<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 341 to 355.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/making-change/storytelling-sartaj-anand"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/stockholm-internet-forum-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/business-standard-ians-october-11-2018-sting-job-by-hyderabad-scientist-exposes-fake-journals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/stiff-resistance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/steps-towards-integrated-open-water-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/state-surveillance-and-human-rights-camp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/state-of-openness-in-indias-e-governance-applications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/Standard-Essential-Patents-on-Low-Cost-Mobile-Phones-in-India-A-Case-to-Strengthen-Competition-Regulation.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/the-socio-legal-review-nehaa-chaudhari-standard-essential-patent-on-low-cost-mobile-phones-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/stand-up-for-digital-rights"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/digital-natives/making-change/storytelling-sartaj-anand">
    <title>Storytelling and Technology - Sartaj Anand</title>
    <link>https://cis-india.org/digital-natives/making-change/storytelling-sartaj-anand</link>
    <description>
        &lt;b&gt;This post outlines the general characteristics of storytelling. The second section is an interview with Sartaj Anand, the founder of EgoMonk and BIllion Strong, who talks about storytelling as a strategy to build trust at the intersections of business and technology. This is the first of a series of installments exploring the potential of storytelling for social change.&lt;/b&gt;
        
&lt;pre&gt;&lt;strong&gt;CHANGE-MAKER:&lt;/strong&gt; Sartaj Anand&lt;strong&gt;

ORGANIZATION: &lt;/strong&gt;EgoMonk &amp;amp; Billion Strong&lt;strong&gt;

STRATEGY OF CHANGE: &lt;/strong&gt;Leverage technology by focusing on the relationship between people and technology, and build trust by localizing and personalizing communication
&lt;strong&gt;
METHOD OF CHANGE:&lt;/strong&gt; Storytelling&lt;strong&gt;
&lt;/strong&gt;&lt;/pre&gt;
&lt;h3 align="right"&gt;&lt;em&gt;“We all have something to say. Question is: will anyone listen?”&lt;/em&gt;&lt;/h3&gt;
&lt;div align="right"&gt;Understanding Comics&lt;br /&gt;Scott McCloud, 1994&lt;/div&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;Today, everybody seems to be talking about ‘storytelling’. From activists to corporates; they are all jumping on this nostalgic bandwagon and embracing once again an enthralling habit of yesteryear: the ability to tell good stories. The practice has taken an identity of its own. It's distancing itself from its roots in oral tradition, and morphing into a state-of-the-art communication strategy. This is no selfless trend, though. Behind the hype, lies their thirst for (your) attention, and the belief that they do not only have a story to tell, but that it is a story that matters. In the context of “making change” particularly, when political and social crises emerge, the public space is flooded by a series of narratives and discourses as told by different actors. This explosion of stories culminates in an overload of information that could end up saturating its intended audience. This is not only undesirable, but dangerous when underneath the noise lies a message important for human dignity and survival. So, what is it about a story that will make it worthy of your attention? And how can this seemingly simple, yet complex tactic culminate in further engagement?&lt;/p&gt;
&lt;p align="justify"&gt;To explain storytelling as a method to create change, I will focus on how this practice can be utilized to enhance visibility and effectiveness of advocacy practices, as outlined in the &lt;a href="https://cis-india.org/digital-natives/making-change/methods-to-conceive-condense-social-change"&gt;research overview&lt;/a&gt;. I will start by unpacking ‘storytelling’: focusing on its  purpose and functions. I will also look at the the relationship between the storyteller and the audience, and also at how storytelling redefines ‘the public space’. Although I will be putting my best effort to explain the workings behind his method, I will rely on the storytellers themselves to learn about the power of well-crafted and well-delivered stories to make change. This opportunity’s change-actors:  Sartaj Anand, The Ugly Indian, Blank Noise, come from different fields and will show very different perspectives of how the narratives of change utilized in their stories, re-articulates how users/citizens/customers interact and experience content.&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Telling Stories&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;So, what is storytelling? And what makes it so different from other forms of narration? I consulted the work of German philosophers Walter Benjamin and Hannah Arendt to unpack the nature of this practice and its ability to transmit knowledge.&lt;/p&gt;
&lt;div align="justify" class="pullquote"&gt;“the storyteller takes what he tells from the 
experience and &lt;span class="st"&gt;he in turn makes it the experience of those who are listening&lt;/span&gt;” &lt;em&gt;&lt;br /&gt;&lt;/em&gt;
&lt;div align="right"&gt;W. Benjamin, 1977&lt;/div&gt;
&lt;/div&gt;
&lt;p align="justify"&gt;In Benjamin’s essay “The Storyteller” (1955) he laments the demise of storytelling: “&lt;em&gt;less and less frequently do we encounter people with the ability to tell a tale properly [as if] the ability to exchange experiences [had been taken away from us]”.&lt;/em&gt;  Having its origins in oral tradition, storytelling for the most part consists of taking experiences worth sharing and disseminating them in the community with a specific, and according to Benjamin, a useful purpose in mind. It could be a moral, a maxim or a practical advice (1977), but at the end of the day, the audience takes away a new piece of information it did not have at the beginning of the story. This lesson may be related to the past of the storyteller or one of his characters, but its value lies in how it can now be extrapolated to the audience’s future.&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/Benjamin1.jpg/image_preview" title="Benjamin 1" height="246" width="419" alt="Benjamin 1" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p align="center" class="discreet"&gt;Ann Rippin's rendition to The Storyteller by Walter Benjamin. Visit her wordpress &lt;a href="http://annjrippin.wordpress.com/thirteen-notebooks-for-walter-benjamin/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;Hannah Arendt, German-American philosopher from the early 20th century also had a lot to say about storytelling  and ‘narratives’. She understood it as a framework, backed up by a strong tradition of its own, and a structure that embodies how our mind works: &lt;em&gt;“the mind doesn’t simply re-create sequences of events as they occur, but it creates new sequences and integrates events into appropriate existing sequences; the mind is constantly forming narratives” &lt;/em&gt;(Kieslich, 2013.). This understanding of the practice goes beyond Benjamin’s proposition that we become part of the narration as it occurs. Arendt posits that our mind is already manufactured to construct sequences and connections in the same way in which we build stories -as opposed to the way we structure our essays, novels or tweets- before we tell them. Being such an embedded cognitive process, it feels familiar, comfortable and natural, which derives into a “critical appreciation” for the events of the story, and leads you to make  deeper connections on how they relate to your life (Oni, 2012).&lt;/p&gt;
&lt;p&gt; (Read more on Arendt and storytelling here: &lt;a href="http://www.hannaharendtcenter.org/?p=5229"&gt;The Story of Reconciliation – Hannah Arendt Center)&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;However, both Benjamin and Arendt’s analysis is still very focused on the oral vs. prose question. Entering the 21st century we face the question of the role of digital technology and our highly visual culture in facilitating, amplifying or limiting the process of storytelling. On this point, I jumped to the end of the 20th century and looked at one of the many forms of storytelling: the comic. Scott McCloud’s “Understanding the Comic” (1994) takes you through the whole process of creating a coherent interplay of words and pictures that “convey information” and/or produce an “aesthetic response in the viewer”. Why are aesthetics important? , Because, according to McCloud, the inclusion of art is both the rejection and affirmation of our human condition. On one hand, art (or how we respond to it) is a rejection to our basic instincts, allowing us to express needs beyond survival and reproduction. On the other hand, it is a vehicle through which we assert our identities as individuals and pursue a “higher purpose and truth” (1994). Digital storytelling is imbued with visual stimuli: pictures, videos, graphics, that enhance the sensory experience, and as we explored in the Information Design posts (Find Part 1:&lt;a href="https://cis-india.org/digital-natives/making-change/tactical-technology-information-is-power"&gt;Information Activism&lt;/a&gt;, and Part 2: &lt;a href="https://cis-india.org/digital-natives/making-change/tactical-technology-design-activism-1"&gt;Information Design&lt;/a&gt;) create new (and deeper) channels to approach and understand the message delivered by these stories.&lt;/p&gt;
&lt;table class="plain" align="center"&gt;
&lt;thead align="center"&gt;&lt;/thead&gt;
&lt;tbody align="center"&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/UnderstandingomicsMcCloud.jpeg/image_preview" style="float: left;" title="SMC" height="341" width="228" alt="SMC" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/FotoFlexer_Photo.jpg/image_preview" style="float: right;" title="SMC 2" height="346" width="400" alt="SMC 2" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/Comic3.jpg/image_preview" alt="SMC 3" class="image-inline image-inline" title="SMC 3" /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="right" class="discreet"&gt;Excerpts of Understanding Comics by Scott McCloud&lt;/p&gt;
From these three perspectives we understand the following about storytelling. It is:
&lt;blockquote&gt;
&lt;ul&gt;&lt;li&gt;A practice rooted in the tradition of sharing experiences&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Participatory and interactive: the experience of the storyteller becomes the experience of the audience.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;The purpose of storytelling is to pass on a message, moral guidance or practical advice to the audience, through its content.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;The form or structure of narratives is determined by sequences of facts and events, which is the same way we build stories in our minds.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;The experiential and familiar nature of storytelling makes it easier to engage with and relate to. &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;The inclusion of images, art and media produces an aesthetic response in the viewer, providing the audience an opportunity for self-expression and freedom.&lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p align="justify"&gt;Translating these characteristics to the theme of the Methods for Social Change project (how to build a sense of citizenship and civicness through technology-mediated practices. More &lt;a href="https://cis-india.org/digital-natives/making-change/methods-to-conceive-condense-social-changehere"&gt;here&lt;/a&gt;): storytelling (re)emerges as a promising vehicle for political change, especially when in par with the “technological possibilities”  of our times (Benjamin, 1977). If we choose to entertain this thought, we find how its roots in community traditions make stories an excellent meeting point to form solidarity networks and stronger offline communities to sustain activism. The logical and sequential format of stories are interesting mediums, not only to transmit new ideas on citizenship and engagement; but make them relevant and appealing. Finally, 'the moral of the stories' are seeds for introspection and reflection, that may shape how we understand our role in society as a whole. At the end of the day though, it is storytellers who will lead this journey and meeting them is the first step to gauge how the theory of storytelling unfolds in the practice.&lt;/p&gt;
&lt;p align="justify"&gt;In the next section, we will meet some of the actors utilizing this method in different fields - and there are plenty of storytellers out there, gifted in skill and 
practice conveying an array of messages to an equally diverse public-&amp;nbsp; but before moving on I will close with an excerpt from Lisa Disch’s essay that brings all these points together:&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 align="center"&gt;“[Storytelling] is more adequate than arguments to depict ambiguities of a multidimensional social reality” &lt;br /&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;br /&gt;In other words, it is a practice that strips narratives from all ornaments, displaying the complexities of humanity in its most intuitive and experiential form.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;strong&gt;(Story)Tellers&lt;/strong&gt;&lt;/h2&gt;
&lt;h3 align="right"&gt;&lt;em&gt;Great storytellers: creators who devote their resources in controlling&lt;/em&gt;&lt;/h3&gt;
&lt;h3 align="right"&gt;&lt;em&gt;&amp;nbsp;this medium to convey their messages effectively”&lt;/em&gt;&lt;/h3&gt;
&lt;p align="right"&gt;Understanding Comics&lt;br /&gt;Scott McCloud (1993)&lt;/p&gt;
&lt;p align="justify"&gt;&lt;img src="https://cis-india.org/home-images/Sartaj.jpg/image_preview" style="float: right;" title="Sartaj" height="185" width="255" alt="Sartaj" class="image-inline image-inline" /&gt;&lt;/p&gt;
&lt;p align="justify"&gt;Our first storyteller is Sartaj Anand; an India-based entrepreneur, founder of the innovation and strategy consulting firm: EgoMonk and active member of TED, Ashoka, Sandbox, Kairos Society and the Pearson Foundation networks (More about his work in his &lt;a href="http://www.plussocialgood.org/Profile/19625"&gt;Social Good profile&lt;/a&gt;). His self-described “unreasonable dream” is to impact one billion people with his work and create “life-changing experiences”. He strives to do this by a) leveraging the relationship between people and technology and b) through his recently launched non-profit Billion Strong. Also, as opposed to other change-makers we’ve interviewed in the project, he comes from an engineering and business background; bringing a for-profit perspective into our melange of multi-stakeholder approaches to change.&lt;/p&gt;
&lt;p align="justify"&gt;The following interview touches on digital storytelling as one of the ways Anand is&amp;nbsp; using to leverage technology. His vision highlights how you cannot disconnect people from the processes you are utilizing to impact their lives. Incorporating a more humane focus in the way we use technology, and in how we construct stories, is according to his experience, the best way to have practices resonate to and be appropriate for the public.&lt;/p&gt;
&lt;p align="right" class="discreet"&gt;Sartaj Anand,&lt;/p&gt;
&lt;p align="right" class="discreet"&gt;Founder of EgoMonk and Billion Strong&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left" class="callout"&gt;&lt;strong&gt;Tell us about your background and the intersections of your work with technology.&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;I started with an engineering background and my thesis was on language processing; figuring out how people talk and how that needs construction data. Fundamentally at some point, I figured out that technology is not the problem, people are; so that’s how I moved into my current focus in business: which is innovation strategic consulting. I frequently rely on technology to enable or actualize change but I don’t necessarily create it. The challenge is how we leverage the technology we have [...] and that’s where I can add the most value.&lt;/p&gt;
&lt;p align="left" class="callout"&gt;&lt;strong&gt;How do you leverage technology in the context of making change then?&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;I leverage technology in terms of using it but focusing on the ‘people’ side of it”: the relationship between people and technology. That’s the main intersection point. [...] This is what I mean when I talk about technology, innovation, social structures and change.&lt;/p&gt;
&lt;p align="center"&gt;&lt;iframe src="http://www.slideshare.net/slideshow/embed_code/26146622" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" align="middle" height="356" width="427"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;div align="center"&gt; &lt;strong&gt; &lt;a title="Ideas for Change" href="https://www.slideshare.net/sartajanand/ideas-for-change" target="_blank"&gt;Ideas for Change&lt;/a&gt; &lt;/strong&gt; from &lt;strong&gt;&lt;a href="http://www.slideshare.net/sartajanand" target="_blank"&gt;Sartaj Anand&lt;br /&gt;&lt;/a&gt;&lt;/strong&gt;
&lt;div align="left"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p align="justify"&gt;Economically, business models have to replicate and service society. If businesses serve their people, they capture maximum value and gain efficiency over ten, twenty years (and this is appealing to all the capitalists in industrial businesses). However, towards the course of these years a lot of things can change and you progressively become more and more outdated. When you have this premonition, that's the point when you need to step in and cannibalize your own business model.&lt;/p&gt;
&lt;p&gt;
For example, for seven years, music labels sold cds only. Then Apple came in with iPods and digital music downloads. After milking this for 10 years, what it should have done is fortify it and start streaming music to capture maximum value, like Spotify did. [...] This is a model EgoMonk works with and we try to communicate these things to our clients. They have the power to execute it, but they have to internally feel confident with all their stakeholders, whether it is for-profits with their board; or non-profits with donors and program partners. This is a choice we need to commit to. A lot of the problem in the change process (technology enabled or otherwise) is trust building. At the end of the day you are working with people, and this is a challenge.&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;In order to build this trust you must be aiming for a deeper and personal communication with your clients. How are you including this in your business model?&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;We focus a lot on communication and that’s something we rely on increasingly; and I found it has to have a Why-What-How model -borrowing from &lt;a href="https://www.youtube.com/watch?v=l5Tw0PGcyN0"&gt;Simon Sinek's gold circles&lt;/a&gt;. In that order.&lt;/p&gt;
&lt;div align="center"&gt;&lt;iframe src="http://www.slideshare.net/slideshow/embed_code/20996308" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="356" width="427"&gt; &lt;/iframe&gt;&lt;/div&gt;
&lt;div align="center"&gt; &lt;strong&gt; &lt;a title="Storytelling 101" href="https://www.slideshare.net/sartajanand/storytelling-101-20996308" target="_blank"&gt;Storytelling 101&lt;/a&gt; &lt;/strong&gt; from &lt;strong&gt;&lt;a href="http://www.slideshare.net/sartajanand" target="_blank"&gt;Sartaj Anand&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;People don’t buy the 'what' of it, without the 'why' you do it. For example, Apple is great because it works to improve your life, to inspire you, amuse you: make your life better. What they do comes second: Apple is an electronics company, an application company. Last is the how: It makes the iPhone. We apply a similar model and this is something I apply in my storytelling also. I’m a believer that every story has to have an end or a moral: something that is more hopeful and optimistic. Rely on that but decide that also, I’m not the only one around: stories are increasingly personal and local.&lt;/p&gt;
