<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 391 to 405.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/sense-and-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/softtware-patents-and-the-commons"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/events/seminar-on-rethinking-copyright-and-licensing-for-digital-publishing-today-delhi-jan-23-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/teri-seminar-on-open-access-in-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/open-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/seminar-on-exceptions-and-limitations-in-copyright"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/selection-of-programme-officer-pilot-projects-a2k"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-march-26-2018-nilesh-christopher-security-experts-say-need-to-secure-aadhaar-ecosystem-warn-about-third-party-leaks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sectoral-privacy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/standards/second-response"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2010-bulletin">
    <title>September 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this bulletin we bring you updates of our research, news and media coverage and announcement of events organised in the month of September 2010.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;News Updates&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Conference: Internet at Liberty 2010: This conference is being held in Budapest from 20 to 22 September 2010. It is co-sponsored by Google and Central European University. Sunil Abraham and Anja Kovacs are attending the conference. &lt;a href="http://bit.ly/afo0WY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/afo0WY&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; INDIA Fears of Privacy Loss Pursue Ambitious ID Project: Fears about loss of privacy are being voiced as India gears up to launch an ambitious scheme to biometrically identify and number each of its 1.2 billion inhabitants. &lt;a href="http://bit.ly/dnJDRu" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dnJDRu&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Innovate / Activate: The event will be held on 24 and 25 September 2010 at New York Law School. &lt;a href="http://bit.ly/cbICFq" target="_blank"&gt;http://bit.ly/cbICFq&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Webinar: Closed for Business: A Global Panel Discusses International Copyright Laws and Their Impact on the Open Internet &lt;a href="http://bit.ly/a3ZFBw" target="_blank"&gt;&lt;br /&gt;http://bit.ly/a3ZFBw&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The madness of software patents &lt;br /&gt;India’s patent law excludes software per se, yet over a thousand patents have been granted, writes Lata Jishnu in an article published in Down to Earth. &lt;a href="http://bit.ly/cpHd7R" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cpHd7R&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Why piracy is tough to rein in &lt;br /&gt;“Video market is being treated as a poor cousin of the film industry” &lt;a href="http://bit.ly/aDUpiY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aDUpiY&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency and MDGs: the Role of the Media and Technology &lt;br /&gt;Key quotes from sixth panel &lt;a href="http://bit.ly/b3a0YC" target="_blank"&gt;&lt;br /&gt;http://bit.ly/b3a0YC&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Copyright bill restricts Net access &lt;br /&gt;Law to curb piracy may fetter creativity &lt;a href="http://bit.ly/cFj3rD" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cFj3rD&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;科技改變社會 數位原生代計畫 &lt;br /&gt;The Chinese language press covered the Digital Natives workshop in Taipei. &lt;a href="http://bit.ly/bPhEO4" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bPhEO4&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;科技改變社會數位原生代掀波 &lt;br /&gt;The Chinese press published an article on Digital Natives. &lt;a href="http://bit.ly/bHaQor" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bHaQor&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Information is Beautiful hacks in India with David Cameron &lt;br /&gt;The Prime Minister took some of the UK's top hackers and data experts with him to India this week. David McCandless was with them. &lt;a href="http://bit.ly/dr3AJ2" target="_blank"&gt;&lt;br /&gt;http://bit.ly/dr3AJ2&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Events&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;International Conference on Enabling Access to Education through ICT: ICT workshop in New Delhi from 27th to 29th October, 2010...Registrations open!&lt;a href="http://bit.ly/9flyEK" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9flyEK&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;A Talk by Philipp Schmidt: Philip Schmidt of Peer 2 Peer University will be giving a lecture at the Centre for Internet and Society, Bangalore on 6 October, 2010. &lt;a href="http://bit.ly/aVyzMq" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aVyzMq&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;On Talking Back: A Report on the Taiwan Workshop: What does it mean to Talk Back? Who do we Talk Back against? Are we alone in our attempts or a part of a larger community? How do we use digital technologies to find other peers and stake-​holders? What is the language and vocabulary we use to successfully articulate our problems? How do we negotiate with structures of power to fight for our rights? These were the kind of questions that the Talking Back workshop held in the Institute of Ethnology, Academia Sinica in Taiwan from 16 to 18 August 2010 posed. &lt;a href="http://bit.ly/daE4dM" target="_blank"&gt;&lt;br /&gt;http://bit.ly/daE4dM&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Binary: City and Nature: A continuation of the last post wherein I am looking at various other representation of the city in both classical and popular medium, today I am writing my views on the analysis of certain Miniature paintings. &lt;a href="http://bit.ly/b5FP5D" target="_blank"&gt;&lt;br /&gt;http://bit.ly/b5FP5D&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Of the State and the Governments - The Abstract, the Concrete and the Responsive: This post examines the concepts of state and government to lay the ground for understanding responsiveness enforced through transparency discourses and the deployment of ICTs, the Internet and e-governance programmes. It also lays the context for understanding why and how ICTs. Internet and e-governance have been deployed in India for improving government-citizen interfaces, eliminating middlemen, delivering services electronically and for introducing a range of similar reforms to institute transparency and a responsive state. &lt;a href="http://bit.ly/cNLKcY" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cNLKcY&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Responsive State --- Introduction to the Series: This post is an introduction to a series of posts on the concept of the 'responsive state'. In this series, I try to explain the various meanings that the term responsiveness has come to acquire when it is used in relation with the discourses surrounding transparency and the deployment of ICTs and the Internet to enforce transparency and thereby create a responsive state. Understanding the notion of responsiveness requires us to revisit and analyze certain concepts and the relations that have been drawn between concepts such as state, government, politics, administration, transparency, effectiveness, government-citizen interface, ICTs and effectiveness, among others. &lt;a href="http://bit.ly/agBOiq" target="_blank"&gt;&lt;br /&gt;http://bit.ly/agBOiq&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Attentional Capital in Online Gaming: The Currency of Survival &lt;br /&gt;This blog post by Arun Menon discusses the concepts of production, labour and race in virtual worlds and their influence on the production of attention as a currency. An attempt is made to locate attentional capital, attentional repositories and attention currencies within gaming to examine 'attention currencies and its trade and transactions in virtual worlds. A minimal collection of attention currencies are placed as central and as a pre-requisite for survival in MMOs in much the same way that real currency become a necessity for survival. The approach is to locate attentional capital through different perspectives as well as examine a few concepts around virtual worlds. &lt;a href="http://bit.ly/aaGZj8" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aaGZj8&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;What's in a Name? Or Why Clicktivism May Not Be Ruining Left Activism in India, At Least for Now: In a recent piece in the Guardian titled “Clicktivism Is Ruining Leftist Activism”, Micah White expressed severe concern that, in drawing on tactics of advertising and marketing research, digital activism is undermining “the passionate, ideological and total critique of consumer society”. His concerns are certainly shared by some in India: White's piece has been circulating on activist email lists where people noted with concern that e-activism may be replacing “the real thing” even in this country. But is the situation in India really this dire? &lt;a href="http://bit.ly/9a3I0G" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9a3I0G&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sexuality, Queerness and Internet technologies in Indian context: This blog post lays out the discursive construction of sexuality and queerness as intelligible domains in the Indian context while engaging with ideas of visibility, representation, exclusion, publicness, criminality, difference, tradition, experience, and community that have come into use with the critical responses to queer identities and practices in India. &lt;a href="http://bit.ly/byfPye" target="_blank"&gt;&lt;br /&gt;http://bit.ly/byfPye&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Enabling Access to Education through ICT - A Conference in Delhi: The Centre for Internet and Society (CIS), Bangalore in cooperation with the Global Initiative for Inclusive ICT (G3ICT), a flagship advocacy organization of the UN Global Alliance on ICT and Development (UN-GAID), the International Telecommunications Union (ITU), UNESCO, Digital Empowerment Foundation, Society for Promotion of Alternative Computing and Employment and the Deafway Foundation is organizing an international conference, Enabling Access to Education through ICT in New Delhi from 27 to 29 October 2010. The event is sponsored by Hans Foundation. Registration for the conference has begun. &lt;a href="http://bit.ly/bmrkf7" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bmrkf7&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Access to Knowledge&lt;br /&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Pre-grant Opposition Filed for a Software Patent Application by Blackberry Manufacturers: A pre-grant opposition was filed against a software patent application filed in the patent office by Certicom, a wholly owned subsidiary of Research in Motion (RIM), manufacturers of Blackberry. The opposition was filed on August 31, 2010 by the Software Freedom Law Centre which has recently expanded its operations to India. This exciting development was announced by Mishi Choudhary from SFLC on the lines of the seminar on “Software Patents and the Commons” organised on 1 September 2010 in Delhi jointly by SFLC, the Centre for Internet and Society, the Society for Knowledge Commons and Red Hat. Filing more such oppositions to software patents in India was in the pipeline and this is just the beginning of a movement to take on monopolisation of knowledge and ideas through patenting software, the organisers said. &lt;a href="http://bit.ly/9wE1Xs" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9wE1Xs&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;First Post-Bilski Decision - Software Patent Rejected: In the first decision post-Bilski, the Board of Patents Appeals and Interferences (BPAI) rejected a software patent claimed by Hewlett-Packard. The ruling in this case has buttressed the fact that the Bilski decision furthered the cause of narrowing the patentability of software even though the Supreme Court of the United States totally avoided mentioning software patents or the applicability of the machine or transformation test for software patents in its decision. &lt;a href="http://bit.ly/cnPw7E" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cnPw7E&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Bilski Case - Impact on Software Patents: The Supreme Court of the United States gave its decision in Bilski v Kappos on 28 June, 2010. In this case the petitioners’ patent application sought protection for a claimed invention that explains how commodities buyers and sellers in the energy market can protect, or hedge, against the risk of price changes. The Court in affirming the rejection by the Court of Appeals for the Federal Circuit also held that the machine- or-transformation test is not necessarily the sole test of patentability. The Court’s ruling of abstract ideas as unpatentable and its admission that patents do not necessarily promote innovation and may sometimes limit competition and stifle innovation have provided a ray of hope. In the light of the developments, the Bilski decision as far as patentability of software is concerned may not be totally insignificant, says Krithika Dutta Narayana.