<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1661 to 1675.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/open-equitable-access-to-research-knowledge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/untapped-potential"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/notices/second-expert-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-watchmen"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-for-governments-presence-in-social-media-recommendations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/open-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/battle-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/anti-social-network"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rtis-on-website-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/february-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/digital-commons"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cyber-cafe-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/design-public"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/openness/blog-old/open-equitable-access-to-research-knowledge">
    <title>Towards Open and Equitable Access to Research and Knowledge for Development</title>
    <link>https://cis-india.org/openness/blog-old/open-equitable-access-to-research-knowledge</link>
    <description>
        &lt;b&gt;There is growing recognition that the capacity to conduct research and to share the resulting knowledge is fundamental to all aspects of human development, from improving health care delivery to increasing food security, and from enhancing education to stronger evidence-based policy making. This article by Leslie Chan, Barbara Kirsop and Prof. Subbiah Arunachalam was published in PLoS (Public Library of Science) on March 29, 2011.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/open-equitable-access-to-research-knowledge'&gt;https://cis-india.org/openness/blog-old/open-equitable-access-to-research-knowledge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2011-08-18T05:04:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services">
    <title>The Draft Electronic Delivery of Services Bill, 2011 – Comments by CIS</title>
    <link>https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services</link>
    <description>
        &lt;b&gt;The Draft Electronic Delivery of Services Bill, 2011 (“Bill”) is a Bill to provide for delivery of government services manadatorily through electronic means by phasing out manual delivery of services. It is heartening to note that the Bill shifts the approach to electronic delivery of services by Government agencies to one as part of the citizens' right to service delivery through electronic means rather than a luxury or benefit doled out by the Government. The Bill introduces bodies exclusively accountable for ensuring that electronic delivery of services by the Government at the state and central levels. While this is a welcome move on the part of the Government there are a few comments we, at the Centre for Internet and Society, have on the present version of the Bill:&lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;Accessibility&lt;br /&gt;The Bill does not make it mandatory for all 
Government services to be accessible to all including persons with 
disabilities. The Bill refers to the term “access”, as defined in 
Section 2(1)(a) from the prespective of merely gaining physical access 
to the services or availability of such services1 rather than from the 
perspective of catering to the ability of a person with print (or other)
 disbilities from gaining access to the services in the normal format. 
It is very important that the electronic services are delivered in a 
format which is accessible to all persons including persons with 
disbilities, elderly persons etc. It should be mandatory for the 
Government to comply with Web Content Accessibility Guidelines (WCAG) 
and National Informatics Centre (NIC) guidelines for web accessibility. 
It is also important to ensure accessibility of all documents produced 
during service delivery by Government agencies.&lt;/li&gt;&lt;li&gt;Linguistic Accessibility&amp;nbsp;&lt;br /&gt;Section
 5(2)(b) of the Bill requires the Government to prescribe a framework 
for all its agencies to ensure web presence or enablement which refers 
to rendering electronic services in the language chosen by the user. In 
pursuance of the same, it is important for delivery of services to be 
available in all national languages of India to begin with in addition 
to the content being encoded in Unicode font for all languages. It is 
important to note that there are not many open fonts available for 
Indian languages. Hence, it must be ensured that the Government 
allocates sufficient funds to ensure linguistic accessbility of the 
services delivered, while ensuring implementation of the provisions of 
the Bill.&lt;/li&gt;&lt;li&gt;Public Scrutiny&amp;nbsp;&lt;br /&gt;In order to ensure transparency of
 Government services and process of service delivery, it is essential 
that the Bill incorporates a provision to enable citizens to gain access
 to information provided by the Government as part of the service 
delivery process unless disclosing such information would amount to 
violation of any applicable law. Similarly, provision should be made for
 making public all RTI applications filed with the Government and 
responses to them.&lt;/li&gt;&lt;li&gt;Use of Free and Open Source Software&lt;br /&gt;Considering
 that electronic service delivery by Government agencies is effected 
through public money, it is important that Governments are urged to use 
Free and Open Source Software (FOSS) for service delivery. This cuts 
costs to a great extent and also make the process more transparent and 
capable of customisation to varied needs of different departments. It is
 important to insert a provision requiring the Government to use FOSS as
 far as possible and in the event of any use of proprietary software, 
the Government should clearly explain the reason for such use, the costs
 incurred for the same, the additional benefit derived out of its use 
and other relevant details.&lt;/li&gt;&lt;li&gt;Open Standards&lt;br /&gt;The Bill must 
stress on use of open standards for all computer resources and service 
delivery systems by Government agencies. As is the case with FOSS, such 
use brings down operation costs drastically and makes the service 
delivery process transparent and available for all to use. Use of ODF 
formats for documents, HTML for websites, ISA standards for hardware is 
recommended. It is also useful to ensure compliance with W3C guidelines 
by the concerned Government departments during implementation of the 
Bill.&lt;/li&gt;&lt;li&gt;Whistleblower Exception&lt;br /&gt;The Bill does not contain any 
safeguards to ensure free and fearless disclosure of any wilful 
violation of the law impacting larger public interest. It is important 
to include a provision protecting any person exposing any violation of 
the provisions of the Bill or blowing the cover off any scam or 
farudulent activity decieving the public committed by service providers 
under the Bill. Such protection can be given by ensuring that the 
actions of such whistleblower, to the extent required for the exposure, 
does not constitute an offence under the provisions of the Bill.&lt;/li&gt;&lt;li&gt;Penalties for Offences&lt;br /&gt;
&lt;ul style="list-style-type: square;"&gt;&lt;li&gt;Chapter 4 of the Bill gives a 
detailed list of acts constituting an offence under the Act including 
Section 15 which specifically relates to offences by companies. It is 
critical to ensure that the punishment and penalities for offences 
extend not only to citizens and companies but also to Government 
officials who misuse information they are&amp;nbsp;privy to under the provisions 
of the Bill. In fact, a separate provision specifically applicable to 
the various offences which could be committed by Government officials 
under the Bill can reduce misuse of its provisions by the Government.&lt;/li&gt;&lt;li&gt;It
 is to be noted that several provisions listed under Chapter 4 of the 
Bill covering offences and penalties are a reproduction of the 
provisions for the same under the Information Technology Act, 2000 (“IT 
Act”). Such reprodution is unnecessary and acts which are already deemed
 to be offences and have punishments prescribed for them under the IT 
Act (or any other legislation for the time being in force in India) need
 not be covered again in the Bill. This will avoid duplication and 
confusion in the legislations.&lt;/li&gt;&lt;li&gt;Section 19(1) of the Bill 
provides that no alleged offence under the Bill can be tried in a court 
of law unless the Central Electronic Delivery of Services Commissioner 
(“Central Commissioner”) or the State Electronic Delivery of Services 
Commissioner (“State Commissioner”) authorises the same by issuing a 
complaint in this regard to the relevant court. This provision directly 
conflicts with a citizen's constitutional right to seek legal redress 
since it takes away his freedom to approach a court of law for redressal
 of his grievance without the permission of the Commissioners. It is 
recommended that the provision be either deleted or suitably modify so 
that it is not in violation of this constitutional right.&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;Bottoms up Approach&lt;br /&gt;A decentralised approach should be 
adopted along the lines of the Panchayati Raj system giving the citizen a
 greater say in the framework and implementation of service delivery by 
Government agencies. Implementation can be at the Panchayat and District
 levels apart from State levels. Citizens must be able to access and 
update their information. Furthermore, they should be able to define to a
 certain extent, access control to their information. This will 
automatically make them eligible or ineligible for various government 
services.&amp;nbsp;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Charges for service delivery&lt;br /&gt;Section 4 
of the Bill authorises the Government to allow service providers to 
collect charges for electronic service delivery while Section 3(2) 
provides for the Government to regulate the manner and method of payment
 of such charges. It is critical to ensure that such charges levied 
under the provisions of the Bill do not exceed the charges levied by the
 Government agency for manual delivery of services. Charges for manual 
service delivery may include charges for photocopy, printing, paper, 
postage etc., all of which are totally eliminated during service 
delivery through electronic means. Thus, levying the same charges, let 
alone greater charges for electronic service delivery is totally 
unnecessary and places an additional burden on the citizen ultimately 
defeating the very purpose of the Bill.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Security in payment of charges&lt;br /&gt;Section
 3(2) of the Bill provides for the Government to regulate the manner and
 method of payment of charges for delivery of services.It is important 
that each transaction that takes place is done securely and without the 
exposure of an individuals confidential details. There are many ways to 
structure the transaction of payment of fees to achieve this goal. We 
reccommend that the SCOSTA smart card structure is used for completing 
and processing a transaction.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Data Security and Privacy&lt;br /&gt;Section
 5(1)(e) of the Bill requires the Government to ensure integrity, 
security and confidentiality of data collected, preserved and retained. 
We recommend that in addition to this, the Government also ensures 
integrity, security and confidentiality of data or information that is 
transferred, accessed or deleted. We also recommend that the Bill 
requires the Government to prescribe a framework under Section 5(2) for 
agency privacy policies to ensure that they are interoperable and 
consistent between different departments of the Government.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Functions of the Central Commissioner&lt;br /&gt;Section
 8 of the Bill grants the Central Commissioner the power to perform any 
or all of the functions listed in the provision including Section 8(f) 
which refers to the power of the State Commissioner in conducting the 
work of the State Government agencies. A Central Government authority 
may not have a say in all matters under the purview of the State 
Governments. This aspect has been left out for consideration while 
drafting this provision and hence it needs to be relooked at.&lt;/li&gt;&lt;li&gt;Cut-off Date for Implementation&lt;br /&gt;While
 the Bill mandates a cut off period of 180 days for the Government to 
finalise on the scope, framework and manner of service delivery under 
its provisions, it states that the Government “may” prescribe a 
framework for implementation of the provisions. It is recommended, for 
the purpose of ensuring speedy implementation of the provisions, that 
the term “may” in Section 5(2) be replaced by “shall”.&lt;/li&gt;&lt;li&gt;Transparency of Government Agencies&lt;br /&gt;Transparency
 and accountability of the Government towards the citizen is as 
important as the transparency of the citizen towards the Government. 
Therefore, the provisions of the Bill must ensure that the Government 
activities are transparent to the citizens by making available to the 
citizens, details of the responsible officials under the Bill, manner of
 service delivery and other relevant information in this regard.&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services'&gt;https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-02T07:37:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/untapped-potential">
    <title>India's untapped potential: Are a billion people losing out because of spectrum?</title>
    <link>https://cis-india.org/telecom/blog/untapped-potential</link>
    <description>
        &lt;b&gt;As one of the world’s fastest growing economies and with over 65% of its billion-plus population under 35, India has huge potential. But according to Shyam Ponappa of the Centre for Internet &amp; Society, its spectrum management – the electromagnetic waves that are used from home appliances like microwaves and remote controls, to radios, cell phones, and of course, the internet – could be a huge barrier to the country’s economic and social development.&lt;/b&gt;
        &lt;p&gt;Until the global economic downturn that began about two years ago, the economic model for spectrum distribution in India and many developing countries was based on the free market. But Ponappa demonstrates in a &lt;a class="external-link" href="http://www.apc.org/en/node/11864/"&gt;new report &lt;/a&gt;for APC that spectrum is worth treating as a public utility the way we do roads, electricity and other basic infrastructure, which would allow for people in rural areas to access spectrum-dependant services like mobile phones and wifi and increase quality of services for all.&lt;/p&gt;
&lt;p&gt;Currently in India, as in most other countries, spectrum is being treated as a property, where “chunks” of spectrum are sold to the mobile phone and telecommunications operators with the highest bid. Commonly there are 3 – 4 operators in a developed country; however, in India there are up to sixteen. The extreme competition has resulted in the Indian bidders paying outrageous fees that they are never able to recuperate. So while the &lt;a class="external-link" href="http://www.apc.org/en/glossary/term/353"&gt;government&lt;/a&gt; makes a profit on the sale, this profit comes at a societal cost.&lt;/p&gt;
&lt;p&gt;Ponappa proposes pooling spectrum and to have a set of network providers, who in turn serve operators for retail users. This effectively opens up the spectrum and could make costs ten or fifteen times cheaper than they are now.&lt;/p&gt;
&lt;p&gt;“It is appropriate to push the concept of open spectrum in developed markets who underwent their development phase some 60 – 100 years ago and put in place basic infrastructure systems. But in countries like India and the Asian sub-continent, it does not make sense to do this because we are not at the same stage of economic development,” Ponappa told APCNews.&lt;/p&gt;
&lt;p&gt;“When markets are well structured and organised,” he continues, “[&lt;a class="external-link" href="http://www.apc.org/en/glossary/term/353"&gt;government&lt;/a&gt; control] can be less effective and efficient for society as a whole, compared with open competition. However developing economies don’t have the integrated systems in place that advanced economies do. India does not have an adequately developed network of copper, optical &lt;a class="external-link" href="http://www.apc.org/en/glossary/term/293"&gt;fibre&lt;/a&gt; or microwaves covering most of its population. And we are at a stage of development at which infrastructure is a fundamental determinant of productivity, as well as of a reasonable quality of life.”&lt;/p&gt;
&lt;p&gt;Ponappa argues that in India’s case it would be advisable for governments to work with other stakeholders – corporations, &lt;a class="external-link" href="http://www.apc.org/en/glossary/term/354"&gt;state&lt;/a&gt;-owned agencies, and civil society – on a collaborative solution. “It would be much more conducive to a sound economy to have either the &lt;a class="external-link" href="http://www.apc.org/en/glossary/term/353"&gt;government&lt;/a&gt; step in and open up the commercial spectrum, or to have two to three main operators (possibly subsidised, but not necessarily) as we do with the provision of utilities,” he says. Yet, the free market mentality continues to reign, and a surfeit of operators is trying to make a profit in the telecommunications &lt;a class="external-link" href="http://www.apc.org/en/taxonomy/term/325"&gt;wireless&lt;/a&gt; sector.&lt;/p&gt;
&lt;h3&gt;Everybody wants a piece of the pie&lt;/h3&gt;
&lt;p&gt;In India, every operator is assigned a sliver of spectrum for their exclusive use and the rest is assigned to the government, the public sector and defence.&lt;/p&gt;
&lt;p&gt;The result is high-cost infrastructure for operators (setting up networks with multiple sets of more advanced equipment because of the limited spectrum, with the capital constraints resulting in less extensive networks in rural areas) as well as for users (who have to pay for all this equipment).&lt;/p&gt;
&lt;p&gt;“Too many operators make for increased capital costs for each operator, and cumulatively for all operators,” Ponappa explains.&lt;/p&gt;
&lt;p&gt;And these higher costs are increasingly difficult to recover from consumer-generated revenue, as India undergoes huge price wars. Many operators may eventually go bankrupt. While no consumers ever complain about low costs –and India has some of the world’s lowest mobile rates– they will complain about poor quality and unreliable service. Consequently, consumers may not have to pay much to use mobile services, but they may not always be able to make or receive calls when they need to, and do not have access to broadband.&lt;/p&gt;
&lt;p&gt;While most countries have moved on to 3G networks (which has more capacity for a given spectrum band than 2G, meaning better call quality) as many as four of India’s sixteen operators have not even developed their 2G networks. Making the switch to 3G seems like a good idea, but there are substantial costs associated with deploying these more advanced techniques to both operators (for network upgrades) and for end users (in terms of new handsets).&lt;/p&gt;
&lt;p&gt;Too much competition in this case has made operators inefficient.&lt;/p&gt;
&lt;h3&gt;Spectrum as a national common good&lt;/h3&gt;
&lt;p&gt;If spectrum were treated as if it were a public utility, posits Ponappa, each operator would have access to a bigger chunk of spectrum, and the traffic-handling capacity of each would increase at a lower cost.&lt;/p&gt;
&lt;p&gt;“With the current model the capacity of networks is suffering because networks cannot afford to expand or make technical improvements without economic losses. Other infrastructure services such as electricity and water supply are managed by utility companies, which are typically monopolies for a product-segment, or duopolies for purposes of competition. So why not treat spectrum the same way?” suggests Ponappa.&lt;/p&gt;
&lt;p&gt;Ponappa suggests treating networks, and spectrum as a part of networks, as we would an oil pipeline, where everyone accesses the same one, and pays a fee for its use.&lt;/p&gt;
&lt;p&gt;This would bring more people onto the network and increase revenues, since operating costs would be shared. The more revenue it can generate, the more efficient operators will be, using the same high-capacity circuits. The more revenue the main operators have, the more they could invest in up-to-date technology to extend their networks and provide a better service to clients. The better the technology, the more people could access the &lt;a class="external-link" href="http://www.apc.org/en/taxonomy/term/258"&gt;internet&lt;/a&gt; and other now vital sources of information, as well as focus on broadband and infrastructure to the country’s isolated rural areas, which today have rudimentary communications infrastructure.&lt;/p&gt;
&lt;h3&gt;India’s rural populations, the lost resource&lt;/h3&gt;
&lt;p&gt;As a predominantly rural country, lack of basic IT infrastructure means that the largest segment of India’s population has no &lt;a class="external-link" href="http://www.apc.org/en/taxonomy/term/300"&gt;access to information &lt;/a&gt;and communications technologies.&lt;/p&gt;
&lt;p&gt;Ponappa grew up on a farm in a rural area some 200 km from Bangalore where even fixed line phone networks were unreliable. “We have multiple telephone lines because we never know which one will work,” he says.&lt;/p&gt;
&lt;p&gt;Given India’s massive rural population, this means that there are hundreds of millions of people that are unable to access the internet. Services like quality distance education are not even an option if basic infrastructure such as fixed telephone lines is not in place and the country itself is losing out on the incalculable potential of this untapped human resource.&lt;/p&gt;
&lt;p&gt;Download the report &lt;a href="https://cis-india.org/telecom/publications/india-untapped-potential" class="internal-link"&gt;here&lt;/a&gt; [pdf - 280 kb]&lt;/p&gt;
&lt;p&gt;See the report in the APC &lt;a class="external-link" href="http://www.apc.org/en/pubs/research/open-spectrum-development-india-case-study"&gt;website&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;This article was written as part of the APC’s project work on &lt;/i&gt;&lt;a class="external-link" href="http://www.apc.org/en/node/10445/"&gt;&lt;i&gt;Spectrum for development&lt;/i&gt;&lt;/a&gt;&lt;i&gt;, an initiative that aims to provide an understanding of spectrum regulation by examining the situation in Africa, Asia and Latin America.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Photo by &lt;a class="external-link" href="http://www.flickr.com/photos/kiwanja/3170290086/"&gt;kiwanja&lt;/a&gt;. Used with permission under Creative Content licensing.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/untapped-potential'&gt;https://cis-india.org/telecom/blog/untapped-potential&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2012-12-14T10:31:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/notices/second-expert-meeting">
    <title>Second Expert Meeting on Human Rights and the Internet</title>
    <link>https://cis-india.org/notices/second-expert-meeting</link>
    <description>
        &lt;b&gt;The second expert meeting on human rights and the Internet is being organised by the Swedish Ministry for Foreign Affairs and the UN Special Rapporteur on Freedom of Opinion and Expression on 30 and 31 March 2011 in Stockholm (Sweden). Anja Kovacs will participate in this meeting.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;List of Participants (draft)&lt;/strong&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Alison LeClaire Christie &lt;br /&gt;alison.leclairechristie@international.gc.ca&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Minister-Counsellor and Deputy Permanent Representative, Canadian mission to UN in Geneva&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anabella Rivera&lt;br /&gt;libert.expresion@gmail.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, DEMOS, Guatemala &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anja Kovacs&lt;br /&gt;anja@cis-india.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Fellow, The Centre for Internet and Society, Bangalore&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anna Nawrot &lt;br /&gt;anna.nawrot@rwi.lu.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Researcher, Raoul Wallenberg Institute of Human Rights, Lund, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Annie Game &lt;br /&gt;agame@cjfe.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, CJFE-IFEX&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anriette Esterhuysen &lt;br /&gt;anriette@apc.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, Association for Progressive Communications, South Africa&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Arthit Suriyawongkul &lt;br /&gt;arthit@gmail.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Thai Neitzen Network, Centre for Popular Media Reform&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Brett Solomon&lt;br /&gt;brett@accessnow.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, Access Now&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Charlotta Bredberg&lt;br /&gt;charlotta.bredberg@sida.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Thematic Coordinator for Democracy, Human Rights, Peace and Security, Global Programme Unit, Department for Global Cooperation, Sida&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cynthia Wong &lt;br /&gt;cynthia@cdt.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Project on Global Internet Freedom, Center for Democracy and Technology, Washington DC &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Daniel Westman Daniel.Westman@juridicum.su.se&lt;/td&gt;
&lt;td&gt;Researcher and Teacher, Faculty of Law, Stockholm University&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Danny Aerts &lt;br /&gt;danny.aerts@iis.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;CEO, The Internet Infrastructure Foundation (.SE)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;David Mothander davidmothander@google.com&lt;/td&gt;
&lt;td&gt;Nordic Policy Counsel, Google, Stockholm&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Dunja Mijatovic&lt;br /&gt;pm-fom@osce.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;OSCE Representative on Freedom of the Media&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Eduardo Bertoni&lt;br /&gt;eberto2@palermo.edu&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Center for Studies on Freedom of Expression and Access to Information, Palermo University School of Law, Argentina&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Eric King&lt;br /&gt;eric@privacy.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Human Rights and Technology Advisor, Privacy International&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Grace Githaiga&lt;br /&gt;ggithaiga@hotmail.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Kenya ICT Action Network (KICTANET)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Guy Berger&lt;br /&gt;G.Berger@ru.ac.za&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Professor, School of Journalism &amp;amp; Media Studies, Rhodes University, South Africa&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Helena Bjuremalm&lt;br /&gt;helena.bjuremalm@sida.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Policy Specialist, Democracy Assistance, Sida &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hossam Bahgat&lt;br /&gt;Hossam@eipr.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, Egyptian Initiative for Personal Rights, Cairo&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Jan Kleijssen&lt;br /&gt;jan.kleijssen@coe.int&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Directorate General of Human Rights and Legal Affairs, Council of Europe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Jean-Luc Delvert&lt;br /&gt;Jean-luc.DELVERT@diplomatie.gouv.fr&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Counsellor, Human Rights Division, Ministry for Foreign Affairs, France&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Jean-Pierre Kempeneers, &lt;br /&gt;jem.kempeneers@minbuza.nl&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head of the Human Rights Division, Ministry of Foreign Affairs, The Netherlands&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Jermyn P Brooks&lt;br /&gt;jermynbrooks@aol.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Chair, Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Joana Varon &amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;br /&gt;joana@varonferraz.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Researcher, Centre for Technology and Society, Rio De Janeiro&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Joe McNamee &amp;nbsp;&lt;br /&gt;joe@mcnamee.eu&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;EU Advocacy Coordinator, European&lt;br /&gt;Digital Rights Initiative&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Joy Liddicoat&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;br /&gt;joy@liddicoatlaw.co.nz&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Project Coordinator, Internet Rights are Human Rights, APC, South Africa&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Kurt Erik Lindqvist&lt;br /&gt;kurtis@netnod.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;CEO, NETNOD, Stockholm &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lee Hibbard &lt;br /&gt;Lee.HIBBARD@coe.int&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Coordinator for Internet Governance and Information Society, Council of Europe &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lisa Horner &lt;br /&gt;LisaH@global-partners.co.uk&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head of Research &amp;amp; Policy, Global Dialogue, London&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lise Bergh&lt;br /&gt;lise.bergh@amnesty.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Amnesty International,&lt;br /&gt;Swedish Section&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Louise Bermsjö&lt;br /&gt;louise.bermsjo@sida.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Programme Manager for Democracy and Human Rights, Global Programme Unit, Department for Global Cooperation, Sida&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lucille Morillon &lt;br /&gt;internet@rsf.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head, Bureau of New Media, Reporters sans frontières &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maciej TOMASZEWSKI &lt;br /&gt;maciej.tomaszewski@ec.europa.eu&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;European Commission &lt;br /&gt;DG INFSO, Unit A3 &lt;br /&gt;Internet; Network &amp;amp; Information Security&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maria Häll&lt;br /&gt;maria.hall@enterprise.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Deputy Director, Division for Information Technology Policy, Ministry of Enterprise, Energy and Communications, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Mats Ringborg&lt;br /&gt;mats.ringborg@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Ambassador of Sweden to OECD and UNESCO&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Matthew Barzun &lt;br /&gt;BarzunMW@state.gov &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;US Ambassador to Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Michael Camilleri &amp;nbsp;&lt;br /&gt;MCamilleri@oas.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Attorney, office of the Special Rapporteur for Freedom of Expression, OAS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Nicklas Lundblad&lt;br /&gt;nlundblad@google.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Policy Counsel, Public Policy and Government Affairs, Google&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Nicole Gregory &lt;br /&gt;nicole.gregory@fco.gov.uk&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head of Human Rights Section, Human Rights and Democracy Department, Foreign and Commonwealth Office, UK&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Orest Nowosad&lt;br /&gt;onowosad@ohchr.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Special Procedures of the Office of the UN High Commissioner for Human Rights&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Patrik Fältström &lt;br /&gt;patrik@frobbit.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Distinguished Consulting Engineer, Cisco&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Patrik Hiselius &lt;br /&gt;Patrik.Hiselius@teliasonera.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Advisor, Public Affairs, Group Communications, Telia Sonera &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Paula Uimonen&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;br /&gt;paula@spidercenter.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, The Swedish Program for ICT in Developing Regions, Stockholm&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Richard Allan, &lt;br /&gt;ric@fb.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director of Policy in Europe, Facebook&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Richard Esguerra&lt;br /&gt;gwen@eff.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Activist, Global Internet Freedom Policy, Electronic Frontier Foundation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Robert Guerra&lt;br /&gt;guerra@freedomhouse.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Project Director, Internet Freedom, Freedom House&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Robert Hårdh Robert.Hardh@civilrightsdefenders.org&lt;/td&gt;
&lt;td&gt;Executive Director, Civil Rights Defenders, Stockholm&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sally Elkhodary &lt;br /&gt;sally.khodary@anhri.net&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Programs Director, The Arabic Network for Human Rights Information, Cairo&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sarah Labowitz&lt;br /&gt;LabowitzSB@state.gov&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Office of the Coordinator for Cyber Issues, US State Dept&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Staffan Jonson&lt;br /&gt;staffan.jonson@iis.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Policy Adviser, The Internet Infrastructure Foundation (.SE)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sylvie Coudray &lt;br /&gt;s.coudray@unesco.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Division for Freedom of Expression, Democracy and Peace, UNESCO&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Thomas Hajnoczi, Thomas.HAJNOCZI@bmeia.gv.at&lt;/td&gt;
&lt;td&gt;Ambassador, Permanent Representative of Austria to Council of Europe &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Toby Mendel&lt;br /&gt;toby@law-democracy.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, Centre for Law and Democracy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vilhelm Konnander&lt;br /&gt;vilhelm.konnander@gmail.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Global Voices&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wolfgang Benedek&lt;br /&gt;wolfgang.benedek@uni-graz.at&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Professor, Faculty of Law, Graz University, Austria&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Yaman Akdeniz&lt;br /&gt;yaman.akdeniz@bilgi.edu.tr&lt;br /&gt;&lt;br /&gt;Ženet Mujić &lt;br /&gt;zenet.mujic@osce.org&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Associate Professor of Law, Faculty of Law, Istanbul Bilgi University&lt;br /&gt;&lt;br /&gt;Senior Adviser, office of the OSCE Representative on Freedom of the Media&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Organisers&lt;/strong&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Frank la Rue&lt;br /&gt;Co-Chair of the meeting&lt;br /&gt;libert.expresion@gmail.com&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;UN Special Rapporteur on Freedom of Opinion and Expression&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Olof Ehrenkrona&lt;br /&gt;Co-Chair of the meeting&lt;br /&gt;olof.ehrenkrona@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Ambassador, Political Adviser to Foreign Minister Carl Bildt, MFA, Sweden&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Per Sjögren&lt;br /&gt;per.sjogren@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head, Dept of International Law, Human Rights and Treaty Law, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hans Dahlgren&lt;br /&gt;hans.dahlgren@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Ambassador for Human Rights, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Måns Molander&lt;br /&gt;mans.molander@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head of Human Rights Section, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Johan Hallenborg&lt;br /&gt;johan.hallenborg@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Special Adviser, HR Section, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maria Koliopanou&lt;br /&gt;maria.koliopanou@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Assistant, HR Section, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Karin Keil Pettersson&lt;br /&gt;karin.keil-pettersson@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Assistant, HR Section, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Pauline Etemad&lt;br /&gt;pauline.etemad@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Intern, HR Section, MFA Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Rolf Ring&lt;br /&gt;rolf.ring@rwi.lu.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Deputy Director, Raoul Wallenberg Institute of Human Rights and Humanitarian Law, Lund, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Gordana Jankovic &amp;nbsp;&lt;br /&gt;Gordana.Jankovic@osf-eu.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Open Society Foundation Media Program&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vera Franz &lt;br /&gt;vfranz@osf-eu.org &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Program Manager, Information Program, Open Society Foundations&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Stewart Chisholm&lt;br /&gt;Stewart.Chisholm@osf-eu.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Manager for Freedom of Expression, Open Society Media Program&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/notices/second-expert-meeting'&gt;https://cis-india.org/notices/second-expert-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-06-08T10:01:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-watchmen">
    <title>India Should Watch Its Internet Watchmen </title>
    <link>https://cis-india.org/news/internet-watchmen</link>
    <description>
        &lt;b&gt;The month after terrorists attacked Mumbai in 2008, India's government initiated legislation enabling it to eavesdrop on electronic communication and block websites on grounds of national security. There was no public debate before the bill in question was introduced, and hardly any debate inside parliament itself before it passed in 2009. In the law, there were no guidelines about the extent to which an individual's right to privacy would be breached. And there was certainly no mention, and therefore, reassurance, that due process would be followed when it came to restricting access to websites. This article by Rahul Bhatia was published in the Wall Street Journal on March 28, 2011.&lt;/b&gt;
        