&lt;p class="callout"&gt; 

&lt;strong&gt;Given the personal and experiential nature of storytelling, I assume it is a challenge to mainstream it in your services. Tell us more about the practices you are using to implement it and how they break from more traditional communication practices in the past.&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;EgoMonk&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;EgoMonk is an Innovation and Strategic Management Consultancy (More about EgoMonk &lt;a href="http://egomonk.com/"&gt;here&lt;/a&gt;). Particularly this means that:&lt;/p&gt;
&lt;p align="justify"&gt;a) We start with the hypothesis that&lt;strong&gt; we don't know everything&lt;/strong&gt;. With that in mind, we borrow amazing frameworks from amazing institutions. For example, &lt;a href="http://holacracy.org/how-it-works"&gt;Holacracy&lt;/a&gt;;
 (a “purposeful organization” technology that changes how the 
organization is structured, how decisions are made and how power is 
distributed); '&lt;a href="http://www.forbes.com/sites/stevedenning/2013/02/04/playing-to-win-how-strategy-really-works/"&gt;How will you win&lt;/a&gt;'
 philosophy from traditional large companies,, where they equate every 
decision to a couple of questions like what's your winning aspiration?, 
where will you plan?, how will you win?, what capability 
systems/processes need to exist to make this a sustainable practice that
 outlives you? This approach gets us halfway there, [especially] working
 with people who haven't had access to this before.&lt;/p&gt;
&lt;div align="center"&gt;
&lt;div align="center"&gt;&lt;img src="https://cis-india.org/home-images/EGomonk3.jpg/image_preview" title="egomonk 3" height="246" width="419" alt="egomonk 3" class="image-inline image-inline" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p align="center" class="discreet"&gt;&amp;nbsp;&lt;a href="https://cis-india.org/digital-natives/making-change/egomonk.com"&gt;EgoMonk&lt;/a&gt;'s services&lt;/p&gt;
&lt;p align="justify"&gt;b) &lt;strong&gt;We localize it.&lt;/strong&gt; We work with high impact entrepreneurs and turn their life goals into a four week plan. We frame it: What happens if after four weeks, you die. If these are four weeks you have to live: what really matters to you? What do you want to accomplish professionally and personally? Once you go through that exercise we say: What can continue sustainable during your life? What can you take away?  We focus on timing and what you have to do. Once you put that concept of mortality into every day's existence, you start behaving differently.&lt;/p&gt;
&lt;p align="justify"&gt;c) We work with &lt;strong&gt;gamification&lt;/strong&gt;. For example, we worked in a factory and completely changed the incentivization for their workers into something that is more fun. The challenge was: how do you improve the process of well-being in an industrial environment. How do we make working enjoyable for them? This model consists of short-term rewards: if you work really hard over this much time, you get 10 points and this gets you a (reward) with your family. This has never happened before.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Billion Strong&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;
Billion Strong is a platform. We want to impact a billion people and mobilize a billion dollars every year. The concept behind it is that the future is completely decoupled from our reality. It is highly utopian and right now we are not there and my hypothesis is that we'll never get there because our perspectives and assumptions keep evolving. This non-profit aims to accelerate the future in our lifetime so we can at least enjoy some of its benefits. It focuses on six things: culture, mobility, technology, art, nutrition and divinity. Each of these will be used as levers to impact a billion people. 

In the case of Billion Strong, user adoption is the most frequent challenge you face in the non-profit space. I will explain this using our first two projects:&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;a) Project 1 - Divinity:&lt;/strong&gt;&lt;br /&gt;We want to take religion, God and spirituality as a lever to impact people. A manifestation of this is the release of an open source tool kit to convert religious institutions into co-working spaces.&lt;/p&gt;
&lt;blockquote style="float: left;"&gt;
&lt;p align="center"&gt;&lt;strong&gt;Centers of religion are:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Everywhere and permanent&lt;/li&gt;
&lt;li&gt;Well known by the community&lt;/li&gt;
&lt;li&gt;Community centers&lt;/li&gt;
&lt;li&gt;Safe&lt;/li&gt;
&lt;li&gt;Non-profit and non-taxable&lt;/li&gt;
&lt;li&gt;Underutilized 99% of the time&lt;/li&gt;
&lt;li&gt;Disconnected from youth&lt;/li&gt;&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p align="justify"&gt; Centers of religion have always been centers of education and community oriented, but within the last generation they've become prayer halls, and I think this is the wrong way of using this infrastructure. There are a couple of narratives being negotiated here (See box to the left).&lt;/p&gt;
&lt;p align="justify"&gt;In this case [the open source tool-kit] has a framework, and it is dynamic to the point where your choices in real time will influence the policies of this place and their physical manifestation. So you ask questions in a flow chart: Do you want men and women to work together or not?; Do you have the ability to buy new furniture or you want to use the existing furniture?;  when you ask these questions you navigate a flow chart, depending on your choices. They will lead to a different output and when they see that, it is immediately empowering. This is storytelling, and this what will help us navigate the adoption issues. It's essentially us saying you own it; you know exactly what is good for your own community. In terms of the narrative, each copy will be different and adapted to its language. It has to be made for this community and everything has to be localized for that story you are telling. The religious and cultural narrative needs to be blended into it.&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;b) Project 2 - Nutrition:&lt;br /&gt;&lt;/strong&gt;Meat consumption is a huge challenge and highly unsustainable. We will use kick-start mechanics in a mobile app  to trigger and enable change in food habits. We are obviously very digitally inclined right now. It's easy to capitalize on that, but instead of giving them money, we will ask them to skip a meal, go vegetarian for today or for the week and we are going to support that.&lt;/p&gt;
&lt;p align="justify"&gt;Adoption is a huge challenge, so we'll ask them: Where do you stay? They'll say: Amsterdam [for example], and it will provide them with a template. If you are vegetarian for today, for the week, or the month, this is your meal plan and all you need. Users will find meals close to them and won't have to worry about it anymore. And we will map their impact in real time through info-graphics and data visualization. They will be constructing and visualizing their own story in real time and we’ll present it through different narratives.&lt;/p&gt;
&lt;p align="justify" class="callout"&gt;

&lt;strong&gt;We are also looking at multi-stakeholderism in this project. Both EgoMonk and Billion Strong seem to be a combination of business, technology and communication strategies. Why multi-stakeholderism? &lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;Three reasons:&lt;/p&gt;
&lt;p align="justify"&gt;a) The future is&lt;strong&gt; multi-domain. &lt;/strong&gt;You will never understand the whole picture if you say: I’m only going to solve water, but what about the pipes, the roads, the environment, infrastructure, cultural issue. One domain is no longer good enough. You will never be a complete expert of the complete ecosystem.&lt;/p&gt;
&lt;p align="justify"&gt;b) &lt;strong&gt;Adoption models&lt;/strong&gt; will always be a challenge and right now it’s a compromised formula. Now it's a zero-sum game. We literally need to escape that and make it future-oriented; make it 1+1 through partnerships.&lt;/p&gt;
&lt;p align="justify"&gt;c)&lt;strong&gt; Storytelling &lt;/strong&gt;is also getting more mainstreamed into change management and multi-stakeholderism. At the end of it, if you tell a good enough story, you can sell and get people to believe in your projects. This inherently builds partnership models. There is something that is permission marketing: all sales in the future are relationship based and indirect sales.(E.g. Red Bull is all about the experience) That’s how we have to be when we talk about multi-stakeholderism. Everything needs to be built in.&lt;/p&gt;
&lt;p align="justify"&gt;_____________________________________________________________________________________________________________________________________&lt;/p&gt;
&lt;p align="justify"&gt;&lt;em&gt;** Next installment will look at how storytelling enhances visibility and accessibility, and how it is being used by Urban Governance groups in Bangalore.**&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Arendt, Hannah (1994) Essays in Understanding Edited with an 
Introduction by Jerome Kohn. The literary Trust of Hannah Arendt 
Bluecher.p.308

&lt;/li&gt;&lt;li&gt;
&lt;div id="gs_cit2" class="gs_citr"&gt;Benjamin, Walter. (1977):  "The storyteller."89.&lt;/div&gt;
&lt;/li&gt;&lt;li&gt;Disch,Lisa Jane (1994) Hannah Arendt and the limits of Philosophy. Cornell University Press. p.172-173

&lt;/li&gt;&lt;li&gt;
&lt;div id="gs_cit2" class="gs_citr"&gt;Kieslich, Ingo. (2013) "Walter 
Benjamin, Hannah Arendt: Storytelling in and as theoretical writing." 
PhD diss., Vanderbilt University,&lt;/div&gt;
&lt;/li&gt;&lt;li&gt;McCloud, Scott. (1994)."Understanding comics: The invisible art." &lt;em&gt;Northampton, Mass&lt;/em&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;
&lt;div id="gs_cit2" class="gs_citr"&gt;Oni, Peter (2012). "The Cognitive Power of Storytelling: Re-reading Hannah Arendt in a Postmodernist/Africanist Context."&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/making-change/storytelling-sartaj-anand'&gt;https://cis-india.org/digital-natives/making-change/storytelling-sartaj-anand&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>denisse</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Making Change</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2014-03-12T11:43:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel">
    <title>Stop Press Carousel </title>
    <link>https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel</link>
    <description>
        &lt;b&gt;The silent blocking of URLs by the DoT assaults freedom of expression.&lt;/b&gt;
        &lt;hr /&gt;
&lt;div class="fsptext" id="divouterfullstorytext" style="text-align: justify; "&gt;
&lt;div id="ctl00_cphpagemiddle_reparticle_ctl00_divfullstorytext"&gt;
&lt;div&gt;
&lt;p&gt;Arindam Mukherjee's article was &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?284011"&gt;published&lt;/a&gt; in the Outlook on February 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Five Questions&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On what grounds did the DoT ask for a ban on the &lt;a href="http://www.outlookindia.com/article.aspx?283960" target="_blank"&gt;55 Facebook URLs&lt;/a&gt; pertaining to Afzal Guru?&lt;/li&gt;
&lt;li&gt;Why did the Gwalior court rush into blocking of &lt;a href="http://www.outlookindia.com/article.aspx?283938" target="_blank"&gt;73 URLs related to IIPM &lt;/a&gt;even though the content was very old and clearly some  of it was even prima facie non-defamatory?&lt;/li&gt;
&lt;li&gt;Why is the Gwalior court order not being made public?&lt;/li&gt;
&lt;li&gt;Why doesn’t DoT keep the whole process transparent by putting up  all its block orders on its website, giving reasons in each case?&lt;/li&gt;
&lt;li&gt;How many URLs in all has the DoT asked for a ban on so far?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: center; "&gt;***&lt;/p&gt;
&lt;p&gt;It’s the perfect recipe for a potboiler—a sudden, mysterious and  arbitrary blocking of web pages, sparked off by an irate ‘educationist’;  several upset publications (&lt;i&gt;Outlook&lt;/i&gt; included); a government  department with a blocked web page; a ministry trying to figure out how  to react to a court order that is at the root of all the action, but  which no one has been able to see.&lt;/p&gt;
&lt;p&gt;As the cliche goes, truth is often stranger than fiction—as the  affected parties discovered on February 15. That’s when it became known  that the government had sought to block 78 web pages, reportedly  following an order from a court in Gwalior. Around 73 of these articles  sought to be blocked are on the controversial Indian Institute of  Planning and Management (IIPM), promoted by self-styled management guru  Arindam Chaudhuri.&lt;/p&gt;
&lt;p&gt;What has taken everyone by surprise is how the blocks were  executed­—in a clandestine manner, without informing the affected  parties, without serving them a notice or a copy of the order, or giving  them a chance to react or defend themselves. The enormity of the ban is  evident from the list of websites targeted, which include &lt;i&gt;The Economic Times, The Indian Express, The Wall Street Journal, FirstPost, Careers360, Rediff.com&lt;/i&gt; and &lt;i&gt;Caravan&lt;/i&gt;. When it came to &lt;i&gt;Outlook&lt;/i&gt;,  there was a clear case of overreach, as not just the web pages, but the  entire blogs area was blocked for more than eight hours (see Jump Cut).&lt;/p&gt;
&lt;p&gt;What is even more surprising is the smokescreen that is being  maintained over the Gwalior court order that has caused this  consternation on the Internet. At the time of going to print, no one—the  affected websites, auth­ors, lawyers or activists—had access to the  order or had seen it, and the government was evading media queries on  details of the order and the case. Despite repeated requests, the head  of the Computer Emergency Response Team (CERT), Gulshan Rai, did not  speak to &lt;i&gt;Outlook&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;So, in the absence of the order, no one even knows who the  complainant is. Sig­nificantly, IIPM’s Chaudhuri has said that one of  his ‘channel partners’ app­roached the court, though he clearly is the  chief beneficiary of the episode. What this entire episode serves up is a  blatant use of the law to muzzle press criticism while the government  and official machinery have been willy-nilly forced to become mute  players.&lt;/p&gt;
&lt;p&gt;This surreal, Kafkaesque scenario continues apace at &lt;i&gt;Outlook&lt;/i&gt;’s  website, where on protesting the block on its blogs, the ISP said, “As  only some of the URLs are mentioned in the DoT letter, we have  reactivated the website and requested you to delete the mentioned  contents,” adding that they had “att­ached the DoT instructions  alongwith”. What they had attached was not one but two DoT orders, both  dated February 14. One was, of course, the order about the 78 URLs. The  other order came as news: an order on 55 Facebook URLs on Afzal Guru  that the DoT wanted blocked.&lt;/p&gt;
&lt;p&gt;As expected, internet activists and advocates of freedom of speech are livid. Shivam Vij, founder of &lt;i&gt;kafila.org&lt;/i&gt;,  one of the blogs that was blocked in the IIPM matter, says, “We were  never given a chance to defend or explain. If only the DoT had put up  the notice on their website, there would have been a healthier debate on  regulation or censorship. But this was done in an opaque and arbitrary  manner. If a book is banned, everyone gets to know. Why was there so  much secrecy here?”&lt;/p&gt;
&lt;p&gt;The arbitrariness of the twin government action also stems from the  new IT Act which authorises the gov­ernment or a competent authority to  block or take down content considered “harmful”. And, according to the  law, there is no obligation on the auth­orities’ part to inform the  defendants. Cyber law expert Apar Gupta says, “Under the blocking rules,  there is nothing that says that a copy of the court order has to be  given to the aff­ected parties. The rules also do not talk about the  authors being given a chance to explain. It permits ad int­erim  injunction to block content.”&lt;/p&gt;
&lt;p&gt;Says Nikhil Pahwa, internet activist and editor of &lt;i&gt;Medianama&lt;/i&gt;,  which first reported about the IIPM blocks, “It is not clear why the  DoT has taken this cloak-and-dagger approach. These are legitimate  issues being raised by people regarding IIPM and its students. This is  an infringement on the freedom of speech and expression. The DoT should  have executed the blocks in a transparent manner by sending the affected  parties a copy of the court order and making it public.”&lt;/p&gt;
&lt;p&gt;That’s important, because legal exp­erts feel that full facts may not  have been considered in the IIPM case. “For this kind of a blocking  order, the content should have come to the notice of the plaintiff  recently. In this case, most of the content was much older. But  sometimes plaintiffs also do not provide full details in a case,” says  Gupta. Lawyers also feel that the Gwalior court may not be equipped to  deal with litigation on new technologies.&lt;/p&gt;
&lt;p&gt;There are other issues. In the IIPM case, the issue is primarily of  defamation. But it is not clear whether defamation was established in  all the articles that were sought to be taken down, especially a  University Grants Commission (UGC) notice. Thus, the evidence that was  presented to the court is important. Once again, till the court order  becomes public, no one will know who the complainant was or what  evidence was presented. The temporary ban on UGC’s web page is  particularly surprising—and this has been noted by Shashi  Tharoor—considering it is an independent regulator. “The regulatory  body’s job is to regulate and nobody considers its notice as  defamatory,” says Parminder Jeet Singh of IT for Change, an organisation  dealing with internet issues.&lt;/p&gt;
&lt;p&gt;The real purpose of such exercises, say experts, is to create a scare  and embroil people in the legal process so that the process itself  becomes a punishment and acts as a deterrent to others to engage in such  writing. And that is why such cases are filed in remote and unusual  destinations like Gwalior, Silchar, Dehradun and Guwahati. “There is a  concept of forum shopping and forum shifting where cases are filed at  remote destinations and by asking for huge damages, an attempt is made  to scare people away from free speech. There are also many bullies who  use defamation to create a scare effect. IIPM seems to have pioneered  forum shopping in India,” says Sunil Abraham, executive director of the  Bangalore-based Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p&gt;The problem, everyone agrees, stems from the faulty nature of the  Information Technology Act, which is open to interpretation and misuse.  Says Singh, “The law tries to cover everything under a single head. It  does not look specifically at the nuances of new media and give an  appropriate response. So it is misused.” It is time that DoT became  transparent and stopped its arbitrary, covert war against freedom of  expression.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel'&gt;https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-06T04:27:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/stockholm-internet-forum-2017">
    <title>Stockholm Internet Forum 2017</title>
    <link>https://cis-india.org/internet-governance/news/stockholm-internet-forum-2017</link>
    <description>