&lt;a href="http://bit.ly/bjrPGh" target="_blank"&gt;&lt;br /&gt;http://bit.ly/bjrPGh&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt; Free Access to Law—Is it here to Stay? An Environmental Scan Report: The following is a preliminary project report collaboratively collated by the researchers of the "Free Access to Law" research study. This report aims to highlight the trends, as well as the risks and opportunities, for the sustainability of Free Access to Law initiatives in each of the country examined. &lt;a href="http://bit.ly/9VVzkk" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9VVzkk&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Open Access to Science and Scholarship - Why and What Should We Do?: The National Institute of Advanced Studies held the eighth NIAS-DST  training programme on “Multidisciplinary Perspectives on Science,  Technology and Society” from 26 July to 7 August, 2010. The theme of the  project was ‘Knowledge Management’. Dr. MG Narasimhan and Dr. Sharada  Srinivasan were the coordinators for the event. Professor Subbiah  Arunachalam made a presentation on Open Access to Science and  Scholarship. &lt;a href="http://bit.ly/ciohYy" target="_blank"&gt;&lt;br /&gt;http://bit.ly/ciohYy&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Moldova Online: An Interview with Victor Diaconu: In this interview for Russian Cyberspace, set up with the help of Sunil Abraham (Executive Director at the Centre for Internet and Society in Bangalore, India), computer software professional Victor Diaconu explains the nature of Internet use, state control and the development of blogging and social media platforms in Moldova. Victor works at Computaris in Chisinau. He is Moldova educated, and has travelled to several western countries (including lengthy stays to US, UK) to learn about and understand what there is to be done in Moldova. Sudha Rajagopalan interviewed Victor Diaconu. &lt;a href="http://bit.ly/cgIvXT" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cgIvXT&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Presentation of the UID project by Ashok Dalwai – A Report: On Tuesday, 7 September 2010, Ashok Dalwai, the Deputy Director General of the Unique Identification of India (UIDAI), gave a lecture at the Indian Institute for Science in Bangalore. Representing the UID Authority, his presentation explained the vision of the project and focused on the challenges involved in demographic and biometric identification, the technology adopted, and the enrolment process. Elonnai Hickok gives a report of his presentation in this blog post. &lt;a href="http://bit.ly/aAy5DG" target="_blank"&gt;&lt;br /&gt;http://bit.ly/aAy5DG&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Beyond Access as Inclusion: On 13 September, the day before the fifth Internet Governance Forum opens, CIS is co-organised in Vilnius a meeting on Internet governance and human rights. One of the main aims of this meeting was to call attention to the crucial, yet in Internet governance often neglected, indivisibility of rights. In this blog post, Anja Kovacs uses this lens to illustrate how it can broaden as well reinvigorate our understanding of what remains one of the most pressing issues in Internet governance in developing countries to this day: that of access to the Internet. &lt;a href="http://bit.ly/cgS9py" target="_blank"&gt;&lt;br /&gt;http://bit.ly/cgS9py&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Summary of UID Public Meeting, August 25 2010: A summary of the "No UID" public meeting that took place on Aug. 25th at the Constitution Club, New Dehli. &lt;a href="http://bit.ly/9epHTz" target="_blank"&gt;&lt;br /&gt;http://bit.ly/9epHTz&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;No UID Campaign in New Delhi - A Report: The Unique Identification (UID) Bill is not pro-citizen. The scheme is deeply undemocratic, expensive and fraught with unforseen consequences. A public meeting on UID was held at the Constitution Club, Rafi Marg in New Delhi on 25 August, 2010. The said Bill came under scrutiny at the meeting which was organised by civil society groups from Mumbai, Bangalore and Delhi campaigning under the banner of "No UID". The speakers brought to light many concerns, unanswered questions and problems of the UID scheme. &lt;a href="http://bit.ly/97HwbS" target="_blank"&gt;&lt;br /&gt;http://bit.ly/97HwbS&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wherever you are, whatever you do: Facebook recently launched a location-based service called Places. Privacy advocates are resenting to this new development. Sunil Abraham identifies the three prime reasons for this outcry against Facebook. The article was published in the Indian Express on 23 August, 2010. &lt;a href="http://bit.ly/adXVjB" target="_blank"&gt;&lt;br /&gt;http://bit.ly/adXVjB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;What a highway can do: Despite signs of transformational change, we need more - SOPs and quality &lt;a href="http://bit.ly/deUbmU" target="_blank"&gt;http://bit.ly/deUbmU&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2010-bulletin'&gt;https://cis-india.org/about/newsletters/september-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-08-10T07:22:30Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins">
    <title>Separating the 'Symbiotic Twins'</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins</link>
    <description>
        &lt;b&gt;This post tries to undo the comfortable linking that has come to exist in the ‘radical’ figure of the cyber-queer. And this is so not because of a nostalgic sense of the older ways of performing queerness, or the world of the Internet is fake or unreal in comparison to bodily experience, and ‘real’ politics lies elsewhere. This is so as it is a necessary step towards studying the relationship between technology and sexuality.&lt;/b&gt;
        &lt;p&gt;Here, I would like to deal with ‘openness’ as an idea that seems to structure discussions on the nature of both the Internet and queerness, in different ways. What does it mean to read an object/phenomenon/practice as signalling the acts of opening? What is opening placed in opposition to? The terms that come together to constitute the &lt;em&gt;field of openness&lt;/em&gt;, so to speak, are these – transparency, publicness, privacy, safety, freedom, expression, anonymity (not so paradoxically), communication, virtuality on the one hand and opacity  on the other, the closet, danger, morality, prohibition, lack of access and real life.&lt;/p&gt;
&lt;p&gt;‘Openness’ is seen as the fundamental principle of the Internet. [1] The ramifications of this statement for Internet studies and by extension for studies on the ‘cyber queer’ or on the implications of Internet technology for alternative sexuality practices are then the concern of this post. What does this idea refer itself to in terms of how we live in the world? It refers to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;communication – the idea that with the Internet, communication has broken free of the temporal, spatial, linguistic and national restrictions imposed by earlier technologies; &lt;/li&gt;
&lt;li&gt;space – that space is no longer defined in material terms and the binary or inside/outside and public/private, has been radically recast by the entry into our lives of ‘cyberspace’ and of space thought of in virtual terms;&lt;/li&gt;
&lt;li&gt;body – dematerialization, disembodiment, terms that imply that on the Internet, you become an entity of the mind and of a desire that does not need the material body. The implications of this then being that the threat to the body, posed by its circulation in ‘real’ space and time, is now reduced, because that body no longer has as much at stake as the mind does, in the world of virtual technology. It also means release from a body that is encumbered by class difference and the various ‘markers’ of social relations;&lt;/li&gt;
&lt;li&gt;decentralization – that the Internet adopts the mode of ‘weaving’, which is seen as a refusal of hierarchisation, the kind imposed by the ways in which information is made available, or production and consumption are managed, the ways in which class, race and gender restrict the ways in which individuals ‘participate’. Weaving then refers to a network system in place of a top-down system. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;“The evidence of the trend towards openness is all around. Young people are sharing their lives online via Facebook, Twitter, Flickr, YouTube, Google, and whatever comes next. Though that mystifies their elders and appalls self-appointed privacy advocates, the transparent generation gains value from its openness. This is how they find each other, share, and socialize.”[2] (Jeff Jarvis, author of What would Google do?). We are henceforth titled the ‘transparent generation’, and we find the same value in the technology that defines our lives – the Internet. Why we are ‘transparent’ when compared to earlier generations? ‘Transparent’, ‘strawberry’, etc., are all terms that have come to describe the present generation of Internet users, the youth, a category born out of an idea of freedom from both moral and political constraint. In this imagination of them, they use technology in order to gain this freedom, in order to give their minds and bodies, which are straining at the leash, the required escape routes, from institutions (family, school and legal systems), from social relations (class and sexuality), and earlier forms of political identification.&lt;/p&gt;
&lt;p&gt;The 90s was seen as the decade of openness, both in terms of new media technology and sexual practice. “With liberalisation sweeping the Indian mindset, more and more people are determined to enjoy the secret thrills sex has to offer. While high-profile executives are being seduced by escort services, the middle-class minds are being titillated by 'parties'. Those who are more discreet go for phone sex or MMS.”[3] What comes across is an idea of a new relationship to the temporal and the spatial, the cultural and the social. And sexuality seems to be central to this relationship. “A sexual revolution is sweeping through the small and big towns of India, and to stay immune to it is a big (t)ask.”[4] This article from The Week tells us how the ‘new sexual’ or the ‘newly sexual’ is described in popular discourse. So much so that the violence of the right-wing groups against women and against ‘obscene’ texts are sometimes explained through this very revolution of/in sex. It is read as a backlash, in a moment that is producing this new relationship, with the help of new media technologies such as the mobile phone, the Internet, the web camera and the ‘things’ that enable this openness. And because it is read as a backlash, the practices of the Hindu right are read as wishing to &lt;em&gt;close&lt;/em&gt;, to reverse this process of opening out and to keep things &lt;em&gt;as they used to be&lt;/em&gt;. Openness is not just a set of practices; it is read as a mindset, a shift from an older era of being bound within certain social structures. “Earlier only newly married women had the right, indeed were expected, to advertise their sexuality before receding into wall-flowers as respectable married women but today all that has changed….Walk into any college or even a school campus across the country and you have young men and women equating liberation and sexuality” (Patricia Uberoi). The linking of sexuality and liberation or freedom is here crucial, because what is particular to this era is the fact that ‘sexual expression’ is seen an indicator of freedom, whether this freedom is placed against moral or political orthodoxies, or on the other hand posited as Westernisation. Popular discourse reveals us as having arrived at the desire for sexual freedom (whether or not sexual freedom itself).&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Queerness&lt;/em&gt;, a phenomenon of the 90s in the Indian context, is similarly described as an &lt;em&gt;opening out&lt;/em&gt;. ‘Queer’ signifies a stepping out of the binary of heterosexuality/homosexuality, which will no longer encumber the body or the mind. It is a conscious move away from identities like lesbian, gay, bisexual or transgender, in fact identity in itself is rendered fragmented and cannot emerge from a monolithic location.&lt;/p&gt;
&lt;p&gt;“There was excitement and apprehension in the early '90s as an endless diversity of images flowed into private and public spaces…. Sexual speech came under special attention as newscasts, talk shows, sitcoms and a variety of TV shows challenged conventional family values and sexual normativity including monogamy, marriage and heterosexuality” (Shohini Ghosh – “The Closet is Ajar”, in Outlook[6]). Queerness is then linked to this rapid spread, this breathless circulation, this new access. Technological change is inextricably tied to this idea of the closet being ajar. “…the rapid spread of satellite TV and new media technologies continue to transform the cultural practices of the urban middle class.” It seems to be an era in which the boundaries of the sexual norm are being forced to redraw themselves, simply by the massive onslaught of ideas, speech and images. Queer identities are then seen as riding the crest of a wave of sexual revolution that has been washing over India over the past two decades.&lt;/p&gt;
&lt;p&gt;These two formations, the Internet and the queer (we have not yet established what kind of formations they are), have been brought together in the term ‘cyber queer’ for the purpose of sociological and other analyses. The Levi’s ad for ‘innerwear’ shows a young black man saying, “On my web profile, I am a girl”. You can be a beer-bellied man in real life and turn into a voluptuous woman in second life. The virtual life, the virtual body and the virtual sex – the Internet is often spoken of as performing two functions for someone practicing alternative sexualities:&lt;/p&gt;
&lt;p&gt;that it lets them be ‘other’ than they are (or are forced to be in real life);&lt;/p&gt;
&lt;p&gt;by doing this, they are allowed to express their ‘real’ sexual desire or gender in a ‘safer’ space than in real life, thereby allowing for a freeing up or an opening (however, secretively it is done). “Cruising in physical spaces of the city has always been an affair which dangles on the edge of unsafety. Arrests and blackmail by policemen loaded with section 377, or extortion for money are often reported within queer circles. The &lt;a class="external-link" href="http://www.gaybombay.org/"&gt;Gay Bombay&lt;/a&gt; website has several articles and personal narratives which function as cruising guidelines and warnings. has several articles and personal narratives which function as cruising guidelines and warnings. In this context, Internet portals like &lt;a class="external-link" href="http://www.robtex.com/dns/guys4men.com.html"&gt;guys4men&lt;/a&gt; provide forums which can be used to manoeuvre cruising in a different manner, possibly much safer than in moonlit Nehru or Central Parks in Delhi or train-station loos in Bombay.” (Mario d’Penha, gay activist [7])&lt;/p&gt;
&lt;p&gt;Again, the notion of ‘space’ as suddenly emerging from the shadowy realms of ambiguity and secrecy, to stand in for freedom, is something that one often encounters in relation to cyber-queerness. And it is not just physical space which is pulled into this discourse of the technological shift, it is desire itself - “Desire is unabashed, playful and complex here”[8]. Desire, personified thus, is then seen as something set free by and through technological innovation.&lt;/p&gt;
&lt;p&gt;Though this notion of sudden freedom is contested by researchers and scholars within the field, the result of that contestation has often been to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;affirm, in place of a single figure of the liberated cyber queer, the multiplicity of behaviours, dangers and freedoms that are generated. This is a little like affirming, in place of a single body called &lt;em&gt;the public&lt;/em&gt;, several bodies that are termed multiple publics, or subaltern publics. The problem with this approach is that the nature of this public, the public-ness of it, is not then fully interrogated. It is assumed that the multiplicity in itself will be contest enough;&lt;/li&gt;