&lt;p&gt;It's taken about two years for the first signs of misuse to show up. And there may be many more, as the government uses vague discretion instead of firm rules to police India's Internet. Various groups can exploit these discretionary powers to their own ends.&lt;/p&gt;
&lt;p&gt;Earlier this month, the Indian Computer Emergency Response Team (CERT-In), the body appointed by the government to protect India's information infrastructure, blocked a text-message provider that sends out advertisements in bulk over mobile phone. It also blocked Typepad.com, a publishing platform used frequently by bloggers. Both restrictions have now been lifted.&lt;/p&gt;
&lt;p&gt;Most contentiously, a Delhi court ordered CERT-In to block access to Zone-H.org, an Italian security giant that acts as a repository of hacked websites—that is, it collects screen grabs of sites that are infiltrated, which later proves valuable for studying the cyber crime in question. A representative of this website accused an Indian cyber security firm, E2 Labs, of using Zone-H's logo and images to promote its own cyber security school courses. E2 Labs dragged Zone-H to court in 2009 and, on grounds of defamation, had Zone-H's website blocked. What muddies the waters is that E2 Labs claims to work for the government.&lt;/p&gt;
&lt;p&gt;Nobody knows what threat, if any, these websites posed to national security. Users who tried accessing them simply received a one-line message from their service providers that the sites had been blocked due to "instructions from the Department of Telecom." That message later disappeared, replaced by the standard error message: "Page Not Found."&lt;/p&gt;
&lt;p&gt;Many bloggers immediately started comparing this case to the situation they found themselves in 2006, when the government banned Blogspot.com right after Mumbai's suburban train system was hit by bomb blasts. The Department of Telecom then did not offer an official reason, leaving people guessing that this was some kind of response to that terrorist attack.&lt;/p&gt;
&lt;p&gt;That's happening again. The guidelines under which CERT-In operates say that all information related to website blocking is classified. Moreover, its mandate does not include communicating with the public. Which is why everyone is in the dark. Nobody even knows how widespread the blockade is. There's no hint of the process involved. There's no course for redress for those who own the affected sites.&lt;/p&gt;
&lt;p&gt;Inquiries from journalists about the Department of Telecom's method of functioning have gone unanswered. When cornered by the press this month, India's Information Technology minister Kapil Sibal, who oversees this department, passed responsibility to the ministry of home affairs, which manages the nation's internal security.&lt;/p&gt;
&lt;p&gt;Perhaps there are legitimate reasons for blocking these websites. India has faced its share of terrorist attacks that have, in the last decade, begun to affect the country's urban centers. Terrorists have gotten more sophisticated. The 2008 Mumbai assault especially put pressure on security personnel to be electronically vigilant, because the terrorists used satellite phones and internet technology to communicate. Since then, the government has ramped up its scrutiny of the Internet, including getting into a high-profile dispute last year with Blackberry-maker Research in Motion. Blogs are fair game, too, seeing as how terrorist groups have been known to use them for recruiting and communication. But if there are good reasons this time for blocking the sites in question, they're unknown and unexplained.&lt;/p&gt;
&lt;p&gt;That lack of explanation is cause for alarm. First, there's the impact on businesses. Intermediary guidelines proposed by the Department of Information Technology put the onus on service providers to remove any material that, in addition to endangering national security, "causes inconvenience or annoyance," is "grossly offensive or menacing in nature," or "belongs to another person." These open-ended guidelines mean service providers have to spend a good chunk of their time dealing with government officials to determine, say, what is offensive.&lt;/p&gt;
&lt;p&gt;The larger impact is on the rule of law. The clumsiness with which New Delhi has blocked these sites undermines any legitimacy the laws have. Lawyers I've spoken with already say that the guidelines, which are open to wide interpretation, violate the country's constitution.&lt;/p&gt;
&lt;p&gt;This legal debacle has implications beyond any immediate security concerns. Despite being a democracy with a vigorous free press, India can't afford to take freedom of speech for granted. The concern here is that a statute intended to protect the country from terrorism may also give new legal cover to people trying to restrict speech for other reasons.&lt;/p&gt;
&lt;p&gt;Already, thanks in part to the lack of political support for free speech, varied groups hijack cracks or loopholes in the legal framework to their populist ends. For instance, a colonial-era law against religious insults was used in 2007 to appease Hindu nationalists who wanted the government to punish Muslim painter M.F. Hussain for depicting "Mother India" in the nude. That case suggests that the new ill-considered and badly implemented rules for online policing could be exploited by political or business interests.&lt;/p&gt;
&lt;p&gt;India undoubtedly faces a serious terrorism problem. But New Delhi needs to defend itself through laws that don't end up impinging on free speech in damaging, undemocratic ways.&lt;/p&gt;
&lt;p&gt;Mr. Bhatia is a writer with Open Magazine in Mumbai.&lt;/p&gt;
&lt;p&gt;Read the original story &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748704396904576226460167553174.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-watchmen'&gt;https://cis-india.org/news/internet-watchmen&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-06T05:08:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-for-governments-presence-in-social-media-recommendations">
    <title>Policy for Government's Presence in Social Media - Recommendations</title>
    <link>https://cis-india.org/internet-governance/blog/policy-for-governments-presence-in-social-media-recommendations</link>
    <description>
        &lt;b&gt;In pursuance of the Office Memorandum issued by the DIT dated March 4, 2011, the e-Governance Group of the DIT, convened on March 23, 2011, the first meeting of an exclusive group to propose guidelines for government presence on social networking and social media sites. The Centre for Internet and Society being one of the invitees to the meeting, has submitted its recommendations for a Policy for the Government's presence in social networking and social media sites. &lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;1.	Data Retention&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The
Government's communication to citizens via social media should follow
the same data retention policy as its communication through other
electronic and non-electronic channels.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Data
portability compliance varies from one social media platform to
another. Hence, privileged access may be mandated by the Government
along the same lines “take down notices” and “information
requests” currently being sent to social media and other platforms
for intellectual property rights infringement and other offences.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;2.	Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Yochai Benkler has
famously stated that privacy is the protection of the weak from
scrutiny 	by the powerful while transparency is the exposure of the
powerful to scrutiny by the weak.&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It
is critical that social media policy for the Government is compliant
with existing law governing data protection and privacy.&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;
As Benkler said, privacy protection should be a function of power –
ordinary citizens should be afforded greater protection than
Government personnel. Each department of the Government may be
recommended to publish their own set of additional protections to
safeguard privacy of citizens while maintaining highest levels of
transparency of Government bodies.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;3.	Certifying Official
Accounts&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Some
social media platforms have the ability to certify or validate an
official account. Such validation must be made mandatory for all
Government presence across various social media platforms. The mere
existence of official Government social media accounts does not mean
that the Government officers cannot use their own personal unofficial
social media accounts. However, there must be a very clear and
discernable distinction between a Government officer's personal
(individual) social media presence and the official social media
presence of a Government department or Ministry.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While
individual officers are encouraged to set up their own personal
social media presences, the official accounts must be in the format:
Ministry/Department (Acronym) along with Designation (Acronym) of the
official, so that the fans/followers/friends accumulated during the
tenure of a particular official can be handed over to the next person
who takes the same office. In order that this process of handing over
is smooth and uniform across various Government departments, it is
recommended that the protocol for handing over of social media
presences be clearly laid down and communicated to all the Government
departments.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;4.	Social Media
Integration with Government Portals&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Social
media must be integrated with the official websites. Ideally, the
websites should use Free and Open Source Software (FOSS) content
management system with full compliance with web accessibility
guidelines such as W3C's Web Content Accessibility Guidelines (WCAG)
so that the RSS feeds of newly added content can be broadcast via
multiple social media presences. Therefore, social media is seen as
an additional benefit accruing from already existing efforts and
investments of the Governments in electronic publishing.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In
fact, it would be greatly beneficial for citizens if a constitutent
relationship management software with tracking number is used for all
social media and email communication by the Government. This will
bring about a higher level of transparency and accountability on part
of the Government.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;5.	Security&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Social
media presences will be the target of malicious elements online.
Government social media presences are, in fact, at a greater risk of
being subject to such attacks. Therefore, Government security
standards must be adhered to including change of passwords regularly
for Government social media accounts.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;6.	Mass Outreach&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In
order to neutralise the pro-elite bias of social media, a special
outreach to non-elites via mobile phones must be an integral part of
the Government's social media strategy. Digitally enabled middle
class activism can undermine true participatory democracy and this
must be resisted.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;7. 	Rude
Accountability&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Occasionally,
citizens may resort to the use of inflammatory language and tone with
Government authorities to claim public services and to sanction
service failures. Such communications referred to as 'rude
accountability' accompanied by trolling are common phenomena which
the Government can expect around its social media presences. It is
recommended that these incidents be ignored at the first instances
instead of penalising them. The Department of Information Technology
(DIT) should prescribe protocol for escalation in case of systemic
trollers. It is to be noted that the lower threshold for freedom of
speech as prescribed by the Information Technology Act and
Information Technology Rules should not serve as the yardstick on
Government social media presences for characterising citizens'
behaviour as offences. It is important that the Government allows a
greater space for citizens to communicate with the Government and
exercise their freedom of expression.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;8.	Managing
Expectations&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Each
Government Ministry/Department/Official should publicly manage
expectations for their social media presences in the form of an
explicit, published “social media” policy in which expectations
surrounding integral aspects of communication with the public such as
public comments, speed of response and procedure for escalation are
clearly documented. This will ensure that citizens have fewer undue
expectations from the social media presence of a particular
Government authority.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;9. 	Brevity of
Communications&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Social
media particularly, micro blogging and SMS is based on brevity of
communications. Therefore, when a social media presence is branded or
named, it must be ensured that the name takes up least number of
characters so that it enables viral propagation.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In
order to standardise on the spellings employed for SMS slang common
in micro blogging and SMSes, it is recommended that Government
officials use modern clients with in-built support for such
functionality to avoid being embarrassed online.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;10.	 Official Logo&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The
official logo of the Government Ministry/Department should be an
integral part of Government social media presences. The logo may also
be published where applicable so that it could be the Public key. A
link to the official website should be employed wherever appropriate
in order to establish credibility of the social media presence.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;11.	 Proactive
Information Disclosure&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Social
media should be used as a means to uphold RTI obligations for
proactive information disclosure and to drive traffic to the website
which should ideally be an archive of such comprehensive proactive
disclosures.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;12. 	Alternative Open
Platforms&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wherever
free and open/ non-proprietary/ community-owned social media
infrastructure exists, the Government will be obliged to use the
alternative social media platform in addition to mainstream
platforms. For instance, for every Government authority's presence on
Twitter, the Government is obliged to ensure that such authority also
has a presence on status.net.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;13.	Uniformity of
Communication&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Social
media can only be used by the Government to communicate existing
Government information and propagate official policy terms to the
public. Great care must be taken to avoid propagation of unverified
facts and frivolous misleading rumours which tend to circulate often
through miscreants on social media platforms. It is recommended that
any information published by the Government on a social media
platform should be published only when such information can also be
published through other existing Government channels.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;If
the Government has to be a good neighbour in social media, it should
also contribute to viral dissemination of relevant public information
by way of re-tweeting, commenting and liking. Considering that the
Government might lend its credibility to dubious causes through such
endorsement, a protocol should be in place as part of social media
policy for the Government to ensure that baseless and dubious claims
are not vouched for by the Government.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc"&gt;1&lt;/a&gt;&lt;em&gt;See
	&lt;/em&gt;Yochai Benkler, “A Free
	Irresponsible Press: Wikileaks and the Battle over the Soul of the
	Networked Fourth Estate” (2011), &lt;em&gt;forthcoming &lt;/em&gt;Harvard
	Civil Rights – Civil Liberties Law Review available at
	&lt;a href="http://bit.ly/e84QhK"&gt;http://bit.ly/e84QhK&lt;/a&gt;.&lt;/p&gt;
&lt;div id="sdfootnote2"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote2sym" href="#sdfootnote2anc"&gt;2&lt;/a&gt;Existing
	laws covering data protection and privacy would include the
	Information Technology Act, the Information Technology Rules, The
	Telegraph Act and the Constitution of India.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-for-governments-presence-in-social-media-recommendations'&gt;https://cis-india.org/internet-governance/blog/policy-for-governments-presence-in-social-media-recommendations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>krithika</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-02T07:37:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/open-access">
    <title>Seminar on Open Access for Scientific Information</title>
    <link>https://cis-india.org/events/open-access</link>
    <description>
        &lt;b&gt;Open-access provides free online access to quality scholarly material that can be defined as “open domain,” meaning publicly supported research information, and “open access,” so that it is copyrighted to be freely available scholarly material. Open-access publishing enables researchers in developing countries to establish priority for their research, which they could use later to defend their intellectual property. It removes excess barriers in terms of both price and permission, enhances national research capacity, and improves visibility for developing-country research. Open access thus enables a global platform for this research and collaboration and reciprocates the information flow from South to North among all countries.&lt;/b&gt;
        