        &lt;b&gt;Elonnai Hickok participated in the Stockholm Internet Forum 2017 held in Stockholm from May 15 to 18, 2017. She spoke on the panel "Private sector and civil society collaboration to advance freedom online". The event was organized by Swedish International Development Cooperation Agency. &lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Pre-SIF 15 May at Sida HQ&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Welcoming and informal lunch at Sida 12.00 – 14.00 &lt;/b&gt;(Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-SIF regional sessions: 14.00 – 17.00 (breaks included) &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/?page_id=3951&amp;amp;preview=true"&gt;&lt;b&gt;MENA:&lt;/b&gt; Access, power and gender&lt;/a&gt; (Location: Hörsalen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/?page_id=3955&amp;amp;preview=true"&gt;&lt;b&gt;AFRICA:&lt;/b&gt; Inequality and the digital revolution in Africa&lt;/a&gt; (Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-regional-session-latin-america/"&gt;&lt;b&gt;LATIN AMERICA:&lt;/b&gt; Human rights and technology in Latin America: Where to from here?&lt;/a&gt; (Location: Room 19, Asante)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-regional-session-eurasia/"&gt;&lt;b&gt;EURASIA:&lt;/b&gt; Media freedom and fact checking practices&lt;/a&gt; (Location: Room 18, Djenné)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-regional-session-south-east-asia/"&gt;&lt;b&gt;SOUTH EAST ASIA&lt;/b&gt;: Regional internet freedom unconference&lt;/a&gt; (Location: Room 23, Quirigua)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/study-visit-kista-science-city/"&gt;&lt;b&gt;STUDY VISIT: &lt;/b&gt;Kista Science City&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle: 17.00 – 18.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Dinner: 18.00 – 20.00&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Pre-SIF 16 May at Sida HQ&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-welcome-and-framing-access-and-power/"&gt;Welcome and framing access and power&lt;/a&gt; 09.00 – 11.30 &lt;/b&gt;(break included, location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-SIF Parallel sessions: 11.30 – 13.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-1a/"&gt;&lt;b&gt;1A&lt;/b&gt; From divides to dividends – DDP and SDG17&lt;/a&gt; (Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-1b/"&gt;&lt;b&gt;1B&lt;/b&gt; Online threats: Operational response and kick-ass solutions&lt;/a&gt; (Location: Hörsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and lunch: 13.00 – 15.00 &lt;/b&gt;(Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-SIF Parallel sessions: 15.00 – 17.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-2a/"&gt;&lt;b&gt;2A &lt;/b&gt;Financial services in a digital era: Development, livelihoods and privacy&lt;/a&gt; (Location: Oasen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/pre-sif-parallel-session-2b/"&gt;&lt;b&gt;2B&lt;/b&gt; Responsible data forum: Open source investigation for human rights&lt;/a&gt; (Location: Hörsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle: 17.00 – 18.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Dinner: 18.00 – 20.00&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;SIF 17 May at Münchenbryggeriet&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/opening-and-main-session-1/"&gt;&lt;b&gt;Opening and main session 1: 9.00 – 11.00 &lt;/b&gt;&lt;/a&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;Welcoming remarks by Sida Director General &lt;b&gt;Lennart Båge&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Speech by Swedish Minister of Culture and Democracy &lt;b&gt;Alice Bah Kuhnke&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Main session 1: Equal access – Distributed power&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The theme of SIF 2017 is “Access and Power” – a duality that can be  analysed in many different ways. It is not enough to have access to the  Internet, ICT’s and digital tools to achieve social justice and  development outcomes. The question of what people have access to and  what possibilities access gives also needs to be addressed. Access to  the Internet is more than technical aspects and solutions – there are  also dimensions related to rights, policy and power that need to be  addressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At SIF we are keen on framing the current struggles and challenges in  order to formulate possible ways ahead. One way to approach this is to  discuss the co-relation between access and power. The first main session  on the various aspects of access and power, is designed to get the  conversation started.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Speech by State Secretary Annika Söder 11.00 – 11.15 &lt;/b&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Coffee break 11.15 – 11.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Parallel sessions: 11.45 – 13.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-1a/"&gt;&lt;b&gt;#SIF1A &lt;/b&gt;Digital Identity&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-1b/"&gt;&lt;b&gt;#SIF1B &lt;/b&gt;Community access – Helping the last 4 billion get connected&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-1c/"&gt;&lt;b&gt;#SIF1C &lt;/b&gt;Gender based violence online: levelling the discussion&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and lunch: 13.00 – 14.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Parallel sessions: 14.00 – 15.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-2a-open-sif/"&gt;&lt;b&gt;#SIF2A &lt;/b&gt;OPEN SIF&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-2b/"&gt;&lt;b&gt;#SIF2B&lt;/b&gt; The promises and risks of the platform economy&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-2c/"&gt;&lt;b&gt;#SIF2C&lt;/b&gt; The global shut down epidemic – From rights, tech and economic perspective&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Coffee break 15.30 – 16.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Breakout sessions: 16.00 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-1b/"&gt;&lt;b&gt;#SIFB1&lt;/b&gt; The (alternative) truth is out there&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-2/"&gt;&lt;b&gt;#SIFB2&lt;/b&gt; Private sector and civil society collaboration to advance freedom online&lt;/a&gt; (Location: Galleriet)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-3/"&gt;&lt;b&gt;#SIFB3&lt;/b&gt; Access and human rights in the smart city&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-4/"&gt;&lt;b&gt;#SIFB4&lt;/b&gt; Empowering technologies in hostile environments&lt;/a&gt; (Location: Milles)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/breakout-session-5/"&gt;&lt;b&gt;#SIFB5&lt;/b&gt; Freedom Online Coalition: Open forum&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://www.stockholminternetforum.se/may-17th-reflections-and-highlights-from-the-day/"&gt;Reflections and highlights from the day&lt;/a&gt;: 17.45 – 18.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and Dinner: 19.00 – 21.00&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;SIF 18 May at Münchenbryggeriet&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://www.stockholminternetforum.se/may-18th-welcome-and-keynote/"&gt;Welcome and keynote&lt;/a&gt;: 09.00 – 09.30 &lt;/b&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Parallel sessions: 09.30 – 11.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-3a-open-sif/"&gt;&lt;b&gt;#SIF3A &lt;/b&gt;OPEN SIF&lt;/a&gt; (Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-3b/"&gt;&lt;b&gt;#SIF3B &lt;/b&gt;Digital rights 2.0: challenges and opportunities to empowerment&lt;/a&gt; (Location: Fogelström)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/parallel-session-3c/"&gt;&lt;b&gt;#SIF3C &lt;/b&gt;Safe media in conflict and chaos&lt;/a&gt; (Location: Riddarsalen)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Coffee break: 11.00 – 11.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/main-session-2-2/"&gt;&lt;b&gt;Main session 2: 11.30 – 13.00 &lt;/b&gt;&lt;/a&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p&gt;A positive outlook: Leave no one offline&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Half of the world’s population — specifically women, the poor and  marginalised populations in developing countries — are still being left  offline. What is needed to reach those still offline?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond access, there are still many obstacles to achieving a digital  inclusive society. Access to the Internet, ICT’s and digital tools is  not only a catalyst for economic growth but increasingly a means for  people to participate in today’s society.  Too often access is measured  by number of subscribers. This session will address access and power  from a multidimensional approach – including infrastructure,  affordability and contextual factors such as regulation and social and  power structures.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mingle and lunch: 13.00 – 14.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/sif-may-18th-closing-session/"&gt;&lt;b&gt;Closing session: 14.00 – 15.00 &lt;/b&gt;&lt;/a&gt;(Location: Mässhallen)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This session will focus on summarizing knowledge and experiences  shared at SIF17 and mapping the road ahead – identifying constraints but  also opportunities for equal access and Internet freedom in the strive  for global development and a digital inclusive society. The closing  session will be interactive with the participants being the centre of  the discussion.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Side happenings &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;During breaks you will have the opportunity to develop your digital  skills, participate in discussions and expand your knowledge at this  year’s side happenings.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;16 May at Sida HQ&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;11.00 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-new-media-documentation-clinic-with-witness/"&gt;New media documentation clinic with Witness&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Room 19 Asante)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.00 – 17.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-developing-internet-universality-indicators-with-unesco-and-the-apc-internet-indicators-consortium/"&gt;Developing Internet universality indicators with UNESCO and the APC Internet indicators consortium&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Room 21 Tsodilo)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;14.30 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-local-access-and-community-based-networks-with-apc-and-isoc/"&gt;Local access and community based networks with APC and ISOC&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Djenné)&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;17 – 18 May at Münchenbryggeriet&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;All day&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-digital-security-clinic-with-access-now/"&gt;Digital security clinic with Access Now&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Mässtorget)&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.stockholminternetforum.se/side-happening-healing-justice-pod-with-astraea-foundation/"&gt;Healing justice pod with Astraea Foundation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;(Location: Bergrummet)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/stockholm-internet-forum-2017'&gt;https://cis-india.org/internet-governance/news/stockholm-internet-forum-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T13:43:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/business-standard-ians-october-11-2018-sting-job-by-hyderabad-scientist-exposes-fake-journals">
    <title>Sting job by Hyderabad scientist exposes fake journals</title>
    <link>https://cis-india.org/openness/news/business-standard-ians-october-11-2018-sting-job-by-hyderabad-scientist-exposes-fake-journals</link>
    <description>
        &lt;b&gt;Scientists have at last found a cure for Schlodomoniasis -- a deadly brain infection caused by the "inter-galactic parasite Klaousmodium cruzi" -- they claim to have identified for the first time.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.business-standard.com/article/news-ians/sting-job-by-hyderabad-scientist-exposes-fake-journals-118101100439_1.html"&gt;Business Standard&lt;/a&gt; on October 11, 2018. Subbiah Arunachalam was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=beth+smith" target="_blank"&gt;Beth Smith &lt;/a&gt;and co-workers at "&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=sanchez+institute" target="_blank"&gt;Sanchez Institute &lt;/a&gt;for Biomedical Sciences for Doopidoo Research" in &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=morocco" target="_blank"&gt;Morocco &lt;/a&gt;have published their discovery in three science journals and also reported a novel method called "Magnetic Oddities &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=radiation" target="_blank"&gt;Radiation &lt;/a&gt;Therapy (MORTY)" to treat the &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=infection" target="_blank"&gt;infection.&lt;/a&gt; The study was carried out in "Wakandan population".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If readers are breaking their heads to understand the startling findings  and decipher the strange words like "Wakandan" and "Doopidoo", Farooq  Ali Khan, a &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=college+professor" target="_blank"&gt;college professor &lt;/a&gt;and PhD student in &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=hyderabad" target="_blank"&gt;Hyderabad &lt;/a&gt;and a co-&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=author" target="_blank"&gt;author &lt;/a&gt;of the paper, had the last laugh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It was not intended to be a scientific paper," he told this &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=correspondent" target="_blank"&gt;correspondent &lt;/a&gt;in  an email. "It was my sting operation to expose publishers of predatory  journals who are churning out fake science for profit."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Open access journals are supposed to provide an &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=online+platform" target="_blank"&gt;online platform &lt;/a&gt;for  rapid dissemination of latest updates in science and technology. Their  publishers don't charge the readers as access to these journals is free,  but they charge the authors wanting to have their research papers  published in these journals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inspired by previous publishing "stings", Khan wanted to test whether  open access journals would publish an obviously absurd paper liberally  salted with nonsense for the sake of money from gullible authors anxious  to publish.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He created a spoof manuscript titled "Newer Tools to Fight  Inter-Galactic Parasites and their Transmissibility in Zygirion  Simulation", and submitted it to several suspect journals from the list  kept online by &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=jeffrey+beall" target="_blank"&gt;Jeffrey Beall &lt;/a&gt;-- an &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=associate+professor+and+librarian" target="_blank"&gt;associate professor and librarian &lt;/a&gt;at the &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=university+of+colorado" target="_blank"&gt;University of &lt;/a&gt;&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=colorado" target="_blank"&gt;Colorado &lt;/a&gt;who coined the term "predatory journal" -- as a public service to his colleagues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All the hilarious fake names like "schleem", "dinglebop" and  "schwitinization", that do not make any sense, as well as images and  graphs published in the paper, were fabricated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The "Zyrgion simulation", and "intergalactic parasites" are all  references to "Rick and Morty" -- a US Cartoon Network's animated  science &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=fiction" target="_blank"&gt;fiction &lt;/a&gt;programme about the misadventures of mad &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=scientist" target="_blank"&gt;scientist &lt;/a&gt;&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=rick+sanchez" target="_blank"&gt;Rick Sanchez &lt;/a&gt;and his grandson &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=morty+smith" target="_blank"&gt;Morty Smith.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Khan, a great fan of "Rick and Morty", submitted the paper with &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=beth+smith" target="_blank"&gt;Beth Smith &lt;/a&gt;(Rick's granddaughter in the cartoon show) as the corresponding &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=author" target="_blank"&gt;author &lt;/a&gt;and himself as co-&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=author" target="_blank"&gt;author.&lt;/a&gt; Two other authors' names were made-up, and Sukant Khurana -- a &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=scientist" target="_blank"&gt;scientist &lt;/a&gt;at &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=central+drug+research+institute" target="_blank"&gt;Central Drug Research Institute &lt;/a&gt;in Lucknow, who offered to help Khan in this sting, was another author -- all affiliated to an institution in &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=morocco" target="_blank"&gt;Morocco &lt;/a&gt;that does not exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The so-called "Magnetic Oddities &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=radiation" target="_blank"&gt;Radiation &lt;/a&gt;Therapy" developed by the authors to treat the brain &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=infection" target="_blank"&gt;infection &lt;/a&gt;is again nothing but an expansion of "MORTY", a character in the cartoon show.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anyone with commonsense would have noticed all the nonsense and  consigned the paper to trash, but Khan surprisingly found it was  accepted for publication by 10 journals for fees ranging from $75 to  $650.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After some bargaining over fees, three scientific journals -- ARC  Journal of Pharmaceutical Sciences, IOSR Journal of Pharmacy and  Biological Sciences, and Clinical &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=biotechnology" target="_blank"&gt;Biotechnology &lt;/a&gt;and &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=microbiology" target="_blank"&gt;Microbiology &lt;/a&gt;-- published the paper without a second glance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Khan says his "scientific prank" was intended to expose the seriousness  of predatory journal industry and to create awareness among people who  are beginning their careers in science. "These predatory journals are  polluting the scientific record with junk science and are also resulting  in fake news."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"When the Open Access Declaration was drafted in 2002, no one would have  imagined that many unscrupulous individuals would pollute the entire  system of scholarly communication with predatory journals solely with  the idea of making money," Subbiah Arunachalam, &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=renowned+information+scientist" target="_blank"&gt;renowned information &lt;/a&gt;&lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=scientist" target="_blank"&gt;scientist &lt;/a&gt;and Distinguished Fellow of the &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=centre+for+internet" target="_blank"&gt;Centre for Internet &lt;/a&gt;and Society in Bengaluru, told this &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=correspondent" target="_blank"&gt;correspondent &lt;/a&gt;in an email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Unfortunately, many Indians -- both individuals and companies -- are in  this business," he said. "Predatory journals pose a big threat to the  integrity of research."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These are shameful acts by greedy publishers," Subhash Lakhotia, a &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=professor+of+zoology" target="_blank"&gt;professor of zoology &lt;/a&gt;at the Benaras Hindu University, told this &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=correspondent" target="_blank"&gt;correspondent &lt;/a&gt;in an email. "Until we stop payments of all kinds of open access charges and modify the present faulty &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=assessment+system" target="_blank"&gt;assessment system &lt;/a&gt;that relies on numbers of publications, predation in one or the other form would continue."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/business-standard-ians-october-11-2018-sting-job-by-hyderabad-scientist-exposes-fake-journals'&gt;https://cis-india.org/openness/news/business-standard-ians-october-11-2018-sting-job-by-hyderabad-scientist-exposes-fake-journals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2018-10-17T02:06:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/stiff-resistance">