&lt;li&gt;return to the body as existing at the root of queer existence. This return then, in claiming something that has been forgotten, or disavowed (our bodily existence), finds a strange comfort in this body, settling within it as if having found a location from which to speak, about the virtual, about cyberspace. For example, though Jodi O’Brien, in her essay “Changing the Subject”[9] refutes the claim “There are no closets in cyberspace”, she finds it necessary to return to the ‘body’ and not to subjectivity in order to do so – it is as if the materiality of the body is the only &lt;em&gt;concrete&lt;/em&gt; thing that will allow this contestation. “The ‘alternative’ experiences that are enacted in ‘alternative’ or queer spaces are based on realities of the flesh: real, embodied experiences and/or fantasies cultivated through exposure to multisensory stimuli.” The body then becomes the explanatory fulcrum, and it is only from here that any kind of relationship to what is seen as virtuality can be understood.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;An ancestor to the above problem - “What precisely does the &lt;em&gt;cyber&lt;/em&gt; add to the &lt;em&gt;queer&lt;/em&gt; identity which it lacked previously?”[10] This question, framed as the most basic one can ask of this figure, makes the following assumptions – that ‘queer’ is a human subject that precedes ‘cyber’, a.k.a non-human technology that the latter &lt;em&gt;adds&lt;/em&gt; to this human subject and how it performs in the world, or has transformed it &lt;em&gt;after the fact&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;It is remarkably easy to say that in the great saga of sexual practices, technology has been an agent of transformation. Or, more importantly, to place cyberspace and queerness on par with each other, as sharing the same nature, or functioning on the same fundamental principle – of decentering or destabilizing a previously integrated or unified subject. Nina Wakeford asks of the term cyberqueer, “…what is the purpose of creating a hybrid of the two? It is a calculated move which stresses the interdependence of the two concepts, both in the daily practices of the certain and maintenance of a cyberspace which is lesbian, gay, transgendered or queer, and in the research of these arenas.”[11] By this logic, they are interdependent because there is some inherent quality in each that makes it offer itself to the other. “Queer sex is about following the desires of the flesh into an unnamed, uncategorized, uncharted realm, and doing something that neither of you can 'code'.”[12] The value of queerness therefore, derives from this lack of naming, an escape from coding of a particular kind, the zone of ambiguous enactments of desire.[13] “While it is this open transparent character of online existence that lays the Internet vulnerable to surveillance, it is also its self-inscribing character that makes it the playground of possibilities it is at its best. Cyberspace is habitat, playground, university, boulevard and refuge” (Shuddhabrata Sengupta, ‘Net Nomad on a Rough Route: A Despatch from Cyberspace’[14]). It is a zone of enactments of desire, a playground of possibilities, undefined, unbound.&lt;/p&gt;
&lt;p&gt;There is then a reading of technology and sexuality as feeding off each other - “The relationship between technology and sexuality is a symbiotic one. As humankind creates new inventions, people find ways of eroticizing new technology. So it is not surprising that with the advent of the information superhighway, more and more folks are discovering the sexual underground within the virtual community in cyberspace” (Daniel Tsang)[15]. The above quote assumes the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;that humankind existed before technology;&lt;/li&gt;
&lt;li&gt;that first a technology is born and then there is the eroticization of this technology. It is only because of these assumptions that technology (in this case the Internet) as such can be seen as fundamentally open. Latour’s critique of the first assumption is that “Without technological detours, the properly human cannot exist.”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;At the point of encountering this strange euphoria, we need to pause and consider, with Latour, this very relationship between technology and sexuality. “There has been a persistent silence on matters of sexuality in critical cultural studies of technology, perhaps partially because technology was associated with the instrumental to the exclusion of the representational (Case 1995). The creation of the term ‘cyber queer’ is itself an act of resistance in the face of such suppression” (Nina Wakeford). If the relationship between the two is viewed along representational lines, then the only direction that can be taken is one which will posit the human before the technological, will posit technological as that which enables (or not) representations of this human subject. In this sense, the representational is not far from the instrumental as an explanatory framework.&lt;/p&gt;
&lt;p&gt;In all the explanations we have seen above, at one level or another, technology has viewed as the ‘thing’[17], and morality as that which ascribes meaning in a particular way to this thing. For example, the mobile phone is seen as the thing, the technology, with concrete attributes and use value. Morality is what then prescribes how this thing is to be used or not used, or the dangers that follow from its use in the world of social relations. Latour argues against this way of positioning technology and morality, and instead calls them both modes of ‘alterity’, albeit two different modes. Alterity in his definition is being-as-another, technology and morality both then constituting a particular way of &lt;em&gt;being-as-another&lt;/em&gt;. Technology is not what you use, it is not a means to an end, it in fact changes the end to which it is the means. It is the curve, the detour. Morality is what questions means and ends and prevents the easy categorization of objects or people as one or another.&lt;/p&gt;
&lt;p&gt;We are used to thinking of morality as keeping things static, wanting them unchanged, preventing new ideas or practices from being absorbed into the domains of our existence. Especially when it comes to sexuality, morality is seen as that which blocks, which lives in the past, which ‘ossifies’ – “…morality consists precisely of the willingness/ability to accept and organize one's behaviour in accordance with… ‘ossified’ recipes for interaction. If gender is a primary (read: coded as ‘natural’) institution for organizing social interaction, then boundary transgressions are not only likely to arouse confusion but to elicit moral outrage from the boundary keepers.”[18] Morality here refers to boundary keeping. Latour shifts our understanding of morality in ways that allow us to read beyond the boundary keeping. According to him, morality constantly interrupts the means-to-end process by questioning the use of something/someone as a means towards an end. Morality is then a hindrance to this process, not an ossification of social relations or practices.&lt;/p&gt;
&lt;p&gt;This argument disrupts the location of technology as that which signals an opening out of the universe, and morality as signalling a closing off. True, Latour himself reads technology as creating &lt;em&gt;new&lt;/em&gt; functions, or as creating &lt;em&gt;new&lt;/em&gt; ends but he does not categorise these and the technologies they derive from as ‘open’. For him, technology is opaque, unreadable. Sexuality also then cannot be read as feeding off of technology, as some kind of symbiotic twin to it. The relationship between technological shifts and sexual practices or identities has to be read alternately to this idea of freedom from the shackles of social relations and bodily constraints. Sexuality cannot also then be opposed to morality, as it has often been done.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="discreet"&gt;[1] &lt;a class="external-link" href="http://www.openinternetcoalition.org/"&gt;www.openinternetcoalition.org.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[2] Jarvis, Jeff. “Openness and the Internet”, &lt;a class="external-link" href="http://www.businessweek.com/managing/content/may2009/ca2009058_754247.htm"&gt;http://www.businessweek.com/managing/content/may2009/ca2009058_754247.htm.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[3] Doval, Nikita. “Bold Bodies”, in The Week, September 7, 2008.&lt;/p&gt;
&lt;p class="discreet"&gt;[4] Ibid.&lt;/p&gt;
&lt;p class="discreet"&gt;[5] Quoted in Doval, Nikita. "Bold Bodies", in The Week, September 7, 2008, p 50.&lt;/p&gt;
&lt;p class="discreet"&gt;[6] &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?227507"&gt;http://www.outlookindia.com/article.aspx?227507&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[7] Quoted in Katyal, Akhil. “Cyber Cultures/Queer Cultures in Delhi”. See &lt;a class="external-link" href="http://mail.sarai.net/pipermail/urbanstudygroup/2007-July/002827.html"&gt;http://mail.sarai.net/pipermail/urbanstudygroup/2007-July/002827.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[8] Katyal, Akhil “Cyber Cultures/Queer Cultures in Delhi”. See &lt;a class="external-link" href="http://mail.sarai.net/pipermail/urbanstudygroup/2007-July/002827.html"&gt;http://mail.sarai.net/pipermail/urbanstudygroup/2007-July/002827.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[9] Women and Performance: Issue 17: Sexuality and Cyberspace.&lt;/p&gt;
&lt;p class="discreet"&gt;[10] Wakeford, Nina. “Cyberqueer”, in Bell, David and Barbara Kennedy, eds. The Cybercultures Reader. Routledge: London, 2000&lt;/p&gt;
&lt;p class="discreet"&gt;[11] “Cyberqueer”, in Bell, David and Barbara Kennedy, eds. The Cybercultures Reader.&lt;/p&gt;
&lt;p class="discreet"&gt;[12] O’Brien, Jodi. “Changing the Subject”. In Women and Performance, Issue 17: Sexuality and Cyberspace.&lt;/p&gt;
&lt;p class="discreet"&gt;[13] Here I deal with the idea of queerness at an almost commonsensical level, not at the level of the queer theory of Judith Butler or Eve Sedgwick, just as cyberspace is also dealt with at the level of what it seems to be seen as doing.&lt;/p&gt;
&lt;p class="discreet"&gt;[14] Quoted in the Sarai discussion.&lt;/p&gt;
&lt;p class="discreet"&gt;[15] Tsang, Daniel. “Notes on Queer ‘n’ Asian Virtual Sex”. In Bell, David and Barbara Kennedy, eds. The Cybercultures Reader. Routledge: London, 2000.&lt;/p&gt;
&lt;p class="discreet"&gt;[16] Latour, Bruno. “Morality and Technology: The End of the Means”. See &lt;a class="external-link" href="http://www.bruno-latour.fr/articles/article/080-en.html"&gt;http://www.bruno-latour.fr/articles/article/080-en.html&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;[17] I put this in quotes because latour has a very specific definition of ‘thing’ or Ding, which this is not.&lt;/p&gt;
&lt;p class="discreet"&gt;[18] O’Brien, Jodi. “Changing the Subject”, in Women and Performance, Issue 17: Sexuality and Cyberspace. See &lt;a class="external-link" href="http://web.archive.org/web/20040604123458/www.echonyc.com/~women/Issue17/art-browning.html"&gt;http://web.archive.org/web/20040604123458/www.echonyc.com/~women/Issue17/art-browning.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[18] O’Brien, Jodi. “Changing the Subject”, in Women and Performance, Issue 17: Sexuality and Cyberspace. See &lt;a class="external-link" href="http://web.archive.org/web/20040604123458/www.echonyc.com/~women/Issue17/art-browning.html"&gt;http://web.archive.org/web/20040604123458/www.echonyc.com/~women/Issue17/art-browning.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nitya V</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>histories of internet in India</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    

   <dc:date>2019-09-18T14:10:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/sense-and-censorship">
    <title>Sense and Censorship</title>
    <link>https://cis-india.org/internet-governance/sense-and-censorship</link>
    <description>
        &lt;b&gt;The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) bills, at the US House of Representatives and Senate, respectively, appear to enforce property rights, but are, in fact, trade bills. This article by Sunil Abraham was published in the Indian Express on 20 January 2012.&lt;/b&gt;
        
&lt;p&gt;In developed countries like the US, intellectual property (IP) plays a
 dominant role in the economy, unlike in economies like India. Countries
 that have significant IP are keen to increase global and national 
enforcement activities, while countries with little domestic IP are keen
 to reduce outgoing royalties in the balance of payments and therefore, 
keen to expand alternatives, limitations and exceptions like copyleft 
licensing, compulsory/statutory licensing and fair dealing.&lt;/p&gt;
&lt;p&gt;The loss of generic medicines, hardware based on open standards, 
public domain content, free and open source software, open access 
journal articles, etc will equally impoverish consumers in the US and in
 India. SOPA and PIPA, therefore, do not represent the will of the 
average American but rather the interests of the IP sector, which has 
tremendous influence in the Hill. There is one more layer of 
complication for policy-makers to consider as they work towards a 
compromise of interests in Internet governance — the tension between the
 old and the new. The incumbents — corporations with business models 
that have been rendered obsolete by technological developments — versus 
emerging actors who provide competing products and services, often with 
greater technological sophistication, higher quality, at a lower cost.&lt;/p&gt;
&lt;p&gt;The US, in terms of policy and infrastructure, still controls the 
global Domain Name System (DNS) and consequently, post-SOPA/PIPA, can 
take unilateral trade action without worrying about national variations 
enabled by international law. These bills directly undermine the 
business models of many Indian companies — generic drug manufacturers 
like Ranbaxy, software service providers like Infosys, electronics 
manufacturers like Spice and players in many other sectors dominated by 
IP rights. So it is baffling that they have not added their voices to 
the global outcry.&lt;/p&gt;
&lt;p&gt;SOPA and PIPA, if passed, will enable the US administration to take 
three-pronged action against IP infringers — seizure of domain names and
 DNS filtering, blocking of transactions by financial intermediaries and
 revocation of hosting by ISPs. While circumvention may still be 
possible, it will get increasingly laborious — something like the Great 
Firewall of China, but worse. Unfortunately, the implementation of these
 blunt policy instruments will require more and more public-funded 
surveillance and censorship.&lt;/p&gt;
&lt;p&gt;The censorship potential of efforts like SOPA and PIPA may appeal to 
others, as autocratic and democratic regimes across the world have been 
keen to try technology-mediated social engineering — these efforts have 
been multiplied in the post-Arab Spring and Occupy Wall Street world. 
