair:&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;&lt;br /&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteurs:&lt;br /&gt;Graciela Selaimen, NUPEF [Brasil, EN/ES/PT]&lt;/p&gt;
&lt;p&gt;Renzo Lavin, Asociación Civil por la Igualdad y la Justicia [Argentina, ES]&lt;br /&gt;Hisham Almiraat, Global Voices Advocacy [Morocco, EN]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Each breakout session will have one designated rapporteur, one note-taker, and a module to work around.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/state-surveillance-and-human-rights-camp'&gt;https://cis-india.org/news/state-surveillance-and-human-rights-camp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-21T07:19:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf">
    <title>Presentation on MLATS</title>
    <link>https://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf'&gt;https://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-12-21T07:11:08Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/leslie-chan-lectures-in-tiruvananthapuram-and-mysore">
    <title>Leslie Chan Lectures in Tiruvananthapuram and Mysore</title>
    <link>https://cis-india.org/news/leslie-chan-lectures-in-tiruvananthapuram-and-mysore</link>
    <description>
        &lt;b&gt;Prof. Leslie Chan from the University of  Toronto, Canada is giving a series of lectures in Tiruvananthapuram and Mysore from December 17, 2012 to December 19, 2012.&lt;/b&gt;
        &lt;h2&gt;Programme of Prof. Leslie Chan in Thiruvananthapuram&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;Knowledge Management in the Open Access Environment&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Date: December 17, 2012&lt;br /&gt;Time: 11.00 a.m. – 1.00 p.m.&lt;br /&gt;Venue: Dept. of Library &amp;amp; Information Science, University of Kerala&lt;br /&gt;Organiser: University of Kerala&lt;br /&gt;Contact person : Dr. KP Vijayakumar / 9496749901 (Mob) / 0471-2308034 (Off)&lt;br /&gt;E-Mail : &lt;a class="mail-link" href="mailto:kpvijayakumar2@gmail.com"&gt;kpvijayakumar2@gmail.com&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;
&lt;h3&gt;Emerging Trends in Scholarly Communications and Impact Measures in the Open Knowledge Environment&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Date: December 17, 2012&lt;br /&gt;Time: 3.00 p.m. – 5.00 p.m.&lt;br /&gt;Venue: National Institute of Interdisciplinary Science &amp;amp; Technology (NIIST)(CSIR), Pappanamcode, Trivandrum&lt;br /&gt;Organiser: NIIST and CSIR&lt;br /&gt;Contact person: Mrs. Nishy P/9645086468 (Mob)/0471-2515293(Off)&lt;br /&gt;E-Mail: &lt;a class="mail-link" href="mailto:nishy22@gmail.com"&gt;nishy22@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Evening : Discussion with Prof. VN Rajasekharan Pillai, Executive Vice President, KSCSTE, Sasthrabhavan, Trivandrum&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;
&lt;h3&gt;Lecture-cum-Open Forum on Open Access Initiatives (OAI)&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Time: 10.30 a.m. – 1.00 p.m.&lt;br /&gt;Venue:Indian Institute of Information Technology &amp;amp; Management-Kerala (IIITMK), Technopark, Trivandrum&lt;br /&gt;Organiser: IITMK&lt;br /&gt;Contact person : KP Sadasivan : 9447903282 (Mob) / 0471-2527567 Ext.103 (Off)&lt;br /&gt;E-Mail: &lt;a class="mail-link" href="mailto:kps31147@yahoo.com"&gt;kps31147@yahoo.com&lt;/a&gt; or &lt;a class="mail-link" href="mailto:sadasivan.kp@iiitmk.ac"&gt;sadasivan.kp@iiitmk.ac&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Afternoon : Visit to ICFOSS, Technopark, Trivandrum &lt;/b&gt;&lt;br /&gt;(Co-sponsored by IIITMK &amp;amp; ICFOSS)&lt;br /&gt;Contact person : KP Sadasivan : 9447903282 (Mob) / 0471-2527567 Ext.103 (Off)&lt;br /&gt;E-Mail : &lt;a class="mail-link" href="mailto:kps31147@yahoo.com"&gt;kps31147@yahoo.com&lt;/a&gt; or &lt;a class="mail-link" href="mailto:sadasivan.kp@iiitmk.ac"&gt;sadasivan.kp@iiitmk.ac&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;A Special Lecture by Prof. Leslie Chan in Mysore&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3 style="text-align: justify; "&gt;Emerging Trends in Scholarly Communications and Impact Measures in the Open  Knowledge Environment&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Organisers: Mysore University Library, Department of Studies in Library  and Information Science (DLIS-UoM), Mysore Library and Information  Scientist’s Association (MyLISA) and SDM Institute of Management  Development, Mysore.&lt;/p&gt;
&lt;p&gt;Date: Wednesday, December 19, 2012&lt;br /&gt;Venue: Manasa Media Centre, Mysore University Library, Manasagangotri, Mysore&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/leslie-chan-lectures-in-tiruvananthapuram-and-mysore'&gt;https://cis-india.org/news/leslie-chan-lectures-in-tiruvananthapuram-and-mysore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-12-12T06:26:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india.pdf">
    <title>Accessible Broadcasting in India </title>
    <link>https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india.pdf</link>
    <description>
        &lt;b&gt;A report based on ITU's "Making Television Accessible Report" prepared by the Centre for Internet and Society&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india.pdf'&gt;https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>srividya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-01-28T03:37:40Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/changing-face-of-citizen-action.pdf">
    <title>Links in the Chain - Volume X, issue 3</title>
    <link>https://cis-india.org/digital-natives/blog/changing-face-of-citizen-action.pdf</link>
    <description>
        &lt;b&gt;Digital Natives newsletter, Volume X, issue 3. &lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/changing-face-of-citizen-action.pdf'&gt;https://cis-india.org/digital-natives/blog/changing-face-of-citizen-action.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-12-05T07:33:34Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/wipo-sccr-25-day-5-november-23-2012.txt">
    <title>WIPO SCCR 25 Day 5, November 23, 2012 (Full Text)</title>
    <link>https://cis-india.org/a2k/blogs/wipo-sccr-25-day-5-november-23-2012.txt</link>
    <description>
        &lt;b&gt;Rough transcript of proceedings from WIPO SCCR on Day 5, November 23, 2012.
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/wipo-sccr-25-day-5-november-23-2012.txt'&gt;https://cis-india.org/a2k/blogs/wipo-sccr-25-day-5-november-23-2012.txt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>WIPO</dc:subject>
    

   <dc:date>2012-12-05T00:55:55Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