    <title>Stiff Resistance Dogs India's ID Plan</title>
    <link>https://cis-india.org/news/stiff-resistance</link>
    <description>
        &lt;b&gt;An article about the UID project by Indrajit Basu in Asia Times Online.&lt;/b&gt;
        
&lt;p&gt;Tembhali is little known beyond its neighborhood in northern Maharashtra. Yet, as Manmohan Singh and Sonia Gandhi descended by on Wednesday, the tiny hamlet with less than 1,500 residents suddenly became the center of attraction in the global arena of e-governance.&lt;/p&gt;
&lt;p&gt;India's prime minister and the ruling Congress party's leader were helicoptered in to officially flag India's most ambitious attempt to transform the way the state reaches its citizens - and also the world's largest identity program.&lt;/p&gt;
&lt;p&gt;The so-called Unique Identification (UID) mission, which has been dubbed locally as "Aadhar" ("foundation"), the project will create unique biometric identification numbers for each and every one of India's 1.2 billion people.&lt;/p&gt;
&lt;p&gt;Ambitious yet highly controversial, UID numbers will be linked to fingerprints, iris scans, personal information, a microchip for easy scanning, and more. Led by a new government agency called the Unique Identification Authority of India (UIDAI), the project is spearheaded by Nandan Nilekeni, one of India's most famous techie-entrepreneurs as the co-founder of Infosys, who has been given ministerial powers and a magnanimous (rumored to be US$3 billion or more) budget to implement the grand plan.&lt;/p&gt;
&lt;p&gt;According to Nilekeni, among the scores of advantages for the country's people, the millions of India's poor who are without access to the government's plethora of welfare schemes would benefit the most from the new identification system. Much like the mobile telephony, the UID number would connect the poor to the broader and advancing economy of India, he says.&lt;/p&gt;
&lt;p&gt;"The government has taken up this project for two reason; one is there are large number of Indians specially those who are urban migrants and rural poor who do not have any form of acknowledged existence by the state and therefore they face the challenge of harassment in their lives. They do not get access to public services either. So the one of the main purposes of this program is to make life easier for the millions of poor, migrants and marginalized (expected to be over 300 million) people. As well as to give inclusion to them," said Nilekeni.&lt;/p&gt;
&lt;p&gt;The other is to make all government welfare schemes far more efficient by ensuring that they reach "each and every deserving poor", he says.&lt;/p&gt;
&lt;p&gt;Even as the impoverished tribal farming community in Tembhali - many of whom do not even own the land they till - wonder how a unique identity, as Manmohan declared on Wednesday, "can change their lives", UID is meeting stiff resistance from civil liberties groups, privacy advocates, and legal eagles.&lt;/p&gt;
&lt;p&gt;Critics condemn the UID as a blatant intrusion to privacy, a tool that will increase bureaucracy and corruption, and say that in addition to being hugely expensive and even illegal, the UID goes against basic human values.&lt;/p&gt;
&lt;p&gt;"This project, has been initiated without any prelude: there is no project document; there is no feasibility study; there has been no cost-to-benefit analysis and there are serious concerns about data and identity theft," said Gopal Krishna, Member Citizens Forum for Civil Liberties.&lt;/p&gt;
&lt;p&gt;Worse, Krishna added, a project "that could change the status of the people in this country, with regard to security and constitutional rights has been initiated without any legal authorization; just on the basis of an executive order".&lt;/p&gt;
&lt;p&gt;The strongest opposition to the project has been generated by the fact that it aims to create a huge digital database containing sensitive personal information in one central location. This is a security risk of "immense" proportions, according to critics.&lt;/p&gt;
&lt;p&gt;"Given that the country has hardly any capability in securing its digital database, and an absence of privacy laws, UID's plans of storing its data in one centralized database is an immense risk," said Sunil Abraham, an activist at the People Union for Civil Liberties. "The trouble with a centralized infrastructure is that if it is compromised, then all of it will be compromised, which can result in the collapse of the country's information systems."&lt;/p&gt;
&lt;p&gt;Nilekeni deflects these criticisms, saying that the UID Authority will use "the best expertise for security and we also have a policy of proactively publishing strategy policy report and committee reports on our website as well." But arguments against the project stretch on.&lt;/p&gt;
&lt;p&gt;"The other opposition is the use of biometrics for ID," says Abraham. "Our fear is that most parts of the country do not have power and if the system mandates that every time a rural resident has to prove his identity biometrically for say collecting subsidized food, chances are that the process will be slower and more prone to failure because of lack of infrastructure."&lt;/p&gt;
&lt;p&gt;That, according to critics, could give rise to newer complication or even manipulation of the biometric data - and hence an additional opportunity for corruption.&lt;/p&gt;
&lt;p&gt;"A typical unlettered person does not understand the complexities of biometric data collection and verification," says Jiti Nichani, a researcher and an advocate, Alternative Law Forum. "Given the rampant bureaucracy and corruption in the country, this would give yet another reason for the corrupt to siphon off the largesse of a welfare scheme elsewhere; corruption will increase manifold as a consequence."&lt;/p&gt;
&lt;p&gt;Still, its flip side is not really devoid of selling points; some of UID's beneficial characteristics are undeniable.&lt;/p&gt;
&lt;p&gt;For one, experts say, for every rupee spent on the government's welfare schemes, lack of identity of a poor Indian results in just 15 paisa reaching them. UID then can really revolutionize the way government services are delivered.&lt;/p&gt;
&lt;p&gt;Besides, inability to prove identity is not only one of the biggest barriers that prevent the poor from accessing benefits and subsidies, or stymie the government from reaching out to the deserving. It also stops the government formulating appropriate welfare polices, plugging leakages, and above all, eliminating fraud and duplicate identities.&lt;/p&gt;
&lt;p&gt;UID, say its proponents, will no longer allow someone to represent themselves differently across a number of agencies, which could solve a lot these problems.&lt;/p&gt;
&lt;p&gt;"A UID will enable the poor grab the right to education, get jobs on migration, get medical benefits and even open a bank account and get a mobile phone connection," said Nilekni. "The transformative capability of the UID scheme can be enormous."&lt;/p&gt;
&lt;p&gt;Nevertheless, providing an identity to one billion plus Indians in a country so devoid of basic infrastructure is a Herculean task.&lt;/p&gt;
&lt;p&gt;Its real challenge may not lie in the concerns that critics have raised, but perhaps in the politics of governance and its reforms. Experts say the success of the project depends on the effective use of political authority, and how Nilekeni and Manmohan manage to address corruption in the political and official systems.&lt;/p&gt;
&lt;p&gt;Nilekeni though is undaunted. "I am aware that there are a lot of challenges and this is a humongous project," he said. "But there is a lot of political will and support, and the government is firmly convinced that this project could change the face of India."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original in &lt;a class="external-link" href="http://www.atimes.com/atimes/South_Asia/LJ01Df02.html"&gt;Asia Times Online&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt;: &lt;em&gt;Sunil Abraham does not work for People's Union for Civil Liberties&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/stiff-resistance'&gt;https://cis-india.org/news/stiff-resistance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T09:59:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/steps-towards-integrated-open-water-data">
    <title>Steps towards Integrated Open Water Data</title>
    <link>https://cis-india.org/openness/steps-towards-integrated-open-water-data</link>
    <description>
        &lt;b&gt;Multiplicity of data collection agencies, formats, and disclosure practices and conditionalities make it very difficult to access interoperable and open data about water resources and systems in India. Barriers to accessing water data impede not only academic and applied research on related topics but also public consumption of information and critical decision making. DataMeet and CIS are proud to collaborate on identifying and addressing the challenges to open up and integrate data and information in the water sector. Supported by a generous grant from Arghyam, we are undertaking an initial study of open water data resources in India and taking first steps towards developing a Free and Open Source data portal for water resources information in India. Here is an initial note about the project. The key leaders and contributors of this project are Craig Dsouza, Namita Bhatawdekar, Riddhi Munde, and Jinda Sandbhor, all of whom are members of the Pune Chapter of DataMeet.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Project website: &lt;a href="https://datameet-pune.github.io/open-water-data/" target="_blank"&gt;https://datameet-pune.github.io/open-water-data/&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;Contact: &lt;a href="mailto:pune@datameet.org"&gt;pune@datameet.org&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2&gt;The problem statement&lt;/h2&gt;
&lt;p&gt;Following devastating precipitation of more than 300mm in 24 hours in early December 2015 the city of Chennai was flooded unlike anything it had seen in recent history. A combination of bad urban planning along with heavy precipitation events had made such eventualities all the more likely. But in the case of such storms what parts of the city are likely to flood? What parts will remain unaffected by the deluge. Specific answers to these questions would help city planners plan better for such emergencies.&lt;/p&gt;
&lt;p&gt;Only two months after Chennai was waist deep in water, the city of Latur in 2016 ran dry. The Manjara reservoir, on the river of the same name, the city's source of municipal water supply had not a drop left. With more than 4 months left until the rains would replenish the waters of the dam, the city was now reliant on water being transported in bulk via train tankers from more than 300 kms away, news that made daily headlines. The scale of sugarcane cultivation in the region was being called into question.. Was it possible that lowering the allocation of water to irrigation could have preserved enough water for the city's domestic water needs?&lt;/p&gt;
&lt;p&gt;Each of these questions call for answers relating to the exact stock of water resources, and how fast the water flows from one part of the water cycle to another. For example, knowing current soil moisture levels and daily precipitation can we estimate groundwater recharge with a high degree of accuracy? If seasonal groundwater fluctuations and river flows in a watershed or sub-basin is known can we estimate actual quantum groundwater footprint of the crop irrigated with groundwater in that river basin? If new industries are being set up in close proximity to each other what might be the effect of these industries on groundwater stocks in the vicinity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Towards an (integrated and open) data solution&lt;/h2&gt;
&lt;p&gt;Deriving cause-effect links between the scale of use of water in a particular region and its possible effect on the status of water resources in the vicinity is an extremely difficult exercise because water stocks and flows are affected by so many causal links which need to be studied and quantified in an integrated manner. An integral part of any water resource study is developing a water balance model to estimate water availability and water demand.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Water availability&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Precipitation in the form of rainfall and snowfall,&lt;/li&gt;
&lt;li&gt;Live storage capacity in reservoirs,&lt;/li&gt;
&lt;li&gt;Soil moisture,&lt;/li&gt;
&lt;li&gt;Groundwater levels (and fluctuation), and&lt;/li&gt;
&lt;li&gt;Surface water flows in rivers.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Water use/demand&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Domestic water use:&lt;/strong&gt; Human Population x estimated per capita consumption (or prescribed norm for domestic water consumption),&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Livestock water use:&lt;/strong&gt; Livestock population x estimated per capita requirement,&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Agriculture and Forests:&lt;/strong&gt; Evapotranspiration data (derived from temperatures (daily/monthly), wind speeds, humidity (daily/monthly), soil moisture &amp;amp; type, type of Agricultural land use, stage of plant growth, and&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Industry:&lt;/strong&gt; Nature of industry and annual production x water required per unit of production.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Overcoming the data challenge&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Unknown to many, reasonably high resolution data does exist of these variables both across space and time, as described in detail below. Much of this data though hasn't been made inter-operable. We need tools to model water data, putting together real-time data for water availability and demand onto one platform that can facilitate discussions around it. However what we have are either proprietary river basin modeling software (expensive) OR free open source tools (programming/skill intensive).&lt;/p&gt;
&lt;p&gt;They demand:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;knowledge of programming or know-how of technical tools and unavoidably&lt;/li&gt;
&lt;li&gt;knowledge of the various data sources (to piece together the puzzle)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;What if instead, we had access to a tool, open, free, accessible to everyone through a browser (hence no need to download software) and most importantly intuitive to use and understand to someone with little technical or programming knowledge.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;What we propose and who is it for?&lt;/h2&gt;
&lt;p&gt;To understand and take the first steps towards developing a completely free and open source data portal for water resources information in India.&lt;/p&gt;
&lt;p&gt;Different groups would have different kinds of needs for water data. Researchers for instance tend to think of larger scales (river basins, sub-basins) whereas Gram Panchayat members may not think beyond the village or watershed scale. Hence this proposal aims at macro and micro scales, trying to determine needs at each level and enhancing our platform to meet these different needs.&lt;/p&gt;
&lt;p&gt;The project will generate:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;A &lt;strong&gt;web app prototype&lt;/strong&gt; that will collate secondary data,&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;paper&lt;/strong&gt; that outlines sources of data, type of data, level to which available (GP, village, etc.) and nature of the source (Paid/ unpaid/ format available etc.), and&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;model WSP format&lt;/strong&gt;, along with indications for what data already exists in secondary sources.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The users of this work will be:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Researchers/Journalists in the water sector, and&lt;/li&gt;
&lt;li&gt;Gram Panchayat Members (to effectively develop water security plans, monitor and govern their local water resources).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Project Team&lt;/h2&gt;
&lt;p&gt;The project team is supported by Nisha Thompson (Director, DataMeet) and Sumandro Chattapadhyay.&lt;/p&gt;
&lt;h4&gt;Craig Dsouza&lt;/h4&gt;
&lt;p&gt;Craig is an independent researcher in the development sector with a keen interest in water resources and agriculture. He has a Master’s degree in Energy and Environmental Policy (2013) and has worked as a researcher with the Society for Promoting Participative Ecosystem Mgmt, undertaking river basin studies in central and eastern India. Craig believes that the democratization of data and tools to derive insights from it holds tremendous potential for addressing issues of inequity and environmental sustainability in India. He contributes to these efforts as co-ordinator of Datameet-Pune, a city chapter of datameet.org.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/craigdsouza"&gt;https://github.com/craigdsouza&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;Twitter:&lt;/strong&gt; &lt;a href="https://twitter.com/dsouza_craig"&gt;https://twitter.com/dsouza_craig&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;Website:&lt;/strong&gt; &lt;a href="http://unravellingindia.in/"&gt;http://unravellingindia.in/&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;Namita Bhatawdekar&lt;/h4&gt;
&lt;p&gt;Namita is a web developer with 10 years of experience developing web applications and web-based data visualizations. She has worked on developing data Visuaizations for corporate businesses as well as in the research sector. She worked with Singapore-MIT Alliance for Research and Development (MIT's research lab in Singapore) as a Data Visualization expert where she visualized simulation outputs of autonomous vehicles to evaluate urban transport policies. Her work was showcased in many national and international conferences. She has a keen interest in solving social problems using data and is part of Datameet Pune, city chapter of datameet.org.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;GitHub:&lt;/strong&gt; &lt;a href="https://github.com/bnamita"&gt;https://github.com/bnamita&lt;/a&gt;&lt;br /&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/namitabhatawdekar/"&gt;https://www.linkedin.com/in/namitabhatawdekar/&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;Website:&lt;/strong&gt; &lt;a href="https://bnamita.github.io/Portfolio/"&gt;https://bnamita.github.io/Portfolio/&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;Riddhi Munde&lt;/h4&gt;