Organised religion, social conservatives and those who have been at the 
receiving end of free speech would all want to shut down platforms like 
WikiLeaks and political movements like Anonymous and the Pirate Party.&lt;/p&gt;
&lt;p&gt;These are equally dismal times for Internet governance in India. 
Google, Facebook and 20-odd other intermediaries are trying to avoid 
jail time at the hands of a Delhi court. However, ever since the IT Act 
amendments were put in place three years back, digital activists have 
been requesting intermediaries to register their protests early and 
often, regarding draconian provisions in the statute and in the 
associated rules. Their silence is going to be very expensive for all of
 us. We cannot depend on the private sector alone to defend our 
constitutional rights. As yet unpublished research from CIS demonstrates
 that private intermediaries only bother with defending freedom of 
expression when it undermines their business interests. Working with an 
independent researcher, we conducted a policy sting operation — faulty 
take-down notices were served to seven intermediaries asking for 
legitimate content to be taken down. In six of those cases, the 
intermediaries over-complied, in one case deleting all comments on a 
news article instead of just those comments identified in the notice. 
The only take-down that was resisted was one claiming that sale of 
diapers was “harmful to minors” under the Indian IT Act (because they 
caused nappy rash). It is clear that the IT Act and its associated rules
 have already had a chilling effect on online participation by Indians.&lt;/p&gt;
&lt;p&gt;Fortunately for us, during the previous parliamentary session — 
Jayant Chaudhary, Lok Sabha MP from the Rashtriya Lok Dal, asked for the
 revision of rules concerning intermediaries, cyber-cafes and reasonable
 security practices. The next Parliament session is the last opportunity
 for the House to reject these rules and intervene for a free Internet.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The writer is executive director of the Bangalore-based Centre for Internet and Society&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/sense-and-censorship/901686/1"&gt;Read&lt;em&gt; &lt;/em&gt;the original published in the Indian Express&lt;/a&gt;&lt;em&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/sense-and-censorship/901686/1"&gt; &lt;/a&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/sense-and-censorship'&gt;https://cis-india.org/internet-governance/sense-and-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-01-31T06:15:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/softtware-patents-and-the-commons">
    <title>Seminar on Software Patent and the Commons</title>
    <link>https://cis-india.org/a2k/blogs/softtware-patents-and-the-commons</link>
    <description>
        &lt;b&gt;A pre-grant opposition has been filed against a software patent application filed in the patent office by Certicom, a wholly owned subsidiary of Research in Motion (RIM), manufacturers of Blackberry. The opposition was filed on August 31, 2010 by the Software Freedom Law Centre which has recently expanded its operations to India. This exciting development was announced by Mishi Choudhary from SFLC on the lines of the seminar on “Software Patents and the Commons” organised on 1 September 2010 in Delhi jointly by SFLC, the Centre for Internet and Society, the Society for Knowledge Commons and Red Hat. Filing more such oppositions to software patents in India was in the pipeline and this is just the beginning of a movement to take on monopolisation of knowledge and ideas through patenting software, the organisers said.&lt;/b&gt;
        &lt;p&gt;Software patent opposition is still in its nascent stage in India while several oppositions have been filed against software patents in the US and the EU. The harmful effects of software patents are little known to the Indian public, especially from the context of its danger to development in small and medium size enterprises, as pointed out by Pranesh Prakash from the Centre for Internet and Society who spoke about why software patents are bad for innovation and development in society and also in the software industry, in particular.&lt;/p&gt;
&lt;p&gt;In the same context, Venkatesh Hariharan from Red Hat as also Mr. T.C. James, Director of the National Intellectual Property Organisation spoke about the growing importance of free and open source software in education, governmental agencies and as a key agent in information technology policy making in India. “Out of 500 super computers in the world, 446 are running on Linux”, he said, talking about how open source software makes computing highly accessible and affordable while allowing for improvements to be made to the software by any user and releasing it back to benefit the whole community. Dr. Anshu Bhardwaj involved in the Open Source Drug Discovery project undertaken by CSIR, spoke at length about the project as a live demonstration of the power of open source software in impacting drug access and development and health care reform across communities at highly economical rates.&lt;/p&gt;
&lt;p&gt;Prof. Eben Moglen, Executive Director of Software Freedom Law Centre in New York who was the keynote speaker at the conference spoke about the growth of the free software and open source movement based on the principle of equating knowledge with commons – that is, a good to be commonly shared by all members of the public – resulting in access to and sharing of knowledge and distribution of information in society for greater innovation, creation of new ideas, communication and development. Dr. Abhijit Sen, member of the Planning Commission was the other keynote speaker who stressed on the role of the government and the policy making bodies to ensure that knowledge and education is accessible and shared without restrictions in such a way that it is not misused by the members of the society.&lt;/p&gt;
&lt;p&gt;Other notable speakers in the event included Prabir Purkayastha from the Society for Knowledge Commons, Pradyut Bora, Chief Convenor of BJP's information and technology cell, Jaijit Bhattacharjee from Hewlett Packard and Sudhir Krishnaswamy, Professor, National University of Juridical Sciences. The event also witnessed the participants discuss the various strategies to be used from the perspective of legal analysis as well as policy reform, for opposing software patents filed or granted in India. Indian patent law clearly declares computer programmes per se or software patents to be unpatentable. Prabir Purkayastha pointed out that the most important and major scientific discoveries in history have not been patented and that this has, in no way prevented new ideas from being created and has in fact fostered such innovation. In spite of such a clear legal restriction on grant of software patents, around 1000 software patents have been filed in the patent offices in India in the last year. This trend is extremely disturbing since it poses a serious threat to access to knowledge and distribution of information in society in addition to stifling innovation and development in the software industry.&lt;/p&gt;
&lt;p&gt;The seminar was attended by people from diverse backgrounds including the IT industry, civil society organisations, and groups working in pharma patent advocacy, media persons and government officials.&lt;/p&gt;
&lt;h3&gt;Videos&lt;/h3&gt;
&lt;p&gt;
&lt;object data="http://www.youtube.com/v/KDcbHb_WjQw&amp;amp;" height="250" type="application/x-shockwave-flash" width="250"&gt;
&lt;param name="data" value="http://www.youtube.com/v/KDcbHb_WjQw&amp;amp;"&gt;
&lt;param name="src" value="http://www.youtube.com/v/KDcbHb_WjQw&amp;amp;"&gt;
&lt;/object&gt;
&lt;object data="http://www.youtube.com/v/jOfpqpjYt70&amp;amp;" height="250" type="application/x-shockwave-flash" width="250"&gt;
&lt;param name="data" value="http://www.youtube.com/v/jOfpqpjYt70&amp;amp;"&gt;
&lt;param name="src" value="http://www.youtube.com/v/jOfpqpjYt70&amp;amp;"&gt;
&lt;/object&gt;
&lt;object data="http://www.youtube.com/v/KXwkSOC-p3A&amp;amp;" height="250" type="application/x-shockwave-flash" width="250"&gt;
&lt;param name="data" value="http://www.youtube.com/v/KXwkSOC-p3A&amp;amp;"&gt;
&lt;param name="src" value="http://www.youtube.com/v/KXwkSOC-p3A&amp;amp;"&gt;
&lt;/object&gt;
&lt;object data="http://www.youtube.com/v/tLcAi2D7HFY&amp;amp;" height="250" type="application/x-shockwave-flash" width="250"&gt;
&lt;param name="data" value="http://www.youtube.com/v/tLcAi2D7HFY&amp;amp;"&gt;
&lt;param name="src" value="http://www.youtube.com/v/tLcAi2D7HFY&amp;amp;"&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;object data="http://www.youtube.com/v/GYk5TlSwwg0&amp;amp;" height="250" type="application/x-shockwave-flash" width="250"&gt;
&lt;param name="data" value="http://www.youtube.com/v/GYk5TlSwwg0&amp;amp;"&gt;
&lt;param name="src" value="http://www.youtube.com/v/GYk5TlSwwg0&amp;amp;"&gt;
&lt;/object&gt;
&lt;object data="http://www.youtube.com/v/776BOGXiJwc&amp;amp;" height="250" type="application/x-shockwave-flash" width="250"&gt;
&lt;param name="data" value="http://www.youtube.com/v/776BOGXiJwc&amp;amp;"&gt;
&lt;param name="src" value="http://www.youtube.com/v/776BOGXiJwc&amp;amp;"&gt;
&lt;/object&gt;
&lt;object data="http://www.youtube.com/v/ruiOa9olYgQ&amp;amp;" height="250" type="application/x-shockwave-flash" width="250"&gt;
&lt;param name="data" value="http://www.youtube.com/v/ruiOa9olYgQ&amp;amp;"&gt;
&lt;param name="src" value="http://www.youtube.com/v/ruiOa9olYgQ&amp;amp;"&gt;
&lt;/object&gt;
&lt;object data="http://www.youtube.com/v/xWv16xqhztw&amp;amp;" height="250" type="application/x-shockwave-flash" width="250"&gt;
&lt;param name="data" value="http://www.youtube.com/v/xWv16xqhztw&amp;amp;"&gt;
&lt;param name="src" value="http://www.youtube.com/v/xWv16xqhztw&amp;amp;"&gt;
&lt;/object&gt;
&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/softtware-patents-and-the-commons'&gt;https://cis-india.org/a2k/blogs/softtware-patents-and-the-commons&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2011-10-23T14:22:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/events/seminar-on-rethinking-copyright-and-licensing-for-digital-publishing-today-delhi-jan-23-2017">
    <title>Seminar on Rethinking Copyright and Licensing for Digital Publishing Today (Delhi, January 23)</title>
    <link>https://cis-india.org/a2k/events/seminar-on-rethinking-copyright-and-licensing-for-digital-publishing-today-delhi-jan-23-2017</link>
    <description>
        &lt;b&gt;Against the backdrop of a growing global and domestic digital publishing industry on one hand and the recent judgment by the Delhi High Court that upheld the education exception to reproduction of academic and literary works, Pro Helvetia - Swiss Arts Council, Goethe-Institut Max Mueller Bhavan New Delhi, and the Centre for Internet and Society (CIS) are organising a seminar to discuss and reflect on the relevance and functions of copyright and licensing within the transforming market practices and legal structures of the publishing industry today.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="http://cis-india.org/a2k/events/seminar-on-rethinking-copyright-and-licensing-for-digital-publishing-today-delhi-january-23/leadImage" alt="Seminar on Rethinking Copyright and Licensing for Digital Publishing Today, Delhi, January 23" width="400" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Poster: &lt;a href="http://cis-india.org/a2k/events/seminar-on-rethinking-copyright-and-licensing-for-digital-publishing-today-delhi-january-23/leadImage"&gt;Download&lt;/a&gt; (PNG)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;The two speakers at the seminar will be &lt;a href="#philipp"&gt;Dr. Philipp Theisohn&lt;/a&gt;, Professor of Modern German Literary Studies, Zurich University, and &lt;a href="#kerstin"&gt;Ms. Kerstin Schuster&lt;/a&gt;, Droemer Knaur publishing group. The session will be chaired by &lt;a href="#zakir"&gt;Mr. Zakir Thomas&lt;/a&gt;, Additional Director General (Risk Assessment), Directorate of Income Tax, Government of India.&lt;/p&gt;
&lt;p&gt;Dr. Theisohn will address the question of whether the digital age requires a new approach to copyright thinking, and Ms. Schuster will discuss the dynamics of the international market for licenses in the contemporary publishing world.&lt;/p&gt;
&lt;p&gt;Please join us at the CIS Delhi office on Monday, January 23, at 11:00 for the seminar. The seminar will include the presentations by the speakers followed by an open moderated discussion.&lt;/p&gt;
&lt;p&gt;Further, it is our great pleasure to inform you that in a recent judgement on the Super Cassettes v. MySpace case, the Delhi High has strengthened the safe harbor immunity enjoyed by internet intermediaries in India. As CIS was one of the intervenors in the case, and has been duly acknowledged in the judgment, we would like to invite you for an informal discussion about the case over lunch. This will take place after the seminar.&lt;/p&gt;
&lt;p&gt;A brief analysis of the judgement can be found &lt;a href="http://cis-india.org/a2k/blogs/super-cassettes-v-myspace"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Please RSVP by sending an email to Nisha Kumar at &lt;a href="mailto:nisha@cis-india.org"&gt;nisha@cis-india.org&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Address:&lt;/strong&gt; The Centre for Internet and Society, first floor, B 1/8, Hauz Khas, near G block market, after Crunch, New Delhi, 110016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Location on Google Map:&lt;/strong&gt; &lt;a href="http://j.mp/cis-delhi"&gt;http://j.mp/cis-delhi&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="philipp"&gt;&lt;strong&gt;Philipp Theisohn&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Philipp Theisohn, who was born in 1974, studied Modern German Literature, Medieval Studies and Philosophy in Tübingen and Zürich. He gained his doctorate in Jerusalem and Tübingen and, since 2013, has been Professor of Modern German Literary Studies at Zurich University. He has produced numerous publications on German and European literary history from the 13th to the 21st century, in particular on “literary future knowledge“, the perception of literary property, and Jewish Cultural Poetics.&lt;/p&gt;
&lt;p&gt;The focal points of his work and research are the literature of Switzerland, literary property/plagiarism as a literary historical phenomenon, science fiction and futurology, realism, Franz Kafka and Early Modern Poetics of Knowledge.&lt;/p&gt;
&lt;p&gt;Theisohn is intensely involved in the transmission of literature far beyond the academic environment. He is a member of the jury for the “Swiss Book Prize“ of the Publishers‘ Association, an expert for inter-disciplinary and literary projects for the Swiss Arts Council Pro Helvetia; he curates literary exhibitions, is active in a broad range of journalistic work, among other things for the Neue Zürcher Zeitung, and is in charge of the blog and website of the “Schweizer Buchjahr” which contributes significantly to contemporary literary discourse.&lt;/p&gt;