&lt;p&gt;In India, there is a large opportunity for open-access publishing. There are many non-commercial research and development institutions, both academic and research laboratories. For example, there are approximately 300 universities that offer both graduate and research programs. There are also many R&amp;amp;D laboratories operating within government science agencies, which cover domains like industrial research, defense research, agricultural research, medicine, ecology, environment, information technology, space, energy, and ocean development.&lt;/p&gt;
&lt;p&gt;Many of these institutions, and also several professional societies, publish science journals. Tools like the Open Journal Systems could help many of these journals to come online in an open-access environment. Open Access is &amp;nbsp;relevant to India because most &amp;nbsp;research is funded from public money, institutional framework and information infrastructure, trained manpower and financial resources are &amp;nbsp;adequately available. &amp;nbsp;It &amp;nbsp;widens distribution of information and knowledge and &amp;nbsp;lowers the cost of reaching a fairly wide audience while maximising return on public money. The OA movement is being supported by research funding agencies, academic institutions, researchers and scientists, teachers, students, and members of the general public.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Open access publishing can foster the exchange of research results amongst scientists from different disciplines, thus facilitating interdisciplinary research, whilst providing access to research results to researchers world-wide, including from developing countries, as well as to an interested general public.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Access to and sharing of information, including scientific information, goes through dramatic changes because of rapidly emerging new communication and information technologies (ICTs) and the societal transformations that they generate. But what are the long-term strategies to efficiently harness the open access potential for developing new approaches to knowledge acquisition and sharing? What needs to be done to effectively integrate these strategies into forward looking and sustainable policy making? How can we harness the potential of open access to develop knowledge societies that are people-centred, inclusive and development oriented? &amp;nbsp;What are the global environmental trends that will influence open access &amp;nbsp;in the next few years? &amp;nbsp;What are the main needs of the open access stakeholders in India and &amp;nbsp;South Asia ? &amp;nbsp;Which are the publishing models for open-access journals &amp;nbsp;and &amp;nbsp;what does it imply to finance and sustain open access journals in developing countries; how to overcome language and other barriers ?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;These issues are of strategic relevance to UNESCO as they address key challenges linked to building knowledge societies, one of the overarching objectives of the Medium Term Strategy 2008-2013.&lt;/p&gt;
&lt;p&gt;UNESCO, jointly with the Centre for Internet Society is well placed to mobilize interested stakeholders to develop efficient implementation strategies in the area of acquision and sharing of scientific information &amp;nbsp;and to integrate them into forward looking and sustainable policies.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;UNESCO believes that open access is an enriching part of the scholarly communication process that can and should co-exist with other forms of communication and publication, such as society-based publishing and conferencing activities. Open access publications are also more easily included and searchable in search engines and indexing databases.&lt;/p&gt;
&lt;p&gt;In order to initiate a sub-regional dialogue on democratizing access to scientific and health-related information, on the economics of scientific publishing and the &amp;nbsp;implications of the various open-access models &amp;nbsp;and the copyright and intellectual property issues, UNESCO convenes a one day seminar on 16 March 2011 in New Delhi. The &amp;nbsp;concept of « open access » &amp;nbsp;and the inter-relationships between academic institutions, researchers, &amp;nbsp;scientists and publishers will be &amp;nbsp;examined, as well as the challenges and barriers which OA is currently facing in this part of the world.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Overall objectives&amp;nbsp;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Strengthen awareness of UNESCO’s stakeholders on the potential of open access &amp;nbsp;in scientific knowledge &amp;nbsp;sharing that are dramatically accelerated by ICTs;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Provide analysis for anticipating foreseeable trends end emerging challenges &amp;nbsp;in order to enable Indian and South Asian stakeholders to develop strategies and policies to take them up;&lt;/li&gt;&lt;li&gt;Develop a partnership and collaboration among interested stakeholdesr in order to improve access to and sharing of scientific information and research &amp;nbsp;through open access&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Expected results&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The discussion of the Open Access Seminar is expected to achieve the following results:&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;UNESCO’s stakeholders enabled to understand trends and emerging challenges related to the impact of open access &amp;nbsp;on scientific information acquisition and sharing;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Possible developments prospected in the area of scientific information sharing in the coming 5 years;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Specific technology generated trends, and their consequences for development &amp;nbsp;in scientific information and research sharing&amp;nbsp;&lt;/li&gt;&lt;li&gt;Highlight the collaborative and collective efforts and actions behind the Open Access movement&lt;/li&gt;&lt;li&gt;Discussions of best practices of &amp;nbsp;Open Access Initiatives&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Who should attend:&amp;nbsp;&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Science editors&lt;/li&gt;&lt;li&gt;Policy makers&lt;/li&gt;&lt;li&gt;Information professionals&lt;/li&gt;&lt;li&gt;Researchers &amp;nbsp;&lt;/li&gt;&lt;li&gt;Open Access movement activists&lt;/li&gt;&lt;li&gt;Academics &amp;nbsp;and &amp;nbsp;all those interested in electronic publishing.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Terms of Reference:&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;
&lt;div&gt;1) Initiatives within the open access movement (with focus on what all of this means for developing countries):&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;discussion on the pros and cons of open access&amp;nbsp;&lt;/li&gt;&lt;li&gt;different models used and &amp;nbsp;paths to achieving open access to the health literature&amp;nbsp;&lt;/li&gt;&lt;li&gt;research reports and open access&amp;nbsp;&lt;/li&gt;&lt;li&gt;democratizing access to scientific and health-related information&lt;/li&gt;&lt;li&gt;economics of scientific publishing and implications of the various open-access models&amp;nbsp;&lt;/li&gt;&lt;li&gt;copyright and intellectual property&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;2) Open Access and the journals from developing countries&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;what does it means to bring journals online&amp;nbsp;&lt;/li&gt;&lt;li&gt;publishing models for open-access journals&amp;nbsp;&lt;/li&gt;&lt;li&gt;financing and sustaining open access journals in developing countries &amp;nbsp;&lt;/li&gt;&lt;li&gt;costs associated with open access in developing countries&amp;nbsp;&lt;/li&gt;&lt;li&gt;language barriers and translation&amp;nbsp;&lt;/li&gt;&lt;li&gt;training information specialists and users on searching and accessing health literature&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;This event is co-organised by UNESCO and the Centre for Internet and Society, Bangalore&lt;/em&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Download the agenda &lt;a href="https://cis-india.org/advocacy/open-access-agenda" class="internal-link" title="Agenda"&gt;here&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/open-access'&gt;https://cis-india.org/events/open-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2011-06-09T12:41:22Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/battle-internet">
    <title>Battle for the Internet </title>
    <link>https://cis-india.org/news/battle-internet</link>
    <description>
        &lt;b&gt;In this article written by Latha Jishnu and published by Down to Earth, Issue: March 15 2011, the author reports about the events in the United States in the post WikiLeaks scenario.&lt;/b&gt;
        