&lt;p&gt;Riddhi is a GIS and Remote Sensing professional with 2.5 yrs of experience. She has a Master's degree in Geoinformatics and Earth Observation from ITC, University of Twente, The Netherlands. Her project experience includes implementing GIS and remote sensing solutions across a number of industries. She is interested in location and remote sensing analytics, ML, Image processing, web based visualizations and is proficient in ArcGIS, QGIS, PostGIS, Web mapping, algorithm development in Python and R and cloud computing. At Datameet she contributes with her know how of remote sensing to further improve data access in water and agriculture.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;LinkedIn:&lt;/strong&gt; &lt;a href="https://www.linkedin.com/in/riddhimunde/"&gt;https://www.linkedin.com/in/riddhimunde/&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;Jinda Sandbhor&lt;/h4&gt;
&lt;p&gt;Jinda Sandbhor is an action researcher associated with Manthan Adhyayan Kendra, Pune, where he works to document and analyze issues related to the water and energy sectors in India. He actively supports socio-political movements in Maharashtra, Odisha and North Karnataka. In the past he has conducted research studies on water conflicts around rivers and major dams, socio-economic impacts of droughts, impacts of coal based thermal power on water and the local environment. He has been associated with the Datameet-Pune chapter since its beginning in 2015 and here seeks to improve access to data on social and environmental subjects.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;a href="http://jinda.manthan-india.org/author/jinda/"&gt;http://jinda.manthan-india.org/author/jinda/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/steps-towards-integrated-open-water-data'&gt;https://cis-india.org/openness/steps-towards-integrated-open-water-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Water Data</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Environment</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2017-11-02T09:58:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting">
    <title>Statement of Civil Society Members and Groups Participating in the "Best Bits" pre-IGF meeting at Baku in 2012</title>
    <link>https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society was one of the signatories for this submission made to the ITU on November 16, 2012.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bestbits.igf-online.net/statement/"&gt;Read the statement of civil society members and groups participating in the “Best Bits” pre-IGF meeting at Baku in 2012&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;We thank the Secretariat of the ITU for making the opportunity to submit our views.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nevertheless, the process of the revision of the International Telecommunication Regulations (ITRs) has not been sufficiently inclusive and transparent, despite some recent efforts to facilitate public participation.  Fundamental to the framing of public policy must be the pursuit of the public interest and fundamental human rights, and we urge Member States to uphold and protect these values.&lt;br /&gt; &lt;br /&gt; We as civil society organizations wish to engage with the World Conference on International Telecommunication (WCIT) process in this spirit. Member States, in most cases, have not held open, broad-based, public consultations in the lead up to the WCIT, nor have they indicated such a process for the WCIT itself.&lt;br /&gt; &lt;br /&gt; In order to address this deficiency, and at a minimum, we would urge:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; All Member States and regional groups to make their proposals available to the public in sufficient time to allow for meaningfulpublic participation;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All delegates to support proposals to open sessions of the WCIT meeting to the public;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ITU Secretariat to increase transparency of the WCIT including live webcast with the video, audio, and text transcripts, as far as possible, to enable participation by all, including persons with disabilities;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ITU Secretariat, Member States, and regional groups to make as much documentation publicly available as possible on the ITU's website, so that civil society can provide substantive input on proposals as they are made available;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Member States to encourage and facilitate civil society participation in their national delegations;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ITU to create spaces during the WCIT for civil society to express their views, as was done during the WSIS process.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Given the uncertainty about the nature of final proposals that will be presented, we urge delegates that the following criteria be applied to any proposed revisions of the ITRs.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;That any proposed revisions are confined to the traditional scope of the ITRs, where international regulation is required around technical issues is limited to telecommunications networks and interoperability standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There should be no revisions to the ITRs that involve regulation of the Internet Protocol and the layers above.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There should be no revisions that could have a negative impact on affordable access to the Internet or the public's rights to privacy and freedom of expression.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;More generally we call upon the ITU to promote principles of net neutrality, open standards, affordable access and universal service, and effective competition.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Signatories:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Access (Global)&lt;/li&gt;
&lt;li&gt;Association for Progressive Communications (Global)&lt;/li&gt;
&lt;li&gt;Bangladesh NGOs Network for Radio and Communication (Bangladesh)&lt;/li&gt;
&lt;li&gt;Bytes for All (Pakistan)&lt;/li&gt;
&lt;li&gt;Center for Democracy and Technology (United States of America)&lt;/li&gt;
&lt;li&gt;Centre for Community Informatics Research (Canada)&lt;/li&gt;
&lt;li&gt;Centre for Internet and Society (India)&lt;/li&gt;
&lt;li&gt;Collaboration on International ICT Policy for East and Southern Africa (Eastern and Southern Africa)&lt;/li&gt;
&lt;li&gt;Consumer Council of Fiji (Fiji)&lt;/li&gt;
&lt;li&gt;Consumers International (Global)&lt;/li&gt;
&lt;li&gt;Dynamic Coalition on Internet Rights and Principles (IRP) (Global)&lt;/li&gt;
&lt;li&gt;Electronic Frontier Finland (Finland)&lt;/li&gt;
&lt;li&gt;Imagining the Internet Center (United States of America)&lt;/li&gt;
&lt;li&gt;Instituto Nupef (Brazil)&lt;/li&gt;
&lt;li&gt;Internet Democracy Project (India)&lt;/li&gt;
&lt;li&gt;Internet Research Project (Pakistan)&lt;/li&gt;
&lt;li&gt;Global Partners and Associates (United Kingdom)&lt;/li&gt;
&lt;li&gt;GobernanzadeInternet.co (Colombia)&lt;/li&gt;
&lt;li&gt;ICT Watch Indonesia (Indonesia)&lt;/li&gt;
&lt;li&gt;Instituto Brasileiro de Defesa do Consumidor / Brazilian Institute for&lt;/li&gt;
&lt;li&gt;Consumer Defense (Brazil)&lt;/li&gt;
&lt;li&gt;InternetNZ (New Zealand)&lt;/li&gt;
&lt;li&gt;IT for Change (India)&lt;/li&gt;
&lt;li&gt;Media Education Center (Armenia)&lt;/li&gt;
&lt;li&gt;ONG Derechos Digitales (Chile)&lt;/li&gt;
&lt;li&gt;OpenMedia (Canada)&lt;/li&gt;
&lt;li&gt;Public Knowledge (United States of America)&lt;/li&gt;
&lt;li&gt;Thai Netizen Network (Thailand)&lt;/li&gt;
&lt;li&gt;Ginger Paque (Venezuala)&lt;/li&gt;
&lt;li&gt;Nnenna Nwakanma (Côte d'Ivoire)&lt;/li&gt;
&lt;li&gt;Sonigitu Ekpe (Nigeria)&lt;/li&gt;
&lt;li&gt;Wolfgang Kleinwächter (Denmark)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting'&gt;https://cis-india.org/internet-governance/blog/statement-of-civil-society-members-and-groups-at-best-bits-pre-igf-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T08:06:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary">
    <title>State Surveillance and Human Rights Camp: Summary</title>
    <link>https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary</link>
    <description>
        &lt;b&gt;On December 13 and 14, 2012, the Electronic Frontier Foundation organized the Surveillance and Human Rights Camp held in Rio de Janeiro, Brazil. The meeting examined trends in surveillance, reasons for state surveillance, surveillance tactics that governments are using, and safeguards that can be put in place to protect against unlawful or disproportionate surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The camp also examined different types of data, understanding tools that governments can use to access data, and looked at examples of surveillance measures in different contexts. The camp was divided into plenary sessions and individual participatory workshops, and brought together activists, researchers, and experts from all over the world. Experiences from multiple countries were shared, with an emphasis on the experience of surveillance in Latin America. Among other things, this blog summarizes my understanding of the discussions that took place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The camp also served as a platform for collaboration on the &lt;i&gt;Draft International Principles on Communications Surveillance and Human Rights&lt;/i&gt;. These principles seek to set an international standard for safeguards to the surveillance of communications that recognizes and upholds human rights, and provide guidance for legislative changes related to communications and communications meta data to ensure that the use of modern communications technology does not violate individual privacy.  The principles were first drafted in October 2012 in Brussels, and are still in draft form. A global consultation is taking place to bring in feedback and perspective on the principles.&lt;/p&gt;
&lt;p&gt;The draft principles were institutionalized for a number of reasons including:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Currently there are no principles      or international best standards specifically prescribing necessary and      important safeguards to surveillance of communication data. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Practices around surveillance of      communications by governments and the technology used by governments is      rapidly changing, while legislation and safeguards protecting individual      communications from illegal or disproportionate surveillance are staying      the same, and thus rapidly becoming outdated. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New legislation that allows      surveillance through access to communication data that is being proposed      often attempts to give sweeping powers to law enforcement for access to      data across multiple jurisdictions, and mandates extensive cooperation and      assistance from the private sector including extensive data retention      policies, back doors, and built in monitoring capabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Surveillance of communications is      often carried out with few safeguards in place including limited transparency      to the public, and limited forms of appeal or redress for the individual. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This has placed the individual in a vulnerable position as opaque surveillance of communications is carried out by governments across the world — the abuse of which is unclear. The principles try to address these challenges by establishing standards and safeguards which should be upheld and incorporated into legislation and practices allowing the surveillance of communications.&lt;/p&gt;
&lt;p&gt;A summary of the draft principles is below. As the principles are still a working draft, the most up to date version of the principles can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net/"&gt;here&lt;/a&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Summary of the Draft International Principles on Communications Surveillance and Human Rights&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any surveillance of communications undertaken by the government must be codified by statute. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow surveillance of communications for legitimate purposes.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing surveillance of communications should limit such measures to what is demonstrably necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Surveillance of communications should only be undertaken to the extent that is adequate for fulfilling legitimate and necessary purposes. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Any authorization for surveillance of communications must be made by a competent and independent authority. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: All measures of surveillance of communications must be specific and proportionate to what is necessary to achieve a specific purpose. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments undertaking surveillance of communications must respect and guarantee an individual’s human rights. Any interference with an individual's human rights must be authorized by a law in force.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Governments undertaking surveillance of communications must allow service providers to notify individuals of any legal access that takes place related to their personal information. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The governments ability to survey communications and the process for surveillance should be transparent to the public. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: Governments must establish an independent oversight mechanism to ensure transparency and accountability of lawful surveillance measures carried out on communications. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: In order to enable service providers to secure communications securely, governments cannot require service providers to build in surveillance or monitoring capabilities.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: When governments work with other governments across borders to fight crime, the higher/highest standard should apply. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should provide sufficient penalties to dissuade against unwarranted surveillance of communications.  &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of the surveillance on communications should be borne by the government undertaking the surveillance.&lt;/p&gt;
&lt;h3&gt;Types of Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conversations during the camp reviewed a number of practices related to surveillance of communications, and emphasized the importance of establishing the draft principles. Setting the background to various surveillance measures that can be carried out by the government, the different categories of communication data that can be easily accessed by governments and law enforcement were discussed. For example, law enforcement frequently accesses information such as IP address, account name and number, telephone number, transactional records, and location data.  This data can be understood as 'non-content' data or communication data, and in many jurisdictions can easily be accessed by law enforcement/governments, as the requirements for accessing communication data are lower than the requirements for accessing the actual content of communications. For example, in the United States a court order is not needed to access communication data whereas a judicial order is needed to access the content of communications.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in the UK law enforcement can access communication data with authorization from a senior police officer.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was discussed how it is concerning that communication data can be accessed easily, as it provides a plethora of facts about an individual. Given the sensitivity of communication data and the ability for personal information to be derived from the data, the ease that law enforcement is accessing the data, and the unawareness of the individual about the access- places the privacy of users at risk.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ways of Accessing Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ways in which governments and law enforcement access information and associated challenges was discussed, both in terms of the legislation that allows for access and the technology that is used for access.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Technology&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this discussion it was pointed out that in traditional forms of accessing data governments are no longer effective for a number of reasons. For example, in many cases communications and transactions, etc., that take place on the internet are encrypted. The ubiquitous use of encryption means more protection for the individual in everyday use of the internet, but serves as an obstacle to law enforcement and governments, as the content of a message is even more difficult to access. Thus, law enforcement and governments are using technologies like commercial surveillance software, targeted hacking, and malware to survey individuals. The software is sold off the shelf at trade shows by commercial software companies to law enforcement and governments. Though the software has been developed to be a useful tool for governments, it was found that in some cases it has been abused by authoritarian regimes. For example in 2012, it was found that  FinSpy, a computer espionage software made by the British company Gamma Group was being used to target political dissidents by the Government of Bahrain. FinSpy has the ability to capture computer screen shots, record Skype chats, turn on computer cameras and microphones, and log keystrokes.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to intercept communications or block access to sites, governments and ISPs also  rely on the use of deep packet inspection (DPI).&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Deep packet inspection is a tool traditionally used by internet service providers for effective management of the network. DPI allows for ISP's to monitor and filter data flowing through the network by inspecting the header of a packet of data and the content of the packet.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; With this information it is possible to read the actual content of packets, and identify the program or service being used.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DPI can be used for the detection of viruses, spam, unfair use of bandwidth, and copyright enforcement.  At the same time, DPI can allow for the possibility of unauthorized data mining and real time interception to take place, and can be used to block internet traffic whether it is encrypted or not.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Governmental requirements for deep packet inspection can in some cases be found in legislation and policy. In other cases it is not clear if it is mandatory for ISP's to provide DPI capabilities, thus the use of DPI by governments is often an opaque area. Recently, the ITU has sought to define an international standard for deep packet inspection known as the "Y.2770" standard. The standard proposes a technical interoperable protocol for deep packet inspection systems, which would be applicable to "application identification, flow identification, and inspected traffic types".