&lt;p&gt;Among his most important book publications are: "Die Zukunft der Dichtung. Geschichte des literarischen Orakels 1450-2050" (“The Future of Poetry. The History of the Literary Oracle 1450-2050”); “Plagiat. Eine unoriginelle Literaturgeschichte”( “Plagiarism. An Unoriginal Literary History”) and “Literarisches Eigentum. Zur Ethik geistiger
Arbeit im digitalen Zeitalter” (“Literary Property. On the Ethics of Intellectual Work in the Digital Age”).&lt;/p&gt;
&lt;h3 id="kerstin"&gt;&lt;strong&gt;Kerstin Schuster&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Having obtained a university degree in Romance Studies and Political Science, Kerstin Schuster worked in the bookselling trade. Since 1993 she is trading licenses for the international market. She has worked till 2001 for the literary agency Dr. Ray-Güde Martin, from 2001 until 2013 for the publishing house S. Fischer Verlag in Frankfurt, and since 2014 for the Droemer Knaur publishing group.&lt;/p&gt;
&lt;p&gt;For many years now, Kerstin Schuster is also facilitating seminars on how to successfully offer and sell licenses in the international market.&lt;/p&gt;
&lt;h3 id="zakir"&gt;&lt;strong&gt;Zakir Thomas&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Mr. Thomas is an expert in the field of intellectual property. He has served as a former Registrar of Copyright for the Government of India, and as a project director of the Open Source Drug Discovery Initiative under the Council of Scientific &amp;amp; Industrial Research (a premier R&amp;amp;D org). His expertise spans across copyright, open source innovation, neglected diseases and innovation ecosystem in science and technology in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/events/seminar-on-rethinking-copyright-and-licensing-for-digital-publishing-today-delhi-jan-23-2017'&gt;https://cis-india.org/a2k/events/seminar-on-rethinking-copyright-and-licensing-for-digital-publishing-today-delhi-jan-23-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>License</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Publishing</dc:subject>
    
    
        <dc:subject>Digital Scholarship</dc:subject>
    

   <dc:date>2017-01-21T14:51:56Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/teri-seminar-on-open-access-in-research">
    <title>Seminar on Open Access in Research Area: A Strategic Approach</title>
    <link>https://cis-india.org/openness/teri-seminar-on-open-access-in-research</link>
    <description>
        &lt;b&gt;The Energy and Resources Institute (TERI), Delhi, is organising a seminar on open access in research on Tuesday, December 22, 2015. The seminar will focus on: 1) wider access to scientific publications and research data, 2) access to scientific information, and 3) challenges and opportunities of research data. The Centre for Internet and Society is supporting the event as a Knowledge Partner.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Background&lt;/h2&gt;
&lt;p&gt;Open Access has become central importance to advancing the interests of researchers, scholars, students, business, and the public as well as librarians. Increasingly, research institutions require researchers to publish articles that report research findings openly accessible in open domain.&lt;/p&gt;
&lt;p&gt;Open Access pursues to yield scholarly publishing to spread knowledge and allow that knowledge to be built upon. Price barriers should not stop researchers from getting access to research data. Open Access, and the open availability and search ability of scholarly research that it entails, will have a significant positive impact on everything from education to the research practice in various fields.&lt;/p&gt;
&lt;p&gt;To explore why Open Access is so important to a number of groups, TERI Library along with The Centre for Internet &amp;amp; Society (CIS) as Knowledge Partner is organizing a half day seminar on &lt;em&gt;Open Access in Research Areas: a Strategic Approach&lt;/em&gt; on December 22, 2015 at TERI Seminar Hall, IHC, Lodhi Road, New Delhi.&lt;/p&gt;
&lt;p&gt;The Seminar will focus on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;wider access to scientific publications and research data&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;access to scientific information, and&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;challenges and opportunities of research data.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Schedule&lt;/h2&gt;
&lt;p&gt;No registration is required to attend the seminar. Seats are limited, and will be provided on first-come-first-served basis.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;13:45 - 14:00&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration and Networking&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00 - 14:10&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Welcome Address - &lt;strong&gt;Mr. Prabir Sengupta&lt;/strong&gt;, Distinguished Fellow and Director, Knowledge Management Division, TERI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:10 - 14:20&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Special Address - &lt;strong&gt;Sumandro Chattapadhyay&lt;/strong&gt;, Research Director, The Centre for Internet and Society&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:20 - 14:35&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Keynote Address - &lt;strong&gt;Dr. K.R. Murali Mohan&lt;/strong&gt;, Advisor, Big Data Initiatives Division, Department of Science and Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:35 - 14:50&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inaugural Address - &lt;strong&gt;Dr. Chandrima Shaha&lt;/strong&gt;, Director, National Institute of Immunology, New Delhi&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:50 - 15:00&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Setting the Theme and Vote of Thanks - &lt;strong&gt;Dr. P.K. Bhattacharya&lt;/strong&gt;, Fellow and Area Convenor, Knowledge Management Division, TERI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00 - 15:30&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea and Refreshments&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30 - 17:15&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Plenary Session&lt;/strong&gt;&lt;br /&gt;
Chair: &lt;strong&gt;Dr. Ramesh Sharma&lt;/strong&gt;, Director, CEMCA&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Puneet Kishor&lt;/strong&gt;,  Researcher and Independent Consultant - "Science, Data, and Creative Commons"&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dr. Beth Sandore Namachchivaya&lt;/strong&gt;, Associate Dean of Libraries and Professor University of Illinois - "Developing Services, Infrastructure, and Best Practices to Conserve and Provide Access to Research Data: Challenges and Opportunities"&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dr. Usha Mujoo Munshi&lt;/strong&gt;, Librarian, Indian institute of Public Administration&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/teri-seminar-on-open-access-in-research'&gt;https://cis-india.org/openness/teri-seminar-on-open-access-in-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Open Research</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2015-12-22T05:37:44Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/open-access">
    <title>Seminar on Open Access for Scientific Information</title>
    <link>https://cis-india.org/events/open-access</link>
    <description>
        &lt;b&gt;Open-access provides free online access to quality scholarly material that can be defined as “open domain,” meaning publicly supported research information, and “open access,” so that it is copyrighted to be freely available scholarly material. Open-access publishing enables researchers in developing countries to establish priority for their research, which they could use later to defend their intellectual property. It removes excess barriers in terms of both price and permission, enhances national research capacity, and improves visibility for developing-country research. Open access thus enables a global platform for this research and collaboration and reciprocates the information flow from South to North among all countries.&lt;/b&gt;
        
&lt;p&gt;In India, there is a large opportunity for open-access publishing. There are many non-commercial research and development institutions, both academic and research laboratories. For example, there are approximately 300 universities that offer both graduate and research programs. There are also many R&amp;amp;D laboratories operating within government science agencies, which cover domains like industrial research, defense research, agricultural research, medicine, ecology, environment, information technology, space, energy, and ocean development.&lt;/p&gt;
&lt;p&gt;Many of these institutions, and also several professional societies, publish science journals. Tools like the Open Journal Systems could help many of these journals to come online in an open-access environment. Open Access is &amp;nbsp;relevant to India because most &amp;nbsp;research is funded from public money, institutional framework and information infrastructure, trained manpower and financial resources are &amp;nbsp;adequately available. &amp;nbsp;It &amp;nbsp;widens distribution of information and knowledge and &amp;nbsp;lowers the cost of reaching a fairly wide audience while maximising return on public money. The OA movement is being supported by research funding agencies, academic institutions, researchers and scientists, teachers, students, and members of the general public.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Open access publishing can foster the exchange of research results amongst scientists from different disciplines, thus facilitating interdisciplinary research, whilst providing access to research results to researchers world-wide, including from developing countries, as well as to an interested general public.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Access to and sharing of information, including scientific information, goes through dramatic changes because of rapidly emerging new communication and information technologies (ICTs) and the societal transformations that they generate. But what are the long-term strategies to efficiently harness the open access potential for developing new approaches to knowledge acquisition and sharing? What needs to be done to effectively integrate these strategies into forward looking and sustainable policy making? How can we harness the potential of open access to develop knowledge societies that are people-centred, inclusive and development oriented? &amp;nbsp;What are the global environmental trends that will influence open access &amp;nbsp;in the next few years? &amp;nbsp;What are the main needs of the open access stakeholders in India and &amp;nbsp;South Asia ? &amp;nbsp;Which are the publishing models for open-access journals &amp;nbsp;and &amp;nbsp;what does it imply to finance and sustain open access journals in developing countries; how to overcome language and other barriers ?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;These issues are of strategic relevance to UNESCO as they address key challenges linked to building knowledge societies, one of the overarching objectives of the Medium Term Strategy 2008-2013.&lt;/p&gt;
&lt;p&gt;UNESCO, jointly with the Centre for Internet Society is well placed to mobilize interested stakeholders to develop efficient implementation strategies in the area of acquision and sharing of scientific information &amp;nbsp;and to integrate them into forward looking and sustainable policies.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;UNESCO believes that open access is an enriching part of the scholarly communication process that can and should co-exist with other forms of communication and publication, such as society-based publishing and conferencing activities. Open access publications are also more easily included and searchable in search engines and indexing databases.&lt;/p&gt;
&lt;p&gt;In order to initiate a sub-regional dialogue on democratizing access to scientific and health-related information, on the economics of scientific publishing and the &amp;nbsp;implications of the various open-access models &amp;nbsp;and the copyright and intellectual property issues, UNESCO convenes a one day seminar on 16 March 2011 in New Delhi. The &amp;nbsp;concept of « open access » &amp;nbsp;and the inter-relationships between academic institutions, researchers, &amp;nbsp;scientists and publishers will be &amp;nbsp;examined, as well as the challenges and barriers which OA is currently facing in this part of the world.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Overall objectives&amp;nbsp;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Strengthen awareness of UNESCO’s stakeholders on the potential of open access &amp;nbsp;in scientific knowledge &amp;nbsp;sharing that are dramatically accelerated by ICTs;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Provide analysis for anticipating foreseeable trends end emerging challenges &amp;nbsp;in order to enable Indian and South Asian stakeholders to develop strategies and policies to take them up;&lt;/li&gt;&lt;li&gt;Develop a partnership and collaboration among interested stakeholdesr in order to improve access to and sharing of scientific information and research &amp;nbsp;through open access&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Expected results&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The discussion of the Open Access Seminar is expected to achieve the following results:&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;UNESCO’s stakeholders enabled to understand trends and emerging challenges related to the impact of open access &amp;nbsp;on scientific information acquisition and sharing;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Possible developments prospected in the area of scientific information sharing in the coming 5 years;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Specific technology generated trends, and their consequences for development &amp;nbsp;in scientific information and research sharing&amp;nbsp;&lt;/li&gt;&lt;li&gt;Highlight the collaborative and collective efforts and actions behind the Open Access movement&lt;/li&gt;&lt;li&gt;Discussions of best practices of &amp;nbsp;Open Access Initiatives&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Who should attend:&amp;nbsp;&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Science editors&lt;/li&gt;&lt;li&gt;Policy makers&lt;/li&gt;&lt;li&gt;Information professionals&lt;/li&gt;&lt;li&gt;Researchers &amp;nbsp;&lt;/li&gt;&lt;li&gt;Open Access movement activists&lt;/li&gt;&lt;li&gt;Academics &amp;nbsp;and &amp;nbsp;all those interested in electronic publishing.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Terms of Reference:&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;