&lt;p&gt;As the Internet becomes the public square and the marketplace of our world, it is increasingly becoming a contested terrain. Its potential for diffusing knowledge and subverting the traditional channels of information is tremendous. So it is not surprising that governments, corporations and even seemingly innocuous social networking sites all want to control and influence the way the Internet operates. It’s easy to see why. Close to a third of humanity is linked to this system—and the dramatic growth in Internet usage over the past decade is set to explode in coming years. So is its commercial promise. Latha Jishnu looks at events in the US following the WikiLeaks exposé of its diplomatic cables, and in the hot spots of political turmoil across the world to understand the significance of the Internet in today’s interconnected world and the threats it faces. Arnab Pratim Dutta explains the technology used to block access to the Net.&lt;/p&gt;
&lt;table style="text-align: center;" class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="https://cis-india.org/home-images/D2E1.jpg/image_preview" style="float: none;" title="D2E1" class="image-inline image-inline" alt="D2E1" /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left;"&gt;
&lt;p&gt;&amp;nbsp;An opposition supporter holds up a laptop showing images of celebrations in Cairo's Tahrir Square, after Egypt's President Hosni Mubarak resigned (Photo: Reuters)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Ideas and ideologies, images and reports of events, both minor and cataclysmic, fly on the Internet, swirling through cyberspace, gathering resonance, metamorphosing and touching millions of lives in different ways. Many of the ideas—and visuals—could be banal (as they very often are), some dangerous, others bringing promise of change. Some have the power to subvert, helping to stir and stoke the smouldering embers of political and social unrest as recent uprisings in north Africa, West Asia and Asia have shown. To many, the Internet is the rebel hero of our times, subverting conventional media and leaking news and information that governments would like to censor. Even a village in the remote reaches of Odisha’s Malkangiri district which may have no electricity is in some way linked to cyberspace through smart cell phones because mobile operators are increasingly turning Internet service providers (ISPs) and bringing the worldwide web to the conflict-ridden forests of central India.&lt;/p&gt;
&lt;p&gt;It is about the power and reach of connection, unprecedented since people first began communicating with each other. The Internet, therefore, is turning into a conflict zone with everyone seeking control of it: governments, corporations and social networking sites, all of whom have different agendas. Social networks may seem innocuous but they are as much a hazard as the others to Internet freedom. Surveillance of “netizens” is becoming commonplace, whether in democracies or in totalitarian regimes, through a host of new laws and regulations ostensibly aimed at strengthening national security, cyber security or protecting business interests.&amp;nbsp;&lt;br /&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/D2E2.jpg/image_preview" alt="Down to Earth 2" class="image-inline image-inline" title="Down to Earth 2" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;While most governments are seeking to filter and block specific content, in extreme cases, as in Egypt, the Net has been blacked out using what some experts say is the “kill switch” (see ‘The Egypt shutdown’). This could emerge as the biggest threat to the Internet since other regimes could be tempted to go the Egyptian way. Most governments, however, prefer not to use it, not even the censorship-obsessed Chinese and Saudi regimes because the Internet is also about business—commerce of increasing significance is being routed through its sinews. Take one small example: In January alone, Britons spent a whopping £5.1 billion online, recording a 21 per cent jump in e-commerce revenues over January 2010, according to the latest edition of the IMRG/CapGemini e-Retail Sales Index. It is the kind of figure that stops authorities from reaching for the kill switch.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: left;"&gt;In the case of China, e-commerce transactions hit 4.5 trillion yuan (US $682.16 billion) in 2010, up 22 per cent year-on-year, according to China e- Business Research Center and CNZZ Data Center. Of this, online B2B or business-to-business deals accounted for the bulk: 3.8 trillion yuan (US&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;" class="pullquote"&gt;Popular whistleblower website wikileaks.org was unavailable for some time in December 2010&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;$576.05 billion). And retail sales are expected to zoom, too, pretty soon with e-commerce websites selling directly to customers growing to more than 18,600 last year. Thanks to a dramatic spike in the rate of Net penetration and impressive growth of online business.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But the world has a long way to go before the Internet becomes ubiquitous or an all-encompassing global commons. Currently, just two billion people are linked to the system (see above: ‘Big picture’), which is less than a third of the world’s population. And the reach, as the chart shows, is rather patchy. India may be in the top five Internet user nations with a total of 81 million users but penetration is an abysmal 6.9 per cent, the worst in the list. Blame that on our pathetic education levels and poverty. China, however, is the undisputed leviathan with 420 million users in 2010—some estimates put the figure closer to 500 million now—who account for more than a fifth of the world’s Internet users. No other country’s growth in this sector matches China’s either in speed or drama.&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/D3E3.jpg/image_preview" alt="Down to Earth 3" class="image-inline" title="Down to Earth 3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;This is one reason Washington frequently raises the issue of China’s policing of the Internet in different fora. The most recent was on February 15 when secretary of state Hillary Clinton made the second of her rousing speeches on safeguarding the Internet from all kinds of government interference. Speaking at George Washington University in Washington DC, Clinton pointed out that the attempts to control the Internet were rife across the world but singled China for repeated attacks.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;“In China, the government censors content and redirects search requests to error pages. In Burma, independent news sites have been taken down with distributed denial of service (DDoS) attacks. In Cuba, the government is trying to create a national intranet, while not allowing their citizens to access the global internet. In Vietnam, bloggers who criticize the government are arrested and abused. In Iran, the authorities block opposition and media websites, target social media, and steal identifying information about their own people in order to hunt them down. These actions reflect a landscape that is complex and combustible, and sure to become more so in the coming years as billions of more people connect to the Internet.”&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: -webkit-auto;"&gt;&lt;span class="Apple-style-span"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/D4E4.jpg/image_preview" alt="Down to Earth 4" class="image-inline image-inline" title="Down to Earth 4" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;That seemed a fair assessment of the trends&amp;nbsp;but the irony is that even as the secretary of state was speaking,&amp;nbsp;the Department of Justice was seeking to enforce a court order to direct Twitter Inc,&amp;nbsp;to provide the US government records&amp;nbsp;of three individuals, including Birgitta Jonsdottir, a member of Iceland's Parliament who had been in touch with others about WikiLeaks and its founder Juan Assange last year when WikiLeaks released its huge cache of US diplomatic cables.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;A commentary in China Daily noted with asperity: “The Assange case reveals such rhetoric is just so much hypocrisy. It is apparent that when Internet freedom conflicts with self-declared US national interests, or when Internet freedom exposes lies by the self-proclaimed open and transparent government, it immediately becomes a crime.”&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The Assange case more than anything else has exposed how vulnerable the Net is to political meddling and control. In December last year, Amazon said it stopped hosting the WikiLeaks website because it “violated its terms of service” and not because the office of the Senate Homeland Security Committee chaired by Joe Lieberman had questioned Amazon about its relationship with WikiLeaks.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;WikiLeaks had turned to Amazon to keep its site available after hackers tried to flood it and prevent users accessing the classified information. Few people were willing to credit Amazon’s feeble explanation for cutting off WikiLeaks and the general surmise was that Lieberman had put some kind of pressure on the webhosting platform. According to one analyst, the simple reason is that the US government is one of the company’s biggest clients. According to a press note issued by the company: “Government adoption of AWS (Amazon Web Services) grew significantly in 2010. Today we have nearly 20 government agencies leveraging AWS, and the US federal government continues to be one of our fastest growing customer segments.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As Amazon abandoned WikiLeaks, Paypal, Visa and MasterCard had also dumped WikiLeaks. This set off a fullscale cyber war in which a fourth party made its presence felt: Hackers/ ‘hacktivists’ who unleashed operation payback for what they deemed unfair targeting of WikiLeaks and Assange. This involved a series of (DDOS) attacks on Paypal, MasterCard, Swiss Bank PostFinance and Lieberman’s website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So while governments in many parts of the world block sites, jail or kill dissidents for expressing their views on the Net, threats to the freedom of the Internet come primarily from the paranoia that governments suffer and from badly crafted policies they implement to protect business and other interests.&amp;nbsp;&lt;/p&gt;
&lt;div class="pullquote"&gt;US enforcement agencies shut down 84,000 sites, falsely accusing them of child pornography&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The US, the ultimate symbol of liberal democracy, is no less uneasy about the power of the Internet. A slew of laws are making their way through the Senate, laws that will give the administration sweeping powers to seize domain names and shut down websites, even those outside its territory, and laws that strengthen the powers of the president in the time of a cyber emergency, including the use of a kill switch. In September, the US Senate introduced the Combating Online Infringement and Counterfeits Act, which would allow the government to create a blacklist of websites that are suspected to be infringing IP rights and to pressure or require all ISPs to block access to those sites. In these cases, no due process of law protects people before they are disconnected or their sites are blocked.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In India, in the wake of the terrorist attacks in Mumbai in November 2008, Parliament hastily passed amendments to the Information Technology Act, 2000, without any discussion in either House. The December 2008 amendments have some good points but they also allow increased online surveillance. Section 69A permits the Centre to “issue directions for blocking of public access to any information through any computer resource”, which means that the government can block any website.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Pranesh Prakash of the Bengalurubased Centre for Internet and Society notes that while necessity or expediency in terms of certain restricted interests is specified, no guidelines have been specified. “It has to be ensured that they are prescribed first, before any powers of censorship are granted to anybody,” said Prakash in an analysis of the amendments. “In India, it is clear that any law that gives unguided discretion to an administrative authority to exercise censorship is unreasonable.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;p&gt;Civil rights activists say the section has broadened the scope of surveillance and that there are no legal or procedural safeguards to prevent violation of civil liberties.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As the battle for keeping the Internet is joined by netizens who are aware of the power of connection, governments, too, are ramping up command and control measures. Among the risks to an open, democratic Internet are the following:&lt;/p&gt;
&lt;h3&gt;Threat to universality&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The basic design principle underlying the World Wide Web is universality, and, according to its founder Tim Berners-Lee, several threats are emerging. Among these are: cable companies that sell Internet connectivity wanting to limit their Net users to downloading only the company’s mix of entertainment and social networking sites (see ‘&lt;a class="external-link" href="http://www.downtoearth.org.in/content/hidden-dangers-facebook"&gt;Hidden dangers of Facebook&lt;/a&gt;’).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Another is by pricing Net connectivity out of the reach of the poor and allowing differential pricing. Berners- Lee, warned at a recent London conference: “There are a lot of companies who would love to be able to limit what web pages you can see...the moment you let Net neutrality go, you lose the web as it is...You lose something essential—the fact that any innovator can dream up an idea and set up a website at some random place and let it just take off from word of mouth...”&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Actions against piracy&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The nub of such operations lies in the US Department of Homeland Security, whose Immigration and Customs Enforcement (ICE) and the Department of Justice (DoJ) have been seizing domains because they are suspected of hawking pirated goods. The first seizure was in November last year when 82 websites selling counterfeit goods ranging from handbags to golf clubs were taken out.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Last month, there was another raid on the Internet. According to TorrentFreak and other Internet monitoring sites, the two agencies wrongly shut down 84,000 websites that had not broken the law, falsely accusing them of child pornography crimes. After the mistake was identified, it took about three days for some of the websites to go live again. The domain provider, FreeDNS, was taken aback. “Freedns.afraid.org has never allowed this type of abuse of its DNS service. We are working to get the issue sorted as quickly as possible,” it said.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Earlier, DoJ and ICE had seized the domain of the popular sports streaming and P2P download site Rojadirecta. What is shocking is that the site is based in Spain and is perfectly legal. Two courts in Spain have ruled that the site operates legally, and other than the .org domain the site has no links to the US.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Internet freedom could easily become the biggest casualty in the illconceived and poorly designed procedures adopted by developed countries— France, the UK, South Korea, Taiwan and New Zealand have similar laws—to protect intellectual property from counterfeiters and pirates, primarily at the behest of the film and music recording industries.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are indications India may be planning to follow suit (see ‘&lt;a class="external-link" href="http://www.downtoearth.org.in/content/indias-three-strikes-policy"&gt;India’s three-strikes policy&lt;/a&gt;’), although civil rights groups say it could amount to a form of deprivation of liberty.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Surveillance technology&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The problem with the use of technology in keeping the Internet safe cuts both ways. With increasing number of cyber attacks on both official and public websites from an array of hackers and malware, governments are reaching for ever more sophisticated high-tech surveillance systems. For instance, computer systems of the US Congress and the executive branches are under attack an average of 1.8 billion times per month, according to a recent Senate report. The result: more spyware. One such is deep packet inspection technology. It is a tool that protects customers from rampant spam and virus traffic. Experts say the Internet could not survive without this technology and yet, it helps authorities to keep a close watch on what people are doing on the Net. In the US, ISPs are required to have this technology.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So what can be done? Keep close tabs on government involvement in the Internet and ensure that its intrusion in both the content and the engines of this system is kept to the minimum.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Read the original article written by Latha Jishnu in Down to Earth&lt;/em&gt; &lt;a class="external-link" href="http://www.downtoearth.org.in/content/battle-internet"&gt;here&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/battle-internet'&gt;https://cis-india.org/news/battle-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:28:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/anti-social-network">
    <title>Anti-Social Network</title>
    <link>https://cis-india.org/news/anti-social-network</link>
    <description>
        &lt;b&gt;Social media is driving teens to a reality they can't handle. This article by Max Martin was published in Mail Today on February 27, 2011. &lt;/b&gt;
        