&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Access and Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussions also examined similarities across legislation and policy which allows governments legal access to data. It was pointed out that legislation providing access to different types of data is increasingly becoming outdated, and is unable to distinguish between communications data and personal data. Thus, relevant legislation is often based on inaccurate and outdated assumptions about what information would be useful and what types of safeguards are necessary. For example, it was discussed how US surveillance law has traditionally established safeguards based on assumptions like: surveillance of data on a personal computer is more invasive than access to data stored in the cloud, real-time surveillance is more invasive than access to stored data, surveillance of newer communications is more invasive than surveillance of older communications, etc. These assumptions are no longer valid as information stored in the cloud, surveillance of older communications, and surveillance of stored data can be more invasive than access to newer communications, etc. It was also discussed that increasingly relevant legislation also contains provisions that have generic access standards, unclear authorization processes, and provide broad circumstances in which communication data and content can be accessed. The discussion also examined how governments are beginning to put in place mandatory and extensive data retention plans as tools of surveillance. These data retention mandates highlight the changing role of internet intermediaries including the fact that they are no longer independent from political pressure, and no longer have the ability to easily protect clients from unauthorized surveillance.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. EFF. Mandatory Data Retention: United States. Available at: &lt;a class="external-link" href="https://www.eff.org/issues/mandatory-data-retention/us"&gt;https://www.eff.org/issues/mandatory-data-retention/us&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Espiner, T. Communications Data Bill: Need to Know. ZDNet. June 18th 2012. &lt;a class="external-link" href="http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/"&gt;http://www.zdnet.com/communications-data-bill-need-to-know-3040155406/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Perlroth, M. Software Meant to Fight Crime is Used to Spy on Dissidents. The New York Times. August 30th 2012. Available at: &lt;a class="external-link" href="http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0"&gt;http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Wawro, A. What is Deep Packet Inspection?. PCWorld. February 1st 2012. Available at: &lt;a class="external-link" href="http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html"&gt;http://www.pcworld.com/article/249137/what_is_deep_packet_inspection_.html&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Geere, D. How deep packet inspection works. Wired. April 27th 2012. Available at: &lt;a class="external-link" href="http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works"&gt;http://www.wired.co.uk/news/archive/2012-04/27/how-deep-packet-inspection-works&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Kassner. M. Deep Packet Inspection: What You Need to Know. Tech Republic. July 27th 2008. Available at: &lt;a class="external-link" href="http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609"&gt;http://www.techrepublic.com/blog/networking/deep-packet-inspection-what-you-need-to-know/609&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Anonyproz. How to Bypass Deep Packet Inspection Devices or ISPs Blocking Open VPN Traffic. Available at: &lt;a class="external-link" href="http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;amp;_a=viewarticle&amp;amp;amp;kbarticleid=138"&gt;http://www.anonyproz.com/supportsuite/index.php?_m=knowledgebase&amp;amp;_a=viewarticle&amp;amp;kbarticleid=138&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Chirgwin. R. Revealed: ITU's deep packet snooping standard leaks online: Boring tech doc or Internet eating monster. The Register. December 6th 2012. Available at: &lt;a class="external-link" href="http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/"&gt;http://www.theregister.co.uk/2012/12/06/dpi_standard_leaked/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary'&gt;https://cis-india.org/internet-governance/blog/state-surveillance-human-rights-camp-summary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T16:02:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/state-surveillance-and-human-rights-camp">
    <title>State Surveillance and Human Rights Camp</title>
    <link>https://cis-india.org/news/state-surveillance-and-human-rights-camp</link>
    <description>
        &lt;b&gt;A two-day conference was held in Rio on December 13 and 14 at Sheraton Rio Hotel &amp; Resort. Elonnai Hickok participated in the event and made a presentation on MLATS and International Cooperation for Law Enforcement Purposes.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://wiki.surveillancehumanrights.org/Rights_Camp_Brazil"&gt;Click here&lt;/a&gt; to see the Wiki page of the event. See Elonnai's presentation&lt;a href="https://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf" class="internal-link"&gt; here&lt;/a&gt; [PDF, 313 Kb].&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;DAY 1: Mapping Out Government Surveillance Problems &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;8:30 - 9:00 &lt;b&gt;Registration&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;9:00 - 9:10 &lt;b&gt;Welcome/Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from Spanish to English and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: Kinds of Data, Ways of Getting It &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;09:10 - 10:30&lt;/p&gt;
&lt;p&gt;Chair: Enrique Chaparro, Fundacion Via Libre [Argentina, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Metadata, online identifiers, and technologies of surveillance &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/seth-schoen"&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Surveillance  is getting      easier and cheaper for many reasons, not least because  people are using      electronic communications more than ever before,  and there are so many      facts out there to be noticed about the ways  devices are talking to each      other. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I will  talk about the kinds      of things that refer to people and their  devices, with a particular focus      on telecommunications metadata and  transactional records that are      described as "non-content" and may  receive lower levels of legal      protection. I'll discuss who is in a  position to record this information,      some of the things that can be  learned from it, and why traffic analysis      is powerful and  difficult to defend against. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I'll  try to explain concepts      like MAC address, IP address, account name  and number, telephone number,      IMEI, IMSI, transient identifiers,  log files, transactional records,      locational privacy, and  associational privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Cell_Phone_Location_Tracking" title="Cell Phone Location Tracking"&gt;How law enforcement agencies use cell phone location tracking technology in criminal cases&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;Hanni Fakhoury, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;With  the rise of      smartphones, the U.S. government's use of cell site  location data to      pinpoint our exact location has grown more  widespread (and precise) over      time. For years, U.S. courts  permitted the government to get this location      data without a search  warrant under a tortured interpretation of federal      electronic  privacy statutes and an even more alarming constitutional argument:       that we don't have any privacy in data we turn over to third parties,  like      cell phone companies. This talk will review what location data  is and why      the police want it, how they can get it under U.S. law,  and legal and      practical steps that need to be taken to safeguard  our privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Deep_packet_inspection:_What_it_is,_how_it_works,_and_how_it_is_used_for_surveillance" title="Deep packet inspection: What it is, how it works, and how it is used for surveillance"&gt;Deep packet inspection: What it is, how it works, and how it is used for surveillance&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Chris Parsons, Doctoral Candidate, University of Victoria [Canada, EN]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;We are  in the midst of a      standardization revolution, a mass translation  of discordant analogue      signal types to interoperable digital  transmission standards. All this      digitized consumer traffic passes  through the gateways of Internet Service      Providers’ (ISPs). ISPs  function as communicative bottlenecks, ideally      positioning them to  monitor, mine, and modify data using the Deep Packet      Inspection  (DPI) appliances situated within their networks. Some uses of      these  appliances could reshape the conditions of communication in       democracies, blocking or modifying data transmissions in near real time. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In  this presentation I      discuss the technical capabilities of deep  packet inspection and its      significance for increased private and  public surveillance capabilities.      Drawing from case material from  academic and advocacy work, I identify how      the technology has been  used for ISP-level surveillance, for copyright      purposes, for  national security purposes, and for advertising purposes.      Moreover,  I address how advocates in differing nations have opposed      various  uses of the technology, why they have done so, and conditions that       facilitate domestic resistance to deep packet inspections' uses. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Advances_in_online_spying:_Commercial_surveillance_software,_targeted_hacking_and_beyond" title="Advances in online spying: Commercial surveillance software, targeted hacking and beyond"&gt;Advances in online spying: Commercial surveillance software, targeted hacking and beyond&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Morgan Marquis-Boire, Google [New Zealand, EN]&lt;/p&gt;
&lt;p&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Against  an increasingly      security-aware online community, the traditional  tools of blocking, filtering,      and wiretapping have become less  effective. Nervous regimes turn to the      largely unregulated $5  billion a year industry in Internet surveillance      tools. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Once  the realm of the black      market and intelligence agencies, the latest  computer spyware is now sold      at trade shows for dictator pocket  change. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This  talk will detail the      cat and mouse game between authoritarian  regimes and dissidents, as well      as ongoing efforts to map out the  relationship between surveillance      software companies and  governments. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;10:30 - 10:40 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round I &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;10:40 - 11:50&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Format:&lt;/i&gt; Interactive sessions with active participat0ion from the audience.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 1: Mobile privacy threats &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This  workshop addresses the      ways governments are tracking mobile  devices’ location and use, and why      it’s been harder to protect  communications privacy on mobile devices than      on PCs. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;&lt;br /&gt;Hanni Fakhoury, Electronic Frontier Foundation&lt;/a&gt; [United States, EN]&lt;a href="https://www.eff.org/about/staff/seth-schoen"&gt;&lt;br /&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN/PT]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Enrique Chaparro, Fundación Vía Libre [Argentina, EN/ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 2: Training activists about state surveillance capabilities &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this workshop we’ll talk      about some of new surveillance  technologies that states are deploying, and      the tactics that are  used to legitimize the surveillance. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Going  beyond just ‘what is      used and how’, we speak to some political  tactics that advocates have used      to resist these tools on practical  and principled levels, some of the      conditions that contribute to  successes, and ways of mobilizing effective      strategies against  expansions of state surveillance. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitator:&lt;a href="http://www.christopher-parsons.com"&gt;&lt;br /&gt;Chris Parsons, University of Victoria&lt;/a&gt; [Canada, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Workshop_Tactics_for_Opposing_Surveillance" title="Workshop Tactics for Opposing Surveillance"&gt;Workshop 3: Tactics for opposing state sponsored malware and surveillance&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This  workshop will review      the different tactics government and  non-government actors have employed      to stop authoritarian regimes  from making use of surveillance technology      built in the United  States and Europe to spy on their citizens. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We  will discuss corporate      responsibility, export controls, as well as  the role of security research      and user education campaigns. The  workshop will end with a brainstorm of      at least one concrete action  each workshop attendee can take. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN]&lt;br /&gt;Morgan Marquis-Boire [New Zealand, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Silvio Rhatto, Sarava Group [Brazil, PT]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporting Back Session &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;11:50 - 12:40 Chair:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteurs:&lt;br /&gt;Enrique Chaparro, Fundación Vía Libre [Argentina, EN/ES]&lt;br /&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Report:Training_activists" title="Report:Training activists"&gt;Training Activists about State Surveillance Capabilities&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Silvio Rhatto, Sarava Group [Brazil, PT]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Format: Each rapporteur has 10 minutes to report back about the  results of their workshop discussion and 20 minutes to answer questions.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;12:40 - 2:00 &lt;b&gt;Lunch&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Legal and Policy Plenary: Government Access to People’s Data &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;2:00 - 3:20&lt;/p&gt;
&lt;p&gt;Chair: Pedro Paranaguá, Advisor for Internet Policy to the Workers’ Party in the Brazilian Chamber of Deputies [Brazil, PT/EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Different_data,_different_rules%3F_How_the_law_has_assigned_varying_levels_of_privacy_protection_to_different_categories_of_personal_information" title="Different data, different rules? How the law has assigned varying levels of privacy protection to different categories of personal information"&gt;Different  data, different rules? How the law has assigned varying levels of  privacy protection to different categories of personal information&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Kevin Bankston, Center for Democracy and Technology [United States, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Using  the example of US law,      this presentation will map the different  legal protections that have      traditionally been applied to different  types surveillance of different      types of data, and consider how to  redraw that map in light of new      technologies. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Speaking  generally, US surveillance      law has been written based on the  assumptions that: (1) surveillance of      data on your computer is more  invasive than access to your data in the      cloud;(2) real-time  surveillance is more invasive than access to stored      data; (3)  surveillance of the content of communications is more invasive      than  surveillance of non-content meta-data; (4) surveillance of newer       communications is more invasive than surveillance of older  communications. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;These  assumptions have long      defined which types of surveillance are most  strongly regulated against      and which types of data are most  strongly protected by law. Changing      technology has made these  assumptions about invasiveness and privacy      increasingly obsolete,  assuming that they ever made sense at all. But if      these  distinctions are outdated, what if any legal distinctions between       different types of surveillance or data should replace them? How, if at       all, can the law sensibly distinguish between personal  communications and      communications data in which we have a  reasonable expectation of privacy,      and that which we do not? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Internet_companies_as_an_agent_of_the_state_%26_european_mandatory_telecommunications_data_retention" title="Internet companies as an agent of the state &amp;amp; european mandatory telecommunications data retention"&gt;Internet companies as an agent of the state &amp;amp; european mandatory telecommunications data retention&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this short presentation I      will introduce European (i.e. based on EU  legislation) regime of mandatory      retention of telecommunication  data for law enforcement purposes,      explaining its political  context, implementation and negative impact on      human rights  standards (not just privacy-related!). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Using  case studies of Poland      and Germany I will present two strikingly  different approaches to storing      telecommunication data and law  enforcement, thus questioning the necessity      and proportionality of  this controversial measure. I will also touch      briefly on pending  political developments (including the revision of the      Data  Retention Directive and the reform of data protection law in the EU),       explaining what the stakes are, what European civil society  organisations      are fighting for and why it is such an important  fight. Finally, I will      explain how the debate about mandatory data  retention feeds into a broader      discussion about the role of  Internet intermediaries, including both their      independence from  political pressure and protection of their clients from       surveillance executed by “private police.” &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Crossborder access to citizen's data and cloud computing in the investigation of criminal cases: Regional trends &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Marcos Salt, profesor de derecho penal y procesal penal de la universidad de Buenos Aires (UBA) [Argentina, ES]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;During  the brief      presentation, I will present practical examples of the  problems caused by      the application by analogy of the rules on  physical evidence to obtain      digital evidence. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;I try  to show that this      trend is inconvenient to both for efficiency in  the investigation of      crimes by the state as to the validity of  individual rights. I will place      special reference to cross-border  access to citizen's data in the cloud. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from Spanish to English and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Background_on_lawful_interception_mandates_and_government_access_to_encryption_keys" title="Background on lawful interception mandates and government access to encryption keys"&gt;Background on lawful interception mandates and government access to encryption keys&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/seth-schoen"&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this session, I'll      discuss some of the history of fights over  government surveillance powers      and government access in the United  States, starting in the early 1990s      and continuing to the present  day. These issues have centered on three      main themes: restrictions  on cryptography and privacy tools, obligations      for communications  intermediaries to acquire and implement surveillance      capabilities,  and mandatory retention of telecommunications data. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;One  interesting point is      that many of the same themes keep recurring:  the powers that the      government is seeking today are often similar  to those it sought two      decades ago. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Another  interesting point is      that the government has not always been  successful in expanding its      surveillance powers. Many of its  proposals never became law and there are      still plenty of issues  left to fight over. But governments around the      world are continuing  to having a major effect on the design of technology,      getting  wiretapping interfaces and backdoors added to communications       systems and discouraging deployments of strong encryption. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/MLATS_and_International_Cooperation_for_Law_Enforcement_Purposes" title="MLATS and International Cooperation for Law Enforcement Purposes"&gt;MLATS and International Cooperation for Law Enforcement Purposes&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Elonnai Hickok, Center for Internet &amp;amp; Society India [India, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this session I will be      looking at the challenges, requisite  safeguards, and possible solutions in      the context of international  cooperation for fighting crime. In doing so I      will look closely at  the proposed principle of safeguards for      international cooperation. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The  objective of this      session will be to explore ways of improving  MLATS and international law      enforcement cooperation in order to  ensure that basic safeguards can be      built into the process of  international cooperation. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Format: 10-15 minutes for each five speakers to introduce legal issues and 20 minutes of discussions&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;3:10 - 3:20 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round II&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3:20 - 4:30&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 1: Electronic surveillance demonstrations &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this workshop, we'll take      a look at a few electronic surveillance  devices (including an ordinary      laptop) and look at some of what  they can intercept. Technological      infrastructure permitting, we may  have a live demonstration of      intercepting or modifying users'  Internet communications. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We'll  also consider low-cost      surveillance techniques and discuss what  kinds of demonstrations have the      most pedagogical value for making  users aware of particular threats. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitator:&lt;br /&gt;Seth Schoen, Electronic Frontier Foundation [United States, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN/ES/PT]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Workshop 2: Legal framework regarding compelled disclosure of communications, subscriber information, and cryptographic keys &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In  this workshop we will      cover various examples of compelled  disclosure of private information      (from subscriber information and  content of communication to cryptographic      keys) in the context of  law enforcement, focusing on their legal aspects.      We will briefly  present various legal frameworks, discussing both the      examples of  legal safeguards (“good practices”) and their shortcomings      that  allow for government surveillance. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We  will also look at various      human rights implications of these  measures and (potential / existing)      role of private companies from  the perspective of their compliance with      such measures (incl. when  requested by non-democratic regimes). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;br /&gt;Katarzyna Szymielewicz, European Digital Rights [Poland, EN]&lt;br /&gt;Elonnai Hickok, Center for Internet &amp;amp; Society India [India, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;&lt;br /&gt;Hanni Fakhoury, Electronic Frontier Foundation&lt;/a&gt; [United States, EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshop 3: What data is most private? What surveillance is most invasive? How if at all should laws treat them differently? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This  workshop will build on      the discussion that began in the law &amp;amp;  policy plenary, discussing how      certain surveillance laws have  applied different legal protections to      different types of data and  surveillance, and questioning whether such      distinctions make sense  in light of new technology. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The  workshop will address      that question from legal, personal, and  political perspectives.      Participants will share with each other  details of how the laws in their      countries treat different types of  data and different types of      surveillance, to facilitate shared  understanding of the existing legal      frameworks and to identify  existing gaps and discrepancies in current      legal protections. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Based  on their own personal      experiences as Internet users and as  advocates, participants will then      discuss what data in their lives  they consider most private and what types      of surveillance they find  most invasive, and reflect on how if at all the      law should  distinguish between them. Finally, participants will discuss      the  politics of these different frameworks: both how gaps and weaknesses       in existing frameworks threaten the ability of advocates to  politically      organize in the face of government surveillance, and  how we can best work      through the political process and change those  frameworks to better      reflect current technology and human rights  norms. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;br /&gt;Kevin Bankston, Center for Democracy and Technology [United States, EN]&lt;br /&gt;Danilo Doneda, Fundação Getúlio Vargas [Brazil, PT/EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Beatriz Busaniche, Fundación Vía Libre [Argentina, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporting Back Session &amp;amp; Closing Meeting Day 1 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4:30 - 5:20&lt;/p&gt;
&lt;p&gt;Chair:&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;&lt;br /&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteurs:&lt;br /&gt;Eva Galperin, Electronic Frontier Foundation [United States, EN/ES/PT]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Report:Demonstrating_Surveillance" title="Report:Demonstrating Surveillance"&gt;Demonstrating Surveillance&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/hanni-fakhoury"&gt;Hanni Fakhoury, Electronic Frontier Foundation&lt;/a&gt; [United States, EN]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Report:Compelled_Disclosure" title="Report:Compelled Disclosure"&gt;Compelled Disclosure of Communications, Subscriber Information &amp;amp; Cryptographic Keys&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Beatriz Busaniche, Fundación Vía Libre [Argentina, ES]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Report:&lt;/b&gt; What Data is Most Private? What Surveillance is Most Invasive? Should Laws Treat Different Data Differently? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;8:30 pm &lt;b&gt;Dinner&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;DAY 2: Challenges and Mapping Out Possible Solutions&lt;/b&gt;&lt;br /&gt;8:55 - 9:00 Welcome&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: Surveillance in Latin America&lt;/b&gt;&lt;br /&gt;9:00 - 10:20&lt;/p&gt;
&lt;p&gt;Chair: Camila Marques, Lawyer, ARTIGO 19 [Brazil, PT]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Colombia&lt;/b&gt;&lt;br /&gt;Carlos Eduardo Huertas, Semana [Colombia, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Cuba&lt;/b&gt;&lt;br /&gt;“Mario Hernandez” [Cuba, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in the Northern Triangle&lt;/b&gt;&lt;br /&gt;Renata Avila, Global Voices [Guatemala, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Peru&lt;/b&gt;&lt;br /&gt;Yonsi Solis, Global Voices [Peru, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance in Mexico&lt;/b&gt;&lt;br /&gt;Caracol Azul, [Mexico, ES]&lt;i&gt;&lt;br /&gt;This session will have simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Keynote: Challenges Posed By Electronic Surveillance &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10:20 - 10:40&lt;br /&gt;Frank La Rue, United Nations Special Rapporteur on Freedom of Expression [Guatemala, ES]&lt;br /&gt;Increasing pressure (legal and political) on private parties to help carry out the state’s surveillance mandate.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;10:40 - 11:00 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: International Surveillance &amp;amp; Human Rights Principles: Challenges and Opportunities in Latin America &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;11:00 - 11:50&lt;/p&gt;
&lt;p&gt;Chair: Carly Nyst, Privacy International [Australia/UK, EN]&lt;br /&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Explanation of the Principles: Background, purpose, need, challenges and opportunities&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Chilean and Latin American perspectives&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Alberto Cerda, Derechos Digitales [Chile, ES]&lt;i&gt;&lt;br /&gt;Simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Expansion of Brazilian law enforcement powers to access users’ digital information &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Pablo Ortellado, GPOPAI [Brasil, PT/EN]&lt;i&gt;&lt;br /&gt;Simultaneous interpretation from Portuguese to Spanish and English&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance and regional human rights standards &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Juan Camilo Rivera, Comisión Colombiana de Juristas [Colombia, ES]&lt;i&gt;&lt;br /&gt;Simultaneous interpretation from Spanish to English and Portuguese&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round III &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;11:50 - 1:00&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Workshop_1:_International_surveillance_and_human_rights_principles:_Perspectives_from_Latin_America" title="Workshop 1: International surveillance and human rights principles: Perspectives from Latin America"&gt;Workshop 1: International surveillance and human rights principles: Perspectives from Latin America&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facilitator:&lt;br /&gt;Alberto Cerda, Derechos Digitales [ES] &amp;amp; Carly Nyst, Privacy International [UK, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Juan Camilo Rivera, Comisión Colombiana de Juristas [Colombia, ES]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Technical_community_activism" title="Technical community activism"&gt;Workshop 2: Technical community activism&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;What is the technology community doing to defend privacy?&lt;/p&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Enrique_Chaparro" title="Enrique Chaparro"&gt;Enrique Chaparro, Fundación Vía Libre [Argentina, ES&lt;/a&gt; ]&lt;br /&gt;João Carlos Caribé, Movimento Mega (aka Mega Não) [Brazil, PT/EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;a href="https://www.eff.org/about/staff/eva-galperin"&gt;&lt;br /&gt;Eva Galperin, Electronic Frontier Foundation [USA, EN]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Plenary: Hands-on Activism &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;2:40 - 3:50 p.m.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Chair: Rebecca Bowe,      Electronic Frontier Foundation [United States, EN] &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Simultaneous interpretation from English to Spanish and Portuguese.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;What is meant by Hands-On       Activism? As you’ll learn from our panelists, there are many strategies       that can be utilized to push back against a surveillance practice  or      proposal. We’ll cover the most effective ways to obtain public  records;      strategies for generating interest in digital rights  issues; fresh and      extraordinary approaches to creative campaigning,  and tactics used by an      international nonprofit to tackle privacy  issues with online campaigns. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Raising digital awareness in Peru &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Marco_Sifuentes" title="Marco Sifuentes"&gt;Marco Sifuentes, Instituto Prensa y Sociedad [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Peru has a very active and       influential online community. It can affect the course of elections,  prove      the president wrong and stop law projects. It can work very  well on      "real world" matters. But when it comes to online issues,  it's      been hard to raise awareness on the Peruvian general public  and even on      the media. What went wrong? However, in the past year,  some digital topics      have received a lot of coverage. Some not. What  changed? I’ll share Peru's      experience in the hope that every  participant can compare it with his or      her own country's situation. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Online organizing for human rights &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Fabiola_Carrion" title="Fabiola Carrion"&gt;Fabiola Carrion, Access [Peru, ES/EN] &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A recent addition to the      Access  Team, Fabiola will begin her presentation by talking about her own       experiences in organizing and advocacy, arguing that the struggle for       human rights is increasingly moving online. She will discuss new  tools of      organizing, and the importance of combining technology,  policy, and      grassroots advocacy tactics to affect holistic change  in internet policy      debates. Her presentation will include a series  of short case studies from      around the world where Access, along  with its various allies, have      successfully campaigned for a free  and open internet. Her presentation      will conclude with a discussion  of lessons learned and best practices for      online organizing,  particularly around issues of surveillance and due      process. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Surveillance and secrecy: Strategy and tactics - Using the law to uncover abuse of LEAs’ surveillance powers &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Geoff_King" title="Geoff King"&gt;Geoff King, Lawyer [United States, EN]&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Open government laws, though       riddled with exemptions, are powerful tools for shedding light on the       governmental operations. One way in which these laws can be used is  to      uncover the existence of law enforcement surveillance, as well  details      about the tools used to achieve such surveillance. This  portion of the presentation      will explore how journalists and  activists can employ successful      transparency strategies in the face  of various procedural pitfalls. It      will also give concrete  examples of how such strategies have paid off in      the recent past. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Materials:Law_to_Uncover_Surveillance" title="Materials:Law to Uncover Surveillance"&gt;Presentation      Materials&lt;/a&gt;&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Creative campaigning: tactical media mashup&lt;/b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Vladan_Joler" title="Vladan Joler"&gt;&lt;br /&gt;Vladan Joler, Share Foundation [Serbia, EN] &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Explore the beautiful world      of tactical media as a creative tool for getting your message out there. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;From creative campaigning      during  Serbian protests in the 90s to “lo fi” media interventions,       protests inside computer games, media pranks and parasite media tactics  to      social media bots and Twitter bombs. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Materials:Tactical_Media" title="Materials:Tactical Media"&gt;Presentation      Materials&lt;/a&gt;&lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;Simultaneous interpretation from English to Spanish and Portuguese&lt;/i&gt; &lt;a href="http://wiki.surveillancehumanrights.org/Rights_Camp_Brazil#top"&gt;Return to Top&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3:50 - 4:10 &lt;b&gt;Coffee Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Workshops: Round IV &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4:10 - 5:10&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/Workshop_1:_What_the_international_surveillance_and_human_rights_principles_are_asking_the_governments_to_do%3F" title="Workshop 1: What the international surveillance and human rights principles are asking the governments to do?"&gt;Workshop 1: What the international surveillance and human rights principles are asking the governments to do?&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;This session will be used to      call  out exactly what the International Surveillance and Human Rights       Principles are asking governments to change or legislative/policy  actions      they are asking governments to take. This will hopefully be  useful in      helping individuals and organizations understand what  aspects to highlight      and push when proposing the principles and  why. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;br /&gt;Elonnai Hickok, Center for Internet &amp;amp; Society India [India, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Graciela Selaimen, NUPEF [Brasil, EN/ES/PT]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="http://wiki.surveillancehumanrights.org/index.php?title=Workshop_2:_Creative_campaigning:_tactical_media_mashup_%26_anti-surveillance_campaigns&amp;amp;action=edit&amp;amp;redlink=1" title="Workshop 2: Creative campaigning: tactical media mashup &amp;amp; anti-surveillance campaigns (page does not exist)"&gt;Workshop 2: Creative campaigning: tactical media mashup &amp;amp; anti-surveillance campaigns&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;What are activists around      the  world doing to counter surveillance proposals and practices? And what       could they be doing, with just a little more knowledge and  inspiration? At      this session, workshop facilitators will share  stories about successful      campaigns launched around the world in  response to government      surveillance. How did a humorous Twitter  hashtag about a proponent of      surveillance legislation rise to  “trending” status on Twitter? How did a      small team of digital  rights activists in Argentina manage to position      themselves as one  of the most trusted media sources on issues relating to      privacy in  the digital realm? How did a small group of activists manage to       reach biggest world media and how are activists creating their own  media?      We’ll then open it up for a group discussion in which  participants can      share their own stories of effective tactics from  around the world, and      explore ideas for collaborating and  harnessing the knowledge gleaned from      our collective experiences. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Facilitators:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.eff.org/about/staff/rebecca-bowe"&gt;Rebecca Bowe, Electronic Frontier Foundation [United States, EN]&lt;/a&gt;&lt;br /&gt;Vladan Joler, Share Foundation [Serbia, EN]&lt;/p&gt;