&lt;div&gt;1) Initiatives within the open access movement (with focus on what all of this means for developing countries):&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;discussion on the pros and cons of open access&amp;nbsp;&lt;/li&gt;&lt;li&gt;different models used and &amp;nbsp;paths to achieving open access to the health literature&amp;nbsp;&lt;/li&gt;&lt;li&gt;research reports and open access&amp;nbsp;&lt;/li&gt;&lt;li&gt;democratizing access to scientific and health-related information&lt;/li&gt;&lt;li&gt;economics of scientific publishing and implications of the various open-access models&amp;nbsp;&lt;/li&gt;&lt;li&gt;copyright and intellectual property&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;2) Open Access and the journals from developing countries&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;what does it means to bring journals online&amp;nbsp;&lt;/li&gt;&lt;li&gt;publishing models for open-access journals&amp;nbsp;&lt;/li&gt;&lt;li&gt;financing and sustaining open access journals in developing countries &amp;nbsp;&lt;/li&gt;&lt;li&gt;costs associated with open access in developing countries&amp;nbsp;&lt;/li&gt;&lt;li&gt;language barriers and translation&amp;nbsp;&lt;/li&gt;&lt;li&gt;training information specialists and users on searching and accessing health literature&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;This event is co-organised by UNESCO and the Centre for Internet and Society, Bangalore&lt;/em&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Download the agenda &lt;a href="https://cis-india.org/advocacy/open-access-agenda" class="internal-link" title="Agenda"&gt;here&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/open-access'&gt;https://cis-india.org/events/open-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2011-06-09T12:41:22Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/seminar-on-exceptions-and-limitations-in-copyright">
    <title>Seminar on Exceptions and Limitations in Copyright </title>
    <link>https://cis-india.org/accessibility/blog/seminar-on-exceptions-and-limitations-in-copyright</link>
    <description>
        &lt;b&gt;This is a report on a seminar organised by the Department of Higher Education, Ministry of Human Resource Development, and Government of India on 14 and 15 May 2009, in Kochi, Kerala, to look at exceptions and limitations in copyright. Programme Manager Nirmita Narsimhan, of the Centre for Internet and Society, attended the seminar. &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;CIS Programme Manager Nirmita Narsimhan attended a seminar on exceptions and limitations in copyright, organised by the
Department of Higher Education, Ministry of Human Resource Development, and
Government of India on 14 and 15 May 2009, in Kochi, Kerala. The seminar was intended to bring up key issues affecting access to knowledge, which are to be taken up by the
Standing Committee on Copyright and Related Rights (SCCR) at the World Intellectual Property Organisation (WIPO) later this
month. Resource persons identified for different topics were eminent
scholars, academicians and practitioners across India. The seminar covered eight
topics. On each topic, a paper was presented by a resource person with commentary by
an expert in the field, after which there was an open discussion.&lt;/p&gt;
&lt;p&gt;The first day
featured, amongst others, a paper presented by Lawrence Liang, Distinguished Fellow,
CIS. He spoke at length on the exceptions and limitations for education.&lt;/p&gt;
&lt;p&gt;The
second day featured a paper by Mr. Madhukar Sinha, former Registrar of Copyright.
Mr. Sinha presented on the topic&lt;a name="OLE_LINK7"&gt;&lt;/a&gt; 'Use of works by visually impaired and other
miscellaneous exceptions of use of works under Indian Copyright
Act: Section 52(1) (q), (r), (s), (t), (u), (v), and (x), (y), (z)'. His paper went into great length on
definitions of visual disability and tried to evolve an economic model to
support conversion of books into accessible formats for the visually
challenged. The paper drew parallels with existing laws and best practices in
different countries, made a detailed analysis of exceptions for the blind in
the light of the Berne three-step test and the TRIPS agreement, and concluded by
recommending that the Copyright Act should be amended to include exceptions and
limitations which would permit conversion of books into formats in certain
special cases. Mr. Sinha also recommended that India should look at solutions
which go beyond the limits of the Copyright Act to solve such problems.&lt;/p&gt;
&lt;p&gt;The
response to this was prepared by Mr. Rahul Cherian of Indo Juris Law offices.
The response paper drew
attention to the fact that half of the total blind population of the world is
in India
and that amounts to a population of more than a crore. In the light of the economic and
logistic considerations of our country, the Copyright Act should&lt;/p&gt;
&lt;ol type="1" start="1"&gt;&lt;li&gt;Expressly
     include a limitation to permit conversion of books into accessible formats
     for visually challenged persons;&lt;/li&gt;&lt;li&gt;Permit
     conversion by stakeholder organizations as well as interested family
     members and friends of beneficiaries;&lt;/li&gt;&lt;li&gt;Adopt a
     functional definition of disability and not a medical one as is currently
     the case in the Persons with Disabilities Act 1995, and extend the benefit
     of the exception to all persons, who by reason of any disability are
     unable to access the work in its original format;and&lt;/li&gt;&lt;li&gt;Not restrict
     conversion only to those formats which are exclusively for the use of
     blind persons. Visually challenged persons should be able to make use of
     available mainstream formats like PDFs or Word as well.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;The paper also dealt extensively with the
Treaty for Improved access for the Blind, Visually Impaired and Other Reading Disabled, which was proposed by the World Blind Union in WIPO last year and is
coming up again for discussion later this month.&lt;/p&gt;
&lt;p&gt;Please &lt;a href="https://cis-india.org/accessibility/blog/uploads/Draft%20Comments.doc/at_download/file" class="external-link"&gt;click here&lt;/a&gt; to see the complete
text of the paper.&lt;/p&gt;
&lt;p&gt;The seminar was extremely productive because there was a strong recommendation and support for the inclusion
of a limitation for conversion into accessible formats for persons with
disabilities in the Indian Copyright Act. All the members present came to a
consensus that the Indian Government should take a supportive stand towards the
Treaty for the Blind proposed by the WBU at the SCCR this month. A
representative of a leading publishing house committed himself to working
towards providing books to certain organizations for the blind, if they could
assure him that those books would be circulated only to blind persons and not
to others.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/seminar-on-exceptions-and-limitations-in-copyright'&gt;https://cis-india.org/accessibility/blog/seminar-on-exceptions-and-limitations-in-copyright&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sachia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-08-17T08:50:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/selection-of-programme-officer-pilot-projects-a2k">
    <title>Selection of Programme Officer — Pilot Projects, CIS-A2K</title>
    <link>https://cis-india.org/openness/blog-old/selection-of-programme-officer-pilot-projects-a2k</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) opened applications for the post of Programme Officer, Pilot Projects for its Access to Knowledge (A2K) Programme on 17th April 2013. The vacancy and call for applications was shared on all Indian language mailing lists, city mailing lists as well as Village Pumps. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Last date of &lt;a class="external-link" href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-April/009856.html"&gt;submitting applications&lt;/a&gt; was 30th April which was later extended for another week. By the first week of May we had received 35 applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;First level of shortlisting&lt;/b&gt;&lt;br /&gt;Applicants were given an assignment where they had to write at least one new article on their respective language Wikipedia projects (though we encouraged them to write more than one article if they liked). Asking them to write new articles on Wikipedia was a way to assess their seriousness and level of commitment towards this job. Applicants who failed to submit their written assignment were outright rejected in this level. Amongst the ones that did complete the assignment were assessed on the basis of their relevant work experience and skills that matched requirements of the job profile. CIS-A2K assessed these applicants on different parameters such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Exposure to digital domain&lt;/li&gt;
&lt;li&gt;Exposure in community driven projects&lt;/li&gt;
&lt;li&gt;Exposure of working with schools of performing arts or cultural departments&lt;/li&gt;
&lt;li&gt;Prior experience of working in multi-cultural environment&lt;/li&gt;
&lt;li&gt;Prior experience in program design and management &lt;/li&gt;
&lt;li&gt;Exposure to Wikimedia projects and community&lt;/li&gt;
&lt;li&gt;Technical work experience&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In this level, 9 applicants were rejected due to failure of completing the assignment and 1 applicant pulled out. Out of the remaining 25 applicants, CIS-A2K shortlisted 15.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Second level of shortlisting&lt;/b&gt;&lt;br /&gt;Vishnu and Nitika conducted one hour Skype interviews with each of the shortlisted candidates. CIS-A2K tried to assess candidates on their:&lt;/p&gt;
&lt;li&gt;Understanding and passion for Wikimedia movement and projects&lt;/li&gt;
&lt;li&gt;Level of understanding of the job profile&lt;/li&gt;
&lt;li&gt;Level of understanding of open source, open access, open standards.&lt;/li&gt;
&lt;li&gt;Clarity of thinking and communication skills&lt;/li&gt;
&lt;li&gt;Ability to work with teams and communities&lt;/li&gt;
&lt;li&gt;Experience  / understanding of community mobilisation &amp;amp; outreach&lt;/li&gt;
&lt;li&gt;Skills in project management&lt;/li&gt;
&lt;li&gt;Comfort with working in unstructured environments &lt;/li&gt;
&lt;li&gt;Ability to learn new things and approach unfamiliar situations&lt;/li&gt;
&lt;li&gt;Personal passions and interests&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;On the basis of Skype conversations, CIS-A2K shortlisted 6 candidates out of 15 for the next level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Third level of shortlisting&lt;/b&gt;&lt;br /&gt;At this stage one more applicant pulled out and remaining 5 were called for personal interviews to our Bangalore office. All participants were requested to come prepared to present on the topic of 'Performing Arts and Wikipedia' for 10 mins. Each interview lasted for approximately an hour. Towards the closure of the day all participants were requested to gather where each one of them showcased their presentations. This further led to an interesting group discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K had requested Wikimedia India to select someone from the Chapter who could be involved in the selection process and we're glad that Sowmyan Tirumurti, Executive Manager of Wikimedia Chapter could join us for a little while on the day of personal interviews.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Final Selection&lt;/b&gt;&lt;br /&gt;Based on all the parameters and levels of interviews, CIS-A2K decided to extend the offer to &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Team"&gt;Syed Muzammiluddin&lt;/a&gt; for the position of Programme Officer - Pilot Projects. Muzammil's experience, skills and interest matched our requirements the best and we look forward to a long and successful relationship with him.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/selection-of-programme-officer-pilot-projects-a2k'&gt;https://cis-india.org/openness/blog-old/selection-of-programme-officer-pilot-projects-a2k&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nitika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2013-10-30T06:07:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology">
    <title>Security: Privacy, Transparency and Technology</title>
    <link>https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has been involved in privacy and data protection research for the last five years. It has participated as a member of the Justice A.P. Shah Committee, which has influenced the draft Privacy Bill being authored by the Department of Personnel and Training. It has organised 11 multistakeholder roundtables across India over the last two years to discuss a shadow Privacy Bill drafted by CIS with the participation of privacy commissioners and data protection authorities from Europe and Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was co-authored by Sunil Abraham, Elonnai Hickok and Tarun Krishnakumar. It was published by Observer Research Foundation, &lt;a href="https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf" class="internal-link"&gt;Digital Debates 2015: CyFy Journal Volume 2&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Our centre’s work on privacy was considered incomplete by some stakeholders because of a lack of focus in the area of cyber security and therefore we have initiated research on it from this year onwards. In this article, we have undertaken a preliminary examination of the theoretical relationships between the national security imperative and privacy, transparency and technology.