<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1691 to 1705.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/civic-hackers-in-India"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/privacy-matters"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-workshop-in-santiago-open-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/edict-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/open-standards-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/the-cyborgs/archive-and-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/ideology-and-ict"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/report-digitally-open-innovation-and-open-access-forum-23-oct-2010-doha-qatar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/access-to-knowledge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/october-2010-bulletin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/civic-hackers-in-India">
    <title>Civic hackers seek to find their feet in India</title>
    <link>https://cis-india.org/news/civic-hackers-in-India</link>
    <description>
        &lt;b&gt;In 2006, when Sushant Sinha,who holds a doctorate in Internet security from the University of Michigan, tried to use the Indian government’s judicial rulings website, Judis.nic.in, he found it difficult to get the data he was looking for. “Judis.nic.in didn’t have a good text search or ability to sort results by  relevance,” Sinha said. The lack of these two critical functions rendered the wealth of data on the site largely unusable.&lt;/b&gt;
        
&lt;p&gt;Sinha, who currently works at &lt;strong&gt;Yahoo India&lt;/strong&gt;, set about creating 
the legal search engine Indiankanoon. org, which now has a database of 
more than 1.4 million judgements. It tries to overcome the deficiencies 
of the government’s effort, indexing judgements by the Supreme Court, 
the high courts and various tribunals, and linking them to the 
underlying Acts.&lt;/p&gt;
&lt;p&gt;In November, the portal saw around one million unique visits. Sinha 
is a “civic hacker”, a programmer driven by the urge to create 
applications that will allow fellow citizens to help themselves and 
further the democratic process by using information, often from freely 
available government databases. (A “cracker”, on the other hand, uses 
similar tools to break into secure systems with malicious intent.)&lt;/p&gt;
&lt;p&gt;Nishant Shah, director, research, at the Centre for Internet and 
Society (CIS), Bangalore, offers a wider definition for civic hackers.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“In a Web 2.0 world, you needn’t have programming skills to be a 
civic hacker. When people have access to digital technologies, they are 
potentially civic hackers, because they have learned how to negotiate 
with oppression and injustice. In the West, the ubiquitousness of 
digital technologies has enabled a lot of people to engage with civic 
hacking—from subversive documentaries by the Yes Men group to parodic 
YouTube videos that critique state-market policies— all these qualify as
 civic hacking.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;WikiLeaks, said Shah, is the biggest example of such a civic hacker
 in recent times. “Civic hackers are always in grey territory,” he said.
 “Their legality is always being questioned, depending on how far they 
go. Remember, WikiLeaks was around for five years before they began 
talking about banning it.”&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Much of the online Indian information in the open domain, from the 
government or autonomous bodies such as the Election Commission (EC), 
isn’t always served up such that it can be sliced and diced in ways that
 citizens can digest, making the civic hacker a critical part of the 
democratic process in the digital age.&lt;/p&gt;
&lt;p&gt; A larger presence in the West, they are thin on the ground in the 
country. “Civic hackers, while present (in India), are not numerous, and
 it’s unclear to what extent they are conscious of the work that others 
are doing, although this could be easily remedied through networking 
efforts both online and offline,” according to a report by CIS.&lt;/p&gt;
&lt;div class="pullquote"&gt;One of the reasons for their sparse numbers CIS 
suggests is that the Indian government doesn’t engage yet with the 
hacking community,&lt;/div&gt;
&lt;p&gt;unlike countries such as the US. New York, Washington DC and San 
Francisco, for instance, have portals that share data with the intention
 of encouraging application development.&lt;/p&gt;
&lt;p&gt;The NYC BigApps competition has a cash prize of $20,000 (nearly `9 
lakh) for the best application using the City of New York’s NYC.gov data
 mine. Around 350 data sets including public safety data, buildings 
complaints, and real-time traffic numbers are thrown open to 
participants. In 2009, an application to let New Yorkers findmass 
transit routes, public school information, etc., based on their location
 won the prize.&lt;/p&gt;
&lt;p&gt;Despite the lack of incentives, some hackers are still mushrooming in
 the Indian space. In 2009, just ahead of the April-May general 
election, 25-year-old Akshay Surve, the founder of a think tank for 
social change called SocialSync.org Labs, was building a Web application
 to profile members of Parliament.&lt;/p&gt;
&lt;p&gt;The application was aimed at generating a snapshot of each legislator
 based on the debates they participated in, the number of Parliament 
sessions attended, and other such information that could help voters 
make an informed choice.&lt;/p&gt;
&lt;p&gt;The websites of the EC and the Lok Sabha had much of this data in 
Excel and Adobe PDF documents, but that didn’t necessarily make it 
usable. The formats changed every year, and some files didn’t allow text
 and numbers to be extracted. To build the mashup—an application that 
throws together data from more than one source, mashing everything up to
 create a new service—Surve had to parse and standardize the data.&lt;/p&gt;
&lt;p&gt;Realizing that the problem he faced was not an isolated one, Surve 
and his friend, Pavan Mishra, launched OpenCivic.in this year, a set of 
standards and APIs (application programming interface) that sift data 
from government websites and make them available in a machine-readable, 
remixable format.&lt;/p&gt;
&lt;p&gt;Surve’s API is the primary engine for Askneta.com and Gov-Check.net, 
which track the performance of elected representatives and use 
OpenCivic’s feed. He plans to keep the API free for non-commercial use. 
Now his team is at work to develop a mobile version of the API. Another 
example is RTINation. com, built in August 2009 by a group of graduates 
from the Kanpur and Delhi Indian Institutes of Technology.&lt;/p&gt;
&lt;p&gt;RTINation.com enables the online filing of Right to Information (RTI)
 applications. A 2009 PricewaterhouseCoopers report estimated that more 
than a quarter of those who file RTI applications have to visit a 
government office over three times to do so. RTINation.com generates its
 revenue by charging each user `125 for an application. It is now 
building a backoffice to handle marketing and promotion.&lt;/p&gt;
&lt;p&gt;“Since we launched, we have seen 200,000 unique visitors,” said Rahul
 Gupta, a cofounder of RTINation.com. Most civic hackers in India 
entered the field through work related to various e-governance 
initiatives and the RTI Act, which has put more government data in the 
public domain than ever before. This data, though, is dumped in a format
 that makes it difficult for citizens to use or understand. “Few of the 
publicly accessible databases are open in terms of data reusability (in 
terms of machine-readability and openness of formats), data reusability 
(legally), easily accessible (via search engines, for persons with 
disabilities, etc.), understandable (marked up with annotations&amp;nbsp; and&amp;nbsp; 
etadata),” according to CIS. Here is where civic hackers such as Sinha 
and Surve come in.&lt;/p&gt;
&lt;p&gt;CIS suggests that networking across civic hacking teams could 
strengthen this effort. OpenCivic.in has been proactive in its tie-ups. 
In February, it joined hands with Yes To Politics, a civic participation
 endeavour by Texas-based software engineer Murali M. Launched in 2009, 
Yes To Politics offers tools to help communities work on causes. Among 
these are analytics of previous elections and a tracker of ongoing 
campaigns. During its peak usage in the four weeks leading up to the 
2009 assembly elections in Andhra Pradesh, the website had on an average
 43,000 visitors a day, with a oneday surge of 97,457 visitors on 9 
April that year. Yes To Politics, inactive since last year’s polls, is 
going to launch a new version in January. “Once we do that, we 
contribute our own data feeds to OpenCivic,” said Murali.&lt;/p&gt;
&lt;p&gt;Talking about the challenges, Murali said, “The data sets from the Election Commission’s site were raw and not directly presentable to users. So we had to iteratively transform it and correct (it) on the way and make meaningful sets. It took me almost 
three-and-a-half weeks to get it ready. And when the EC releases any new
 data, they always release in PDF files that are hard to retrieve and 
mashup. So I wrote special apps (applications) to scan files, transform 
data, and automatically correct spelling mistakes in names.” The 
36-year-old software engineer works full-time for Alcatel-Lucent and 
develops the applications when he’s free. Yes To Politics has been 
steadily adding bells and whistles to its portal. Recently, it 
integrated Google Maps into an application called Vote2009, layering it 
with information such as when a constituency is scheduled to have 
elections. “Another example is, due to delimitation, about 77 assembly 
and eight parliamentary constituencies in AP (Andhra Pradesh) have been 
reorganized. We set up a section where users can look at what has 
changed and find their constituency based on mandal and district 
information,” Murali said.&lt;/p&gt;
&lt;p&gt;Read the original article in Livemint &lt;a class="external-link" href="http://epaper.livemint.com/Default.aspx?BMode=100#"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Read it in IndiaInfoline &lt;a class="external-link" href="http://www.indiainfoline.com/Markets/News/Civic-hackers-seek-to-find-their-feet-in-India/5037582858"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/civic-hackers-in-India'&gt;https://cis-india.org/news/civic-hackers-in-India&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-04-04T06:45:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2010-bulletin">
    <title>December 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! It gives us immense pleasure to present regular updates on the progress of our research on the mainstream Internet media. In this issue of we bring our latest project updates, news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Monographs arising from these projects are now online for public review:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pornography &amp;amp; the Law&lt;/b&gt;&lt;br /&gt;This monograph attempts to unravel the relations between pornography, technology and the law in the shifting context of the contemporary. Deadline for review expires on 15 Jan 2011.&lt;a href="http://bit.ly/f1sQsi"&gt;&lt;br /&gt;http://bit.ly/f1sQsi&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Re:wiring Bodies&lt;br /&gt;&lt;/b&gt;Dr. Asha Achutan historicises the attitudes, imaginations and policies that have shaped the Science-Technology debates in India, to particularly address the ways in which emergence of Internet Technologies have shaped notions of gender and body in India. Deadline for review expires on 15 Jan 2011.&lt;a href="http://bit.ly/gYCP1C"&gt;&lt;br /&gt;http://bit.ly/gYCP1C&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Leap of Rhodes or, How India Dealt with the Last Mile Problem — An Inquiry into Technology and Governance&lt;/b&gt;&lt;br /&gt;The project has fed into many different activities in teaching, in examining processes of governance and in looking at user behaviour. The deadline for peer review expires on 15 Jan 2011.&lt;a href="http://bit.ly/iiYJp1"&gt;&lt;br /&gt;http://bit.ly/iiYJp1&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Internet, Society and Space in Indian Cities&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h3lWzS"&gt;From the Stock Market to Neighbourhood Mohalla&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hU6GTL"&gt;Transforming Urbanscapes: ATM in cities&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Queer Histories of the Internet&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hqrjqc"&gt;A Detour: The Internet and Forms of Narration: A Short Note&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS has interest in developing Digital Identities as a core research area and looks at practices, policies and scholarships in the field to explore relationships between Internet, technology and identity.&lt;/p&gt;
&lt;h3&gt;Columns on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following articles were published in the Indian Express recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/ig08Dr"&gt;Make a Wish&lt;/a&gt; [published on 19 December 2010]&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hRHUYu"&gt;Play Station&lt;/a&gt; [published on 5 December 2010]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshop&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The third and final workshop in the Digital Natives with a Cause? research project will take place in Santiago, Chile, from the 8 to 10 February. Open Call and FAQs for the workshop are online:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/emKslL"&gt;Digital Natives with a Cause? Workshop in Santiago – An Open Call&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eCu2it"&gt;Digital Natives with a Cause? Workshop in Santiago – Some FAQs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Publication&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Position papers from the Thinkathon conference held at Hague from 6 to 8 December have been published:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eVYR2h"&gt;Digital Natives with a Cause? Thinkathon: Position Papers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;National Award&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nirmita Narasimhan got a National Award for Empowerment of Persons with Disabilities from the Government of India on 3 December 2010. The award was presented by Smt. Pratibha Patil, President of India under the Role Model category. The event was telecast live on Doordarshan.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fKG9MH"&gt;Nirmita Narasimhan wins National Award&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Conference Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;An international conference on Enabling Access to Education through ICT was held in New Delhi from 27 to 29 October 2010. The full report of the conference is published online:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eDHXyq"&gt;Enabling Access to Education through ICT - Conference Report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://goo.gl/ddMBN"&gt;Accessibility at CIS – Looking back at 2010&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/igUi8H"&gt;G3ict-GW Global Policy Forum: "ICT Accessibility: A New Frontier for Disability Rights"&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Copyright, patents and trademarks are the most important components on the Internet. CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime. Our latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/glBYTS"&gt;Problems Remain with Standing Committee's Report on Copyright Amendments&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/hq9OZO"&gt;CIS Submission on Draft Patent Manual 2010&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software, its latest involvement have yielded these results:&lt;/p&gt;
&lt;h3&gt;Reports&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/eKUKIY"&gt;Call for Comments for Report on the Online Video Environment in India&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://goo.gl/wr8Td"&gt;Call for Comments for Report on Open Government Data in India&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hQAUkg"&gt;Wikipedia Meetup in Bangalore, This time in TERI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a couple of projects, one Privacy in Asia which is supported by Privacy International, UK and the other on Privacy and Identity which is funded by Ford Foundation and managed by the Centre for Study of Culture and Society. The project is a research inquiry into the history of privacy in India and how it shapes the contemporary debates around technology mediated identity projects like &lt;i&gt;Aadhar&lt;/i&gt;.&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hYUmVK"&gt;The Privacy Rights of Whistleblowers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/hcP9lI"&gt;UID &amp;amp; Privacy - A Call for Papers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/esjtL7"&gt;Should Ratan Tata be Afforded the Right to Privacy?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bit.ly/h0Vdz3"&gt;DSCI Information Security Summit 2010 – A Report&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this.&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fNADQo"&gt;Take 'Model T' for Telecom&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/h8TJwF"&gt;An online community platform for people with different needs&lt;/a&gt; (Sify News, 12 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fF3Y6V"&gt;Self-regulation in media and society meet to gain legal perspectives&lt;/a&gt; (Indiantelevision.com, 13 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/e3gZGz"&gt;This Is All India Radia&lt;/a&gt; (Outlook, 6 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gYrF7h"&gt;'Pakistan' hackers target India's top police agency&lt;/a&gt; (Google News, 4 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gBMFzY"&gt;Intellectual Property Rights as seen in a graphic novel&lt;/a&gt; (TimeOut Bengaluru, 1 December 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/fa4qcy"&gt;The Niira Radia Tapes: Scrutinizing the Snoopers&lt;/a&gt; (The Wall Street Journal, 29 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gWEkKw"&gt;Mobile banking set to get a boost from IMPS&lt;/a&gt; (The Hindu, 28 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://bit.ly/gjyNbF"&gt;UID elicits mixed response&lt;/a&gt; (Deccan Herald, 23 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://bit.ly/hcrAd2"&gt;Time to bury e-mail?&lt;/a&gt; (DNA, 21 November 2010)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://www.cis-india.org"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Looking forward to hearing from you. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2010-bulletin'&gt;https://cis-india.org/about/newsletters/december-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-07T11:28:02Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/privacy-matters">
    <title>Privacy matters</title>
    <link>https://cis-india.org/events/privacy-matters</link>
    <description>
        &lt;b&gt;Privacy India invites individuals to attend “Privacy Matters”, a one-day conference on 23 January 2011 at the WB National University of Juridical Sciences (NUJS) Law School in Kolkata.  Privacy India, Society in Action Group and the Centre for Internet &amp; Society have joined hands to organize this.&lt;/b&gt;
        
&lt;p&gt;The conference will focus on discussing the challenges to privacy that India is currently facing. The right to privacy in India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, e.g., the TRAI Act for telephony or RBI Guidelines for Banks, India does not as yet have a &lt;em&gt;horizontal&lt;/em&gt; legislation that deals comprehensively with privacy across all contexts. This lack of uniformity has led to ironically imbalanced results. In India today one has a stronger right to privacy over telephone records than over one’s own medical records.&amp;nbsp; The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. – people who most need to know that sensitive information is protected.&lt;/p&gt;