&lt;p&gt;THIS is the generation of instant messaging and two-minute noodles. Impatient teenagers are always plugged in to their computers and cell phones. Their reality is virtual and most of their friends can be found online. "It's the coolest way to keep in touch," says Charlotte William, a college student in Bangalore whose Facebook was got flooded with birthday greetings on Saturday. Her FB page is an almost-instantly updated open book of her life.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Such minute-by-minute minute updates are an integral part of any teenager's life but the older generation is cautious. Not just old-fashioned people but even the tech-savvy are raising several issues with this uncontrolled explosion of social networking. India is the seventh largest social networking market in the world, with millions of users and many issues like privacy, etiquette, commercial, and political interests. Even though people have control over the information they post online, unauthorised access&amp;nbsp;--&amp;nbsp;usage and republication -- is a major cause of concern, says Nikhil Pahwa, who publishes MediaNama, a mobile business news site based in Delhi. "You put up information about friends and family without realising the enormous consequences of it being in the public domain," says Pahwa.&lt;/p&gt;
&lt;p&gt;"I see a lot of people exchanging personal messages and phone numbers on their walls. A lot of people are rather nonchalant about it," says Christian Wolff, a German development researcher, living in Hyderabad, who finds it amazing how Indians are not as concerned about their privacy as they should be. Bangalore-based lawyer Sarim Naved says the internet gives people a misplaced sense of anonymity, which makes them shed their inhibitions -- and etiquette. Should you allow a friend to post pictures of you from that crazy party last night? What if a family member sees them? We still live by traditional values and customs and footloose pictures may not be appreciated.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;And while you may think that your privacy settings are in place to never allow such an unfortunate incident take place, privacy settings give a false sense of security. "Many people cannot figure out how to put filters on," says Yamini Atmavilas, a teacher of gender studies in Hyderabad. She also says that social networking is a mixed bag: "Studies show that women use social networks differently from men. They have helped build women's social capital, providing an outlet for connection and expression."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;AARTI Mundkur, who was involved in the national 'Pink Chaddi' campaign against the pub-attacking Sri Ram Sene, agrees. "Social networks capture only the imagination of the upper middle class -- and fail to evoke any other kind of response," says this activist lawyer. While the social media is powerful -- and can be used for many purposes -- it is limited in scope.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also, these sites are turning into what Wolff calls 'all-devouring marketing machines'. Facebook, for instance, is always in the midst of some controversy over its automatic personalisation or using technology to accommodate differences between individuals, so that disbursing personalised advertisements gets easier. Most of us do not realise that every little bit of information we post online is under the scrutiny of corporate entities that analyse and track browsing, spending, networking, and even music preferences.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"They make money with the data you post online for free," says Anivar Aravind, an IT consultant and commentator who started the online campaign for justice for Binayak Sen. "Even worse is when these service providers pass on this personal information to the government as Yahoo did in China leading to the imprisonment of a journalist," says Aravind.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also getting increasingly active in the online circuit are crooks, says Shantanu Ghosh, who handles the India product operations of Symantec, a leading network and computer security firm. These crooks, he says, launch virus attacks, put up false events to attract people, and spoof networking sites to extract personal data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"This attack was observed before the Cricket World Cup 2011. Attackers had created a page offering ticket deals for the World Cup final in Mumbai, requiring users to log into their social networking accounts. Those who fell for this trick would have ended up revealing their confidential login information to these attackers." Ghosh advises: "You should treat anything you see online with skepticism -- especially if it involves clicking a link or installing an application." Also make sure you check and understand privacy policies and settings.&lt;/p&gt;
&lt;p&gt;This is even more important because existing laws on cyber crime are not strong enough. Also, the question whether new laws will be effective remains.&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"It really depends on the law. If it goes into too much detail then it will be rendered irrelevant because of advancements in technology," says Sunil Abraham, who heads Centre for Internet and Society, a Bangalore-based research group. "A good law usually focuses on principles. What we need in India is a privacy regulator that can dynamically interpret the principles in law to quickly react to developments on the internet."&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;&lt;li&gt;Read the article in Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/epaperhome.aspx?issue=2722011"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Also see the article in the Free Library &lt;a class="external-link" href="http://www.thefreelibrary.com/ANTI-+SOCIAL+NETWORK+(+Social+media+is+driving+teens+to+a+reality...-a0250124694"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Download the news from Mail Today &lt;a href="https://cis-india.org/advocacy/anti-social-network.pdf" class="internal-link" title="Anti-Social Network (PDF)"&gt;here&lt;/a&gt; (pdf, 2.92 MB)&lt;/li&gt;&lt;/ul&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/anti-social-network'&gt;https://cis-india.org/news/anti-social-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:59:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia">
    <title>Pirates, Plagiarisers, Publishers</title>
    <link>https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia</link>
    <description>
        &lt;b&gt;This article attempts to rescue not by denying the charges of plagiarism, but by charting an alternative trajectory of plagiarism so that each successive instance does not amplify our sense of embarrassment and crisis in the academy. The article by Prashant Iyengar was published in the Economic &amp; Political Weekly, February 26, 2011, Vol XLVI No 9.&lt;/b&gt;
        &lt;p&gt;"Copying one book is plagiarism; copying several is research." Unknown &lt;a href="#1"&gt;1&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Someone must have slandered Indian academia, for, without having done anything new or different, allegations of plagiarism have suddenly been tumbling out of India’s ‘top’ universities in these past few years.&lt;/p&gt;
&lt;p&gt;In October 2002, a group of physicists from Stanford University, including three Nobel laureates, addressed a letter to the (then) President Abdul Kalam complaining of plagiarism by the Vice Chancellor of Kumaon University.&lt;a href="#2"&gt;2&lt;/a&gt; In January 2006, a professor from IIM Bangalore was dismissed for plagiarism.&lt;a href="#3"&gt;3&lt;/a&gt; In February 2008, a professor from the Sri Venkateswara University in Tirupathi was accused of having plagiarized up to 70 papers between 2004 and 2007.&lt;a href="#4"&gt;4&lt;/a&gt; In October 2010, IIT Kharagpur was forced to set up a committee to investigate allegations of plagiarism by one of its professors and three doctoral candidates.&lt;a href="#5"&gt;5&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;And so on. It seems Benjamin Franklin’s adage about originality being “the art of concealing your sources” thrives today in Indian academia. Something is rotten in the State of academic research. Evidently, we even know exactly what it is: Some years ago, the Association of Indian Universities invited students to a research contest. The pamphlet advertising the contest contained a remarkably prolix account of the causes of the general decline in academic research:&lt;/p&gt;
&lt;p&gt;Of late, &lt;b&gt;research has become a subservient component in the university&lt;/b&gt; functioning. It is &lt;b&gt;not considered a lucrative career option&lt;/b&gt;. Apart from this, &lt;b&gt;resource constraints, lack of commitment, lack of proper encouragement&lt;/b&gt;, etc., are the impediments that are affecting the quality of research in our institutions of higher education. Another important factor for the deterioration of the quality of research is the &lt;b&gt;absence of adequate training and other capacity building&lt;/b&gt; endeavour in our system, which has &lt;b&gt;restricted students’ creativity only to rote memory&lt;/b&gt;. &lt;a href="#6"&gt;6&lt;/a&gt; (emphasis mine)&lt;/p&gt;
&lt;p&gt;Similarly, we are periodically reminded, as in this instance, by the chief of the Defence Research and Development Organisation that “India lacks quality academic organisations and research and development institutions that breed inventions in technology. This is the major reason behind India's failure in breaking new ground in inventions and innovations.”&lt;a href="#7"&gt;7&lt;/a&gt; Other news reports bemoan the fact that “Indian patent filings lag behind global average" with the total “number of filings by residents being just three per million people in its population, compared with the world average of 250”&lt;a href="#8"&gt;8&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Accounts such as these, which abound in the press and journals, typically trace a “decline” hypothesis according to which the quality of academic research in India, once rigorous and upright, has fallen precipitously in recent times. Poor quality of academic research is then portrayed as a function of the impoverishment of the academy itself. Concealed within this auto-critique is an envy of putatively ideal systems in other countries which exhibit values that are an inversion of those identified as ours: i.e. they privilege research, are well-resourced, file the statistically approved average number of patents, allow students’ creativity free rein, and do not restrict their creativity only to rote memory. Lurking underneath these criticisms is also the anxiety that the arrival of the internet has, far from invigorating indigenous research in India, facilitated plagiarism on a wider scale than previously imaginable. What do we make of all this self-slander?&lt;/p&gt;
&lt;p&gt;In this essay I will attempt to rescue Indian academic research, not by denying the charges of plagiarism, but by charting an alternative trajectory of plagiarism so that each successive instance does not amplify our sense of embarrassment and crisis in the academy.&lt;/p&gt;
&lt;p&gt;I begin by drawing on my own prior study on student research in law universities in India&lt;a href="#9"&gt;9&lt;/a&gt; to provide a rough account of how law students approach research. However inappropriate, I use some of my observations in the course of that study as a microcosmic model for how research is conducted by students across the country today.&lt;/p&gt;
&lt;p&gt;Next, I will attempt to show how the charge of plagiarism only acquires its pungency after the installation of a particularly western ‘Romantic’ conception of creativity that is hinged on the ‘genius’ figure. My point here is not one of cultural difference – we may or may not have conflicting traditions of (literary) creativity in India - but of heterogeneity of possible standpoints from which creativity can be judged, which have been deprecated or forgotten since this modern conception took root. While this idea is itself not ‘original’, having been made by numerous authors on whose work I draw upon here&lt;a href="#10"&gt;10&lt;/a&gt; , I am interested here in how it can inform our reaction to quotidian reports of plagiarism in the contemporary. Specifically, I think our understanding of 'originality-as-genius’ is a relatively recent historical product, and is definitely not the 'natural' or universal parameter by which literature and arts have been judged. I would assert that contemporary practices on the Internet restore us to (or renew the salience of) some of these pre-modern practices of authorship where originality in its Cartesian sense may not necessarily be determinative of value.&lt;/p&gt;
&lt;p&gt;I would however hasten to add that this does not lead us inexorably to the conclusion that our traditional understanding of plagiarism has to abandoned. In the case of academic writing, 'Romantic' standards of originality have been rigorously upheld and policed by the spectral might of the University. Here, the ritual demonstration of cartesian orginality  is not only a condition of success, but a minimum qualification for survival and advancement in this domain. With the stakes being so high, the temptation to pass off others' works as one's own is great, in contrast to the risks of being caught. This does not mean that everyone resorts to it, only that there are structural factors in the academy that make practices of plagiarism more 'rational' than, perhaps, in other domains&lt;a href="#11"&gt;11&lt;/a&gt; .&lt;/p&gt;
&lt;p&gt;To begin, then with my conclusions, I think that dulling the keenness of ‘cartesian originality’ in the University could be an important component in the serious task of educational reform. Equally, I aim, in this article to rehabilitate the term plagiarism so as to diminish the sense of embarrassment that seems to come naturally to us when we speak of Indian research.&lt;/p&gt;
&lt;h3&gt;Student ‘research’ in Law Schools in India&lt;/h3&gt;
&lt;p&gt;The content and observations in this section draw from a study that I had conducted in 2006 on student research in national law universities in India. During the study I had interviewed 40 students and eleven faculty members across three National Law Universities. &lt;a href="#12"&gt;12&lt;/a&gt; I will focus here on the themes from those surveys that directly address the issue of research and plagiarism.&lt;/p&gt;
&lt;p&gt;By way of background, in a typical national law university following a semester model, a student must submit up to 5 research papers (of lengths varying from 20 to 50 pages) a semester – or ten papers a year. In the duration of her five year legal education, a student from a national law university in India would have submitted anywhere between 48 (NALSAR) to 70 (NLIU Jodhpur) research papers of varying lengths. Given an average class-size of 80, and 5 batches in every university, a guesstimate indicates an average output of about 4000 papers of varying quality from every national law university annually. The table below contains a rough back-of-envelope enumeration of the research output of five national law universities in India, drawn from respective university prospectuses and websites.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;NALSAR&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;NLSIU&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;NLIU&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;NLU&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;GNLU&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Intake&lt;/td&gt;
&lt;td&gt;&lt;b&gt;80&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;80&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;80&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;80&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;160&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Max Strength&lt;/td&gt;
&lt;td&gt;&lt;b&gt;400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;800&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Academic Unit&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Semester&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Trisemester&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Trisemester&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Semester&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Semester&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Law Courses&lt;/td&gt;
&lt;td&gt;&lt;b&gt;40&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;51&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;48&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;54&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;51&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Non-Law Courses&lt;/td&gt;
&lt;td&gt;&lt;b&gt;10&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;10&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;26&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;8&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;9&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Number of research papers&lt;br /&gt;per student through the &lt;br /&gt;duration of the 5 year course&lt;/td&gt;
&lt;td&gt;&lt;b&gt;18&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;50-60&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;65-74&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;55-62&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;55-60&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Max number of research &lt;br /&gt;papers per semester / trisemester&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1900&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;2000&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;2200&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;4000&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Number of student&lt;br /&gt;research papers per year&lt;br /&gt;(approx)&lt;/td&gt;
&lt;td&gt;&lt;b&gt;3800&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;4200&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6000&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;4400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;8000&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;By any estimate, this volume of research is staggering and should ordinarily be a cause for pride. However law universities are also beset with the same anxieties of poor research ‘quality’ and plagiarism that characterize the broader academy. While my previous study contains a fuller discussion on the causes of poor legal research at these universities, I would like, here, to only reproduce some of my survey conclusions from that study that would feed the discussion for the later sections of this paper.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;From my surveys it appeared that both students and faculty shared a sense that the research burden on students in these universities was excessive and too onerous to facilitate high quality research.&lt;/li&gt;
&lt;li&gt;Students respond to the high research load by budgeting their efforts – working more intensely on some research assignments while neglecting others. This accorded with the responses from faculty members who reported an extremely low number of high quality research papers turned in. Responses from faculty indicate that a high percentage of papers received fall under a median category between ‘high quality’ and ‘abjectly low quality’ – i.e. there are a large number of papers which, while offering a cogent account of the topic do not add any insight of their own.&lt;/li&gt;
&lt;li&gt;Both students and faculty reported generally, the existence of a high degree of plagiarism (defined as the inclusion of extrinsic material without attributing sources) sourced both from amongst their peers as well as from extrinsic sources. Although most students (78%) claimed never to have directly copied from other students’ papers, many (67%) admitted to having shared their papers with other students either for ‘reference’, or more commonly, for adaptation/reuse in their assignments. The responses to whether they had any reservations against the practice were diverse with more students in favour of the practice of plagiarism (47%) than against (30%). Without admitting to participating it in themselves, 60% of respondents characterised the prevalence of ‘copy/paste’ plagiarism in research on their campus as ‘Rampant’ or ‘High’. Many reasons were forthcoming for the prevalence of this practice among which the more frequently stated included: ‘High work pressure’, ‘lack of time’ ‘lack of incentive to do high quality research’, ‘lack of emphasis by evaluators on high quality academic work’, ‘pointlessness of repeating identical research from scratch’. Other less common reasons offered were ‘emphasis on sheer volume to the neglect of quality of analysis’ and ‘disingenuousness of topics’ and ‘Laziness’.&lt;/li&gt;
&lt;li&gt;Over half the students surveyed had never published their research in journals. This despite the fact that 75% of respondents reported that at least 1 of their research papers was either publishable immediately or with modifications. More than half the respondents reported upwards of three papers that they themselves regarded as ‘publishable’.&lt;/li&gt;
&lt;li&gt;One of the common reasons that the faculty identified for the incidence of plagiarism was that students had begun to stereotype teachers who were unlikely to check or be able to check for plagiarism and would submit entirely plagiarised papers to them. Other reasons included the difficulty of checking the huge number of papers they received individually for plagiarism and also the fact that students had an unreasonably high workload coupled with the lack of enough incentive to do thorough research. &lt;br /&gt;&lt;br /&gt;“Intuition” and “checking the number of sources” was still the common mode of detecting plagiarism although some faculty made creative use of the internet – particularly Google.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Faculty was asked if a paper that appeared plagiarized to a high degree, but also indicated that the student had put in an intelligent compilation of materials, would be acceptable by them. The response to this was largely affirmative with some faculty members saying that most papers would correspond to that category and this standard was imperative for a majority of students to pass! Most faculty required that the source material at least be acknowledged.&lt;/li&gt;
&lt;li&gt;With regard to their research sources, there was a clear bias in favour of online sources almost to the exclusion of other sources. One respondent even rated online sources as being “more important than libraries”, and even claimed that she always began her legal research on the internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It is evident then from the foregoing account that the law universities are poor representatives of ‘original’ scholarship. The career of students through the law school seems to be marked by a blithe collaboration with faculty in which a Nelson’s eye is turned to their less-obvious plagiarisms. Although it is possible to adopt a high moralistic tone and condemn these practices, in the remainder of this paper I would like to marshal resources that would lend some dignity to them. In the section that follows, I will argue firstly, that there are rival conceptions of originality which privilege the recombination of existing information, rather than being fixated on ivory-towered ex nihilo originality.&lt;br /&gt;Under this conception, even the pastiche works by lazy law students emerge as eminently ‘original’. Secondly, I argue that slavish imitation is never always only that, and have long been recognized as an integral aspect of the creative process itself.&lt;/p&gt;
&lt;h3&gt;‘Originality’ is only a special effect of reception&lt;/h3&gt;
&lt;p&gt;In his fascinating book Original Copy, Robert Macfarlane draws on George Steiner’s vocabulary to contrast two different narratives of literary creation – The first, creatio, espouses “a hallowed vision of creation as generation” which “connotes some brief, noumenal moment of afflatus or inspiration’ during which the author composes her work.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;..the creative urge is dramatized as pulsing deep within the fastness of the individual self, and the solitary writer is seen to conjure ideas into the influence proofed chamber of his or her imagination. &lt;a href="#13"&gt;13&lt;/a&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;By contrast, the second conception of literary creativity, inventio, which is commonly found both in literary postmodernism and Augustan aesthetics, conceives of “creation as rearrangement” and “refuse[s] to believe in the possibility of creation out of nothing, or in the uninfluenced literary work”.&lt;a href="#14"&gt;14&lt;/a&gt; Instead this view “privileges the act of making out of extant material”. According to these “recombinative theories”, the creating mind is conceived&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;“as a lumber-room in which are stored innumerable verbal odds and ends. The supposedly ‘original’ writer in fact works with ‘inherited lexical, grammatical, and semantic counters, combining and recombining them into expressive executive sequences’. &lt;a href="#15"&gt;15&lt;/a&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;As an instance of this latter view, Macfarlane cites the example of Derrida who coined the term itérabilité to describe “the semantic drift which inevitably occurs between consecutive uses of the same text”. Derived from a combination of the Latin verb iterare (meaning ‘to repeat’) and the Sanskrit word itara (meaning ‘other’), the word “valuably  emphasizes ‘the logic which links repetition to alterity’. For Derrida, the repetition of a text inescapably involves its alteration: you can never step twice in the same poem, paragraph, or word.”&lt;/p&gt;
&lt;p&gt;I find this latter conception, especially Derrida’s concept of itérabilité to be a valuable tool with which to think through the practices of the law students I interviewed. While being derived from a plurality of (frequently unacknowledged sources), their papers were never mere ‘slavish’ repetitions, but always contained an element of alterity.&lt;/p&gt;
&lt;p&gt;Paradoxically, the networked information age that we inhabit both facilitates and preempts the flourishing of ‘recombinative creativity’. On the one hand, the abundance of informational resources that the internet puts at a researcher’s disposal, as well as the ease of word-processing makes it easy to rapidly refashion materials into a pastiche of one’s own. On the other hand, the illusion of novelty that such work may produce is capable of being dispelled equally swiftly, and more efficiently than ever before through the use of special applications designed to detect plagiarism. If, as MacFarlane suggests, originality is not “an indwelling quality of writerly production, but instead a function of readerly perception, or more precisely readerly ignorance (the failure to discern a writer’s sources)”, then the emergence of the internet has nearly made this form of originality impossible, by making this reader ignorance extremely evanescent (lasting only until the reader’s next Google search). The ability of students to pass off plagiarised material as their own will hinge increasingly on their ability to alter it unrecognizably, at which point the output is no longer a mere slavish imitation, but something new altogether – ‘quality research’.&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;In an essay on pre-print culture&lt;a href="#16"&gt;16&lt;/a&gt; , Lawrence Liang demonstrates that the notion that prior to print technology, the task of writing was reduced to that of slavish copying by scribes is false. As Liang notes, the real story is slightly more complicated.&lt;/p&gt;
&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;
&lt;div&gt;Acting as annotators, compilers, and correctors, medieval bookowners and scribes actively shaped the texts they read. For instance, they might choose to leave out some of the Canterbury Tales, or contribute one of their own. They might correct Chaucer’s versification every now and then. They might produce whole new drafts of Chaucer by combining one or more of his published versions with others.&lt;a href="#17"&gt;17&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;
&lt;p&gt;With the arrival of print technology, however, a fundamental transformation occurs in the way the activities of writing and reading. Liang quotes an extended passage from Rebecca Lynn’s study of reading and writing practices in medieval England&lt;a href="#18"&gt;18&lt;/a&gt; that captures this change:&lt;/p&gt;
&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;the benefits readers derived from the press, in terms of better access to authorized texts, were countered by a profound loss of opportunity for inventive forms of reception. They were free to take with the texts they recopied. Manuscript culture encouraged readers to edit or adapt freely any text they wrote out, or to re-shape the texts they read with annotations that would take the same form as the scribe's initial work on the manuscript. &lt;i&gt;The assumption that texts are mutable and available for adaptation by anyone is the basis, not only for this quotidian functioning of the average reader, but also for the composition of the great canonical works of the period&lt;/i&gt;.&lt;a href="#19"&gt;19&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;
&lt;p&gt;Is it possible, in the light of this insight about the creative element of copying in pre-print days, to revise our pathological accounts of contemporary plagiarism? &lt;a href="#20"&gt;20&lt;/a&gt; Can we view plagiarism not as an offence against the ‘author’ity of knowledge, but in a sense as a reversion to a more primordial tradition in which the availability of a text presumes and is premised upon its availability for adaptation. As described previously, responses from interviews with faculty indicates a grudging tolerance of plagiarism in student research.&lt;/p&gt;
&lt;p&gt;This tolerance, stemming from an acknowledgement that even acts of compilation are not wholly without a creative element, seems to restore us to such an understanding of ‘creative’ reading akin to what has been described above.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Few years ago, a famous author of textbooks on Intellectual Property law in India was discovered to have plagiarised close to two hundred pages of his new book on the Right to Information. The pages had been lifted verbatim from the manuscript sent by a famous law professor to the same publisher. When the matter came to light, the first author pleaded ignorance. After an ugly out-of-court tussle between the professor and the publisher (who happen to be one of India’s more powerful legal-publishing houses), a compromise was reached wherein the professor’s book would be published with a note inserted stating that 200 of his pages had been included in the other ‘author’s’ book.&lt;/p&gt;
&lt;p&gt;I conclude this essay with this piece of copyright ‘gossip’ in order to highlight a couple of ironies that it animates. The first is, of course, the delicious irony that a famous author, of IP books no less, would stoop to such lows. (Could academic writing in any discipline be above suspicion now that academic writing in IP, that guardian discipline of genius ‘originality’, has proven susceptible to plagiarism?) The second irony is that this person’s reputation as the ‘author’ of a book, and of a genre of books survives despite the fact that he may not have penned even a single word of his book – which prompts us to ponder what function the author truly serves here. Lastly, I find the fact curious that both books continue to be displayed – and sold - in various legal bookstores, frequently side-by- side. The ‘fact’ of the plagiarism seems not to have significantly impacted sales of either author’s tome.&lt;/p&gt;
&lt;p&gt;Tempting as it may be, one must resist treating this example as either exceptional or paradigmatic. Publishers in India in many cases do lead authors by their nose, and this is particularly so in the case of text-book publishing. However, this does not mean that original – in the Cartesian sense - academic writing does not continue to be produced in India. I feel this instance points us to the limits of the argument I have made in the preceding section. As well as it may be to celebrate ‘recombinative’ accounts of creativity in students, wholesale plagiarism with impunity by big name authors backed by large publishing houses cannot be easy to endure. In our acceptance of a combinatorial ‘inventio’ theory of creativity, it would be unwise too hastily to jettison the more austere creatio theory. As Macfarlane points out, popular attitudes to originality and plagiarism have moved between the two narratives of originality in a dialectical fashion so that they can best be thought of as “enmeshed .., or existing in a kind of helical wrap: each requiring the other for its support, counter-definition, and continued existence. Neither ever obliterates the other.”&lt;a href="#21"&gt;21&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;However they may have been produced, we regard our ‘works’ not merely as our property but also relationally through ethics of propriety. In other words, what we write is our “own” not in the way that our shoe is our own, but in the sense that our friends are our own. Plagiarism in this context most closely approaches its original Latin roots – plaga: to convert a freeman into a slave22. – as the unjust enslavement or capture of our work by someone else.&lt;br /&gt;What role has the internet played in this crisis of plagiarism? Despite the inherent promiscuity of the medium, I think that the arrival of the internet has not actually changed our practices in relation to plagiarism. So the fact that I may blithely pirate movies and music on the internet does not mean, automatically, that I adopt 'piracy' as my research methodology for academic writing. Our choices remain as they were – to acknowledge or not, with the latter being increasingly more risky in an age when exposure is only a google search away.&lt;/p&gt;
&lt;p&gt;Finally, how does all of this relate to the question I posed at the start viz: what do we make of this self-slander? I think it will not do to simply declare ourselves innocent of the charge of plagiarism. (As Josef K’s prison chaplain says, that is what the guilty usually do.) But equally we must be careful, to continue with a Kafkaesque metaphor, not to see the gallows being constructed in the distance and hang ourselves on the presumption they are being erected solely for us. Kafka alone, of course, does not supply good grist for policy decisions. A possible way forward would be to import the cinematic notion of plagiarism into academic writing: Not all that is unacknowledged is unoriginal (as my &lt;br /&gt;example from student research at law universities shows), but this does not extend to a license to appropriate all as one's own (the example of the famous IP author who plagiarised 200 pages from a professor). The former is a function of the dominant, awkward alien aesthetic imposed by the University, which requires academic writing to be dully impersonal and abstract. Finding it too taxing, most students resort to a clumsy pastiche rather than, for instance, shifting to a more narrative style which they may be more comfortable with. The internet allows their pastiche to be more colorful than before.&lt;/p&gt;
&lt;p&gt;The latter is plainly an ethical failing by someone who believes they can get away with impunity. The internet does not impact them in any way except that their 'crime' once discovered circulates endlessly on the internet (As this IP author discovered to his dismay).&lt;/p&gt;
&lt;p&gt;In deciding what is to be done, however, I would advise our policy makers to make haste, only slowly.&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;Notes&lt;/h2&gt;
&lt;div&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;Lindey, A., 1952. &lt;i&gt;Plagiarism and originality&lt;/i&gt;, Harper., New York, P.2&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;Chu, S. et al., 2002. Letter from the group of Professors of Physics of Stanford University to the President of India. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://www.stanford.edu/dept/physics/publications/PDFfiles/india.pdf"&gt;http://www.stanford.edu/dept/physics/publications/PDFfiles/india.pdf&lt;/a&gt; [Accessed December 22, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;Seethalakshmi, S., 2006. IIM-B prof held violating copyright. The Times of India. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2006-01-05/bangalore/27803993_1_iim-b-p-g-apte-copyright-violation"&gt;http://timesofindia.indiatimes.com/city/bangalore/IIM-B-prof-held-violatingcopyright/ articleshow/1359149.cms?curpg=2&lt;/a&gt; [Accessed December 21, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;Tewari, M., 2008. Indian professor guilty of plagiarism. DNA India. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://www.dnaindia.com/india/report_indian-professor-guilty-of-plagiarism_1152417"&gt;http://www.dnaindia.com/india/report_indian-professor-guilty-of-plagiarism_1152417&lt;/a&gt; [Accessed December 21, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;Singh, K., 2010. IIT-K sets up panel to probe plagiarism charges. Indian Express. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://www.expressindia.com/latest-news/iitk-sets-up-panel-to-probe-plagiarism-charges/695196/"&gt;http://www.expressindia.com/latest-news/iitk-sets-up-panel-to-probe-plagiarism-charges/695196/&lt;/a&gt; [Accessed December 21, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;"Anveshan: Student Research Convention." Association of Indian Universities. Apr 2008. Research Division. 30 Apr 2008 &amp;lt;http://www.aiuweb.org/Research/research.asp&amp;gt;.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="7"&gt;Josy Joseph , ‘India lacks R&amp;amp;D base, laments DRDO chief ‘, (2000), [Internet], Available from: &amp;lt;&lt;/a&gt;&lt;a class="external-link" href="http://www.rediff.com/news/2000/aug/11josy1.htm"&gt;http://www.rediff.com/news/2000/aug/11josy1.htm&lt;/a&gt;&amp;gt; [Accessed 21 April 2008]&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="8"&gt;‘Indian patent filings lag behind global average’, [Internet], Available from: &amp;lt;&lt;/a&gt;&lt;a class="external-link" href="http://www.eetimes.com/electronics-news/4075557/Indian-patent-filings-lag-behind-global-average"&gt;http://www.eetimes.com/news/latest/showArticle.jhtml?articleID=204702703&lt;/a&gt;&amp;gt; [Accessed 21 April 2008]&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="9"&gt;Iyengar, P., 2008. Open Information Policy for Student Research in Law Universities. SSRN eLibrary. &lt;br /&gt;Available at:&lt;/a&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1555689"&gt; http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1555689&lt;/a&gt; [Accessed December 24, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="10"&gt;See for instance, Rose, M., 1993. &lt;i&gt;Authors and Owners: The Invention of Copyright&lt;/i&gt;, Cambridge, Mass: &lt;br /&gt;Harvard University Press. Woodmansee, M., 1984. The Genius and the Copyright: Economic and Legal&lt;br /&gt;Conditions of the Emergence of the 'Author'. &lt;i&gt;Eighteenth-Century Studies&lt;/i&gt;, 17(4), 425-448.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="11"&gt;For instance, the charge of plagiarism in the domain of cinema seems to have a significantly diluted charge. Bollywood has been accused frequently of aping Hollywood, although this does not stand in the way of it immense popularity and renown. Ramesh Sippy's Sholay is regarded as having been influenced by John Sturges' The Magnificent Seven, itself being similarly 'influenced' by Akira Kurosawa's The Seven Samurai. On the modern definition of originality which requires us all to be 'perfectly uninfluenced', this qualifies as plagiarism. This definition however did not stand in the way of Sholay becoming an iconic film for Indian cinema.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="12"&gt;Respectively The National Academy of Legal Studies and Research (NALSAR), the National Law School of India University (NLSIU) and the National University of Juridical Sciences (NUJS).Although this sample is not sufficiently representative to make statistically kosher extrapolations – indeed, I make no such claim - I think the responses I received affirmed certain interesting observable trends about student research, that would seem commonsensical to anyone who teaches in India. To that extent, I think this data yields some interesting starting points for the theme of the current paper.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="13"&gt;Macfarlane, R., 2007. Original Copy: Plagiarism and Originality in Nineteenth-Century Literature, Oxford: Oxford University Press. p.2&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="14"&gt;Ibid, p.4&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="15"&gt;Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="16"&gt;Liang, L., 2009. A Brief History of the Internet from the 15th to the 18th Century. In N. Rajan, ed. &lt;i&gt;The Digitized Imagination&lt;/i&gt;. Routledge India, pp. 15-36.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="17"&gt;Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="18"&gt;Schoff, R.L., 2004. Freedom from the Press: Reading and Writing in Late Medieval England. Harvard University. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://sunzi.lib.hku.hk/ER/detail/hkul/3516592"&gt;http://sunzi.lib.hku.hk/ER/detail/hkul/3516592&lt;/a&gt;. cited in Liang, L., 2009. A Brief History of the Internet from the 15th to the 18th Century. In N. Rajan, ed. The Digitized Imagination. Routledge India, pp. 15-36.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="19"&gt;Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="20"&gt;For instance the ‘epidemic of plagiarism’ language typified in this BBC article Precey, Matt. “Study shows 'plagiarism epidemic'.” BBC 17 Jan 2008. 13 May 2008 &amp;lt;&lt;/a&gt;&lt;a class="external-link" href="http://news.bbc.co.uk/2/hi/uk_news/england/cambridgeshire/7194850.stm"&gt;http://news.bbc.co.uk/1/hi/england/cambridgeshire/7194850.stm&lt;/a&gt;&amp;gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="21"&gt;Supra n. 12, at p. 17&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="22"&gt;See Voltaire, 1824. &lt;i&gt;A philosophical dictionary: from the French&lt;/i&gt;, J. and H. L. Hunt. (Accessed from Google Books)&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;Also see these:&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://epw.in/epw/uploads/articles/15759.pdf"&gt;Economic and Political WEEKLY&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://originalfakes.wordpress.com/2011/03/03/epw-article-on-plagiarism/"&gt;Originalfakes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1775582"&gt;Social Science Research Network&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia'&gt;https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>prashant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-05-29T05:55:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rtis-on-website-blocking">
    <title>RTI Applications on Blocking of Websites</title>
    <link>https://cis-india.org/internet-governance/blog/rtis-on-website-blocking</link>
    <description>
        &lt;b&gt;In recent weeks, an increasing number of incidents have come to light on government-ordered blocking of websites.  In one case involving Zone-H.org, it is clear who has ordered the block (a Delhi district court judge, as an interim order), even though the block itself is open to constitutional challenge.  In all others cases, including the TypePad case, it is unclear who has ordered the block and why.  We at CIS have sent in two right to information requests to find out.&lt;/b&gt;
        