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Privacy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Daniel J. Solove has identified the tension between security and privacy as a false dichotomy: "Security and privacy often clash, but there need not be a zero-sum tradeoff." &lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; Further unpacking this false dichotomy, Bruce Schneier says, "There is no security without privacy. And liberty requires both security and privacy." &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; Effectively, it could be said that privacy is a precondition for security, just as security is a precondition for privacy. A secure information system cannot be designed without guaranteeing the privacy of its authentication factors, and it is not possible to guarantee privacy of authentication factors without having confidence in the security of the system. Often policymakers talk about a balance between the privacy and security imperatives—in other words a zero-sum game. Balancing these imperatives is a foolhardy approach, as it simultaneously undermines both imperatives. Balancing privacy and security should instead be framed as an optimisation problem. Indeed, during a time when oversight mechanisms have failed even in so-called democratic states, the regulatory power of technology &lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; should be seen as an increasingly key ingredient to the solution of that optimisation problem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data retention is required in most jurisdictions for law enforcement, intelligence and military purposes. Here are three examples of how security and privacy can be optimised when it comes to Internet Service Provider (ISP) or telecom operator logs:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Data Retention&lt;/strong&gt;: We propose that the office of the Privacy Commissioner generate a cryptographic key pair for each internet user and give one key to the ISP / telecom operator. This key would be used to encrypt logs, thereby preventing unauthorised access. Once there is executive or judicial authorisation, the Privacy Commissioner could hand over the second key to the authorised agency. There could even be an emergency procedure and the keys could be automatically collected by concerned agencies from the Privacy Commissioner. This will need to be accompanied by a policy that criminalises the possession of unencrypted logs by ISP and telecom operators.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Privacy-Protective Surveillance&lt;/strong&gt;: Ann Cavoukian and Khaled El Emam &lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; have proposed combining intelligent agents, homomorphic encryption and probabilistic graphical models to provide “a positive-sum, ‘win–win’ alternative to current counter-terrorism surveillance systems.” They propose limiting collection of data to “significant” transactions or events that could be associated with terrorist-related activities, limiting analysis to wholly encrypted data, which then does not just result in “discovering more patterns and relationships without an understanding of their context” but rather “intelligent information—information selectively gathered and placed into an appropriate context to produce actual knowledge.” Since fully homomorphic encryption may be unfeasible in real-world systems, they have proposed use of partially homomorphic encryption. But experts such as Prof. John Mallery from MIT are also working on solutions based on fully homomorphic encryption.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Fishing Expedition Design&lt;/strong&gt;: Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal have proposed a standard &lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; that could be adopted by authorised agencies, telecom operators and ISPs. Instead of giving authorised agencies complete access to logs, they propose a format for database queries, which could be sent to the telecom operator or ISP by authorised agencies. The telecom operator or ISP would then process the query, and anonymise/obfuscate the result-set in an automated fashion based on applicable privacypolicies/regulation. Authorised agencies would then hone in on a subset of the result-set that they would like with personal identifiers intact; this smaller result set would then be shared with the authorised agencies.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;An optimisation approach to resolving the false dichotomy between privacy and security will not allow for a total surveillance regime as pursued by the US administration. Total surveillance brings with it the ‘honey pot’ problem: If all the meta-data and payload data of citizens is being harvested and stored, then the data store will become a single point of failure and will become another target for attack. The next Snowden may not have honourable intentions and might decamp with this ‘honey pot’ itself, which would have disastrous consequences.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If total surveillance will completely undermine the national security imperative, what then should be the optimal level of surveillance in a population? The answer depends upon the existing security situation. If this is represented on a graph with security on the y-axis and the proportion of the population under surveillance on the x-axis, the benefits of surveillance could be represented by an inverted hockey-stick curve. To begin with, there would already be some degree of security. As a small subset of the population is brought under surveillance, security would increase till an optimum level is reached, after which, enhancing the number of people under surveillance would not result in any security pay-off. Instead, unnecessary surveillance would diminish security as it would introduce all sorts of new vulnerabilities. Depending on the existing security situation, the head of the hockey-stick curve might be bigger or smaller. To use a gastronomic analogy, optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India the designers of surveillance projects have fortunately rejected the total surveillance paradigm. For example, the objective of the National Intelligence Grid (NATGRID) is to streamline and automate targeted surveillance; it is introducing technological safeguards that will allow express combinations of result-sets from 22 databases to be made available to 12 authorised agencies. This is not to say that the design of the NATGRID cannot be improved.&lt;/p&gt;
&lt;h3&gt;Security and Transparency&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;There are two views on security and transparency: One, security via obscurity as advocated by vendors of proprietary software, and two, security via transparency as advocated by free/open source software (FOSS) advocates and entrepreneurs. Over the last two decades, public and industry opinion has swung towards security via transparency. This is based on the Linus rule that “given enough eyeballs, all bugs are shallow.” But does this mean that transparency is a necessary and sufficient condition? Unfortunately not, and therefore it is not necessarily true that FOSS and open standards will be more secure than proprietary software and proprietary standards.&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;The recent detection of the Heartbleed &lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; security bug in Open SSL, &lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt; causing situations where more data can be read than should be allowed, and Snowden’s revelations about the compromise of some open cryptographic standards (which depend on elliptic curves), developed by the US National Institute of Standards and Technology, are stark examples. &lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At the same time, however, open standards and FOSS are crucial to maintaining the balance of power in information societies, as civil society and the general public are able to resist the powers of authoritarian governments and rogue corporations using cryptographic technology. These technologies allow for anonymous speech, pseudonymous speech, private communication, online anonymity and circumvention of surveillance and censorship. For the media, these technologies enable anonymity of sources and the protection of whistle-blowers—all phenomena that are critical to the functioning of a robust and open democratic society. But these very same technologies are also required by states and by the private sector for a variety of purposes—national security, e-commerce, e-banking, protection of all forms of intellectual property, and services that depend on confidentiality, such as legal or medical services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In order words, all governments, with the exception of the US government, have common cause with civil society, media and the general public when it comes to increasing the security of open standards and FOSS. Unfortunately, this can be quite an expensive task because the re-securing of open cryptographic standards depends on mathematicians. Of late, mathematical research outputs that can be militarised are no longer available in the public domain because the biggest employers of mathematicians worldwide today are the US military and intelligence agencies. If other governments invest a few billion dollars through mechanisms like Knowledge Ecology International’s proposed World Trade Organization agreement on the supply of knowledge as a public good, we would be able to internationalise participation in standard-setting organisations and provide market incentives for greater scrutiny of cryptographic standards and patching of vulnerabilities of FOSS. This would go a long way in addressing the trust deficit that exists on the internet today.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A techno-utopian understanding of security assumes that more technology, more recent technology and more complex technology will necessarily lead to better security outcomes.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is because the security discourse is dominated by vendors with sales targets who do not present a balanced or accurate picture of the technologies that they are selling. This has resulted in state agencies and the general public having an exaggerated understanding of the capabilities of surveillance technologies that is more aligned with Hollywood movies than everyday reality.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;More Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Increasing the number of x-ray machines or full-body scanners at airports by a factor of ten or hundred will make the airport less secure unless human oversight is similarly increased. Even with increased human oversight, all that has been accomplished is an increase in the potential locations that can be compromised. The process of hardening a server usually involves stopping non-essential services and removing non-essential software. This reduces the software that should be subject to audit, continuously monitored for vulnerabilities and patched as soon as possible. Audits, ongoing monitoring and patching all cost time and money and therefore, for governments with limited budgets, any additional unnecessary technology should be seen as a drain on the security budget. Like with the airport example, even when it comes to a single server on the internet, it is clear that, from a security perspective, more technology without a proper functionality and security justification is counter-productive. To reiterate, throwing increasingly more technology at a problem does not make things more secure; rather, it results in a proliferation of vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Latest Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Reports that a number of state security agencies are contemplating returning to typewriters for sensitive communications in the wake of Snowden’s revelations makes it clear that some older technologies are harder to compromise in comparison to modern technology. &lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; Between iris- and fingerprint-based biometric authentication, logically, it would be easier for a criminal to harvest images of irises or authentication factors in bulk fashion using a high resolution camera fitted with a zoom lens in a public location, in comparison to mass lifting of fingerprints.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Complex Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Fifteen years ago, Bruce Schneier said, "The worst enemy of security is complexity. This has been true since the beginning of computers, and it’s likely to be true for the foreseeable future." &lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt; This is because complexity increases fragility; every feature is also a potential source of vulnerabilities and failures. The simpler Indian electronic machines used until the 2014 elections are far more secure than the Diebold voting machines used in the 2004 US presidential elections. Similarly when it comes to authentication, a pin number is harder to beat without user-conscious cooperation in comparison to iris- or fingerprint-based biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the following section of the paper we have identified five threat scenarios &lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt; relevant to India and identified solutions based on our theoretical framing above.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Threat Scenarios and Possible Solutions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Hacking the NIC Certifying Authority&lt;/strong&gt;&lt;br /&gt;One of the critical functions served by the National Informatics Centre (NIC) is as a Certifying Authority (CA). &lt;a name="fr12" href="#fn12"&gt;[12]&lt;/a&gt; In this capacity, the NIC issues digital certificates that authenticate web services and allow for the secure exchange of information online. &lt;a name="fr13" href="#fn13"&gt;[13]&lt;/a&gt; Operating systems and browsers maintain lists of trusted CA root certificates as a means of easily verifying authentic certificates. India’s Controller of Certifying Authority’s certificates issued are included in the Microsoft Root list and recognised by the majority of programmes running on Windows, including Internet Explorer and Chrome. &lt;a name="fr14" href="#fn14"&gt;[14]&lt;/a&gt; In 2014, the NIC CA’s infrastructure was compromised, and digital certificates were issued in NIC’s name without its knowledge. &lt;a name="fr15" href="#fn15"&gt;[15]&lt;/a&gt; Reports indicate that NIC did not "have an appropriate monitoring and tracking system in place to detect such intrusions immediately." &lt;a name="fr16" href="#fn16"&gt;[16]&lt;/a&gt; The implication is that websites could masquerade as another domain using the fake certificates. Personal data of users can be intercepted or accessed by third parties by the masquerading website. The breach also rendered web servers and websites of government bodies vulnerable to attack, and end users were no longer sure that data on these websites was accurate and had not been tampered with. &lt;a name="fr17" href="#fn17"&gt;[17]&lt;/a&gt; The NIC CA was forced to revoke all 250,000 SSL Server Certificates issued until that date &lt;a name="fr18" href="#fn18"&gt;[18]&lt;/a&gt; and is no longer issuing digital certificates for the time being. &lt;a name="fr19" href="#fn19"&gt;[19]&lt;/a&gt;Public key pinning is a means through which websites can specify which certifying authorities have issued certificates for that site. Public key pinning can prevent man-in-the-middle attacks due to fake digital certificates. &lt;a name="fr20" href="#fn20"&gt;[20]&lt;/a&gt; Certificate Transparency allows anyone to check whether a certificate has been properly issued, seeing as certifying authorities must publicly publish information about the