&lt;p&gt;The emergence of information and communications technologies over the past two decades has radically transformed the speed and costs of access to information. However, this enhanced climate of access to information has been a mixed blessing. Whilst augmenting our access to knowledge, this new networked information economy has also now made it much easier, quicker, and cheaper to gain access to intimate personal information about individuals than ever before. As people expose more and more of their lives to others through the use of social networks, reliance on mobile phones, global trade, etc., there has emerged a heightened risk of privacy violations in India.&amp;nbsp; As privacy continues to be a growing concern for individuals, nations, and the international community, it is critical that India understands and addresses the questions, challenges, implications and dilemmas that violations of privacy pose.&lt;/p&gt;
&lt;h3&gt;Who We Are&lt;/h3&gt;
&lt;p&gt;Privacy India was set up in collaboration with the Centre for Internet &amp;amp; Society (CIS), Bangalore and Society in Action Group (SAG), under the auspices of the international organization ‘Privacy International’.&amp;nbsp; Privacy International is a non-profit group that provides assistance to civil society groups, governments, international and regional bodies and the media and the public in a number of countries (see www.privacyinternational.org).&amp;nbsp; Its Advisory Board is made up of distinguished intellectuals, academicians, thinkers and activists such as Noam Chomsky, the late Harold Pinter, and others, and it has collaborated with organizations such as the American Civil Liberties Union (ACLU).&lt;/p&gt;
&lt;p&gt;Download the &lt;a href="https://cis-india.org/advocacy/igov/privacy-nujs-conference" class="internal-link" title="Privacy Conference at NUJS"&gt;poster&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;" Privacy Matters" Conference Agenda&lt;/h3&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time &lt;br /&gt;&lt;/th&gt;
&lt;th&gt;Item&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10:30 &lt;br /&gt;11:00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Welcome: Rajan Gandhi&lt;br /&gt;a.&amp;nbsp;&amp;nbsp; &amp;nbsp;Who is PI &lt;br /&gt;b.&amp;nbsp;&amp;nbsp; &amp;nbsp;What are our objectives &lt;br /&gt;c.&amp;nbsp;&amp;nbsp; &amp;nbsp;Why is privacy important in India &lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 &lt;br /&gt;11:30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Keynote: Sudhir Krishnaswamy&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30&amp;nbsp; 11:45&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:45 &lt;br /&gt;1:00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Session I: Prashant Iyengar and Elonnai Hickok &lt;br /&gt;a.&amp;nbsp;&amp;nbsp; &amp;nbsp;Personal privacy: Violations and Indian legislation that addresses these violations &lt;br /&gt;
&lt;blockquote&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Case study: Nira Radia and wiretapping &lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
b.&amp;nbsp;&amp;nbsp; &amp;nbsp;Informational privacy: Violations and Indian legislation that addresses these violations &lt;br /&gt;
&lt;blockquote&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Case study: The proposed data protection legislation in India &lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
c.&amp;nbsp;&amp;nbsp; &amp;nbsp;What is the existing vacuum in Indian legislation&amp;nbsp; concerning&amp;nbsp; privacy &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:00&amp;nbsp; &lt;br /&gt;2:00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:00&lt;br /&gt;3:30&lt;/td&gt;
&lt;td&gt;Session II: Prashant Iyengar, Deva Prasad, Amba Kak &lt;br /&gt;a.&amp;nbsp;&amp;nbsp; &amp;nbsp;Identity and privacy: why does it matter &lt;br /&gt;b.&amp;nbsp;&amp;nbsp; &amp;nbsp;International approaches to identity &lt;br /&gt;c.&amp;nbsp;&amp;nbsp; &amp;nbsp;The UID and privacy &amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30 &lt;br /&gt;3:45&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea Break&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:45 &lt;br /&gt;4:30&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Open discussion and opinion sharing&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-nujs-conference" class="internal-link" title="Privacy Conference at NUJS"&gt;VIDEOS&lt;br /&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKkt04A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKkukgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKmo38A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKm4S0A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKn3R8A"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/privacy-matters'&gt;https://cis-india.org/events/privacy-matters&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:22:24Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-workshop-in-santiago-open-call">
    <title>Digital Natives with a Cause? - workshop in Santiago Open Call</title>
    <link>https://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-workshop-in-santiago-open-call</link>
    <description>
        &lt;b&gt;The third and final workshop in the Digital Natives with a Cause? research project will take place in Santiago, Chile, from the 8 to 10 February. An open call for participation follows. &lt;/b&gt;
        &lt;p style="text-align: center; "&gt;An Open Call for Participation&lt;/p&gt;
&lt;p&gt;As  the Internet and digital technologies become more widespread, the world  is shrinking: we are constantly connected to our contexts, our people,  our cultures and our networks. And you, yes YOU are a part of this  change. In fact, as a digital native– someone to whom digital  technologies are central to life – you are directly affecting the lives  of many, sometimes even without knowing about it.&lt;/p&gt;
&lt;p&gt;The &lt;a href="https://cis-india.org/digital-natives/"&gt;Centre for Internet and Society &lt;/a&gt;and &lt;a href="http://www.hivos.nl/english/Knowledge-programme"&gt;Hivos&lt;/a&gt; in collaboration with &lt;a href="http://rising.globalvoicesonline.org/"&gt;Rising Voices&lt;/a&gt; is calling out to young users of technology to join a global  conversation. The 3-day workshop titled “From Face to Interface” will  focus on how youth utilize new platforms, media and spaces of  communication and expression in the digital age. If you have used  digital technologies to make your voice heard, to express your opinion  in creative ways or to create new knowledge online, we want to hear from  you. These can be stories where you have used a mobile phone, GPS or  PDA to access the Internet and reduce the online-offline divide, stories  where you accessed interactive platforms like user-generated content  websites, stories where the use of technology has become part of your  identity, or stories where you have been part of a collaborative method  of research, production, shared learning process, participation network  etc.&lt;/p&gt;
&lt;p&gt;We  invite you to share your perspectives in an informal conversation along  people with similar approaches from neighboring communities. The  workshop is open to applicants from, in and around Latin America and the Caribbean  who are interested in an interactive and engaging dialogue that marks  the beginning of the “Digital Natives with a Cause?” research inquiry  into the region. “From Face to Interface” is part of a greater  international research project with aims to produce a book in the  English language, consolidating Digital Natives knowledge from the  Global South. Moreover, the workshop aims at building a Knowledge  Network in collaboration with the other participants and partners at  previous workshops in &lt;a href="http://www.digitalnatives.in/"&gt;Taipei and Johannesburg&lt;/a&gt;.  Hence, a good working knowledge of English is necessary. This workshop  will include the organizers based in India and the Netherlands, and  participants will also come from countries where Spanish is not the  primary language. Hence, a good working knowledge of English is  necessary.Communication during the workshop will be English with Spanish  language translations made available in selected parts of the workshop.&lt;/p&gt;
&lt;p&gt;Participants can register by filling in an online &lt;a href="http://www.surveymonkey.com/s/fromfacetointerface"&gt;application&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;form by January 4th, 2011.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Selected  participants will be contacted by 8th January 2011. Travel expenses and  accommodation will be provided to the selected participants.  For more information do check out the frequently asked questions (FAQ) &lt;a href="https://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-workshop-in-santiago" class="external-link"&gt;here&lt;/a&gt;. For any questions, concerns or comments please contact &lt;a href="mailto:digitalnatives@cis-india.org"&gt;digitalnatives@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;.&lt;/p&gt;
&lt;p&gt;Dates:  February 8-10th, 2011&lt;/p&gt;
&lt;p&gt;Venue: Central Library of Chile, Santiago, Chile&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-workshop-in-santiago-open-call'&gt;https://cis-india.org/digital-natives/blog/digital-natives-with-a-cause-workshop-in-santiago-open-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tettner</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-09-22T11:40:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/edict-report">
    <title>Enabling Access to Education through ICT - Conference Report</title>
    <link>https://cis-india.org/accessibility/blog/edict-report</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS), Bangalore in cooperation G3ict, UNESCO, ITU, WIPO, The Deafway Foundation, DEF and SPACE with the gracious support of The Hans Foundation and the Department of Information Technology, MICT, New Delhi organized an international conference "Enabling Access to Education through ICT" in New Delhi from 27 to 29 October 2010. The event was sponsored by Hans Foundation.&lt;/b&gt;
        &lt;h2&gt;Background&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Persons with disabilities in India are often left out of mainstream schools and universities due to a variety of reasons, primarily the lack of awareness amongst educational organizations and teachers, near absence of infrastructural resources and lack of training in this regard. It is believed that barely two per cent of the 70 million disabled persons have access to education in India. Unless we take special efforts to remedy this situation by equipping teachers, educational institutions and the entire social infrastructure to adopt innovative, cost effective and technology based resources such as assistive technologies, ubiquitous Web, multiple platforms, social networks, online libraries and digital resources etc, they will continue to remain excluded from social participation.&lt;/p&gt;
&lt;h2&gt;Conference&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Edict.png" alt="Edict 2010" class="image-inline" title="Edict 2010" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Given above is a picture of the speakers from the Edict 2010 event in Delhi.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Edict 2010 was organised by the Centre for Internet and Society, in collaboration with G3ict, UNESCO, ITU, WIPO, The Deafway Foundation, DEF and SPACE with the gracious support of The Hans Foundation and the Department of Information Technology, MICT, New Delhi. The main aim was to highlight existing policy and practical barriers for students and educational institutions in developing countries, showcase ICT based solutions which are presently being adopted around the world and point to existing knowledge resources and emerging trends in education. The conference focused on enabling education at all levels: primary, secondary, tertiary and distance education and vocational training. The success of the conference was characterised by the fact that it brought together a wide range of stakeholders, including industry, special and mainstream educators, disability organisations, policymakers from the ministries of education (MHRD) and information technology (DIT), Technology developers and researchers, librarians and persons with disabilities, from several countries like India, USA, Switzerland, Japan, Nepal and Bangladesh, who were all experts with vast experience. Consequently, the sessions were extremely interactive, with a lot of inputs from the participants and it was commonly acknowledged that the sharing of information and learning was equal for both participants and speakers. The break out sessions resulted in a lot of recommendations and insightful observations from the four groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference was inaugurated by Smt. Vibha Puri Das, Secretary, Department of Higher Education, Ministry of Human Resource Development. Other special guests were Dr.Indrajit Banerjee, Director, Information and Communications sector, UNESCO and Mr. Andrew Tru from WIPO. Smt. Das released the first copy of the book, ‘E-Accessibility Handbook for Persons with Disabilities’, a book based on the G3ict-ITU on line e-Accessibility Toolkit for Policy makers, which was edited and published by CIS. Dr. Banerjee received the first copy. Smt. Das delivered the key note address; she outlined the situation with respect to education of persons with disabilities in India and highlighted some of the initiatives of the Ministry of Human Resource and Development. She especially drew attention to the NMEICT project of the MHRD, which is a huge fund for supporting initiatives which used ICT to promote Education through ICT. Till now, NMEICT has funded one disability related project for conversion of college level textbooks into daisy format in four languages. The project is being undertaken by IIT Calcutta. She concluded by inviting all persons and organisations present in the conference to apply to the fund for specific projects and said that the ministry would be happy to look at proposals for promoting education for persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key note address was followed by remarks from Dr. Banerjee, who gave an outline of UNESCO’s initiatives around the world on education and underscored the importance of attaining the Millennium Development Goal of Education for all for all developing countries and UNESCO’s commitment to support countries in their efforts to do so. Mr.Andrew Tru talked about WIPO’s commitment towards securing access to reading materials for persons with print disabilities in accessible formats around the world and focused on the deliberations on a treaty for the print impaired at WIPO, with special emphasis on the Stakeholders’ Platform initiative of WIPO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The conference started off with welcome note from the organisers CIS, G3ict, UNESCO, ITU and WIPO. Smt. Vibha Puri Das, Secretary, Higher Education, Ministry of Human Resource and Development gave the key note address and released the &lt;a href="https://cis-india.org/advocacy/accessibility/blog/e-accessibility-handbook" class="external-link"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt;, brought out by CIS in collaboration with G3ict and ITU and sponsored by Hans Foundation. The handbook will help regulators around the world in their policy making.  Dr. Indrajit Banerjee, Director, UNESCO gave the introductory remarks. This followed by a presentation of Axel Leblois, Executive Director G3ict, on the dispositions of the UNCRPD relating to digital accessibility.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the three days, there were presentations from 29 experts on a variety of topics, ranging from discussing challenges and solutions in educational institutions, to technology development and policy formulation and implementation. The profiles of the speakers are given in Annexure A. The conference was attended by 77 participants and was also attended by a large number of participants from other conferences taking place in the hotel from time to time. The list of the 77 participants is given as Annexure B.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The conference was highly engaging and enabled the attendees to explore the challenges and opportunities and equipped them with the tools needed to implement ICT solutions within their organizations. There was a very high level of expertise amongst educators in the conference which was apparent from the discussions, there were persons who talked about education for the blind, deaf, persons with mental disabilities etc with great authority and put forward insightful perspectives. From a technology standpoint, there was a notion that broadband which was at present not easily available was about to explode because of the huge investment that the government was putting into it and hence it was possible that all the solutions which were being discussed in the conference would be more easily available to persons with disabilities uniformly around the country. There are many opportunities to leapfrog in India. In fact, many speakers considered cloud based technologies being adopted in school systems where there was broadband infrastructure available. There was a common consensus amongst all members present in the conference that universal accessibility could only be achieved with the involvement of all stakeholders; public-private partnership is key to ensuring that all private services and technology solutions are also accessible to persons with disabilities. Participants were very impressed with the innovative teaching methods and technologies in other countries, especially in Japan.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Part.png" alt="Participants at Edict" class="image-inline" title="Participants at Edict" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above is a group photo of the participants at the Edict Conference&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;General Recommendations&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Calls for proposals for funding projects should be widely publicized: It was a common feeling of all the participants that even though there were several funds which could be tapped into for projects, there was little information about where these funds existed, how they could be applied for and used to fund different kinds of projects. Government should make some effort to ensure that information about funding opportunities should reach intended beneficiaries.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accessibility should be integrated into existing education projects: While it is important to initiate specific accessibility related projects, it is equally necessary to integrate accessibility into existing projects such as introducing creation and distribution of accessible content in existing ICT school programmes. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Focus to be given to training students with disabilities: all the groups felt that training was a huge issue and that support for students through training was required. SSA Karnataka gave a good presentation showing how it addressed the issue of training on a large scale. The groups highlighted that the UNCRPD placed an obligation on the government to raise awareness amongst persons with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Priority attention should be given to the development of language based tools for all Indian languages, especially minority languages. This includes development of optical character recognition (OCR) and text to speech (TTS) software in different languages. This is critical for all levels and forms of education. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Access to broadband services for persons with disabilities at affordable prices to be promoted to enable effective use of technology to access educational content.