&lt;p&gt;While under the law (i.e., s.69A of the Information Technology Act), the Department of Information Technology (DIT) has the power to order blocks (via the 'Designated Officer'), in some cases it has been noted that the ISPs have noted that the order to block access to the websites have come from the Department of Telecom (DoT).&amp;nbsp; Due to this, we have sent in RTI applications to both the DIT and the DoT.&lt;/p&gt;
&lt;h2&gt;RTI Application to Department of Information Technology&lt;br /&gt;&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;To&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Shri
B.B.Bahl,&lt;br /&gt;Joint
Director and PIO (RTI)&lt;br /&gt;Office
of PIO (RTI)&lt;br /&gt;Room
No 1016, Electronics Niketan&lt;br /&gt;Department
of Information Technology (DIT)&lt;br /&gt;Ministry
of Communications and Information Technology&lt;br /&gt;6,
CGO Complex, New Delhi&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Dear
Sir, &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Subject:
Information on Website Blocking Requested under the Right to
Information Act, 2005 &lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;1.
Full Name of the Applicant:&lt;/strong&gt;&lt;br /&gt;Pranesh
Prakash &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;2.
Address of the Applicant:&lt;/strong&gt;&lt;br /&gt;E-mail
Address:&lt;br /&gt;pranesh[at]cis-india.org
&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Mailing
Address:&lt;br /&gt;Centre
for Internet and Society&lt;br /&gt;194,
2-C Cross,&lt;br /&gt;Domlur
Stage II,&lt;br /&gt;Bangalore
– 560071 &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;3.
Details of the information required&lt;/strong&gt;:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It
has come to our attention that Airtel Broadband Services (“Airtel”)
has recently blocked access to a blog host called TypePad
(http://www.typepad.com) (“TypePad”) for all its users across the
country. In this regard, we request information on the following
queries under Section 6(1) of the Right to Information Act, 2005:&lt;/p&gt;
&lt;ol type="i"&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Did
	the Department order Airtel to block TypePad under s.69A of the
	Information Technology Act (“IT Act”), 2000 read with the
	Information Technology (Procedures and Safeguards for Blocking
	Access of Information by Public) Rules, 2009  (“Rules”) or any
	other law for the time being in force?  If so, please provide a copy
	of such order or orders.  If not, what action, if at all, has been
	taken by the Department against Airtel for blocking of websites in
	contravention of s.69A of the IT Act?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Has
	the Department ever ordered a block under s.69A of the IT Act?  If
	so, what was the information that was ordered to be blocked?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;How
	many requests for blocking of information has the Designated Officer
	received, and how many of those requests have been accepted and how
	many rejected?  How many of those requests were for emergency
	blocking under Rule 9 of the Rules?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Please
	provide use the present composition of the Committee for Examination
	of Requests constituted under Rule 7 of the Rules.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Please
	provide us the dates and copies of the minutes of all meetings held
	by the Committee for Examination of Requests under Rule 8(4) of the
	Rules, and copies of their recommendations.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Please
	provide us the present composition of the Review Committee
	constituted under rule 419A of the Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Please
	provide us the dates and copies of the minutes of all meetings held
	by the Review Committee under Rule 14 of the Rules, and copies of
	all orders issued by the Review Committee.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;4.
Years to which the above requests pertain:&lt;/strong&gt;&lt;br /&gt;2008-2011&lt;/p&gt;
&lt;strong&gt;5.
Designation and Address of the PIO from whom the information is
required: &lt;/strong&gt;
&lt;p align="JUSTIFY"&gt;Shri
B.B.Bahl,&lt;br /&gt;Joint
Director and PIO (RTI)&lt;br /&gt;Office
of PIO (RTI)&lt;br /&gt;Room
No 1016, Electronics Niketan&lt;br /&gt;Department
of Information Technology (DIT)&lt;br /&gt;Ministry
of Communications and Information Technology&lt;br /&gt;6,
CGO Complex, New Delhi&lt;/p&gt;
&lt;p&gt;To
the best of my belief, the details sought for fall within your
authority.  Further, as provided under section 6(3) of the Right to
Information Act (“RTI Act”), in case this application does not
fall within your authority, I request you to transfer the same in the
designated time (5 days) to the concerned authority and inform me of
the same immediately.&lt;/p&gt;
&lt;p&gt;To
the best of my knowledge the information sought does not fall within
the restrictions contained in section 8 and 9 of the RTI Act, and any
provision protecting such information in any other law for the time
being in force is inapplicable due to section 22 of the RTI Act.&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Please
provide me this information in electronic form, via the e-mail
address provided above.&lt;/p&gt;
&lt;p&gt;This
to certify that I, Pranesh Prakash, am a citizen of India.&lt;/p&gt;
&lt;p&gt;A
fee of Rs. 10/- (Rupees Ten Only) has been made out in the form of a
demand draft drawn in favour of “Pay and Accounts Officer,
Department of Information Technology” payable at New Delhi.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Date:
Monday, February 28, 2011&lt;br /&gt;Place:
Bengaluru, Karnataka&lt;/p&gt;
&lt;br /&gt;(Pranesh
Prakash)
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;RTI Application to Department of Telecom&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;To&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Shri
Subodh Saxena&lt;br /&gt;Central
Public Information Officer (RTI)&lt;br /&gt;Director
(DS-II)&lt;br /&gt;Room
No 1006, Sanchar Bhawan&lt;br /&gt;Department
of Telecommunications (DoT)&lt;br /&gt;Ministry
of Communications and Information Technology&lt;br /&gt;20,
Ashoka Road, New Delhi — 110001&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Dear
Sir, &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;Subject:
Information on Website Blocking Requested under the Right to
Information Act, 2005 &lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;1.
Full Name of the Applicant:&lt;/strong&gt;&lt;br /&gt;Pranesh
Prakash &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;2.
Address of the Applicant:&lt;/strong&gt;&lt;br /&gt;E-mail
Address:&lt;br /&gt;pranesh[at]cis-india.org
&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Mailing
Address:&lt;br /&gt;Centre
for Internet and Society&lt;br /&gt;194,
2-C Cross,&lt;br /&gt;Domlur
Stage II,&lt;br /&gt;Bangalore
– 560071 &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;3.
Details of the information required&lt;/strong&gt;:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It
has come to our attention that Airtel Broadband Services (“Airtel”)
has recently blocked access to a blog host called TypePad
(http://www.typepad.com) (“TypePad”) for all its users across the
country.  Airtel subscribers trying to access this website receive a
message noting “This site has been blocked as per request by
Department of Telecom”.  In this regard, we request information on
the following queries under Section 6(1) of the Right to Information
Act, 2005:&lt;/p&gt;
&lt;ol type="i"&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Does
	the Department have powers to require an Internet Service Provider
	to block a website?  If so, please provide a citation of the statute
	under which power is granted to the Department, as well as the the
	safeguards prescribed to be in accordance with Article 19(1)(a) of
	the Constitution of India.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Did
	the Department order Airtel to block TypePad or any blog hosted by
	TypePad?  If so, please provide a copy of such order or orders.  If
	not, what action, if at all, has been taken by the Department
	against Airtel for blocking of websites?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Has
	the Department ever ordered the blocking of any website?  If so, 
	please provide a list of addresses of all the websites that have
	been ordered to be blocked.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Please
	provide use the present composition of the Committee constituted
	under rule 419A of the Indian Telegraph Rules, 1951. &lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Please
	provide us the dates and copies of the minutes of all meetings held
	by the Committee constituted under rule 419A of the Indian Telegraph
	Rules, 1951, and copies of all their recommendations.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;4.
Years to which the above requests pertain:&lt;/strong&gt;&lt;br /&gt;2005-2011&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;5.
Designation and Address of the PIO from whom the information is
required:&lt;/strong&gt;&lt;br /&gt;Shri
Subodh Saxena&lt;br /&gt;Central
Public Information Officer (RTI)&lt;br /&gt;Director
(DS-II)&lt;br /&gt;Room
No 1006, Sanchar Bhawan&lt;br /&gt;Department
of Telecommunications (DoT)&lt;br /&gt;Ministry
of Communications and Information Technology&lt;br /&gt;20,
Ashoka Road, New Delhi — 110001&lt;/p&gt;
&lt;div style="text-align: justify;" class="visualClear"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;To
the best of my belief, the details sought for fall within your
authority.  Further, as provided under section 6(3) of the Right to
Information Act (“RTI Act”), in case this application does not
fall within your authority, I request you to transfer the same in the
designated time (5 days) to the concerned authority and inform me of
the same immediately. &lt;/p&gt;
&lt;p&gt;To
the best of my knowledge the information sought does not fall within
the restrictions contained in section 8 and 9 of the RTI Act, and any
provision protecting such information in any other law for the time
being in force is inapplicable due to section 22 of the RTI Act.&lt;/p&gt;
&lt;p&gt;Please
provide me this information in electronic form, via the e-mail
address provided above.&lt;/p&gt;
&lt;p&gt;This
to certify that I, Pranesh Prakash, am a citizen of India. &lt;/p&gt;
&lt;p&gt;A
fee of Rs. 10/- (Rupees Ten Only) has been made out in the form of a
demand draft drawn in favour of “Pay and Accounts Officer (HQ),
Department of  Telecom” payable at New Delhi.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Date:
Monday, February 28, 2011&lt;br /&gt;Place:
Bengaluru, Karnataka&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;   &lt;br /&gt;(Pranesh
Prakash)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rtis-on-website-blocking'&gt;https://cis-india.org/internet-governance/blog/rtis-on-website-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    