&lt;p&gt;Rapporteur:&lt;br /&gt;Hisham Almiraat, Global Voices Advocacy [Morocco, EN]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporting Back Session &amp;amp; Closing Remarks &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;5:10 - 6:00&lt;/p&gt;
&lt;p&gt;Chair:&lt;a href="https://www.eff.org/about/staff/katitza-rodriguez"&gt;&lt;br /&gt;Katitza Rodriguez, Electronic Frontier Foundation [Peru, ES]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rapporteurs:&lt;br /&gt;Graciela Selaimen, NUPEF [Brasil, EN/ES/PT]&lt;/p&gt;
&lt;p&gt;Renzo Lavin, Asociación Civil por la Igualdad y la Justicia [Argentina, ES]&lt;br /&gt;Hisham Almiraat, Global Voices Advocacy [Morocco, EN]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Each breakout session will have one designated rapporteur, one note-taker, and a module to work around.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/state-surveillance-and-human-rights-camp'&gt;https://cis-india.org/news/state-surveillance-and-human-rights-camp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-21T07:19:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/state-of-openness-in-indias-e-governance-applications">
    <title>State of Openness in India's E-Governance Applications</title>
    <link>https://cis-india.org/openness/state-of-openness-in-indias-e-governance-applications</link>
    <description>
        &lt;b&gt;Open source software (OSS), also commonly known as free and open source software (FOSS) or free libre open source software (FLOSS), is software that is made available with its source code. It is licensed liberally, granting users access to study, use, modify, improve, or redistribute it. This work was sponsored by Mozilla Foundation. &lt;/b&gt;
        &lt;p style="text-align: left; "&gt;In this context, the term ‘open’ refers to the source code being made available without having to pay royalties or licensing fees, while the term ‘free’ refers to the freedom to copy and use the software rather than being ‘free of cost’. The two organisations that are the self-appointed custodians of these definitions are the Free Software Foundation (FSF)2 and the Open Software Initiative (OSI).3 While the two organisations and the two terms resulted from different philosophies and represent different methodologies, the FSF and OSI acknowledge that for all practical purposes, “they both refer to essentially the same thing”4; “however, the differences in extension of the category are small: nearly all free software is open source, and nearly all open source software is free.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: left; "&gt;&lt;b&gt;&lt;a class="external-link" href="https://cis-india.org/openness/files/state-of-openness-in-indias-e-governance"&gt;Click to download the research paper&lt;/a&gt;&lt;/b&gt; authored by Upasana Hembram and reviewed by Divyansha Sehgal. Shared under Creative Commons Attribution 4.0 International license.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/state-of-openness-in-indias-e-governance-applications'&gt;https://cis-india.org/openness/state-of-openness-in-indias-e-governance-applications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Upasana Hembram</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    

   <dc:date>2025-03-26T02:01:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24">
    <title>State of Digital Rights in India (Delhi, March 24)</title>
    <link>https://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24</link>
    <description>
        &lt;b&gt;The Centre for Communication Governance at National Law University, Delhi and the Internet Freedom Foundation, in association with Access Now, are hosting a discussion on The State of Digital Rights in India on March 24, 2017 (Friday) from 6.00 pm onwards at Lecture Room-I, India International Centre- Annexe, New Delhi. Japreet Grewal and Sumandro Chattapadhyay will participate in the panel discussions.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Registration: &lt;a href="https://www.eventbrite.com/e/state-of-digital-rights-in-india-tickets-33001450226"&gt;Eventbrite&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;March 24, 2017 marks the two year anniversary of the landmark Shreya Singhal judgment. This was a very significant ruling on freedom of speech and expression and occupies an important place in the Supreme Court’s discourse on civil liberties. The judgment traces out the contours of free speech on the Internet in India and unequivocally holds that the right to freedom of expression provided under Article 19(1)(a) applies to speech over the Internet, making it clear that this is a medium-neutral right.&lt;/p&gt;
&lt;p&gt;The event aims to shed some light on this key judgment and discuss ongoing discussions regarding our civil liberties and freedoms online before courts and the Parliament. We would also like to take this opportunity to discuss some of the other pressing issues like Network Neutrality, Internet shutdowns, Privacy and User Security which need immediate attention and engagement of our democratic institutions. We hope to formulate effective strategies which will further shape the legal and policy framework in India, and facilitate better collaborative efforts between stakeholders.&lt;/p&gt;
&lt;p&gt;We hope to bring together everyone who contributed to the judgment, and those who do work connected with it, so that we may build on it to seek a better legal framework to protect online speech and to discuss the threats surrounding digital rights and how best build on the foundations of the judgment.&lt;/p&gt;
&lt;p&gt;We would be grateful if you could take out some time on Friday evening (6PM) and be a part of this important discussion. The discussion will be followed by dinner and an Open Bar for an Open Internet, which will start from 9.00 pm at the Annexe Court in the India International Centre - Annexe. In case you are unable to attend the seminar, please do join us for dinner!&lt;/p&gt;
&lt;p&gt;Featuring:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;A keynote address on our online freedoms and policymaking, by Shri Tathagata Satpathy (Member of Parliament, Lok Sabha)&lt;/li&gt;
&lt;li&gt;A legal panel analysing the legacy of the Shreya Singhal v. Union of India judgment&lt;/li&gt;
&lt;li&gt;Beyond Shreya Singhal: A conversation with women on the future of our digital rights&lt;/li&gt;
&lt;li&gt;Briefings on the state of digital rights in our courts and in Parliament&lt;/li&gt;
&lt;li&gt;A conversation on the path ahead for our civil liberties and digital rights community&lt;/li&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24'&gt;https://cis-india.org/internet-governance/news/state-of-digital-rights-in-india-delhi-march-24&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal and Sumandro Chattapadhyay</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Civil Society</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2017-03-27T13:21:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics">
    <title>Start-up India turns the heat on Facebook Free Basics</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics</link>
    <description>
        &lt;b&gt;Facebook launched its "Save Free Basics" campaign last week, asking users to support "digital equality" in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anita Babu was published in &lt;a class="external-link" href="http://www.business-standard.com/article/companies/start-up-india-turns-the-heat-on-facebook-free-basics-115122300056_1.html"&gt;Business Standard&lt;/a&gt; on December 22, 2015. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;Nearly a week after Facebook launched its  controversial "Save Free Basics" campaign in India, the net neutrality  debate has come to the fore again. This time around, India's star  internet entrepreneurs such as Vijay Shekhar Sharma, founder and chief  executive of Paytm, and Dippak Khurana of Vserv have joined the crusade  for free internet.&lt;br /&gt; &lt;br /&gt; "Oh my fellow Indians, either choose this and do a jihad for independent  internet later or pick net neutrality today," Sharma of Paytm, India's  largest digital wallet, tweeted on Tuesday. "Digital world war heads! We  have to load &lt;a href="http://www.savetheinternet.in%20for%20#NetNeutrality" target="_blank"&gt;http://www.savetheinternet.in for #NetNeutrality&lt;/a&gt;,"  said Sharma in another tweet. Savetheinternet.in, a volunteer group,  has urged people to lend their support for an unfettered internet in  India.&lt;br /&gt; &lt;br /&gt; Facebook launched its "Save Free Basics" campaign last week, asking  users to support "digital equality" in India, in response to a paper by  the telecom regulator which is seeking comments on differential pricing  practices like Airtel Zero of Facebook's Free Basics, which was earlier  called Internet.org.&lt;br /&gt; &lt;br /&gt; Facebook launched a print and digital media campaign for a "connected  India" asking users to give a missed call, automatically sending a  message to the regulator in support of Free Basics.&lt;br /&gt; &lt;br /&gt; Facebook has also been asking its users to send an e-mail to Telecom  Regulatory Authority of India (TRAI) supporting "essential internet for  all". The social network claims to have gained support from 3.2 million  of its 130 million users in India.&lt;br /&gt; &lt;br /&gt; On Tuesday, the social media giant earned flak for soliciting support  from international users for the campaign. Later, Facebook withdrew the  campaign outside India claiming it was an "accident".&lt;br /&gt; &lt;br /&gt; However, some net neutrality volunteers said that many of Facebook's 3.2 million supporters for Free Basics were non-Indians.&lt;br /&gt; &lt;br /&gt; Activists and tech leaders are calling the Facebook campaign "misleading" and "destructive".&lt;br /&gt; &lt;br /&gt; "People are being tricked into supporting Free Basics under the guise of  digital equality," wrote Amol Malviya, former chief technology officer  at Flipkart, India's largest e-commerce firm, on his blog. "Notice the  language on the page? It makes any critic of Free Basics appear to be an  enemy of digital equality. People will listen to the critics' arguments  much lesser when there's a question mark on their intent."&lt;br /&gt; &lt;br /&gt; Nikhil Pahwa, editor and publisher of MediaNama, said India should  question the intent of Facebook and its campaign. "There is  misrepresentation in the language they have used. It makes people assume  that we can't have universal internet access without net-neutrality  violating services such as Free Basics. It is important for a country to  take note of how much power a platform with as much reach as Facebook  has to influence an important government process," said Pahwa, who led a  fight against TRAI's move to allow telecom firms charge for internet  services like WhatsApp and Hike.&lt;br /&gt; &lt;br /&gt; The basic premise of net neutrality is that of freedom - an open  internet that protects and enables free communication. Anything that  takes away this freedom violates the fundamentals of free Internet.  "Facebook's Free Basics is neither free nor basic - it is a cleverly  disguised way of walling a garden, and hardly the philanthropic  initiative that it is marketed to be," said Khurana of Vserv. He urged  internet users to uninstall the Facebook App from their mobile phones in  protest.&lt;br /&gt; &lt;br /&gt; Pranesh Prakash, policy director at the Centre for Internet and Society,  said, "Facebook, a foreign company, is allowed to campaign with  impunity, but NGOs receiving funding from foreign trusts are subject to  all manners of restrictions and may not campaign in India." &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics'&gt;https://cis-india.org/internet-governance/news/business-standard-anita-babu-december-23-2015-start-up-india-turns-the-heat-on-facebook-free-basics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-29T15:54:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/Standard-Essential-Patents-on-Low-Cost-Mobile-Phones-in-India-A-Case-to-Strengthen-Competition-Regulation.pdf">
    <title>Standard-Essential-Patents-on-Low-Cost-Mobile-Phones-in-India-A-Case-to-Strengthen-Competition-Regulation.pdf</title>
    <link>https://cis-india.org/a2k/blogs/Standard-Essential-Patents-on-Low-Cost-Mobile-Phones-in-India-A-Case-to-Strengthen-Competition-Regulation.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/Standard-Essential-Patents-on-Low-Cost-Mobile-Phones-in-India-A-Case-to-Strengthen-Competition-Regulation.pdf'&gt;https://cis-india.org/a2k/blogs/Standard-Essential-Patents-on-Low-Cost-Mobile-Phones-in-India-A-Case-to-Strengthen-Competition-Regulation.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-02-25T02:31:25Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/the-socio-legal-review-nehaa-chaudhari-standard-essential-patent-on-low-cost-mobile-phones-in-india">
    <title>Standard Essential Patents on Low-Cost Mobile Phones in India: A Case to Strengthen Competition Regulation?</title>
    <link>https://cis-india.org/a2k/blogs/the-socio-legal-review-nehaa-chaudhari-standard-essential-patent-on-low-cost-mobile-phones-in-india</link>
    <description>
        &lt;b&gt;The realization of the promise of the sub hundred dollar mobile device as a facilitator of access to knowledge is contingent inter alia on its availability in the market place. In turn, the market availability of the sub hundred dollar mobile device is influenced by the existence of an enabling environment for producers to produce, and consumers to consume. From a regulatory perspective, the enabling environment itself is a function of existing laws and policies, and the ‘developmental effects’ of certain laws and policies (Saraswati, 2012).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This article seeks to examine one such legal and policy lever and the role of a regulator in the development of an enabling environment for access to sub hundred dollar mobile devices. This paper is founded on four assumptions: first, that access to sub hundred dollar mobile devices is influenced by their price; second, that the question of access necessitates conversation between the intellectual property regime and several other actors, sites and tools; third, that one of the fundamental goals of regulatory reform is the creation of a ‘stable, open and future- proof environment’ (Guermazi and Satola, 2005) that encourages access to these devices; and fourth, that there exist public law implications of intellectual property that justify the involvement of State actors and regulators in matters that may arise out of private transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This article will examine whether there is a role to be played by competition law in this narrative of innovation, intellectual property and access to sub hundred dollar mobile devices.  In light of increasing litigation around standard essential patents, and the inability of FRAND and International Standard Setting Organizations to find a comprehensive solution, this paper will question the efficacy of competition law as an ex post solution to a problem that might be better addressed by ex ante regulation from a specialized body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an attempt to address these questions, this article will examine the role of the Competition Commission of India and the Indian Judiciary. Orders of the Competition Commission will be studied from its inception till March, 2015, in order to draw conclusions about the role that the Commission identifies for itself and the nature of disputes it adjudicates. This article will also examine the role of similarly placed institutions in the United States of America as well as some member states of the European Union.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It will be argued that while Competition Law might address some of the issues arising out of litigation around standard essential patents, and might be a tool to increase access to sub hundred dollar mobile devices, its efficacy as a long term solution in light of its nature as an ex post solution, is questionable. Consequently, it might be prudent to have a conversation leaning towards exante regulation of the market place by a specialized regulator.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The paper was published by &lt;a class="external-link" href="http://www.sociolegalreview.com/standard-essential-patents-on-low-cost-mobile-phones-in-india-a-case-to-strengthen-competition-regultion/"&gt;Socio Legal Review&lt;/a&gt; (National Law School of India University). Download the PDF &lt;a href="https://cis-india.org/a2k/blogs/Standard-Essential-Patents-on-Low-Cost-Mobile-Phones-in-India-A-Case-to-Strengthen-Competition-Regulation.pdf" class="internal-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/the-socio-legal-review-nehaa-chaudhari-standard-essential-patent-on-low-cost-mobile-phones-in-india'&gt;https://cis-india.org/a2k/blogs/the-socio-legal-review-nehaa-chaudhari-standard-essential-patent-on-low-cost-mobile-phones-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Competition Law</dc:subject>
    
    
        <dc:subject>Competition</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-04-24T04:42:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/stand-up-for-digital-rights">
    <title>Stand up for Digital Rights</title>
    <link>https://cis-india.org/internet-governance/events/stand-up-for-digital-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a discussion on a set of recommendations for Ethical Tech, a report on human rights and private online intermediaries which describes key areas where such actors have responsibilities. The event will be held at CIS office in Bangalore on June 15, 2016 from 5 p.m. to 7 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The discussion intends to launch a report on human rights and private online intermediaries, which describes key areas where such actors have responsibilities and provides a detailed set of recommendations for Ethical Tech. This work is the culmination of a year long research project led by the Centre for Law and Democracy (CLD), in collaboration with the Arabic Network for Human Rights Information (ANHRI), the Centre for Internet and Society (CIS), Open Net Korea, the Center for Studies on Freedom of Expression and Access to Information at the University of Palermo (CELE) and researchers with the University of Ottawa and the Munk School of Global Affairs at the University of Toronto. The key themes for discussion would include:&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;General Human Rights Responsibilities and Private Online Intermediaries&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Expanding Access&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Net Neutrality&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Content Moderation&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Privacy&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Transparency and Informed Consent&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Responding to State Interferences&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;We look forward to meeting you and making this forum for knowledge exchange a success.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/stand-up-for-digital-rights'&gt;https://cis-india.org/internet-governance/events/stand-up-for-digital-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2016-06-13T15:30:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