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Need to create accessible content and accessible open resources: It was stressed that all study modules used by educators, and open educational resources must be in accessible formats in order to have the widest outreach to students. Cyndi Rowland gave an example where Federal grants would not go to programmes which created non accessible content.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Public procurement should be used to promote accessibility.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Government should focus on early intervention in education because very few disabled children actually enrolled in schools and even amongst those that enrol, a very miniscule percentage go on to complete secondary and higher education.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Need to have a well developed ecosystem: All schools must be equipped with resources to teach disabled children. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Solutions and teaching methods must be innovative and highly individualised. Common approaches to teaching disabled children are less likely to be successful.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Periodic and on going trainings must be given to field practitioners with special emphasis on sharing information about solutions which have been successful or failed in the past.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Specific Recommendations&lt;/h3&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Training colleges for educators should include a course on disabilities and education for students with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Children with disabilities in CBSE, ICSE and all state boards should get at least three years to complete class 10th and 12th examinations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Children with disabilities should be allowed to give examinations with computers and in formats of their choice.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Each child with a disability should get compulsory training in the use of computers using appropriate assistive technology and be provided these technologies free of cost or at subsidised rates. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The government should launch a mandatory ICT training programme for all teachers in rural and urban areas to train them in the use of assistive technologies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Course materials for all classes should be provided in CDs and accessible formats in all schools for children with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;NMEICT should fund development of text to speech software in all Indian languages so that the vast majority of Indian children who cannot read or understand English can continue to study in their native language; it is strongly recommended that such development projects also be entrusted to companies and organisations directly who have expertise in this area and should not be conditional on working with an IIT, IISC or other similar institution. The NMEICT should also fund other projects for the disabled, such as for content creation and so on. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;It is recommended that the Digital Library project, which is a praiseworthy and extremely important project for creating open resources to all existing regional and English books should be made accessible since it has the potential to benefit a very large number of persons with disabilities. At the moment, the project involves all the steps which are required to create accessible books, i.e., scanning and OCRing, however, despite the fact that OCR is done, the books are still uploaded as image files and not as accessible word or text or html files which can be read using screen readers. If this was done and we had access to TTS in Indian languages, we would have access to all the traditional Indian literature and manuscripts, which are invaluable to a researcher.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;It is strongly recommended that the web sites of all educational institutions, both public and private should be made accessible so that persons using screen readers can access information about the courses, admissions, read about the organisations and apply on line for admissions. It is also recommended that persons with disabilities should be given the flexibility to take on line examinations and that these should be designed in an accessible manner.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;It is recommended that all educational institutions and libraries should be made physically accessible for persons using wheelchairs.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;What our Speakers and Partners Had to Say&lt;/h3&gt;
&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div style="text-align: justify; "&gt;"G3ict was most pleased to organize this very effective workshop with CIS: all stakeholders required to implement the dispositions of the Convention on the Rights of Persons with Disabilities in matters of accessible and assistive technologies in Education actively participated.  Disabled Persons Organizations, governments, industry, schools, universities administrators and educators engaged in a very dynamic and practical exchange of experience which created a great learning opportunity for all participants.  It also demonstrated that solutions, funding and expertise can be leveraged in India to leapfrog current implementation methods for accessible and assistive technologies.  Many participants look forward to build on the momentum of the workshop to develop an ongoing national forum on accessible and assistive ICTs in education.  It was clear from the discussions held with government officials that private-public cooperation including industry, education institutions and government agencies are likely to emerge as a result of this dialogue.  A most inspiring workshop, among the most successful that G3ict has been involved with in terms of engaging key ICT accessibility stakeholders at a national level."&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;&lt;b&gt;Axel Leblois&lt;/b&gt;&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div style="text-align: justify; "&gt;"There is an urgent need to teach disability studies in India across all levels of school and university. Ignorance and discrimination are so high that even the media does not attempt to mask its poor and misinformed portrayal of disabled people. This conference has started a welcome conversation in that direction."&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;&lt;b&gt;Joyojit&lt;/b&gt;&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div style="text-align: justify; "&gt;"This meeting brought together an amazing array of individuals that included those with disabilities, those in education, those in Ministry positions, and experts from India and abroad.  The energy was palpable and the work that began at this meeting will be felt throughout India for years to come. It is clear that this will be the first of many transformative meetings sponsored by CIS."&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div class="pullquote"&gt;
&lt;ul&gt;
&lt;p&gt;For the presentations, &lt;a href="https://cis-india.org/events/education-through-ICT" class="external-link"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Download the agenda and bios &lt;a href="https://cis-india.org/advocacy/edict-workshop-report" class="internal-link" title="Edict 2010 Report"&gt;here&lt;/a&gt; [Word, 609 kb]&lt;/p&gt;
&lt;/ul&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/edict-report'&gt;https://cis-india.org/accessibility/blog/edict-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2013-01-28T10:14:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2010-bulletin">
    <title>November 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/november-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The internet’s new billion: New web users — in countries like Brazil and China — are changing the culture of the internet.&lt;a href="http://bit.ly/hKUb5n" target="_blank"&gt;&lt;br /&gt;http://bit.ly/hKUb5n&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;‘Piracy is now a mainstream political phenomenon': “Piracy has become a mainstream political phenomenon,” said Sunil Abraham, executive director of the Centre for Internet and Society in the city. The piracy that he was referring to was not the piracy of the high seas but the piracy of intellectual property.&lt;a href="http://bit.ly/gMC1Br" target="_blank"&gt;&lt;br /&gt;http://bit.ly/gMC1Br&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Open standards policy in India: A long, but successful journey: Last week, India became another major country to join the growing, global open standards movement. After three years of intense debate and discussion, India's Department of IT in India finalized its Policy on Open Standards for e-Governance, joining the ranks of emerging economies like Brazil, South Africa and others. This is a historic moment and India's Department of Information Technology (DIT) deserves congratulations for approving a policy that will ensure the long-term preservation of India's e-government data.&lt;a href="http://bit.ly/dGo6Qo" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dGo6Qo&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Information, the world's new capital - Digital Natives: Information is the new capital and currency of the world, Nishant Shah, of the India-based Digital Natives with a Cause, told Bizcommunity.com yesterday, 10 November 2010, as the three-day workshop on digital and internet technologies that brought together young delegates from nine African countries ended in Johannesburg, South Africa. "If the 20th century was the age of the industrial revolution, the 21st century is now actually the age of the knowledge information," Shah said.&lt;a href="http://bit.ly/dpXIKY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dpXIKY&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;What it means to be a child today: They move seamlessly between reality and virtual reality. The digital landscape they inhabit comprises generations — not of family — but of technology such as Web 2.0, 3G, PS4 and iPhone5. Their world has moved beyond their neighbourhood, school and childhood friends to encompass a 500-channel television universe, the global gaming village, the endless internet. These are the children born in the last decade and half — possibly the first generation that has never known a world without hi-tech.&lt;a href="http://bit.ly/cz3nBJ" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cz3nBJ&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Report: Digitally Open: Innovation and Open Access Forum, 23 Oct 2010, Doha, Qatar: A summary of the event "Digitally Open: Innovation and Open Access Forum" held in Doha.&lt;a href="http://bit.ly/catHoi" target="_blank"&gt;&lt;br /&gt;http://bit.ly/catHoi&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;DOC 2.0: A Resources Sharing Mela by NGO Documentation Centres: A Resource Sharing Mela and Meet of DCM (Document Centres Meet) at the Centre for Education &amp;amp; Documentation in Domlur, Bangalore.&lt;a href="http://bit.ly/dnwQMf" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dnwQMf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Wi-Fi Direct promises range, bandwidth higher than Bluetooth: Sharing, printing and connecting for Wi-Fi devices is going to be more convenient than ever with soon-to-be-launched technology Wi-Fi Direct, which enables devices to connect to each other without a conventional Wi-Fi hub. This article by Ramkumar Iyer was published in the Hindu on 31 October 2010.&lt;a href="http://bit.ly/aUul9f" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aUul9f&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Access to Knowledge in the Age of Intellectual Property: Access to Knowledge in the Age of Intellectual Property charts the rise of the access to knowledge movement, a movement in which Open Society Foundations have played a key role. It maps the vast terrain of legal, cultural, and technical issues that activists and thinkers aligned to the movement negotiate every day.&lt;a href="http://bit.ly/9nkQFM" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9nkQFM&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Social Mashup!: Save the Date Join us to meet India’s most passionate, innovative, and curious start-up social entrepreneurs for two groundbreaking days of conversations, connections and inspiration. This event will be held on 2-3 December 2010 at the Indian School of Business in Hyderabad.&lt;a href="http://bit.ly/bKKcar" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bKKcar&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Digitally Open: Innovation and Open Access Forum: Promoting Openness in Today's Digital World&lt;a href="http://bit.ly/961Ieg" target="_blank"&gt;&lt;br /&gt;http://bit.ly/961Ieg&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Crisis for identity or identity crisis?: The hurry with which the government is pushing its most ambitious project to assign a number (UID) to every citizen without any feasibility study or public debate has raised many questions. &lt;a href="http://bit.ly/8Zt9mf" target="_blank"&gt;http://bit.ly/8Zt9mf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Identity, Identification and Media Representation in Video Game Play: An Audience Reception Study: Adrienne Shaw from the Annenberg School of communications, who is a visiting fellow at MICA is giving a public talk on research on representation in video games on 27 November 2010 at the Centre for Internet and Society in Bangalore.&lt;a href="http://bit.ly/909xkU" target="_blank"&gt;&lt;br /&gt;http://bit.ly/909xkU&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;My Bubble, My Space, My Voice Workshop - Perspective and Future&lt;br /&gt;The second workshop for the “Digital Natives with a Cause?” research project named “My Bubble, My Space, My Voice” took place at the Link Center of Wits University, in Johannesburg, South Africa from 6 November 2010 to 9 November 2010. Samuel Tettner, Digital Natives Co-cordinator shares his perspective on the workshop.&lt;a href="http://bit.ly/bPX6Xd" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bPX6Xd&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Archive and Access: Call for Review&lt;br /&gt;The Archive and Access research project by Rochelle Pinto, Aparna Balachandran and Abhijit Bhattacharya is a part of the Researchers @ Work Programme at the Centre for Internet and Society, Bangalore. The project that attempts to look at the ways in which the notion of the archive, the role of the archivist and the relationship between the state and private archives that has undergone a transition with the emergence of Internet technologies in India has been put up for public review. &lt;a href="http://bit.ly/d4o809" target="_blank"&gt;http://bit.ly/d4o809&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Just Where We Like It&lt;br /&gt;The micro space for status updates might become the new public space for discussion. Nishant Shah's column on Digital Natives was published in the Sunday Eye of the Indian Express on 21 November 2010.&lt;a href="http://bit.ly/96cK8q" target="_blank"&gt;&lt;br /&gt;http://bit.ly/96cK8q&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Taking It to the Streets&lt;br /&gt;The previous posts in the Beyond the Digital series have discussed the distinct ways in which young people today are thinking about their activism. The fourth post elaborates further on how this is translated into practice by sharing the experience of a Blank Noise street intervention: Y ARE U LOOKING AT ME?&lt;a href="http://bit.ly/ciyiiR" target="_blank"&gt;&lt;br /&gt;http://bit.ly/ciyiiR&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Talking Back without "Talking Back"&lt;br /&gt;The activism of digital natives is often considered different from previous generations because of the methods and tools they use. However, reflecting on my conversations with The Blank Noise Project and my experience in the ‘Digital Natives Talking Back’ workshop in Taipei, the difference goes beyond the method and can be spotted at the analytical level – how young people today are thinking about their activism.&lt;a href="http://bit.ly/bHAvDE" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bHAvDE&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The 'Beyond the Digital' Directory&lt;br /&gt;For the past few months, Maesy Angelina has been sharing the insights gained from her research with Blank Noise on the activism of digital natives. The ‘Beyond the Digital’ directory offers a list of the posts on the research based on the order of its publication.&lt;a href="http://bit.ly/b3TK3C" target="_blank"&gt;&lt;br /&gt;http://bit.ly/b3TK3C&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;First Thing First&lt;br /&gt;Studies often focus on how digital natives do their activism in identifying the characteristics of youth digital activism and dedicate little attention to what the activism is about. The second blog post in the Beyond the Digital series reverses this trend and explores how the Blank Noise Project articulates the issue it addresses: street sexual harassment.  &lt;a href="http://bit.ly/cM1HFf" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cM1HFf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Change has come to all of us&lt;br /&gt;The general focus on a digital generational divide makes us believe that generations are separated by the digital axis, and that the gap is widening. There is a growing anxiety voiced by an older generation that the digital natives they encounter — in their homes, schools and universities and at workplaces — are a new breed with an entirely different set of vocabularies and lifestyles which are unintelligible and inaccessible. It is time we started pushing the boundaries of what it means to be a digital native.&lt;a href="http://bit.ly/9J82YY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9J82YY&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;br /&gt;The Centre for Internet and Society is proud to announce the launch of its first publication, the “e-Accessibility Policy Handbook for Persons with Disabilities" in collaboration with the G3ict (Global Initiative for Inclusive Information Communication Technologies) and ITU (International Telecommunications Union), and sponsored by the Hans Foundation. The handbook is compiled and edited by Nirmita Narasimhan. Dr. Hamadoun I. Toure, Secretary-General, International Telecommunication Union has written the preface, Dr. Sami Al-Basheer, Director, ITU-D has written the introduction and Axel Leblois, Executive Director, G3ict has written the foreword.&lt;a href="http://bit.ly/gfKNYO" target="_blank"&gt;&lt;br /&gt;http://bit.ly/gfKNYO&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Statement of CIS on the Work of the Committee in the 21st SCCR&lt;br /&gt;The twenty-first session of the Standing Committee on Copyright and Related Rights was held in Geneva from 8 to 12 November 2010. Nirmita Narasimhan attended the conference and represented the Centre for Internet and Society.&lt;a href="http://bit.ly/fJVNPI" target="_blank"&gt;&lt;br /&gt;http://bit.ly/fJVNPI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;We’ve All Got Some Baggage&lt;br /&gt;America’s newest trade agreement is not going to kill only iPods. The article appeared in the Tehelka Magazine Vol 7, Issue 45, Dated November 13, 2010 &lt;a href="http://bit.ly/cVrpWd" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cVrpWd&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Consumer Privacy - How to Enforce an Effective Protective Regime?&lt;br /&gt;In a typical sense, when people think of themselves as consumers, they just think about what they purchase, how they purchase and how they use their purchase. But while doing this exercise we are always exchanging personally identifiable information, and thus our privacy is always at risk. In this blog post, Elonnai Hickok and Prashant Iyengar through a series of questions look through the whole concept of consumer privacy at the national and international levels. By placing a special emphasis on Indian context, this post details the potential avenues of consumer privacy in India and states the important elements that should be kept in mind when trying to find at an effective protective regime for consumer privacy.