   <dc:date>2012-12-21T06:34:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/february-2011-bulletin">
    <title>February 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/february-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Monographs finalised from these projects have been published online for public review:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/cis-raw/histories/Internetcities/city-and-space"&gt;Internet, Society &amp;amp; Space in Indian Cities&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS has interest in developing Digital Identities as a core research area and looks at practices, policies and scholarships in the field to explore relationships between Internet, technology and identity. The Digital Natives project is funded by Hivos, Netherlands. CIS involvement has resulted into these:&lt;/p&gt;
&lt;h3&gt;Columns on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following articles were published in the Indian Express recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/pull-plug"&gt;Pull the Plug&lt;/a&gt; [published in the Indian Express on February 20, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/flash-of-change"&gt;A FLASH of Change&lt;/a&gt; [published in the Indian Express on February 6, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/dn/wiki-world"&gt;Wiki changes the world&lt;/a&gt; [published in the Indian Express on January 23, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshop&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The third and final workshop in the Digital Natives with a Cause? research project took place in Santiago, Chile, from 8 to 10 February 2011. Samuel Tettner wrote a report about the workshop:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/santiago-workshop-an-after-thought"&gt;Digital Natives with a Cause? —Workshop in Santiago — an Afterthought&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entries by Maesey Angelina&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Maesy Angelina is doing Masters on International Development, specializing in Children and Youth Studies at the International Institute of Social Studies, Erasmus University of Rotterdam. She is working on her research on the activism of digital natives under the Hivos-CIS Digital Natives Knowledge Programme. She spent a month at CIS, working on her dissertation, exploring the Blank Noise Project under the Digital Natives with a Cause? framework. She writes a series of blog entries. The new ones are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/the-class-question"&gt;The Class Question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/diving-into-the-digital"&gt;Diving Into the Digital&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Blog Entry by Samuel Tettner&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Samuel Tettner is a Coordinator in the Digital Natives project. He has written one blog entry:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/computers-in-society"&gt;Computer Science &amp;amp; Society – The Roles Defined&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/accessibility/blog/working-draft"&gt;The Working Draft of the Rights of Persons with Disabilities Act, 2010: Does it exceed its Mandate in Including Provisions Relating to Other Disability Legislations&lt;/a&gt;?&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime. Our latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/exhaustion/weblogentry_view"&gt;Exhaustion: Imports, Exports and the Doctrine of First Sale in Indian Copyright Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/parallel-importation-rebuttal"&gt;Thomas Abraham's Rebuttal on Parallel Importation&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/indian-law-and-parallel-exports"&gt;Indian Law and "Parallel Exports"&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/parallel-importation-of-books"&gt;Why Parallel Importation of Books Should Be Allowed&lt;/a&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software, its latest involvement have yielded these results:&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/openness/blog/digital-commons"&gt;Engaging on the Digital Commons&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/openness/blog/comments-ifeg-phase-1"&gt;CIS Comments on the Interoperability Framework for e-Governance&lt;/a&gt; (Phase I)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/openness/blog/withdrawal-of-journal-access"&gt;Withdrawal of Journal Access is a Wake-up Call for Researchers in the Developing World&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt; Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralised authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cyber crime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.”  CIS involvement in the field of Internet governance has taken the following shape:&lt;/p&gt;
&lt;h3&gt;Announcement&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/google-policy-fellowship"&gt;Google Policy Fellowship Program: Asia Chapter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/intermediary-due-diligence"&gt;Comments on Intermediary Due Diligence Rules, 2011&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/cyber-cafe-rules"&gt;Comments on Cyber Café Rules, 2011&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/security-practices-rules"&gt;Comments on Draft Reasonable Security Practices Rules, 2011&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a project, ‘Privacy in Asia’. It is funded by Privacy International (PI), UK and the International Development Research Centre, Canada and is being administered in collaboration with the Society and Action Group, Gurgaon. The two-year project commenced on 24&lt;sup&gt;th&lt;/sup&gt; March 2010 and will be completed as agreed to by the stakeholders. It was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around challenges and violations of privacy in India. In furtherance of these goals it aims to draft and promote over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;h3&gt;Blog Entries by Elonnai Hickok&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok is a Programme Associate in the Privacy in Asia project. She has published a series of Open Letters to the Finance Committee regarding the UID:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/biometrics"&gt;Biometrics&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/finance-and-security"&gt;Finance and Security&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/uid-and-transactions"&gt;UID  and Transactions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/operational-design"&gt;Operational Design&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/uid-budget"&gt;UID Budget&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Other New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/privacy-conferencebanglaore"&gt;Conference Report: 'Privacy Matters' Bangalore&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/privacy-uiddevaprasad"&gt;Analysing the Right to Privacy and Dignity with Respect to the UID&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this:&lt;/p&gt;
&lt;h3&gt;Column&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/jhatka-or-halal"&gt;Spectrum auctions - 'Jhatka' or 'Halal'?&lt;/a&gt; [published in the Business Standard on February 3, 2011]&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Forthcoming Events&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is holding some conferences/workshops in the month of March in Delhi and Bangalore:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/fostering-freedom-of-expression"&gt;Role of the Internet in Fostering Freedom of Expression and Strengthening Activism in India - A Workshop in Delhi&lt;/a&gt; (March 4, 2011, Constitutional Club, Rafi Marg, New Delhi)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/global-freedom-expression"&gt;Global Challenges to Freedom of Expression&lt;/a&gt; (March 4, 2011, Constitutional Club, Rafi Marg, New Delhi)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/electronication"&gt;Electronication: Ragas and the Future&lt;/a&gt; (March 6, 2011 Jaaga, Bangalore)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/design-public"&gt;Design!publiC&lt;/a&gt; (March 18, 2011, Taj Vivanta, New Delhi)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Staff Update&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Deepti Bharthur&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deepti Bhartur is a Research Intern at CIS. She did her BA (Hons) in Journalism from Lady Sriram College, University of Delhi and completed her Masters in Communication from Sarojini Naidu School of Arts and Communication, University of Hyderabad. Deepti joined the Accessibility team of CIS and is working on accessibility in telecom policy in India.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/growing-cyberspace-controls"&gt;Growing cyberspace controls, Internet filtering&lt;/a&gt; (Hindu, February 20, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/copyright-amendment"&gt;2(m) or not 2(m)&lt;/a&gt; (Business Standard, February 19, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/twitterati-change-world"&gt;Can the twitterati change the world?&lt;/a&gt; (The Times of India, February 12, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/mouse-a-tool-of-revolution"&gt;Can the mouse be a tool of revolution in India?&lt;/a&gt; (DNA, February 12, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-network-suicide"&gt;Social Network Suicide&lt;/a&gt; (Bangalore Mirror, February 6, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/new-kids"&gt;New Kids on the Blog&lt;/a&gt; (Indian Express, February 6, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/procuring-books"&gt;Procuring books in Indian libraries&lt;/a&gt; (Hri Institute for Southasian Research and Exchange, February 4, 2011) &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/what-are-you-accused"&gt;What Are You Accused of? Find Out Online&lt;/a&gt; (Wall Street Journal, February 1, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/one-wikipedian"&gt;One among the clan of Wikipedians&lt;/a&gt; (Hindu, January 27, 2011)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/digital-wrongs"&gt;Digital Wrongs&lt;/a&gt; (Forbes India, January 24, 2011)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit us at &lt;a href="http://www.cis-india.org/"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Looking forward to hearing from you. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;i&gt;&lt;br /&gt; CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/february-2011-bulletin'&gt;https://cis-india.org/about/newsletters/february-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-30T11:16:29Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/digital-commons">
    <title>Engaging on the Digital Commons</title>
    <link>https://cis-india.org/openness/blog-old/digital-commons</link>
    <description>
        &lt;b&gt;We at the Centre for Internet and Society are very glad to be able to participate in the 13th Biennial Conference of the International Association for the Study of the Commons (IASC). Our interest in the conference arises mainly from our work in the areas of intellectual property rights reform and promotion of different forms of ‘opennesses’ that have cropped up as a response to perceived problems with our present-day regime of intellectual property rights, including open content, open standards, free and open source software, open government data, open access to scholarly research and data, open access to law, etc., our emerging work on telecom policy with respect to open/shared spectrum, and the very important questions around Internet governance. The article by Sunil Abraham and Pranesh Prakash was published in the journal Common Voices, Issue 4.&lt;/b&gt;
        
&lt;p&gt;Our work on intellectual property reform are proactive&amp;nbsp; measures at effecting policy change that go towards protecting&amp;nbsp; and preserving an intellectual, intangible commons. We have opposed the Protection and Utilization of the Public-funded Intellectual Property Bill (an Indian version of the American Bayh-Dole Act) which sought to privatise the fruits of publicfunded research by mandating patents on them. We are working towards reform of copyright law which we believe is lopsided in its lack of concern for consumers and that its current march towards greater enclosure of the public domain is unsustainable. Believing that not all areas of industry and technology are equal, and that patent protection is ill-suited for the software industry, we have worked to ensure that the current prohibitions against patenting of software are effectively followed.&lt;/p&gt;
&lt;p&gt;Defensively—that is working within the existing framework of intellectual property law—we seek to promote the various forms of copyright and patent licensing that have arisen as reactions to restrictive IP laws. Free/open source software and open content have arisen as a reaction to the restrictive nature of copyright law, such as the presumption under copyright law that a work is copyrighted by the mere fact of it coming into existence. (for instance, this was not so in the United States until 1989, till when a copyright notice was required to assert copyright). While earlier the presumption was that a work was to belong to the public domain, after the Berne Convention, that presumption was reversed. This led to the creation of the idea of special licences, by using which one could allow all others to share his/her work and reuse it. This innovation in using the law to promote, rather than restrict, what others could do with one’s works has enabled the creation and sharing of everything from Wikipedia, to Linux (which powers more than 85 percent of the world’s top 500 supercomputers) and Apache HTTP server (more than 60 percent of all websites). The advent of the Internet has allowed the creation of intangible digital commons.&lt;/p&gt;
&lt;p&gt;We are also starting to engage with the question of telecom&amp;nbsp; policy around spectrum allocation, and believe that&amp;nbsp; promotion of a shared spectrum would help make telecom&amp;nbsp; services, including broadband Internet, available to people at&amp;nbsp; reasonable prices. We also believe that Internet governance should not be the prerogative of governments, and should not happen in a top-down fashion.&lt;/p&gt;
&lt;p&gt;Comparisons between tangible commons and intangible commons have been made by people like Elinor and Vincent Ostrom, who in 1977 contributed to our understanding of subtractability and public goods. James Boyle has written about the expansion of copyright law as “the second enclosure movement”, following in the footsteps of the first enclosure movement against the take-over of common land which stretched from the fifteenth century till the nineteenth.&amp;nbsp; Yochai Benkler, has written extensively on commons in information and communication systems as well as on spectrum commons. Just as Elinor Ostrom’s work shows how Garrett Hardin’s evocative ‘tragedy of the commons’ and the problems of free-riding are very often avoided in practice, Michael Heller’s equally evocative phrase ‘gridlock economy’ shows that ‘over-propertisation’ of knowledge can lead to a ‘tragedy of the anti-commons’.&lt;/p&gt;
&lt;p&gt;Through this conference we wish to learn of the lessons that academic writings on tangible commons have to impart to intangible commons which are configured very differently (in terms of subtractability, for instance). Ostrom’s work shows how individuals can, in a variety of settings, work to find institutional solutions that promote social cooperation and human betterment. As part of her nine design principles of stable local common pool resource management, she lists clearly defined boundaries for effective exclusion of external unentitled parties. How does that work, when even the existing mechanisms of boundary-definition in intellectual property, such as patent claims, are often decried as being ambiguous thanks to the legalese they are written in? What of traditional knowledge for which defining the community holding ownership rights becomes very difficult? As Ostrom and Hess note, “the rules and flow patterns are different with digital information”, but how do these differences affect the lessons learned from CPR studies? How do Ostrom’s pronouncements against uniform top-down approaches to resource management affect the way that copyright and patents seek to establish a uniform system across multiple areas of art, science and industry (musical recordings and paintings, pharmaceuticals and software)? And how can Ostrom’s work on management of natural resources inform us about the management of resources such as spectrum or the Internet itself? These are all very interesting and important questions that need to be explored, and we are glad that this conference will help us understand these issues better.&lt;/p&gt;
&lt;p&gt;Please read the article in Common Voices Issue 4 &lt;a class="external-link" href="http://iasc2011.fes.org.in/common-voices-4.pdf"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/digital-commons'&gt;https://cis-india.org/openness/blog-old/digital-commons&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Commons</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2011-08-20T12:56:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cyber-cafe-rules">
    <title>CIS Para-wise Comments on Cyber Café Rules, 2011 </title>
    <link>https://cis-india.org/internet-governance/blog/cyber-cafe-rules</link>
    <description>
        &lt;b&gt;On February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website  (The Information Technology (Guidelines for Cyber Cafe) Rules, 2011) in exercise of the powers conferred by Section 87(2) (zg), read with Section 79(2) of the Information Technology Act, 2000.  Comments were invited from the public before February 25th 2011.  Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para wise comments for the Ministry’s consideration.&lt;/b&gt;
        &lt;h2&gt;A. General Objections&lt;/h2&gt;
&lt;p&gt;These rules have no nexus with their parent provision, namely s.79(2).  Section 79(1) provides for exemption from liability for intermediaries.  Section 79(2) thereupon states:&lt;/p&gt;
&lt;blockquote&gt;79. Intermediaries not to be liable in certain cases—&lt;br /&gt;
&lt;blockquote&gt;(2) The provisions of sub-section (1) shall apply if— &lt;br /&gt;
&lt;blockquote&gt;(a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hasted; or &lt;br /&gt;(b) the intermediary does not— &lt;br /&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;(i) initiate the transmission, &lt;br /&gt;(ii) select the receiver of the transmission, and &lt;br /&gt;(iii) select or modify the information contained in the transmission; &lt;br /&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;(c) the intermediary observes due diligence while discharging his duties under this Act and also observes such other guidelines as the Central Government may prescribe in this behalf. &lt;br /&gt;&lt;br /&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;Therefore, by not observing any of the provisions of the Rules, the intermediary opens itself up for liability for actions of its users.  However, the provisions contained in these rules have no rational nexus with due diligence to be observed by the intermediary to absolve itself from liability for third-party actions.&lt;/p&gt;
&lt;p&gt;While the government may have authority to regulate cybercafes, that regulation should not be promulgated as rules under s.79(2).  Doing so would be ultra vires s.79(2) itself.&lt;/p&gt;
&lt;h3&gt;Recommendation&lt;/h3&gt;
&lt;p&gt;These rules should be deleted in toto.&lt;/p&gt;
&lt;h2&gt;B. Specific Objections&lt;/h2&gt;
&lt;p&gt;These specific objections are in addition to the above-stated general objection, and do not detract from out recommendation that these rules should be deleted in their entirety.&lt;/p&gt;
&lt;h3&gt;Rule 2(c)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;(c) “Cyber Cafe” means cyber café as defined in clause (na) of sub-section (1) of section 2 of the Act&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;The Act defines a cyber cafe as meaning “any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public”.  This would include internet access provided in airports, in restaurants, and in many other places where the provisions of these rules (such as those about height of partitions, etc.) just will not be practicable.  Thus, this provision will have unintended consequences.&lt;/p&gt;
&lt;h3&gt;Rule 3&lt;/h3&gt;
&lt;blockquote&gt;Agency for issuance of license: Appropriate government will notify an agency to issue license to cyber cafes.&lt;br /&gt;&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Rule 3 requires the issuing of a license for the establishment of a cyber café. We believe this is unwarranted since cybercafes, like most commercial establishments are already subject to registration and licensing under the “Shops and Establishments Acts” which have been enacted in all states. These Acts already specify an elaborate procedure for the application, registration and monitoring of all establishments and there is no need to multiply the levels of permission a cyber café must obtain. The current rules do not specify an application procedure, fee, and a maximum or minimum time frame within which such a license must be granted or denied nor does it specify the criterion on which such license applications will be evaluated. We think that in the absence of such legislative guidance, this provision is likely to be abused.&lt;/p&gt;
&lt;p&gt;Cyber cafes in India contribute greatly to India’s increasing internet penetration and inserting a licensing regime would greatly impede access to the internet.&lt;/p&gt;
&lt;p&gt;We believe that cyber cafes should be allowed to be established in the same manner as other shops and establishments, without the requirement of a special license.&lt;/p&gt;
&lt;h3&gt;Rule 4(2)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;...When an user cannot establish his/her identify to the satisfaction of the Cyber Café as per sub-rule (1), he/she may be photographed by the Cyber Café using a web camera installed on one of the computers in the Cyber Café for establishing the identity of the user.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Sub-Rule 4 (2) Requires that if an individual is unable to establish identity, their photograph must be taken if they wish to use cyber café facilities. We believe that an individual’s photograph should be taken only as a last resort, where identity has been established.&lt;/p&gt;
&lt;h3&gt;Rule 4(3)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Children without photo identity card shall be accompanied by an adult with any of the documents as prescribed in sub-rule (1).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that children below 18 years should be specifically exempt from proving their identities to cyber café owners. Children are usually the quickest to adopt technology, and the requirement of possessing a valid identity might prove to be a deterrent to their developing computer skills. Likewise, being accompanied by an adult is also an onerous obligation since children’s access to the internet would depend on the availability of an adult/parent who may be too busy to accompany the child on every occasion the child wishes to access the internet or use a computer.&lt;/p&gt;
&lt;p&gt;To reiterate, we feel that the current provision specially and adversely targets children from poorer classes (since they are most likely to routinely access internet through cyber cafes) and denies them the opportunity of developing their computer skills which are crucial for the growth of the “knowledge economy” that India is trying to head towards.&lt;/p&gt;
&lt;p&gt;In addition, we believe that children are more susceptible to exploitation and consequently have a heightened privacy expectation which must be honoured. We recommend that the current sub-rule be deleted and replaced with a clause which specifically exempts children from proving their identity and forbids taking photographs of them under any circumstance.&lt;/p&gt;
&lt;h3&gt;Rule 5(1)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;... Log Register: After the identity of the user has been established as per sub-rule (1) of rule 4 above, the Cyber Café shall record and maintain the required information of each user in the log register for a minimum period of one year. Also, Cyber Café may maintain an online version of the log register.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Rule 5(1) Provides a minimum period of one year that Cyber Cafes must retain their log registers. The rule does not specify the details which the log register must provide. In the interests of minimising threats to privacy, we recommend that these details recorded be confined only to the name and duration of use.&lt;/p&gt;
&lt;p&gt;In addition, we believe that there should also be a coinciding mandatory deletion clause for the log register requiring details to be purged after the minimum retention period.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3&gt;Rules 5(3)and 6(2)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;5(3): “The cyber café owner shall be responsible for storing and maintaining following backups of logs and computer resource records for at least six months for each access or login by any user :&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;·    History of websites accessed using computer resource at cyber cafe&lt;/p&gt;
&lt;p&gt;·    Logs of proxy server installed at cyber café&lt;/p&gt;
&lt;p&gt;·    Mail server logs&lt;/p&gt;
&lt;p&gt;·    Logs of network devices such as router, switches, systems etc. installed at cyber café&lt;/p&gt;
&lt;p&gt;·    Logs of firewall or Intrusion Prevention/Detection systems, if installed.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;6(2): “The screen of all computers, installed other than in Partitions or Cubicles, shall face ‘outward’, i.e. they shall face the common open space of the Cyber Café.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend deletion of this rule since it is an unreasonable intrusion into a person’s privacy and an indirect attempt to censor content which users may wish to access. There are many uses of the internet for which a user may legitimately require privacy: For instance, patients, including HIV patients and those with mental illness, may wish to obtain information about their condition. Similarly sexuality minorities may wish to seek support or reach out to a larger community. Enforcing the architecture stipulated in this rule would discourage their access to such vital information. In addition, this architecture would make it easier for cyber crimes such as identity theft to take place since it would be easier to observe the login details of other users at the cyber café.&lt;/p&gt;
&lt;h3&gt;Rule 7(1)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Inspection of Cyber Café : “An officer, not below the rank of Police Inspector as authorised by the licensing agency, is authorized to check or inspect cyber café and the computer resource or network established therein at any time for the compliance of these rules. The cyber café owner shall provide every related document, registers and any necessary information to the inspecting officer on demand.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend this clause be omitted since it confers unfettered and unsupervised powers on any Police Inspector to examine any cyber café premises he may choose without any restriction on time.&lt;/p&gt;
&lt;p&gt;Additionally, the provisions of Shops and Establishments Acts of most states already prescribe a procedure for inspection of establishments and examination of records. The current rules merely add another layer of supervision to the existing laws without adequate safeguards.&lt;/p&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
 