&lt;a href="http://bit.ly/eEs5Qx" target="_blank"&gt;&lt;br /&gt;http://bit.ly/eEs5Qx&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS Responds to Privacy Approach Paper&lt;br /&gt;A group of officers was created to develop a framework for a privacy legislation that would balance the need for privacy protection, security, sectoral interests, and respond to the domain legislation on the subject. Shri Rahul Matthan of Tri Legal Services prepared an approach paper for the legal framework for a proposed legislation on privacy. The approach paper is now being circulated for seeking opinions of the group of officers and is also being placed on the website of the Department of Personnel and Training for seeking public views on the subject. The Privacy India team at CIS responded to the approach paper and has called for the need for a more detailed study of statutory enforcement models and mechanisms in the creation of privacy legislation.&lt;a href="http://bit.ly/eVTwVC" target="_blank"&gt;&lt;br /&gt;http://bit.ly/eVTwVC&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Privacy and Banking: Do Indian Banking Standards Provide Enough Privacy Protection&lt;br /&gt;Banking is one of the most risky sectors as far as privacy is concerned due to the highly sensitive and personal nature of information which is often exchanged, recorded and retained. Although India has RBI guidelines and legislations to protect data, this blog post looks at the extent of those protections, and what are the areas that still need to be addressed.&lt;a href="http://bit.ly/flq09V" target="_blank"&gt;&lt;br /&gt;http://bit.ly/flq09V&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Privacy and Telecommunications: Do We Have the Safeguards?&lt;br /&gt;All of you often come across unsolicited and annoying telemarketing calls/ SMS's, prank calls, pestering calls for payment, etc. Do we have any safeguards against them? This blog post takes a look at the various rules and regulations under Indian law to guard our privacy and confidentiality.&lt;a href="http://bit.ly/hnTwKp" target="_blank"&gt;&lt;br /&gt;http://bit.ly/hnTwKp&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Privacy, Free/Open Source, and the Cloud&lt;br /&gt;A look into the questions that arise in concern to privacy and cloud computing, and how open source plays into the picture.&lt;a href="http://bit.ly/awpCyF" target="_blank"&gt;&lt;br /&gt;http://bit.ly/awpCyF&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Privacy Concerns in Whole Body Imaging: A Few Questions&lt;br /&gt;Security versus Privacy...it is a question that the world is facing today when it comes to using the Whole Body Imaging technology to screen a traveller visually in airports and other places. By giving real life examples from different parts of the world Elonnai Hickok points out that even if the Government of India eventually decides to advocate the tight security measures with some restrictions then such measures need to balanced against concerns raised for personal freedom. She further argues that privacy is not just data protection but something which must be viewed holistically and contextually when assessing new policies.&lt;a href="http://bit.ly/9rvQPt" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9rvQPt&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;American Bar Association Online Privacy Conference: A Report&lt;br /&gt;On 10 November 2010, I attended an American Bar Association online conference on 'Regulating Privacy Across Borders in the Digital Age: An Emerging Global Consensus or Vive la Difference'. The panelists addressed many important global privacy challenges and spoke about the changes the EU directive is looking to take.  &lt;a href="http://bit.ly/dy41zc" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dy41zc&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;3G Life&lt;br /&gt;You can video chat, stream music and watch TV on your phone. Offering high-speed internet access, 3G would change the world of mobile computing. Nishant Shah's article was published in the Indian Express on 14 November 2010.&lt;a href="http://bit.ly/gyxaW2" target="_blank"&gt;&lt;br /&gt;http://bit.ly/gyxaW2&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Ideology and ICT Policies&lt;br /&gt;For better policies, decision-makers need to know their own and others’ biases, and consider what others are doing, writes Shyam Ponappa in an article published in the Business Standard on 4 November 2010. &lt;a href="http://bit.ly/dbl3Ai" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dbl3Ai&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Looking forward to your feedback. Please feel free to write to us for any queries or details required. If you do not wish to receive these emails, please do write to us and we will unsubscribe your mail ID from the mailing list.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2010-bulletin'&gt;https://cis-india.org/about/newsletters/november-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-08-07T11:46:10Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/open-standards-policy">
    <title>Open standards policy in India: A long, but successful journey</title>
    <link>https://cis-india.org/news/open-standards-policy</link>
    <description>
        &lt;b&gt;Last week, India became another major country to join the growing, global open standards movement. After three years of intense debate and discussion, India's Department of IT in India finalized its Policy on Open Standards for e-Governance, joining the ranks of emerging economies like Brazil, South Africa and others. This is a historic moment and India's Department of Information Technology (DIT) deserves congratulations for approving a policy that will ensure the long-term preservation of India's e-government data.&lt;/b&gt;
        
&lt;p&gt;A major victory for the Open Source community is that the policy now says, "4.1.2 The Patent claims necessary to implement the Identified Standard shall be made available on a Royalty-Free basis for the life time of the Standard."&lt;/p&gt;
&lt;p&gt;This victory is really important to the open source community because open source and open standards have a symbiotic relationship. While open source is the freedom to modify, share and redistribute software source code, open standards refer to the freedom to encode and decode data and network protocols. One freedom without the other is a limited freedom.&lt;/p&gt;
&lt;p&gt;In the Indian policy, proprietary software vendors wanted to define open standards in such a way that even royalty-based standards would be included. Due to stiff opposition from the free and open source software community, Civil Society Organizations (CSOs), academia and others, this proposal was rolled back.&lt;/p&gt;
&lt;p&gt;Under the National e-Government Action Plan, the Indian government is spending more than 10 billion dollars on e-governance. Some of the largest greenfield e-governance projects are in India. For example, one project aims to give a unique ID to more than 700 million Indians. Given the scale and scope of e-governance in India, the storage, archival and retrieval of e-governance data is a critical state responsibility. The standards selected by India also have global implications because the sheer volumes of usage in India, could make those standards the most popular standards in the world.&lt;/p&gt;
&lt;p&gt;It must be remembered that while software changes every few years, the underlying data (birth and death records, census data, tax data etc.) is fairly static and might have to be preserved for centuries. If the government stores its data in a closed format, it could permanently lose access to that data if the owner of that format goes out of business or refuses to provide access to that format. If the government stores its data in proprietary formats that require royalty payments, the negotiation power of the vendor goes up as more and more data is stored in that proprietary format; a situation that no sovereign power should tolerate.&lt;/p&gt;
&lt;p&gt;The Indian policy also states that a single open standard will be used for e-governance. This clause is also extremely important. For example, if a Central Government Ministry requests a certain set of information from state governments in India, and each state government submits the data in a different format, enormous amounts of time will be wasted in converting the data into a common format. There is also risk that data could be lost in the process of converting data from one format to another. Therefore, the usage of a single, open standard for an application area is the backbone that will unify these applications and enable the sharing of data across different applications. This will drive more efficiency in e-governance enabling policy makers and e-government practitioners to quickly pull together data from different government departments and take more informed decisions.&lt;/p&gt;
&lt;p&gt;It was a very tough fight and the proprietary vendors used their market clout and strong field presence in their attempts to subvert open standards. For example, in the previous draft policy dated 25/11/2009, the wordings of the key section read,&lt;/p&gt;
&lt;p&gt;"4.1.2 The essential patent claims necessary to implement the Identified Standard should preferably be available on a Royalty-Free (no payment and no restrictions) basis for the life time of the standard. However, if such Standards are not found feasible and in the wider public interest, then RF on Fair, Reasonable and Non Discriminatory terms and conditions (FRAND) or Reasonable and Non Discriminatory terms and conditions (RAND) could be considered."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://blogs.computerworlduk.com/open-enterprise/2010/11/a-great-indian-takeaway/index.htm"&gt;Commenting on the final policy&lt;/a&gt;, veteran journalist, Glyn Moody said, “As you can see, there is no room for doubt here, no quibbling with 'RF on Fair, Reasonable and Non Discriminatory terms and conditions (FRAND)' or 'Reasonable and Non Discriminatory terms and conditions (RAND)' as the earlier version suggested: just a clear and simple 'Royalty-Free basis for the life time of the Standard'.”&lt;/p&gt;
&lt;p&gt;So how did the Free and Open Source Software (FOSS) community succeed against tremendous odds? Some key actions that helped us succeed are:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp; 1. We worked long and hard to educate the&amp;nbsp; public and the media. At first, some journalists shied away from writing on this subject because they found it too arcane and complex. It took over six months of talking to mediapersons before one of the mainstream publications carried an article on open standards. Once that happened, the dam broke and other publications also started to write about this “arcane” subject.&lt;br /&gt;&amp;nbsp;&amp;nbsp; 2. The academic community, especially in the prestigious Indian academic institutions, were very supportive of open standards. Many academicians have influential positions on government committees and their support helped.&lt;br /&gt;&amp;nbsp;&amp;nbsp; 3. India has a very vibrant set of Civil Society Organizations. The FOSS community worked with leading CSOs like IT For Change, Center for Internet and Society, Knowledge Commons and others that are founded by people who have tremendous experience in working on technology policy issues. A loose-knit coalition was formed under the title of FOSSCOMM and some excellent &lt;a class="external-link" href="http://fosscomm.in/OpenStandards"&gt;representations&lt;/a&gt; were made to the Indian government.&lt;br /&gt;&amp;nbsp;&amp;nbsp; 4. Many sections within government itself were firmly in favor of open standards and the community worked closely with them.&lt;br /&gt;&amp;nbsp;&amp;nbsp; 5. The community made common cause with sections of industry that supported open standards. This helped counter the pressure from industry associations that were supporting proprietary standards.&lt;/p&gt;
&lt;p&gt;It was a long but extremely rewarding issue to be involved in and I am documenting this in the hope that other countries can benefit from the experiences we gained in fighting for open standards in India.&amp;nbsp; Jai Ho! (May you be victorious!)&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://opensource.com/government/10/11/open-standards-policy-india-long-successful-journey"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/open-standards-policy'&gt;https://cis-india.org/news/open-standards-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-04-02T07:40:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications">
    <title>Privacy and Telecommunications: Do We Have the Safeguards? </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications</link>
    <description>
        &lt;b&gt;All of you often come across unsolicited and annoying telemarketing calls/ SMS's, prank calls,  pestering calls for payment, etc. Do we have any safeguards against them? This blog post takes a look at the various rules and regulations under Indian law to guard our privacy and confidentiality.&lt;/b&gt;
        
&lt;h2&gt;1 Introduction&amp;nbsp; &lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;With a subscriber base that stands at just over 700 million (TRAI, August 2010) the telecom industry has enjoyed spectacular success at absorbing Indians into its fold. Tele-density which, even as recently as in 2002 was stagnant in the low single-digits, today stands at a proud 59%. However far one could go today, it would seem one would never be too distant from a mobile phone.&lt;/p&gt;
&lt;p&gt;While this extensive penetration has heralded an era of unprecedented access – truly a ‘communications revolution’ whose full effects it may still be too early to grasp – it has also led to the exposure of individuals to risks on a magnitude never before witnessed. Firstly, in the ordinary course of their business, telecom companies accumulate vast volumes of personal information about their customers including photocopies of identity documents, biographical information etc, which could potentially be misused;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Secondly, the fact that a vast amount of our communication now occurs with the involvement of electronic media has rendered us more susceptible to invasive surveillance - whether lawful or not;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Thirdly, much of our communication is now not merely ephemeral, but is stored in digital form for indefinite periods in corporate ‘data centers’.;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Lastly, owning a mobile phone not only enables us to communicate with our business partners and loved ones, but also forces us to engage with an incessant stream of ‘noise’ – telemarketing calls and SMSes, prank/hoax calls, calls pestering us for the payment of bills and offensive/threatening calls.&lt;/p&gt;
&lt;p&gt;This note examines the kinds of safeguards that currently exist under Indian law to protect the privacy of telecom users. Broadly there are three streams of such protection&lt;/p&gt;
&lt;p&gt;1) The Telegraph Act and Rules, which contains provisions that prohibit and penalize unlawful interception of communication. Furthermore, licenses issued to telecom service providers (TSPs) under this Act require TSPs to take measures to safeguard the privacy of their customers and confidentiality of communications.&lt;/p&gt;
&lt;p&gt;2) The Telecom Regulatory Authority of India has issued various guidelines to TSPs many of which pertain to privacy.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;3) The Consumer Protection Act provides customers with an avenue of redress in case of violation of their privacy. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;The first two are described in greater detail in the paragraphs that follow. This is followed by a brief analysis of certain international norms&lt;/p&gt;
&lt;h2&gt;2 Indian Regulatory Regime&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;2.1 The Indian Telegraph Act and Rules&lt;/h3&gt;
&lt;p&gt;First enacted in 1885, the Telegraph Act remains today on the statute books as the umbrella legislation governing most forms of electronic communications in India including telephones, faxes, the internet etc. The Act contains several provisions which regulate and prohibit the unauthorized interception or tampering with messages sent over ‘telegraphs’i. The following sections apply:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;1) Section 5 empowers the Government to take possession of licensed telegraphs and to order interception of messages in cases of ‘public emergency’ or ‘in the interest of the public safety’. Interception may only be carried out pursuant to a written order by an officer specifically empowered for this purpose by the State/Central Government. &amp;nbsp;The officer must be satisfied that “it is necessary or expedient so to do in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence”ii&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;2) Section 23 imposes a fine of Rs. 500 on anyone who enters a telegraph office without proper authorization.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;3) Section 24 makes it a criminal offence for a person to enter a telegraph office “with the intent of unlawfully learning the contents of any message”. Such a person may be punished with imprisonment for a term of up to a year.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;4) Section 25 further imposes a criminal penalty on anyone who damages or tampers with any telegraph with the intent to prevent the transmission of messages or to acquaint himself with the contents of any message or to commit mischief. Punishment in this case could extend to 3 years imprisonment or a fine or both.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;5) Section 26 makes it an offence for a Telegraph Officer to alter, unlawfully disclose or acquaint himself with the content of any message. This is also punishable with up to 3 years imprisonment or a fine or both.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;6) Section 30 criminalizes the fraudulent retention or willful detention of a message which is intended for someone else. Punishment extends to 2 years imprisonment or fine or both.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;2.2 License Agreements&lt;/h3&gt;
&lt;p&gt;Although the statute itself governs the actions of telecom operators in a general way, more detailed guidelines regulating their behavior are contained in the terms of the licenses issued to the telecoms which permit them to conduct businessiii. Frequently, these licenses contain clauses requiring telecom operators to safeguard the privacy of their consumers. A few examples include:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;1) Clause 21 of the National Long Distance Licenseiv comprehensively covers various aspects of privacy including&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;a. Licensees to be responsible for the protection of privacy of communication, and to ensure that unauthorised interception of message does not take place.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;b. Licensees to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party and their &amp;nbsp;business to whom they provide service and from whom they have acquired such information by virtue of those service and shall use their best endeavors to secure that :&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;i. No person acting on behalf of the Licensees or &amp;nbsp;the Licensees themselves divulge or uses any such information except as may be necessary in the course of providing such service to the Third Party; and&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;ii. No such person seeks such information other than is necessary for the purpose of providing service to the Third Party.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;c. The above safeguard however does not apply where&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;i. The information relates to a specific party and that party has consented in writing to such information being divulged or used, and such information is divulged or used in accordance with the terms of that consent; or&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;ii. &amp;nbsp;The information is already open to the &amp;nbsp;public and otherwise known.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;d. The Licensees shall take necessary steps to ensure that the they and any person(s) acting on their behalf observe confidentiality of customer information.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;2) Clause 39.2 of the Unified Access Service License and clause 42.2 of the Cellular Mobile Telephone Service licence enjoin the licensee to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party, and its business to whom it provides the service. The Licensee is required to use its best endeavors to secure that no person acting on behalf of the licensee or the licensee divulges or uses any such information - except as may be necessary in the course of providing such service to the third party.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;3) The Internet Services License Agreement (which authorizes ISPs to function in India) similarly contains provisions touching on privacy:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;a) Part VI of the License Agreement gives the Government the right to inspect/monitor the TSPs systems. The TSP is responsible for making facilities available for such interception.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;b) Clause 32 under Part VI contains provisions mandating the confidentiality of information. &lt;/em&gt;These provisions are identical to those described in Clause 21 of the NLD License agreement (see above).&lt;/p&gt;
&lt;p&gt;&lt;em&gt;c) Clause 33.4 makes it the responsibility of the TSP to trace nuisance, obnoxious or malicious calls, messages or communications transported through its equipment.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;d) Clause 34.8 requires ISPs to maintain a log of all users connected and the service they are using (mail, telnet, http etc.). The ISPs must also log every outward login or telnet through their computers. T&lt;/em&gt;hese logs, as well as copies of all the packets originating from the Customer Premises Equipment (CPE) of the ISP, must be available in REAL TIME to Telecom Authority. The Clause forbids logins where the identity of the logged-in user is not known.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;e) Clause 34.12 and 34.13 requires the Licensee to make available a list of all subscribers to its services on a password protected website for easy access by Government authorities.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;f) Clause 34.16 requires the Licensee to activate services only after verifying the bonafides of the subscribers and collecting supporting documentation. There is no regulation governing how long this information is to be retained.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;g) Clause 34.22 makes it mandatory for the Licensee to make available “details of the subscribers using the service” to the Government or its representatives “at any prescribed instant”.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;h) Clause 34.23 mandates that the Licensee maintain “all commercial records with regard to the communications exchanged on the network” for a period of “at least one year for scrutiny by the Licensor for security reasons and may be destroyed thereafter unless directed otherwise by the licensor”.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;i) Clause 34.28 (viii) forbids the licensee from transferring the following information to any person/place outside India:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;j) Any accounting information relating to subscriber (except for international roaming/billing) (&lt;/em&gt;Note: it does not restrict a statutorily required disclosure of financial nature)&lt;em&gt; ; and&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;k) User information (except pertaining to foreign subscribers using Indian Operator’s network while roaming).&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;l) Clause 34.28(ix) and (x) require the TSP to provide traceable identity of their subscribers and on request by the Government must be able to provide the geographical location of any subscriber at any given time.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;m) Clause 34.28(xix) stipulates that “in order to maintain the privacy of voice and data, monitoring shall only be upon authorisation by the Union Home Secretary or Home Secretaries of the States/Union Territories”.&lt;/em&gt; &amp;nbsp;(It is unclear whether this is to operate as an overriding provision governing all other clauses as well)&lt;/p&gt;
&lt;h3&gt;2.3 TRAI Regulations and Directions&lt;/h3&gt;
&lt;p&gt;The Telecom Regulatory Authority of India was established by statute in 1997 to safeguard interests of consumers while simultaneously nurturing conditions for growth of telecommunications in the country. The Authority has issued several regulations on various subjects which are binding on TSPs. &amp;nbsp;The following regulations touch on the subject of privacy:&lt;/p&gt;
&lt;h3&gt;2.4 Unsolicited Commercial Communications Regulation&lt;/h3&gt;
&lt;p&gt;In 2007, the Authority introduced the Telecom Unsolicited Commercial Communications Regulations which were aimed at creating a mechanism for registering requests of subscribers who did not wish to receive unsolicited commercial communications.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* The regulations define “unsolicited commercial communication” as any message, through telecommunications service, which is &amp;nbsp;transmitted for the purpose of informing &amp;nbsp;about, or soliciting or promoting any commercial transaction in relation to goods, &amp;nbsp;investments or services &amp;nbsp;which a subscriber opts not to receive,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* The following categories of message are excluded&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(i) &amp;nbsp;any message under a specific &amp;nbsp;contract between the parties to &amp;nbsp;such contract; or &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(ii) &amp;nbsp;any messages relating to charities, national campaigns or natural &amp;nbsp;calamities transmitted on the directions of the Government or &amp;nbsp;agencies authorized by it for the said purpose;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(iii) &amp;nbsp;any message transmitted, on the directions of the Government or any &amp;nbsp;authority or agency authorized by it, in the interest of the sovereignty &amp;nbsp;and integrity of India, the security of the State, friendly relations with &amp;nbsp;foreign States, public order, decency or morality;&lt;/p&gt;
&lt;p&gt;* The regulations specified a procedure for initiation of complaints by consumers and for their adjudication and disposal.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* Telemarketers who initiate unsolicited commercial communication with a person who has opted not to receive such communications face a fine of Rs. 500 per call/SMS as well as disconnection of their telephone services.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* The regulations require the TSPs to maintain confidentiality of all information submitted by the subscribers for the purposes of the ‘Do not Call Registry’.&lt;/p&gt;
&lt;h3&gt;2.5 Privacy and Confidentiality Direction&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In February 2010, the TRAI issued a direction seeking to implement the privacy and confidentiality related clauses in the service providers’ licenses (see previous sections). Accordingly by this direction, the TRAI ordered all service providers to “put in place an appropriate mechanisms, so as to prevent the breach of confidentiality on information belonging to the subscribers and privacy of communication”. All service providers were required by this regulation to submit a report to the TRAI giving details of measures so adopted.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;3 International Norms&lt;/h2&gt;
&lt;h3&gt;3.1 Telecommunications in the EU&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In 2006, the European Union adopted Directive 2006/24/EC which mandated member states to store citizens' telecommunications data for six to 24 months stipulating a maximum time period. The directive permits police and security agencies to request access to details such as IP address and time of use of every email, phone call and text message sent or received. A request to access the information would only be granted through a court order. In 2002 the Directive adopted the Privacy and Electronic Communications Directive. The ECD regulates the electronic communications sector and &amp;nbsp;addresses &amp;nbsp;issues such as: the retention of data, the sending of unsolicited e-mail, the use of cookies and the inclusion of personal data in public directories.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Art 10(1) of the German Constitution holds “The secrecy of letters, as well as of the post and telecommunications, is inviolable”. However, in 1968 an amendment was introduced which permitted (1) &amp;nbsp;surveillance to occur without the affected person ever being informed of it; and (2) surveillance without judicial review, but through “a review of the&lt;/p&gt;
&lt;p&gt;case by bodies and auxiliary bodies appointed by Parliament.”These measures could only be invoked in order to protect “the free democratic basic order or the existence or security of the Federation or a state.”&lt;/p&gt;
&lt;h3&gt;3.2 Telecommunication in the United States&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In the United States telecommunications are regulated by the Federal Communications Commission. Specifically the FCC regulates how telecommunications carriers and providers of cable television use customer personal information, cable subscriber information, and telemarketing and junk fax activities. Every company that participates in telemarketing must comply with the FCC's &amp;nbsp;rules. The main legislation used to regulate telecommunication carriers is the Federal Communication Act. The Act applies to how carriers may use and disclose “Customer Proprietary Network Information” which includes billing information, type of telecommunications service used, and the types of calls customers tend to make. The Act further requires that carriers must provide customer notice and the opportunity to opt out of marketing. The FCC does though &amp;nbsp;provide, what is known as a “total service approach”, exception to these rules - that allows carriers to use CPNI to market to existing customers. Also, &amp;nbsp;under the Act, &amp;nbsp;cable providers are required to provide to their subscribers detailed notice about the collection and use of information, and gather consent before collecting, distributing, or disclosing information. Additionally, customers are granted &amp;nbsp;access to their information, and information must be destroyed after it has served the purpose for which it is collected. &amp;nbsp;The Act further requires that carriers must provide customer notice and the &amp;nbsp;opportunity to opt out of marketing.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Telephone Consumer Protection Act applies to U.S companies that tele-market to consumers for commercial purposes. The rules require that phone calls are not permitted before 8:00 am or after 9:00 pm, the company must keep an internal record of consumer who ask not to be called again, and the company must refrain from sending commercial faxes without the recipient's consent. Telephone monitoring and recording are regulated in each state. Many states follow a system known as “one-party consent”, which permits a party to record &amp;nbsp;a telephone conversation without the other party's consent. Only eleven states require consent of all parties before a telephone conversation is recorded (ibid Westby, International Guide to Privacy, 2004).&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;4 Discussion&lt;/h2&gt;
&lt;p&gt;The Indian Constitution does not, as in certain other countries (Eg. Germany), contain express language upholding the right to privacy in telecommunications. This absence has not however hindered the Supreme Court from reading in the right to privacy into the Fundamental Right to Life. Various judicial decisions as well as statutes affirm this right to privacy in telecommunications. In conclusion, we would like to provide a quick FAQ on privacy in telecommunications that draws on the foregoing analysis of Indian Law.v&amp;nbsp;&lt;/p&gt;
&lt;p&gt;(1) To what extent is there legal protection for customer information (such as one’s name, address, telephone number, or non-dynamic IP address);&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As mentioned above, it is fairly easy for enforcement agencies to obtain this data. ISPs are required to make available much of this data on a website for the government to access at all times. Such access may be gained without judicial scrutiny and without even any showing of suspicion.&lt;/p&gt;
&lt;p&gt;(2) The extent of legal protection for connection data (such as the telephone numbers called; time and length of connection; one’s dynamic IP address) and the content of telecommunications&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Targeted surveillance or wiretapping is only possible following the procedure laid out in the Telegraph Rules which specify the manner in which such an order may be made, the review procedure and the maximum permissible duration of surveillance.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(3) the legal requirements placed on telecommunications providers for data retention or data erasure;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The ISP License agreement requires the ISP to maintain “all commercial records with regard to the communications exchanged on the network” for a period of “at least one year for scrutiny. No definition is provided of what these commercial records would include or exclude. There is no information on the extent to which ISPs in India currently comply with this requirement and whether they follow any data erasure procedures.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Questions:&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;Will a privacy legislation address data retention for the Telecom &amp;nbsp;sector?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Will a privacy legislation regulate the monitoring and tapping of phones?&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;End Notes&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;i‘Telegraph’ is defined widely in the Act to include any “apparatus used or capable of use for transmission or reception of signs, signals, writing, images and sounds or intelligence of any nature” thus covering most known mediums of communication.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;ii&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; In 1997, the Supreme Court of India held in PUCL v. Union of India that the interception of communications under this section was unlawful unless carried out according to procedure established by law. Since no Rules had been prescribed by the Government specifying the procedure to be followed, the Supreme Court framed guidelines to be followed before tapping of telephonic conversation. These guidelines have been substantially incorporated into the Indian Telegraph Rules in 2007. Rule 419A stipulates the authorities from whom permission must be obtained for tapping, the manner in which such permission is to be granted and the safeguards to be observed while tapping communication. The Rule stipulates that any order permitting tapping of communication would lapse (unless renewed) in two months. In no case would tapping be permissible beyond 180 days. The Rule further requires all records of tapping to be destroyed after a period of two months from the lapse of the period of interception.&lt;/p&gt;
&lt;p&gt;iii&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; Section 4 of the Telegraph Act forbids the establishment of any telegraph service (including, as mentioned earlier, all telephony, internet etc) without obtaining a license from the Central Government.&lt;/p&gt;
&lt;p&gt;iv&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; Issued to TSPs who offer long distance telephony in India&lt;/p&gt;
&lt;p&gt;v&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; These questions drawn from a template provided in Schwartz, Paul M. “German and U.S. Telecommunications Privacy Law: Legal Regulation of Domestic Law Enforcement Surveillance.” Hastings Law Journal 54 (August 25, 2003): 751.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-03-21T10:06:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing">
    <title>Privacy, Free/Open Source, and the Cloud </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing</link>
    <description>
        &lt;b&gt;A look into the questions that arise in concern to privacy and cloud computing, and how open source plays into the picture. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;Cloud computing, in basic terms,&amp;nbsp; is internet-based computing where shared resources and services are taken from the primary infrastructure of the internet and provided on demand. Cloud computing creates a shared network between major corporations like Google, Microsoft, Amazon and Yahoo. In this way, cloud systems are related to grid computing systems/service- oriented architectures, and create the potential for the entire I.T. infrastructure to be programmable. Because of this, cloud computing establishes a new consumption and delivery standard for IT services based on the internet. It is a new consumption and delivery model, because it is made up of services delivered through common centers and built on servers which act as a point of access for the computing needs of consumers.&amp;nbsp; The access points facilitate the tailoring and delivering of targeted applications and services to consumers.&amp;nbsp; Details are taken from the users, who no longer need to have an understanding of, or control over the technology infrastructure in the cloud that supports their desired application.&lt;/p&gt;
&lt;p&gt;There are both corporate and consumer implications for such a system. For example, according cloud computing lowers the barriers to entry for corporations and new services. It also enables innovative enterprise in locations where there is an insufficient supply of human or other resources through the provision of inexpensive hardware, software, and applications. The consumer, in turn, is provided with information that he or she is projected to be interested in based on information he or she has already “consumed.”&amp;nbsp; Thus, for example: Google has the ability to monitor a person’s consuming habits through searches and to reduce those habits to a pattern which selects applications to display – and consumption of those reinforces the pattern.&lt;/p&gt;
&lt;h3&gt;Privacy Concerns:&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Though cloud computing can be a useful tool for&amp;nbsp; consumers, corporations, and countries, cloud computing poses significant privacy concerns for all actors involved. For the consumer, a major concern is that future business models may rely on the use of personal data from consumers of cloud services for advertising or behavioral targeting. This concern brings to light the fundamental problem of cloud computing which is that consumers consent to the secondary use of their personal data only when they are signing up for services, and that “consent” is almost automatically generated. How can the cloud assure users that their private data will be properly protected? It is true that high levels of encryption can be (and are) used, and that many companies also take other precautionary measures, but protective measures vary, and the secondary sources that gain access to information may not protect it as well as the initial source.&amp;nbsp; Moreover, even strong protection measures are vulnerable to hackers. As well, what happens if a jurisdiction, like the Indian government, gains access to information about a foreign national?&amp;nbsp;&amp;nbsp; India still does not have a comprehensive data protection law, nor does it have many forms of redress for violations of privacy. How is that individuals information protected?&lt;/p&gt;