&lt;p&gt;Sub-Rule 5(3) holds cyber café owners responsible for the storage and maintenance of back up logs concerning the following information: history of websites, logs of proxy servers, mail server logs, logs of network devices, logs of firewalls installed. We believe that the maximum length for retention of this data should be defined and a mandatory deletion clause should be inserted requiring cyber café owners to delete these logs periodically. We further believe that access to the history of websites and mail server logs is a serious invasion of a person’s privacy, and should be omitted from the back up logs.&lt;/p&gt;
&lt;p&gt;This is especially so when currently there is no requirement that cyber café owners maintain their logs under conditions of utmost secrecy and confidence.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
 
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cyber-cafe-rules'&gt;https://cis-india.org/internet-governance/blog/cyber-cafe-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-14T10:32:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/design-public">
    <title>Design!publiC</title>
    <link>https://cis-india.org/events/design-public</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society in partnership with Centre for Knowledge  Societies, Venkataramanan Associates, Centre for Law  and Policy Research and LiveMint is organising Design!publiC on March 18, 2011. Design Public is a conversation about whether and how to bring design thinking to bear upon the challenges of government so as to promote governance innovation. &lt;/b&gt;
        
&lt;h3 style="text-align: left;"&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Design.jpg/image_preview" alt="Design Public" class="image-inline image-inline" title="Design Public" /&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Background&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;The problem of governance is perhaps as old as society, as old as the rule of law. But it is only more recently -- perhaps the last five hundred years of modernity -- that human societies have been able to conceive of different models of government, different modalities of public administration, all having different effects on the configuration of society. The problem of governments, of governmentality, and of governance is always also the problem of how to change the very processes and procedures of government, so as to enhance the ends of the state and to promote the collective good.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Since the establishment of India’s republic, many kinds of changes have been made to the policies and practices of its state. We may think of, for instance, successive stages of land reforms, the privatization of large-scale and extractive industries, the subsequent abolition of the License Raj and so and so forth. We may also consider the computerization of state documents beginning in the 1980s, and more recently, the Right To Information Act (RTI). More recently there have been activist campaigns to reduce the discretionary powers of government and to thereby reduce the scope of corruption in public life.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While all these cases represent the continuous process of modification, reform, and change to government policy and even to its modes of functioning, this is not what we have in mind when we speak of ‘governance innovation.’ Rather, intend a specific process of ethnographic inquiry into the real needs of citizens, followed by an inclusive approach to reorganizing and representing that information in such a way that it may promote collaborative problem-solving and solutioneering through the application of design thinking.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The concept of design thinking has emerged only recently, and it has been used to describe approaches to problem solving that include: (i) redefining the fundamental challenges at hand, (ii) evaluating multiple possible options and solutions in parallel, and (iii) prioritizing and selecting those which are likely to achieve the greatest benefits for further consideration. This approach may also be iterative, allowing decisions to be made in general and specific ways as an organization gets closer and closer to the solution. Design thinking turns out to be not an individual but collective and social process, requiring small and large groups to be able to work together in relation to the available information about the task or challenge at hand. Design thinking can lead to innovative ideas, to new insights, and to new actionable directions for organizations.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This general approach to innovation -- and the central role of design thinking -- has emerged from the private sector over the last quarter century, and has enjoyed particular success in regards to the development of new technology products, services and experience. The question we would like to address in this conference is whether and how this approach can be employed for the transformation public and governmental systems.&lt;/p&gt;
&lt;h3&gt;What is the Evidence that Design Thinking Positively Impacts Governments?&lt;/h3&gt;
&lt;p&gt;Many European countries have government-supported design conglomerations for the purposes of enhancing business and the government’s interface with the public. Design Council in the UK not only works to create public identities but also helps formulate national design strategies that help the United Kingdom to differentiate its national brand and achieve broad national benefits. Elsewhere in the UK, a private organization, Think Public, and various governmental agencies, are working through a consultative approach with citizens to better target governmental services so as to maximize citizen benefits.&lt;/p&gt;
&lt;p&gt;In the context of public health, the first major public health information system has been built in Canada, and in many ways it may serve as a reference and benchmark for other countries around the world. The first deployment of a public health information system in developing country contexts is in Ghana, where a specialized Resource Center is even now being conceived to enable the support and further development of this new system.&lt;/p&gt;
&lt;p&gt;In India, early innovation research and concept development activities by the Center for Knowledge Societies for the Gates Foundation has shown promising results in terms of new opportunities to enhance the quality of health care delivery through the Bihar pilot itself, using the tools and techniques of ethnography, design, and user experience enhancement. In its studios in New Delhi and Bangalore, it has hosted innovation workshops with international health experts, public officials and other stakeholders to envision new kinds of technologies and solutions for improving public health delivery. In future, it may be possible to organize these kinds of efforts in the form of an Innovation Lab or Innovation Center.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Whereas, in the past, diverse attempts have been made to reform government, to make it more efficient, to reduce corruption and the arbitrariness of decisioning authority. Beneficial as these approaches may have been, they have not always been successful in fundamentally transforming the ways in which bureaucracies think about their mission, objectives and goals. They have not resulted in greater consumer orientation of these cadres, or greater public participation in the decision-making of these bureaucracies. These are the kinds of benefits that design thinking can bring to governmental and quasi-governmental bureaucracies.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this conclave, our interest is to explore how design thinking and user-centered innovation might help such organizations better accomplish their mission and better serve their beneficiaries. We also seek to explore and establish particular modalities through which governance innovation can be achieved, as well as to identify key stakeholders and personalities gripped of the challenge of governance innovation. Our larger goal is to craft a path forward for integrating design thinking and innovation methodologies in the further re-envisioning, refashioning and improvement of public services in India and elsewhere in the world.&lt;/p&gt;
&lt;p&gt;Specific Expected Outcomes&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;A shared understanding and common vocabulary around design thinking and innovation&lt;/li&gt;&lt;li&gt;A review of insights and outcomes from the event by members of government with a view to routinizing and institutionalizing innovation in government&lt;/li&gt;&lt;li&gt;A documentation of case-studies, concepts and perspectives from different participants emerging from the conclave&lt;/li&gt;&lt;li&gt;An emerging community of thinkers and practitioners interested in working together to share information and insights to accelerate governance innovation&lt;/li&gt;&lt;li&gt;A consensus on the modalities and occasion for the conduct of a follow-up conclave, possibly in Bangalore as soon as September 2011&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;An Invitation to Dialogue&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;Design Public is a conversation among a select group of high level thinkers and actors who care about public services design. No more than 50 persons will be in attendance. Presentations will be brief. Panel discussants will intersperse with the other participants for greater involvement and equal opportunity for dialogue and response. All attendees will be asked to participate in the emerging dialogue through the day.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Schedule&lt;/h3&gt;
&lt;p&gt;
&lt;/p&gt;
&lt;p&gt;10.00 am&lt;br /&gt;&lt;em&gt;What do Designers do? &lt;/em&gt;&lt;em&gt;How can Physical, Informational and Interaction Design Impact the Everyday Life of Citizens?&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society (Moderator)&lt;/li&gt;&lt;li&gt;Aditya Dev Sood, CEO, Center for Knowledge Socities&lt;/li&gt;&lt;li&gt;Abhimanyu Kulkarni, Design Director, Philips Design&lt;/li&gt;&lt;li&gt;Younghee Jung, Senior Designer, Nokia Corporation&lt;/li&gt;&lt;li&gt;Daniela Sangiorgi, Lecturer, Lancaster University&amp;nbsp;&lt;/li&gt;&lt;li&gt;Sudhir Krishnaswamy, Founder, Centre for Law and Policy Research&lt;/li&gt;&lt;li&gt;Naresh Narasimhan, Principal Architect, VA Group&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;11.00 am&lt;/p&gt;
&lt;p&gt;&lt;em&gt;How Can the Government Best Use Designers and Design Thinking?&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;Aditya Dev Sood, CEO, Center for Knowledge Societies (Moderator)&lt;/li&gt;&lt;li&gt;Niels Hansen, Project Manager, MindLab&lt;/li&gt;&lt;li&gt;Aparna Piramal Raje, Design Thinker, Mint&lt;/li&gt;&lt;li&gt;Anant Shah, Program Officer, Bill and Melinda Gates Foundation&lt;/li&gt;&lt;li&gt;Harsh Shrivastava, Consultant (Planning), Planning Commission of India&lt;/li&gt;&lt;li&gt;Kiran Dhingra, Secretary, Ministry of Housing and Urban Poverty Alleviation&lt;/li&gt;&lt;li&gt;Shubhagato Dasgupta, Senior Research Fellow, Centre for Policy Research&lt;/li&gt;&lt;li&gt;Steven Solnik, Member-Government Performance and Accountability, Ford Foundation &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;

12.00 pm&lt;/p&gt;

&lt;p&gt;&lt;em&gt;How can Social / Media Promote Design and Governance Innovation? &lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;
Suresh Venkat, Executive Producer, CNBC TV18 (Moderator)&lt;/li&gt;&lt;li&gt;Vibodh Parthasarthy, Associate Professor, Jamia Milia Islamia&lt;/li&gt;&lt;li&gt;Yatish Rajawat, Editor-in-Chief, Business Bhaskar&lt;/li&gt;&lt;li&gt;R. Sukumar, Editor, Mint&lt;/li&gt;&lt;li&gt;Sashwati Banerjee, Executive Director, Sesame Workshop India&lt;/li&gt;&lt;li&gt;Aditya Mishra, Founder, Headstart Foundation&lt;/li&gt;&lt;/ul&gt;

&lt;p&gt;1.00 pm&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Working and Networking Lunch&lt;/p&gt;
&lt;p&gt;2.00 pm&lt;/p&gt;
&lt;p&gt;Innovation Workshopping Breakout Sessions&lt;/p&gt;
&lt;p&gt;Track One:&amp;nbsp;&lt;/p&gt;



&lt;ol&gt;&lt;li&gt;&lt;em&gt;Conducting Ethnography to Inform the Innovation Process&lt;br /&gt;&lt;/em&gt;
&lt;p&gt;The group is responsible for coming up with an innovative approach 
to curbing power theft in peri-urban locations in India. Many factors 
are responsible for this phenomenon. What questions will you ask and how
 will you collect information on the ground to inform any future 
innovations you might come up with? (Case Study subject to change)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;em&gt;Brainstorming and Concepting in Response to Ethnographic Data&lt;br /&gt;&lt;/em&gt;
&lt;p&gt;The
 group is responsible for conceptualizing a new ways to promote maternal
 and child health using mobile devices. Data on this question has 
already been collected and will be shown to you in the form of a brief 
presentation. You must come up with as many different ideas or concepts 
as possible using post-its. Then you must prioritize these concepts and 
vote on the ones you would like to see implemented. (Case Study subject 
to change)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;em&gt;Approaches to Institutionalizing Innovation in Government&lt;br /&gt;&lt;/em&gt;
&lt;p&gt;This
 group will consider ways and means for accelerating and 
institutionalizing innovation in governance, through for example, the 
provision of knowledge, best practices, support, training, and 
organizational change. Ideas may include, but not be restricted to new 
kinds of handbooks, online sources, academic and applied training and 
other ideas. Approaches should be evaluated and prioritized prior to 
presentation back to the group.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;

&lt;p&gt;4.30 pm&amp;nbsp;&lt;br /&gt;Team Presentations (over tea served at tables)&amp;nbsp;&lt;/p&gt;
&lt;p&gt;5.00 pm&lt;br /&gt;&lt;em&gt;What institutional and organizational models can best foster Governance Innovation?&lt;/em&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Amit Garg, Director, MXV Consulting (Moderator)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Arun Maira, Member, Planning Commission &amp;amp; Member, National Innovation Council&lt;/li&gt;&lt;li&gt;R. Gopalakrishnan, Member Secretary, National Innovation Council&lt;/li&gt;&lt;li&gt;Mohammad Haleem Khan, Director, CAPART&lt;/li&gt;&lt;li&gt;D S Ravindran, CEO, Center of e-Governance, Government of Karnataka&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Aditya Dev Sood, CEO, Center for Knowledge Societies&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Other Notable Discussants and Interactants&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Anil Khachi, Deputy Director General, UIDAI&lt;/li&gt;&lt;li&gt;Narahari Mahato, Member of Parliament, AIFB&lt;/li&gt;&lt;li&gt;N. Cheluvaraya Swamy, Member of Parliament, JD(S)&lt;/li&gt;&lt;li&gt;Syed Azeez Pasha, Member of Parliament, CPI&lt;/li&gt;&lt;li&gt;Moinul Hassan, Member of Parliament, CPM&lt;/li&gt;&lt;li&gt;Amit Garg, Director, MXV Consulting&lt;/li&gt;&lt;li&gt;William Bissell, Managing Director, FabIndia&lt;/li&gt;&lt;li&gt;Kalpana Awasthi, Officer on Special Duty (OSD) to Sam Pitroda&lt;/li&gt;&lt;li&gt;Abhimanyu Kulkarni, Design Director, Philips Design&lt;/li&gt;&lt;li&gt;D. Raja, Member of Parliament, CPI&lt;/li&gt;&lt;li&gt;Josh Glazeroff, Visa Chief, US Embassy&lt;/li&gt;&lt;li&gt;Pooja Sood, Curator and Director, Khoj Foundation&lt;/li&gt;&lt;li&gt;Ravina Agarwal, Program Officer, Ford Foundation&lt;/li&gt;&lt;li&gt;Nita Soans, Advisor, Center for Knowledge Societies&lt;/li&gt;&lt;li&gt;Ekta Ohri, Head of Project Operations, Center for Knowledge Societies&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Individual Participation&lt;/h3&gt;
&lt;p&gt;In order to make each voice count, entry to the conclave will be by arrangement only. Others who are truly interested, should please drop us a few lines on how they would like to contribute and we will be glad to get back in touch.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are no registration fees. However, we would like to see participants take their own initiative in covering their own travel costs and making their own arrangements for stay so far as possible. If specific needs are perceived, please communicate them to the organizers.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Institutional Participation&lt;/h3&gt;
&lt;p&gt;Confederations of industry, associations of management, departments of government and diverse development sector and civil society organizations are invited to express their interest in supporting this event.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Organizers&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Center for Knowledge Societies (CKS)&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Center for Internet and Society (CIS)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Sponsors&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Venkatramanan Associates (VA)&lt;/li&gt;&lt;li&gt;Center for Law and Policy (CLP)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Date and Venue&lt;/strong&gt;&lt;br /&gt;The date for the event has been decided for Friday, the 18th of March, 2011. It will be held at the Taj Vivanta in Central Delhi.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Thought Leadership and Dialogue&lt;br /&gt;&lt;/strong&gt;Dr. Aditya Dev Sood, CEO, Center for Knowledge Societies&lt;br /&gt;aditya@cks.in&lt;/p&gt;
&lt;p&gt;Naresh Narasimhan, Principal, VA Associates &lt;br /&gt;naresh@vagroup.com&lt;/p&gt;
&lt;p&gt;Sudhir Krishnaswamy, Founder, Center for Law and Policy &lt;br /&gt;sudhir.krishnaswamy@ashiralaw.co.in&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Participation Enquiries&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;Sumeet Malhotra, Business Development Manager&lt;br /&gt;sumeet@cks.in&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Download the book &lt;a href="https://cis-india.org/advocacy/openness/design-public.pdf" class="internal-link" title="Design! Public"&gt;here&lt;/a&gt; [PDF, 2.8 MB]&lt;/li&gt;&lt;li&gt;Download the case studies &lt;a href="https://cis-india.org/advocacy/openness/case-studies.pdf" class="internal-link" title="Case Studies"&gt;here&lt;/a&gt; [PDF, 641 KB]&lt;/li&gt;&lt;li&gt;Download the glossary &lt;a href="https://cis-india.org/advocacy/openness/glossary.pdf" class="internal-link" title="Glossary"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/design-public'&gt;https://cis-india.org/events/design-public&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2011-06-03T13:27:22Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