&lt;p&gt;These questions give rise to other privacy concerns with respect to the data that is circulated and stored on the cloud, which are the questions of territory, sovereignty, and regulation. Many of these were brought up at the Internet Governance Forum, which took place on the 16th of September including: Which jurisdiction has authority in cases of dispute or digital crime? If you lose data or your data is damaged, stolen, or manipulated, where do you go? Is the violation enforced under local laws, and, if so, under the law of the violator or the law of the violated?&amp;nbsp; If international law, who can access the tribunals, and which tribunals have this jurisdiction?&amp;nbsp; What if a person's data is replicated in two data centres in two different countries? &amp;nbsp;Are the data subject to scrutiny by the officials of all three?&amp;nbsp; Is there a remedy against abuse by any of them?&amp;nbsp; Does it matter whether the country in which the data centre resides does not require a warrant for government access?&amp;nbsp; And how will a consumer know any of that up front?&amp;nbsp; As a corollary, if content is being sent to one country but resides on a data centre in another country, whose data protection standards apply?&amp;nbsp; For example, certain governments in Europe require data retention for limited amount of time for purposes for law enforcement, but other countries may allow retention of data for shorter or longer periods of time.&lt;/p&gt;
&lt;h3&gt;How are privacy, free/open source, and the cloud related ?&lt;/h3&gt;
&lt;p&gt;Eben Moglen, a professor from Columbia law school, and founder and chairman of the Software Freedom Law Center who spoke on cloud computing, privacy, and free/open software at the Indian Institute for science on Thursday September 25, had another solution to the privacy concerns that arise out of the cloud. His lecture explains how the internet has moved from a tool that once promoted equality between people – no servants and no masters – to a tool that reinforces social hierarchies. The reinforcement of these hierarchies is directly related to the language used and communication facilitated between the computer and the individual.&amp;nbsp; Professor Moglen describes how initially, when computers were first introduced to the public, humans spoke directly to computers, and computers responded directly to humans. This open, two-way communication changed when Microsoft, Apple, and IBM removed the language between humans and computers and created proprietary software based on a server-client computing relationship. By removing the language between humans and computers, these corporations dis-empowered individuals. Professor Moglen used this as a springboard to address the privacy concerns that come up in cloud computing. Privacy at its base is the ability of an individual to control access to various aspects of self, such as decisional, informational, and locational. In having the ability to control these factors, privacy consists of a relation between a person and another person or an entity. Professor Moglen postulated that free/open access to code would make the internet an environment where choices over that relationship were still in the hands of an individual, and, among other protections, the individuals could build up their desired levels of privacy.&lt;/p&gt;
&lt;h3&gt;Is free/open software the solution?&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Eben Moglen's solution to the many privacy concerns that arise out of cloud computing is the application and use of free software/open source by individuals.&amp;nbsp; Unlike some applications on the cloud, open source is free, and once an individual has access to the code, that person can control how a program functions, including how a program uses personal information, and thus the person would be able to protect their privacy. Of course, this presumes that the consumer of the internet is sophisticated enough to access and manipulate code.&amp;nbsp; But even putting that presumption aside, is the ability to write code enough to protect data (will help you protect data better – add more security)?&amp;nbsp; Perhaps if a person could create his own server and bypass the cloud, but this does not seem like an ideal (or practical) solution. Though free/open source is an important element that should be incorporated into cloud computing, free/open source depends on open standards.&amp;nbsp;According to Pranesh Prakash, in his presentation at the Internet Governance Forum, the role of standards in ensuring interoperability is critical to allowing consumers to choose between different devices to access the cloud, to choose between different software clients, and to shift between one service and another. This would include moving information, both the data and the metadata, from one cloud to another. Clouds would need to be able to talk to one another to enable data sharing, and open source is key to this, though it is important to note that if one uses free/open source, they must set up their own infrastructure.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Even though Moglen believes that free/open source software brings freedom and provides the solution to protect an individual’s privacy in the context of cloud computing, he was not speaking to the specific context of India. To do that, it is important to expand the definitions that one uses of free/open source and privacy, and then to contextualize them.&amp;nbsp; Looking closely at the words “free/open source,” they are not limited to access to a software's code, even though that is free/open source’s base.&amp;nbsp; For the ideology of free/open source to work, access to code is just a key to the puzzle. A person, community, culture and state must understand the purpose of free/open source, know how to use it,&amp;nbsp; and know how it can be applied in order for it to be transformative, liberating, and protective. There needs to be a shared understanding that free/open source is&amp;nbsp; not just about being able to change code, but about a shared commitment to sharing code and making it transparent and accessible. In the United States and other countries,&amp;nbsp; free/open source did not just enter into American society and immediately fix issues of&amp;nbsp; privacy by bringing freedom, as it seems Professor Moglen is suggesting free/open source will do in India.&amp;nbsp;&amp;nbsp;&amp;nbsp; Though Professor Moglen promises freedom and privacy protection through free/open source, perhaps this is not an honest appraisal of the technology.&amp;nbsp; Free/open source, if not equally accessed or misapplied, protects neither freedom nor privacy.&amp;nbsp; As noted above, even if a person has access to code, he can protect data only to a certain extent.&amp;nbsp; Thus, he might think that he has created a privacy wall around information that actually is readily accessible.&amp;nbsp; In other words, free/open source cannot be the only answer to freedom, but instead a piece to a collective answer.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:50:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/the-cyborgs/archive-and-access">
    <title>Archive and Access: Call for Review</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/the-cyborgs/archive-and-access</link>
    <description>
        &lt;b&gt;The Archive and Access research project by Rochelle Pinto, Aparna Balachandran and Abhijit Bhattacharya is a part of the Researchers @ Work Programme at the Centre for Internet and Society, Bangalore. The project that attempts to look at the ways in which the notion of the archive, the role of the archivist and the relationship between the state and private archives that has undergone a transition with the emergence of Internet technologies in India has been put up for public review. &lt;/b&gt;
        &lt;p&gt;The Researchers At Work Programme, at the Centre for Internet and Society, advocates an Open and transparent process of knowledge production. We recognise peer review as an essential and an extremely important part of original research, and invite you, with the greatest of pleasures, to participate in our research, and help us in making our arguments and methods stronger.&lt;/p&gt;
&lt;p&gt;Laying out a theoretical review of the history of technologies of archiving in the country, the project aims at building case studies of public and private archives in the country and the needs for a local capacity building network of historians, archivists, technologists and state bodies which exploits the digital and Internet technologies for building new archives of Indian material.&lt;/p&gt;
The monograph has emerged out of the "&lt;em&gt;Archive and Access&lt;/em&gt;" project that was initiated in September 2008. The first draft of the monograph is now available for public review and feedback.Please click on the links below to choose your own format for accessing the document:
&lt;ol&gt;&lt;li&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/archive-access-file" class="internal-link" title="Archive and Access File"&gt;PDF&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/archive-call-for-review" class="internal-link" title="Archives"&gt;Word&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/archive-access-file" class="internal-link" title="Archive and Access File"&gt;&lt;/a&gt;
&lt;p&gt;We appreciate your time, engagement and feedback that will help us to bring out the monograph in a published form. Please send all comments or feedback by 15 December 2010 to nishant@cis-india.org or you can use your Open ID to login to the website and leave comments to this post.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/the-cyborgs/archive-and-access'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/the-cyborgs/archive-and-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2012-12-14T12:15:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/ideology-and-ict">
    <title>Ideology and ICT Policies</title>
    <link>https://cis-india.org/telecom/blog/ideology-and-ict</link>
    <description>
        &lt;b&gt;For better policies, decision-makers need to know their own and others’ biases, and consider what others are doing, writes Shyam Ponappa in an article published in the Business Standard on 4 November 2010.&lt;/b&gt;
        
&lt;p&gt;Why do the same facts regarding people’s needs for ICT infrastructure give rise to different policies? Apart from problematic motivation such as malicious intent and opportunism, even well-intentioned policy-makers may prescribe entirely divergent solutions for a given situation. This is evident if one compares India’s broadband policies with those of most countries. There are at least two reasons for this: differing perceptions of the facts, and differences in underlying beliefs and assumptions, i.e. ideology, as distinct from objective data.&lt;/p&gt;
&lt;p&gt;Consider the facts of India’s ICT space. In one sense, there has been spectacular success in the communications sector. One statistic cited as evidence is the phenomenal increase in mobile phone subscriptions (over 12 million in September 2010). Equally, to those who focus on aspects like the shortfall in services outside the big cities and towns, or the meagre broadband coverage and its inaccessibility in rural areas (i.e. in much of the country), the communications sector falls tragically short of its potential, and requires policy change.&lt;/p&gt;
&lt;p&gt;In this time of India Rising interrupted by the Great Recession, there is a stark contrast between the orientation of our ICT policies and that of most other countries. One area is the extent of government intervention and spending on broadband development. Governments of most advanced economies have stepped in to dramatically improve their broadband networks and policies for user access. This is not only in the EU where, historically, the approach is that government acts to extend consumer welfare, but also in America, the UK and Australia, which are considered much more free-market-oriented in their approach, and in many countries in Asia, including China. Unlike in America since Reagan, regulatory intervention in Europe is part of more supportive policies at the national and local levels. But this time around, even America has embarked on a comprehensive Broadband Technology Opportunities Program, with the goals of providing access to users in unserved areas, improving access in underserved areas, supporting public interest schemes for broadband access, improving broadband use by public safety agencies, and stimulating demand for broadband, economic growth and jobs; there is also a separate Rural Utilities Service.*(Click for &lt;a class="external-link" href="http://www.business-standard.com/content/general_pdf/110410_02.pdf"&gt;graph&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;With regard to underlying assumptions and beliefs, an analysis on how economic doctrines affect policies by Robert D Atkinson of the Information Technology and Innovation Foundation offers a way to think through alternatives for better decisions.** His analysis is on ICT, although it can be applied to all sectors. To quote from his conclusion, for advocates and policy-makers, “differences over doctrine cause partisans to view facts differently and to focus on small segments of complex debates, leading to a breakdown of constructive dialog and much ‘talking past each other’.”&lt;/p&gt;
&lt;p&gt;He summarises four ideologies or economic doctrines:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Conservative Neoclassical (CNC)&lt;/li&gt;&lt;li&gt;Liberal Neoclassical (LNC)&amp;nbsp;&lt;/li&gt;&lt;li&gt;Neo-Keynesian (NK) &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Innovation Economics, also called structuralist-evolutionary, neo-Schumpeterian, or evolutionary economics (IE)&lt;/p&gt;
&lt;p&gt;While he describes differences in nuanced detail, the simplified abstractions rendered as a logic tree in the accompanying diagram (above) show how economic beliefs affect network policies.&lt;/p&gt;
&lt;p&gt;CNCs are characterised as being less concerned with fairness, and less likely to expect market failures. Therefore, network and broadband markets in which governments do not intervene are considered to be competitive, and require no unbundling or price prescriptions. Their bias is for pure competition.&lt;/p&gt;
&lt;p&gt;LNCs are more concerned with fairness, as are NKs and IEs. They accept that telecommunication markets are not competitive, and that there may be market failures. LNCs and NKs would use policy to increase competition in different ways. LNCs expect more competition to lead to increased consumer surpluses. LNCs favour regulated competition, viewing more competition as better. NKs want more competition through directed government subsidies, e.g. for municipal broadband or to small companies (which they consider less rapacious than large corporations).&lt;/p&gt;
&lt;p&gt;IEs believe broadband markets have economies of scale, and that increased competition could result in excessive and redundant investments. They consider duplication of existing, expensive infrastructure as inefficient investment. IEs view communications infrastructure as a “general purpose technology” that drives economic activity, innovation and productivity. Therefore, they advocate policies that invest in higher-speed broadband, and in extending network services to more people, favouring a national broadband policy. The US National Broadband Plan defines broadband as a “Transformative General Purpose Technology”, and most countries practise IE. Irrespective of their economic philosophies, most countries have embarked on an aggressive broadband plan.&lt;/p&gt;
&lt;p&gt;In comparison, India’s approach does not fit any of these categories. There are no policy incentives for broadband, and actions like the spectrum auctions this year indicate a focus on collecting government revenues rather than on facilitating communication services. Whereas the OECD countries and other Asian economies are working on network resource-sharing schemes, India seems to have previous-generation preoccupations: revenue-collection-for-the-government, increasing competition per se, or abstruse technology considerations, such as loading the most traffic on every unit of commercially available spectrum, instead of maximising the economic benefits from it. Costs and benefits in the public interest are apparently ignored.&lt;/p&gt;
&lt;p&gt;BSNL, MTNL and DD have networks that, if they could be channelled with the right mix of policies and private enterprise, could be part of the overall backbone infrastructure for open network operations, as is being done by a consortium in Singapore. If our policy-makers understand their biases as well as those of others, they could adapt beneficial policies from other countries, as demonstrated by many countries with different philosophies converging on improving broadband.&lt;/p&gt;
&lt;p class="discreet"&gt;* “Broadband Stimulus Policy in Europe and the US: A Comparative Review”, Dariusz Adamski, Berkman Center for Internet and Society, Harvard Law School: &lt;a class="external-link" href="http://www.nyls.edu/user_files/1/3/4/30/84/187/245/Adamski,%20SPRING%202009,%2018%20MEDIA%20L.%20&amp;amp;%20POL%E2%80%99Y.pdf"&gt;http://www.nyls.edu/user_files/1/3/4/30/84/187/245/Adamski,%20SPRING%202009,%2018%20MEDIA%20L.%20&amp;amp;%20POL%E2%80%99Y.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;** “Network Policy &amp;amp; Economic Doctrines”, Robert D Atkinson, The Information Technology &amp;amp; Innovation Foundation, October 2010: &lt;a class="external-link" href="http://www.itif.org/files/2010-network-policy.pdf"&gt;http://www.itif.org/files/2010-network-policy.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://business-standard.com/india/news/shyam-ponappa-ideologyict-policies/413676/"&gt;Business Standard&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/ideology-and-ict'&gt;https://cis-india.org/telecom/blog/ideology-and-ict&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2012-05-10T10:21:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/report-digitally-open-innovation-and-open-access-forum-23-oct-2010-doha-qatar">
    <title>Report: Digitally Open: Innovation and Open Access Forum, 23 Oct 2010, Doha, Qatar </title>
    <link>https://cis-india.org/news/report-digitally-open-innovation-and-open-access-forum-23-oct-2010-doha-qatar</link>
    <description>
        &lt;b&gt;A summary of the event "Digitally Open: Innovation and Open Access Forum" held in Doha.&lt;/b&gt;
        
&lt;p&gt;Although I arrived in early morning of Saturday, 23 October 2010, I managed to attend &lt;a class="external-link" href="http://www.ictqatar.qa/output/Page1988.asp"&gt;Digitally Open: Innovation and Open Access Forum&lt;/a&gt;, held at &lt;a class="external-link" href="http://www.sharqvillage.com/"&gt;Sharq Village&lt;/a&gt;, Doha Qatar. Here is below a summary of the event.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The welcoming speech was given by Dr. Hessa Al Jaber, secretary General of the Supreme Council of Information and Communication Technology,&lt;a class="external-link" href="http://www.ict.gov.qa/output/page2.asp"&gt; ictQATAR&lt;/a&gt;.&amp;nbsp; Al Jaber spoke about the importance of open digital environments for the region, and outlined specific initiatives that ictQATAR is leading to embrace it (establishment of incubation center, drafting policies that encourage open source in government and arabizing content). She noted that "The Arab world has a strong and important voice that must be heard. Embracing a digitally open world will put us at the forefront of innovation and help propel us towards being a knowledge based economy." The full speech of Dr. Al Jaber is available &lt;a class="external-link" href="http://www.ict.gov.qa/files/images/Dr%20%20Hessa%20Al-Jaber%20Speech_Digitally%20Open%20Forum_22%20Oct%202010.pdf"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Mitchell_Baker"&gt;Michelle Baker&lt;/a&gt;,&amp;nbsp; Chairperson of &lt;a class="external-link" href="http://www.mozilla.org/foundation/"&gt;Mozilla Foundation&lt;/a&gt; provided her insights of openness. She described elegantly openness as “a state of mind” and is about spreading innovation. To Baker, if you want to be effective on the internet, you need to have “scale”. Openness is important for “scale”. Creative Commons is a framework of how to work with a copyright system and share ideas. Mozilla intends to build a layer of the internet designed for individuals to make civil and social value. According to Baker, there are many degrees of “openness” and it up to the users contributing to open projects and the companies to choose between the various levels. She argues that openness does not mean “free” and believe that in certain areas this might hold some truth, but the matter is far from being settled.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://joi.ito.com/"&gt;Joi Ito&lt;/a&gt;, CEO, &lt;a class="external-link" href="http://creativecommons.org/"&gt;Creative Commons&lt;/a&gt; gave an interesting presentation entitled “Innovation and Digital Content Rights”. He described from his own experience while working for Japanese IT companies how innovation was perceived pre the internet era and afterward. He also compared between the traditional style of IT innovation (governments, large companies, experts) and the new style of innovation with the arrival of the internet (users contributing to open source and open content projects). To joi, the internet is made of various layers and stacks. Creative Commons is the next stack. It basically lowers the costs and creates an explosion in knowledge and innovation. He gave examples of organizations that are using Creative Commons including Wikipedia, Aljazeera, and Governments in New Zealand and Australia.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Chris Dibona, Open Source Programs Manager, &lt;a class="external-link" href="http://www.google.com.au/ig?hl=en"&gt;Google&lt;/a&gt;, spoke about open source. He outlined the motivations behind releasing code by developers. He described how Google practices open source projects such as &lt;a class="external-link" href="http://www.chromium.org/"&gt;“Chromium”&lt;/a&gt;. One audience member asked Dibona about Google’s attention in the region in relation to open source. He replied that Google needs to learn more about the region and the culture of the Middle East. His full presentation is available &lt;a class="external-link" href="http://www.ictqatar.qa/files/images/Paul%20Keller%20-%20Promoting%20Openness%20is%20the%20public%20sector.pdfhttp://www.ictqatar.qa/files/images/Chris-DiBona-The%20Open%20Source%20Revolution.pdf"&gt;here&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Professor &lt;a class="external-link" href="http://explore.georgetown.edu/people/mrn24/"&gt;Michael Nelson&lt;/a&gt;,&amp;nbsp; a visiting professor of Internet Studies, &lt;a class="external-link" href="http://www.georgetown.edu/"&gt;Georgetown University&lt;/a&gt; spoke about “open clouds”. He emphasised that we are living in new world where small countries can make big impact in technology world. Estonia is the most “wired” country in Europe. Skype changed the way we do business. Qatar can provide the seed for the magic cloud. This can be achieved by having the right policies in the right time.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The second panel entitled “Openness in Science and Technology” was moderated by &lt;a class="external-link" href="http://en.wikipedia.org/wiki/John_Wilbanks"&gt;John Wilbanks&lt;/a&gt;,&amp;nbsp; Vice President for &lt;a class="external-link" href="http://sciencecommons.org/"&gt;Science, Creative Commons&lt;/a&gt;. He gave introductory remarks to the use of CC in science. His full presentation is available &lt;a class="external-link" href="http://www.ictqatar.qa/files/images/John%20Wilbanks-%20Digitally%20Open%202010.pdf"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Shaikah Al- Jaber, Director of Marketing, Innovation and Alliance, &lt;a class="external-link" href="http://www.qtel.qa/IndexPage.do"&gt;Qtel International&lt;/a&gt; gave a presentation entitled “Open Innovation for Telecom Companies in the Middle East”. She mainly spoke about innovation in the telecommunication sector and how it can be achieved.&amp;nbsp; Her full presentation is available &lt;a class="external-link" href="http://www.ictqatar.qa/files/images/2%20-%20Shaikha%20Al-Jabir_Strategic%20Innovation2-5.pdf"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Hesham Al Komy, Head of Sales and Marketing, &lt;a class="external-link" href="http://www.europe.redhat.com/UAE/"&gt;Middle East and Africa, Redhat&lt;/a&gt;, gave a presentation entitled “From Linux to Beyond”. He went through the history and development of “open source”. Redhat was the first cooperation to take “open source” into the commercial arena.&amp;nbsp; It was founded in 1983 and it currently employs 3500 employees with offices in 29 countries. He also discussed other issues related to open source community and open source adoption. His full presentation is available &lt;a class="external-link" href="http://www.ictqatar.qa/files/images/3%20-%20Hesham%20Al%20Komy%20-%20From%20Linux%20beyond.pdf"&gt;here&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.habibhaddad.com/"&gt;Habib Hadid&lt;/a&gt;,&amp;nbsp; the founder of &lt;a class="external-link" href="http://www.yallastartup.org/"&gt;Yalla Startup&lt;/a&gt; and &lt;a class="external-link" href="http://www.yamli.com/"&gt;Yamili.com&lt;/a&gt; did not give a presentation, but instead spoke spontaneously about business and how innovation and openness can help it. He recommended at the end to consider “innovation as a human right”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Lucio Rispo, a strategic research director for the &lt;a class="external-link" href="http://www.qstp.org.qa/output/page7.asp"&gt;Qatar Science and Technology Park&lt;/a&gt;,&amp;nbsp; spoke about the internet technological revolution and how it is changing the world. He described several initiatives that were taken in Doha, Qatar including IQRA to spread technology and innovation. His full presentation is available &lt;a class="external-link" href="http://www.ictqatar.qa/files/images/4%20-%20Lucio%20Rispo%20-%20The%20Needs%20The%20Present%20The%20Future.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The third panel was about “Openness in Government” that was moderated by Professor Michael Nelson. Sunil Abraham, executive Director for the &lt;a class="external-link" href="http://www.cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; in Bangalore, India provided interesting remarks about the internet and openness from the perspective of developing countries especially India. He also mentioned the importance of putting government funded research under open transparent and open models.&lt;/p&gt;
&lt;p&gt;Paul Keller, Senior Project Lead of Technology and the Public Domain, Knowledgeland, Netherlands, discussed the ways to promote openness in the public sector through the use of Creative Commons licensing model. To view his presentation click&lt;a class="external-link" href="http://www.ictqatar.qa/files/images/Paul%20Keller%20-%20Promoting%20Openness%20is%20the%20public%20sector.pdf"&gt; here&lt;/a&gt;.&amp;nbsp;&amp;nbsp; Marwan Marouf Mahmod, Executive Director of ICT Industry Development, ictQATAR spoke about his experience and the initiatives that they have taken in ictQatar.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The final panel was entitled “Culture, Creativity and Openness”. There were 3 speakers in this panel. Eric Steuer, Creative Commons Director and the moderator of the session gave an introduction to CC. He described how CC is being used in Education, music, museums, design, films and journalism.&amp;nbsp; His full presentation is available &lt;a class="external-link" href="http://www.ictqatar.qa/files/images/Eric%20Steur.pdf"&gt;here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Addulrahman Al Qataba is a web and application developer from Qatar. He presented his philosophy on “open life”. He developed several projects that serve the open source community in mobile applications. The full presentation is available &lt;a class="external-link" href="http://www.ictqatar.qa/files/images/Abdulrahman%20-%20Open%20Life.pdf"&gt;here&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Arend Kuster, Managing Director of &lt;a class="external-link" href="http://www.bqfp.com.qa/"&gt;Bloomsbury Qatar Foundation&lt;/a&gt; (BQF) outlined the initiative that &lt;a class="external-link" href="http://www.bloomsbury.com/"&gt;Bloomsbury Publishing&lt;/a&gt; is taking in Qatar to spread knowledge through printed books and journals published in Arabic and English.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Roger Mandle, spoke about museums and his experience as a director of the &lt;a class="external-link" href="http://www.qma.com.qa/eng/"&gt;Qatar Museum Authority&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;CC Arab World Second Meeting &lt;br /&gt;Sunday, 24 October 2010 &lt;br /&gt;Sharq Village&lt;br /&gt;12:30 p.m – 9:00 p.m.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The CC Arab world was attended by lawyers from Lebanon, Jordan, Egypt and also users and enthusiasts supporting CC from across the region. The meeting was divided into two sessions. The first was for all attendees and the second was divided into two groups one for users and another for lawyers.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The first session started with a welcoming note by Joi Ito, who stressed the importance of reaching consensus decisions on important matters related to CC in the Arab world. He noted the difficulties associated with organising such an event and the efforts that CC has invested to bring all people together. Donna thanked the organizers and the supporters of the event particularly ictQATAR. She also set out the agenda for the meeting. Diane spoke about the Affiliate Enhancement Program and Michelle gave details on drafting road maps for each jurisdictions. Speakers from Jordan, Egypt, Lebanon, Syria and the UAE presented their road maps to CC.&lt;/p&gt;
&lt;p&gt;After discussion and questioning, Diane gave an introduction to CC naming policy in other jurisdictions including Spanish speaking countries. The discussion of CC naming policy started with Rami Olwan writing in Arabic suggested terms for English CC licences. There were two views in relation to the translation of the English terms to Arabic. The first view came from lawyers who want to use legal words that might not sound appealing to Arabic users of the licences. The second view came from users who want to use words that might not be legal and enforceable in courts. After discussion that lasted three hours, a decision was reached on each term. It was agreed to either to use المشاع الإبداعي (creative Commons) or use the English version alone. Attribution: نسب المصنَف; ShareAlike: الترخيص بالمثل, NoDerivatives: منع الاشتقاق; NonCommercial: غير تجاري.&lt;/p&gt;
&lt;p&gt;I attended the second meeting of the session for lawyers. Diane and Joi were present at this session. Diane spoke then allowed each of the jurisdiction leads to speak. Hala Essalmawi from CC Egypt spoke about the A2K project in the &lt;a class="external-link" href="http://www.bibalex.org/Home/Default_EN.aspx"&gt;library of Alexandria&lt;/a&gt;, Egypt and how it was important to start the project there.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;I spoke also about the importance for CC in governments and education. Pierre El Khoury and Mohammed AL Darwish spoke about their upcoming events that will feature Lawrence Lessig as a speaker to the Lebanese Bar Association. Mohammad from CC Lebanon also spoke about his involvement in the &lt;a class="external-link" href="http://www.consumersinternational.org/"&gt;Consumers International&lt;/a&gt;&amp;nbsp; and the reports that he produced for A2K in Lebanon.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Omar Al Taweel presented his views to CC of how CC should proceed in Jordan. Several questions were asked by the lawyers and Diane gave answers. The meeting ended as some of the attendees had to leave for the airport.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;See the original &lt;a class="external-link" href="http://www.olwan.org/index.php?option=com_content&amp;amp;view=article&amp;amp;id=411:report-digitally-open-innovation-and-open-access-forum-23-24-oct-2010-doha-qatar-&amp;amp;catid=4:arab-countries&amp;amp;Itemid=44"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/report-digitally-open-innovation-and-open-access-forum-23-oct-2010-doha-qatar'&gt;https://cis-india.org/news/report-digitally-open-innovation-and-open-access-forum-23-oct-2010-doha-qatar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-04-02T07:43:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/access-to-knowledge">
    <title>Access to Knowledge in the Age of Intellectual Property</title>
    <link>https://cis-india.org/news/access-to-knowledge</link>
    <description>
        &lt;b&gt;Access to Knowledge in the Age of Intellectual Property charts the rise of the access to knowledge movement, a movement in which Open Society Foundations have played a key role. It maps the vast terrain of legal, cultural, and technical issues that activists and thinkers aligned to the movement negotiate every day.&lt;/b&gt;
        
&lt;p&gt;Produced with the support of the Open Society Information Program, the book aims to make accessible a diverse range of subject matter, including access to medicines, software patents, food security and access to agricultural biotechnology, the public domain, remix culture, free expression, and semiotic democracy.&lt;/p&gt;
&lt;p&gt;It features over 60 essays from leaders in the A2K movement, including influential thinkers and doers like Yochai Benkler, Peter Drahos, Lawrence Liang and James Love. The book also contains a chapter by Senior Information Program Manager &lt;a class="external-link" href="http://www.soros.org/initiatives/information/about/bios/franz"&gt;Vera Franz&lt;/a&gt;, exploring the potential to redress the copyright balance of a new international instrument to mandate a minimum set of limitations and exceptions.&lt;/p&gt;
&lt;p&gt;An electronic copy of the book has been made available for free download under a specially crafted Creative Commons (by-nc-nd) license which additionally allows for translations.&lt;/p&gt;
&lt;div class="pullquote"&gt;Date: November 2010&lt;br /&gt;
Source: Zone Books&lt;br /&gt;
Author: Gaëlle Krikorian and Amy Kapczynski, eds.&lt;/div&gt;
&lt;h3&gt;Contents&lt;/h3&gt;
&lt;p&gt;Contents include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The Emergence of the Politics of A2K&lt;/li&gt;&lt;li&gt;The Conceptual Terrain of A2K&lt;/li&gt;&lt;li&gt;Strategies and Tactics of A2K&lt;/li&gt;&lt;li&gt;A2K in the Future: Visions and Scenarios&lt;/li&gt;&lt;/ul&gt;
Need help downloading a file or playing a clip? &lt;a class="external-link" href="http://www.soros.org/help/plugins"&gt;Click here&lt;/a&gt;.
&lt;p&gt;Download the CC-licensed electronic copy of the book. &lt;a class="external-link" href="http://www.soros.org/initiatives/information/focus/access/articles_publications/publications/age-of-intellectual-property-20101110/age-of-intellectual-property-20101110.pdf"&gt;Access to Knowledge in the Age of Intellectual Property&lt;/a&gt;&lt;em&gt; &lt;/em&gt;(PDF Document - 7041K)&lt;br /&gt;&lt;br /&gt;Link to the original &lt;a class="external-link" href="http://www.soros.org/initiatives/information/focus/access/articles_publications/publications/age-of-intellectual-property-20101110"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;NEW&lt;/h2&gt;
&lt;p&gt;The end of the twentieth century saw an explosive intrusion of intellectual property law into everyday life. Expansive copyright laws have been used to attack new forms of sharing and remixing facilitated by the Internet. International laws extending the patent rights of pharmaceutical companies have threatened the lives of millions of people around the world living with HIV/AIDS. For decades, governments have tightened the grip of intellectual property law at the bidding of information industries. Recently, a multitude of groups around the world have emerged to challenge this wave of enclosure with a new counterpolitics of “access to knowledge” or “A2K.” They include software programmers who take to the streets to attack software patents, AIDS activists who fight for generic medicines in poor countries, subsistence farmers who defend their right to food security and seeds, and college students who have created a new “free culture” movement to defend the digital commons. In this volume, Gaëlle Krikorian and Amy Kapczynski have created the first anthology of the A2K movement, mapping this emerging field of activism as a series of historical moments, strategies, and concepts. Intellectual property law has become not only a site of new forms of transnational activism, but also a locus for profound new debates and struggles over politics, economics, and freedom. This collection vividly brings these debates into view and makes the terms of intellectual property law legible in their political implications around the world.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“It’s hard to believe that the ‘definitive’ book has already been written about a movement as new as A2K. It’s even more unusual for an edited collection of essays to have the power of a monograph. But this collection of essays is both the definitive explanation of the access to knowledge movement and a beautifully constructed conversation about the various ideas, conceptual, political and organizational, that make it up. From Amy Kapczynski’s superb overview, to Yochai Benkler’s brilliant meditation on the commons, to Lawrence Liang’s superbly titled ‘The Man Who Mistook His Wife for a Book,’ the central ideas of A2K are laid out with a freshness and power that is remarkable. And the rest of the contributors in the essays gathered here are just as strong. This is a must-have for university libraries, but it is also something that will be read intently, tactically, and sometimes uneasily, in venues ranging from WIPO to the university classroom. Highly recommended.”&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;James Boyle, Duke University, author of The Public Domain&lt;/strong&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“This is the first book of its kind. It comprehensively describes the intellectual contours of a powerful and emerging social movement and serves as a handbook for activism. The A2K movement is disparate and diverse. So assembling a volume that takes account of its various strands and influences is no small task. Gaëlle Krikorian and Amy Kapczynski have selected works from the most influential writers and practitioners of this new distributed politics. I will certainly assign this book to my survey course next year.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Siva Vaidhyanathan, University of Virginia, author of The Googlization of Everything&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;See the news in &lt;a class="external-link" href="http://www.zonebooks.org/titles/KRIK_ACC.html"&gt;Zone Books&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/access-to-knowledge'&gt;https://cis-india.org/news/access-to-knowledge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-02T08:14:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/identity-crisis">
    <title>Crisis for identity or identity crisis?</title>
    <link>https://cis-india.org/news/identity-crisis</link>
    <description>
        &lt;b&gt;The hurry with which the government is pushing its most ambitious project to assign a number (UID) to every citizen without any feasibility study or public debate has raised many questions.




&lt;/b&gt;
        
&lt;p&gt;“It will empower all”, declared Prime Minister Manmohan Singh when he issued the first UID card to a villager from Tembhli village in Maharashtra. But as days pass and relevant issues come for public discourse, many people have begun to doubt prime minister’s assurance.&lt;/p&gt;
&lt;p&gt;Unique identification number (UID), named Aadhaar is a 12 digit identification number that the government plans to issue to all citizens that will not only be an identity card but will also serve multiple purposes for its holder.&lt;/p&gt;
&lt;p&gt;Infosys co-founder Nandan Nilekani has been assigned the responsibility to execute this proposal as Chairman of the Unique Identification Authority of India (UIDAI). Mr Nilekani leads a team of 120 people having the task of assigning unique identities to 1.2 billion people. He plans to take Aadhaar beyond being just a 12-digit identification number for every Indian. This ambitious and mammoth project is pitched to handle projects as diverse as a national-highway toll-collection system, a technology backbone for the forthcoming Goods and Services Tax (GST) and reform of the vast public distribution system (PDS) for subsidized foodgrains.&lt;/p&gt;
&lt;p&gt;Government plans to cover 60 per cent of the nation’s population under this project in the next three years starting October this year. This project is intended to collect identification data about all residents in the country. It is said that it will impact the PDS and NREGA programmes, and plug leakages and save the government large sums of money.&lt;/p&gt;
&lt;p&gt;But the UID will not replace ration cards and passports, and is not mandatory as of now. No questions would be asked related to language, caste or religion of the person applying for UID.&lt;/p&gt;
&lt;p&gt;The UID number is linked to the fingerprints and the pattern of the eyes of the person assigned that number. This inimitable biometric data ensures that any given number is linked to only one person. So there is hardly a chance of any misgiving or stealing of rations and wages from the holder. It is believed that soon banks, insurance companies, cell phone providers and hospitals will demand UID number before doing business with you.&lt;/p&gt;
&lt;p&gt;In short, in the future our name, address, bank account numbers, personal information and identity as a whole will be solely linked and governed by those 12 digit number we hold.&lt;/p&gt;
&lt;div class="pullquote"&gt;Critics say that there has been no feasible study conducted about UID project, neither has there been a cost benefit analysis done. To add to it, there are serious concerns about data and identity theft.&lt;/div&gt;
&lt;p&gt;But apart from the buzz about this new project, there is an air of suspicion surrounding it too.&lt;/p&gt;
&lt;p&gt;The launch of the UID has led to a flurry of debate amongst policy-makers, legal experts and civil society at large. In response, Mr Nilekani claims the UID to be “a foolproof project implemented at a low cost”.&lt;/p&gt;
&lt;p&gt;However, some critical issues remain unanswered.&lt;/p&gt;
&lt;p&gt;One of the major objections about UID is that there has been no feasible study conducted, neither has there been a cost benefit analysis done. There is no project document as such.&lt;/p&gt;
&lt;p&gt;To add to it, there are serious concerns about data and identity theft.&lt;/p&gt;
&lt;p&gt;In a world where cyber terrorism is the new threat, and the countries are gearing themselves to protect against such a threat, projects like UID come as an open invitation to terrorist outfits to infiltrate their defences.&lt;/p&gt;
&lt;div&gt;The UID number is linked to fingerprints and the patterns of the holder’s eye. But medical studies show that our eye's iris patterns can change due to aging, disease or malnourishment. More over the government has no alternative option for many millions who fall outside this pattern of identification owing to callused hands, corneal scars and cataract induced by malnourishment. Even as enrollment is poised to begin, authentication is still an unstudied field. Fake fingerprints can very easily be made. Hence, the unique element of these numbers can be tampered.&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;&lt;span class="Apple-style-span"&gt;Recently, Sunil Abraham, Director, Centre for Internet and Society has remarked, “If I leave my fingerprints around, my identity can be stolen and transactions done on my behalf. They could use that number, to share information about anybody.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;A cyber-criminal having access to any person’s identification number can virtually control that person. Telephone numbers, addresses, family history can all be tracked down. Bank accounts can be manipulated and transactions done without the person knowing. Since these days, a lot of money transactions are done through internet, a cyber criminal can easily steal few UID numbers and impersonate those persons to manipulate the bank or credit card accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;In an even uglier scenario, where people might be tracked and judged by their numbers, a criminal’s fingerprints left behind on a scene of crime can be mixed with some one else through a slight manipulation and exchange of UID numbers, making an entirely innocent person a suspect in the eyes of law. Some incompetent or revengeful government officials can also frame innocents for a crime one never committed.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Human rights activists claim that a tech-savvy person can hack into the system and gain any person’s information from the servers unless the government tightens the defenses. A reminiscence of the Bruce Willis starrer Hollywood blockbuster Die Hard 4, a bunch of techno geeks operating from trailer truck hold the entire United States hostage as they hack into every main frame computing network from transportation, communication, power, defence and individual accounts.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The number can also be used for real time tracking, profiling, mounting surveillance and ‘convergence’ of information. Apart from the concerns about identity theft, the number can also invade our private space. If in the future insurance companies and hospitals merge their databases, the insurance companies can increase premium, or simply refuse insurance cover to a person who is not keeping well.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Poor labourers and immigrants who are on the move in search of work could also be the victims of the ‘Aadhaar’. In future, in case of card being lost or misplaced, poor labour would be threatened with financial and welfare exclusion. Where being a legal resident is to be closely tied in with having a UID number, it could render the poor vulnerable to exclusion and expulsion by exploitative employers and others.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="pullquote"&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Though Mr Nilekani claims that UID would be a cost effective project, however deeper analysis throws a different story. It is reported that the UIDAI project will cost Rs 45,000 crores to the exchequer in the next 4 years. This does not seem to include the costs that will be incurred by Registrars, Enrollers, additional costs on the PDS system to connect it to the UID, the estimated cost to the end user and to the number holder.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;Defending himself from the flurry of queries, Mr Nilekani has stressed that the identification number is not mandatory for everyone and only those interested can enroll. The project aims to first enroll the poor and uneducated masses promising them better wages and ration schemes. As was reported, the first villager to get the UID card was ‘happy but did not know its benefits’. Critics allege that the reason why Aadhaar is selling itself to millions of poor in the country is to create a foundation of legitimacy to deflect concerns over its possible misuse, unsafe technology and huge costs. Later, with a larger foundation, the UID can be enforced upon all citizens in the near future as the apex identity proof, making everyone vulnerable to several risks described above.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;The UIDAI project has proceeded so far without any legal authorization. There has been no feasibility study or cost-benefit analysis preceding the setting up of such a pervasive project. All calculations are of the back-of-the envelope variety. Data theft is a very serious threat to every individual and the country as a whole. There are deeply disconcerting facts about the project that should make even a die-hard UID supporter worry about its long term implications.&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;em&gt;This article has been written by Sushant Sharma. He is a college fresher and avid reader.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Interestingly, few months back in June, UK government scrapped the plans for the controversial 5 billion pounds National Identity Card scheme. The decision came after about 15,000 citizens had already been enrolled and given their numbers. The UK government now plans to destroy all information held on the National Identity Register, effectively dismantling the whole system.&lt;/p&gt;
&lt;p&gt;The UK system like the Indian UID had also started with much fanfare, claiming to save nearly 900 million pounds for the taxpayers. While the project was axed, UK’s Home Secretary Theresa May stated - “It (the identity card project) is intrusive and bullying, ineffective and expensive. It is an assault on individual liberty that does not promise a great good.”&lt;/p&gt;
&lt;p&gt;The same logic implies to the India as well. But instead of scraping this over-hyped-failure-in-the-making project, our Prime Minister claims the UID project “will empower all”. But will it actually? That is for us to decide now.&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read the original article &lt;a class="external-link" href="http://www.d-sector.org/article-det.asp?id=1396"&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/identity-crisis'&gt;https://cis-india.org/news/identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T08:16:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/october-2010-bulletin">
    <title>October 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/october-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! &lt;/b&gt;
        &lt;h3&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Internet, szabadon&lt;br /&gt;A polgárjogi aktivisták konfrontálódtak és panaszkodtak, a Google és a Facebook hárított és panaszkodott az Internet at Liberty konferencián, amelyet kedden és szerdán rendezett a Google és a CEU Budapesten.&lt;a href="http://bit.ly/dwNhRw"&gt;&lt;br /&gt;http://bit.ly/dwNhRw&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Hogyan szűrik a kormányok az internetes tartalmakat?&lt;br /&gt;Az internet szabadságáról tartanak háromnapos konferenciát Budapesten a Google és a Közép-Európai Egyetem (CEU) szervezésében. Kedden az internetes tartalmak szűrése volt a legfontosabb téma a rendezvényen.&lt;a href="http://bit.ly/aFApER"&gt;&lt;br /&gt;http://bit.ly/aFApER&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Konferencia az internetes szólásszabadságról Budapesten&lt;br /&gt;Az internet és szólásszabadság viszonyát vitatják meg Budapesten, a Közép-Európai Egyetem és a Google szervezte, háromnapos konferencián&lt;a href="http://bit.ly/9evwE4"&gt;&lt;br /&gt;http://bit.ly/9evwE4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;How the UID project can be a cause for concern&lt;br /&gt;The Unique Identification Authority of India (UIDAI), headed by Nandan Nilekani, is the UPA government's most ambitious project, where one billion Indians are branded with a unique identity number.&lt;a href="http://bit.ly/bl7INY"&gt;&lt;br /&gt;http://bit.ly/bl7INY&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;In new Facebook features, a comeback for community&lt;br /&gt;Nearly 750 tweets bombard the web every second. Internet traffic is growing by 40 per cent a year. People post 2.5 billion photos on Facebook every month. Every minute, 24 hours of video is uploaded on YouTube. But who owns all that data? Until now, big business was in complete control and used the data to monetise operations. But all that is set to change. With Facebook launching two new features, ‘Groups' and a ‘Download your information,' the community is making a comeback.&lt;a href="http://bit.ly/arEi4V"&gt;&lt;br /&gt;http://bit.ly/arEi4V&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Stiff Resistance Dogs India's ID Plan &lt;br /&gt;An article about the UID project by Indrajit Basu in Asia Times Online.&lt;a href="http://bit.ly/bMcOSs"&gt;&lt;br /&gt;http://bit.ly/bMcOSs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Data Activism and Grassroots Empowerment in India&lt;br /&gt;Glover Wright of the Center for Internet and Society talks about Data Activism and Grassroots Empowerment in India at the Innovate/Activate Unconference in New York Law School on 24 September 2010.&lt;a href="http://bit.ly/alnjsn"&gt;&lt;br /&gt;http://bit.ly/alnjsn&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Enabling Access to Education through ICT&lt;br /&gt;ICT workshop in Delhi....Registrations open! &lt;a href="http://bit.ly/9flyEK"&gt;&lt;br /&gt;http://bit.ly/9flyEK&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Network Culture: Archaeological and Artistic Interventions Public Seminar – Talk by Kristoffer Gansing and Linda Hilfing&lt;br /&gt;Kristoffer Gansing and Linda Hilfling will give a talk on Network Culture on 8 November 2010 in the Centre for Internet and Society, Bangalore.&lt;a href="http://bit.ly/cEmOZw"&gt;&lt;br /&gt;http://bit.ly/cEmOZw&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;City in the Internet 1: Geography Imagined (Part 1) &lt;br /&gt;“The estuaries that flirt with the land mass before they finally perish in the vast deep blue ocean beyond were perfect in their shape and grace. And you know what; from top it appears like a surreal landscape that is so restive and peaceful, almost heaven. The countryside is actually very beautiful”, says Pratyush Shankar in his latest blog post. A random conversation between two persons discovering the joys of seeing our existence through Google Earth!&lt;a href="http://bit.ly/9klUn1"&gt;&lt;br /&gt;http://bit.ly/9klUn1&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;A Digital Native coordinating Digital Natives&lt;br /&gt;Samuel Tettner, joined CIS as a Research Coordinator for the Digital Natives project. He has written a blog entry about his experiences in the project.&lt;a href="http://bit.ly/cpJMQq"&gt;&lt;br /&gt;http://bit.ly/cpJMQq&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;You Are Here&lt;br /&gt;Geo-tagging applications are creating new and impromptu communities of true, says Nishant Shah in his column on Digital Natives in the Indian Express.&lt;a href="http://bit.ly/a64kj7"&gt;&lt;br /&gt;http://bit.ly/a64kj7&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;નિશાંત શાહ: ડિજિટલ પેઢીનો ઉદય&lt;br /&gt;‘ડિજિટલ નાગરિક’ તેમને કહેવામાં આવે છે જેણે સામાન્ય જનજીવનમાં ડિજિટલ ટેક્નોલોજીના પ્રવેશ થઈ ગયા બાદ જન્મ લીધો છે. ડિજિટલ નાગરિકો દરેક જગ્યાએ છે. હવે સમય આવી ગયો છે કે આપણે એ જાણવાનો પ્રયાસ કરીએ કે આ લોકો કોણ છે, તેઓ શું કરી રહ્યા છે, તેઓ પોતાના અંગે શું વિચારે છે અને કેવી રીતે તેઓ કશું પણ જાણ્યા વગર આપણા ભવિષ્યને નવો આકાર આપવાનું કામ કરી રહ્યા છે. (A column by Nishant Shah in the Gujarati newspaper Divya Bhaskar)&lt;a href="http://bit.ly/9HnyBa"&gt;&lt;br /&gt;http://bit.ly/9HnyBa&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Digital Natives with a Cause?— Workshop in South Africa—FAQs&lt;br /&gt;The second international Digital Natives Workshop "My Bubble, My Space, My Voice" will be held in Johannesburg from 7 to 9 November 2010. Some frequently asked questions regarding the upcoming workshop are answered in this blog entry.&lt;a href="http://bit.ly/c1XJHO"&gt;&lt;br /&gt;http://bit.ly/c1XJHO&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The silent rise of the Digital Native&lt;br /&gt;In late August, this year, the world shook for many when they went online (on their computers, PDAs, iPads, laptops) and realised that the comfortable zone of talking, chatting, sharing and doing just about everything else, had suddenly, without a warning, changed overnight (or afternoon, or morning, depending upon the time-zone they lived in). With a single change in its privacy and location settings, Facebook, home to billions of internet hours consisting of relationships, friendships, professional networks, social gaming, entertainment trivia, memories and exchanges, allowed its users to geo-tag themselves when on-the-move.&lt;a href="http://bit.ly/bHY72Y"&gt;&lt;br /&gt;http://bit.ly/bHY72Y&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The geek shall inherit the earth&lt;br /&gt;Demystifying the mysterious -agents changing the world around you...A column on Digital Natives by Nishant Shah in the Indian Express.&lt;a href="http://bit.ly/aq2BqY"&gt;&lt;br /&gt;http://bit.ly/aq2BqY&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Digital Natives Workshop in South Africa - Call for Participation&lt;br /&gt;The African Commons Project, Hivos and the Centre for Internet and Society have joined hands for organising the second international workshop "My Bubble, My Space, My Voice" in Johannesburg from 07 to 09 November 2010. Send in your applications now!&lt;a href="http://bit.ly/d0rl7E"&gt;&lt;br /&gt;http://bit.ly/d0rl7E&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Broad-basing Broadband&lt;br /&gt;Education and training through the Internet need Commonwealth Games-like crisis management, says Shyam Ponappa in an article on broadband for education and training published in the Business Standard on 7 October 2010.&lt;a href="http://bit.ly/dnMtpU"&gt;&lt;br /&gt;http://bit.ly/dnMtpU&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/october-2010-bulletin'&gt;https://cis-india.org/about/newsletters/october-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-07T12:02:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