digital certificates that they have issued. Though this approach does not prevent fake digital certificates from being issued, it can allow for quick detection of misuse. &lt;a name="fr21" href="#fn21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;‘Logic Bomb’ against Airports&lt;/strong&gt;&lt;br /&gt;Passenger operations in New Delhi’s Indira Gandhi International Airport depend on a centralised operating system known as the Common User Passenger Processing System (CUPPS). The system integrates numerous critical functions such as the arrival and departure times of flights, and manages the reservation system and check-in schedules. &lt;a name="fr22" href="#fn22"&gt;[22]&lt;/a&gt; In 2011, a logic bomb attack was remotely launched against the system to introduce malicious code into the CUPPS software. The attack disabled the CUPPS operating system, forcing a number of check-in counters to shut down completely, while others reverted to manual check-in, resulting in over 50 delayed flights. Investigations revealed that the attack was launched by three disgruntled employees who had assisted in the installation of the CUPPS system at the New Delhi Airport. &lt;a name="fr23" href="#fn23"&gt;[23]&lt;/a&gt; Although in this case the impact of the attack was limited to flight delay, experts speculate that the attack was meant to take down the entire system. The disruption and damage resulting from the shutdown of an entire airport would be extensive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Adoption of open hardware and FOSS is one strategy to avoid and mitigate the risk of such vulnerabilities. The use of devices that embrace the concept of open hardware and software specifications must be encouraged, as this helps the FOSS community to be vigilant in detecting and reporting design deviations and investigate into probable vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Attack on Critical Infrastructure&lt;/strong&gt;&lt;br /&gt;The Nuclear Power Corporation of India encounters and prevents numerous cyber attacks every day. &lt;a name="fr24" href="#fn24"&gt;[24]&lt;/a&gt; The best known example of a successful nuclear plant hack is the Stuxnet worm that thwarted the operation of an Iranian nuclear enrichment complex and set back the country’s nuclear programme. &lt;a name="fr25" href="#fn25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The worm had the ability to spread over the network and would activate when a specific configuration of systems was encountered &lt;a name="fr26" href="#fn26"&gt;[26]&lt;/a&gt; and connected to one or more Siemens programmable logic controllers. &lt;a name="fr27" href="#fn27"&gt;[27]&lt;/a&gt; The worm was suspected to have been initially introduced through an infected USB drive into one of the controller computers by an insider, thus crossing the air gap. &lt;a name="fr28" href="#fn28"&gt;[28]&lt;/a&gt; The worm used information that it gathered to take control of normal industrial processes (to discreetly speed up centrifuges, in the present case), leaving the operators of the plant unaware that they were being attacked. This incident demonstrates how an attack vector introduced into the general internet can be used to target specific system configurations. When the target of a successful attack is a sector as critical and secured as a nuclear complex, the implications for a country’s security and infrastructure are potentially grave.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Security audits and other transparency measures to identify vulnerabilities are critical in sensitive sectors. Incentive schemes such as prizes, contracts and grants may be evolved for the private sector and academia to identify vulnerabilities in the infrastructure of critical resources to enable/promote security auditing of infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Micro Level: Chip Attacks&lt;/strong&gt;&lt;br /&gt;Semiconductor devices are ubiquitous in electronic devices. The US, Japan, Taiwan, Singapore, Korea and China are the primary countries hosting manufacturing hubs of these devices. India currently does not produce semiconductors, and depends on imported chips. This dependence on foreign semiconductor technology can result in the import and use of compromised or fraudulent chips by critical sectors in India. For example, hardware Trojans, which may be used to access personal information and content on a device, may be inserted into the chip. Such breaches/transgressions can render equipment in critical sectors vulnerable to attack and threaten national security. &lt;a name="fr29" href="#fn29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Indigenous production of critical technologies and the development of manpower and infrastructure to support these activities are needed. The Government of India has taken a number of steps towards this. For example, in 2013, the Government of India approved the building of two Semiconductor Wafer Fabrication (FAB) manufacturing facilities &lt;a name="fr30" href="#fn30"&gt;[30]&lt;/a&gt; and as of January 2014, India was seeking to establish its first semiconductor characterisation lab in Bangalore. &lt;a name="fr31" href="#fn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Macro Level: Telecom and Network Switches&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The possibility of foreign equipment containing vulnerabilities and backdoors that are built into its software and hardware gives rise to concerns that India’s telecom and network infrastructure is vulnerable to being hacked and accessed by foreign governments (or non-state actors) through the use of spyware and malware that exploit such vulnerabilities. In 2013, some firms, including ZTE and Huawei, were barred by the Indian government from participating in a bid to supply technology for the development of its National Optic Network project due to security concerns. &lt;a name="fr32" href="#fn32"&gt;[32]&lt;/a&gt; Similar concerns have resulted in the Indian government holding back the conferment of ‘domestic manufacturer’ status on both these firms. &lt;a name="fr33" href="#fn33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Following reports that Chinese firms were responsible for transnational cyber attacks designed to steal confidential data from overseas targets, there have been moves to establish laboratories to test imported telecom equipment in India. &lt;a name="fr34" href="#fn34"&gt;[34]&lt;/a&gt; Despite these steps, in a February 2014 incident the state-owned telecommunication company  Bharat Sanchar Nigam Ltd’s network was hacked, allegedly by Huawei. &lt;a name="fr35" href="#fn35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Security practitioners and policymakers need to avoid the zero-sum framing prevalent in popular discourse regarding security VIS-A-VIS privacy, transparency and technology.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;A successful hack of the telecom infrastructure could result in massive disruption in internet and telecommunications services. Large-scale surveillance and espionage by foreign actors would also become possible, placing, among others, both governmental secrets and individuals personal information at risk.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While India cannot afford to impose a general ban on the import of foreign telecommunications equipment, a number of steps can be taken to address the risk of inbuilt security vulnerabilities. Common International Criteria for security audits could be evolved by states to ensure compliance of products with international norms and practices. While India has already established common criteria evaluation centres, &lt;a name="fr36" href="#fn36"&gt;[36]&lt;/a&gt; the government monopoly over the testing function has resulted in only three products being tested so far. A Code Escrow Regime could be set up where manufacturers would be asked to deposit source code with the Government of India for security audits and verification. The source code could be compared with the shipped software to detect inbuilt vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyber security cannot be enhanced without a proper understanding of the relationship between security and other national imperatives such as privacy, transparency and technology. This paper has provided an initial sketch of those relationships, but sustained theoretical and empirical research is required in India so that security practitioners and policymakers avoid the zero-sum framing prevalent in popular discourse and take on the hard task of solving the optimisation problem by shifting policy, market and technological levers simultaneously. These solutions must then be applied in multiple contexts or scenarios to determine how they should be customised to provide maximum security bang for the buck.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. Daniel J. Solove, Chapter 1 in Nothing to Hide: The False Tradeoff between Privacy and Security (Yale University Press: 2011), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1827982.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. Bruce Schneier, “What our Top Spy doesn’t get: Security and Privacy aren’t Opposites,” Wired, January 24, 2008, http://archive.wired.com/politics/security commentary/security matters/2008/01/securitymatters_0124 and Bruce Schneier, “Security vs. Privacy,” Schneier on Security, January 29, 2008, https://www.schneier.com/blog/archives/2008/01/security_vs_pri.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. There are four sources of power in internet governance: Market power exerted by private sector organisations; regulatory power exerted by states; technical power exerted by anyone who has access to certain categories of technology, such as cryptography; and finally, the power of public pressure sporadically mobilised by civil society. A technically sound encryption standard, if employed by an ordinary citizen, cannot be compromised using the power of the market or the regulatory power of states or public pressure by civil society. In that sense, technology can be used to regulate state and market behaviour.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. Ann Cavoukian and Khaled El Emam, “Introducing Privacy-Protective Surveillance: Achieving Privacy and Effective Counter-Terrorism,” Information &amp;amp; Privacy Commisioner, September 2013, Ontario, Canada, http://www.privacybydesign.ca/content/uploads/2013/12/pps.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal, “Information Integration and Analysis: A Semantic Approach to Privacy”(presented at the third IEEE International Conference on Information Privacy, Security, Risk and Trust, Boston, USA, October 2011), ebiquity.umbc.edu/_file_directory_/papers/578.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. Bruce Byfield, “Does Heartbleed disprove ‘Open Source is Safer’?,” Datamation, April 14, 2014, http://www.datamation.com/open-source/does-heartbleed-disprove-open-source-is-safer-1.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. “Cybersecurity Program should be more transparent, protect privacy,” Centre for Democracy and Technology Insights, March 20, 2009, https://cdt.org/insight/cybersecurity-program-should-be-more-transparent-protect-privacy/#1.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. “Cracked Credibility,” The Economist, September 14, 2013, http://www.economist.com/news/international/21586296-be-safe-internet-needs-reliable-encryption-standards-software-and.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. Miriam Elder, “Russian guard service reverts to typewriters after NSA leaks,” The Guardian, July 11, 2013, www.theguardian.com/world/2013/jul/11/russia-reverts-paper-nsa-leaks and Philip Oltermann, “Germany ‘may revert to typewriters’ to counter hi-tech espionage,” The Guardian, July 15, 2014, www.theguardian.com/world/2014/jul/15/germany-typewriters-espionage-nsa-spying-surveillance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. Bruce Schneier, “A Plea for Simplicity,” Schneier on Security, November 19, 1999, https://www.schneier.com/essays/archives/1999/11/a_plea_for_simplicit.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. With inputs from Pranesh Prakash of the Centre for Internet and Society and Sharathchandra Ramakrishnan of Srishti School of Art, Technology and Design.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn12" href="#fr12"&gt;12&lt;/a&gt;]. “Frequently Asked Questions,” Controller of Certifying Authorities, Department of Electronics and Information Technology, Government of India, http://cca.gov.in/cca/index.php?q=faq-page#n41.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn13" href="#fr13"&gt;13&lt;/a&gt;]. National Informatics Centre Homepage, Government of India, http://www.nic.in/node/41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn14" href="#fr14"&gt;14&lt;/a&gt;]. Adam Langley, “Maintaining Digital Certificate Security,” Google Security Blog, July 8, 2014, http://googleonlinesecurity.blogspot.in/2014/07/maintaining-digital-certificate-security.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn15" href="#fr15"&gt;15&lt;/a&gt;]. This is similar to the kind of attack carried out against DigiNotar, a Dutch certificate authority. See: http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1246&amp;amp;context=jss.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn16" href="#fr16"&gt;16&lt;/a&gt;]. R. Ramachandran, “Digital Disaster,” Frontline, August 22, 2014, http://www.frontline.in/the-nation/digital-disaster/article6275366.ece.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn17" href="#fr17"&gt;17&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn18" href="#fr18"&gt;18&lt;/a&gt;]. “NIC’s digital certification unit hacked,” Deccan Herald, July 16, 2014, http://www.deccanherald.com/content/420148/archives.php.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn19" href="#fr19"&gt;19&lt;/a&gt;]. National Informatics Centre Certifying Authority Homepage, Government of India, http://nicca.nic.in//.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn20" href="#fr20"&gt;20&lt;/a&gt;]. Mozilla Wiki, “Public Key Pinning,” https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn21" href="#fr21"&gt;21&lt;/a&gt;]. “Certificate Transparency - The quick detection of fraudulent digital certificates,” Ascertia, August 11, 2014, http://www.ascertiaIndira.com/blogs/pki/2014/08/11/certificate-transparency-the-quick-detection-of-fraudulent-digital-certificates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn22" href="#fr22"&gt;22&lt;/a&gt;]. “Indira Gandhi International Airport (DEL/VIDP) Terminal 3, India,” Airport Technology.com, http://www.airport-technology.com/projects/indira-gandhi-international-airport-terminal -3/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn23" href="#fr23"&gt;23&lt;/a&gt;]. “How techies used logic bomb to cripple Delhi Airport,” Rediff, November 21, 2011, http://www.rediff.com/news/report/how-techies-used-logic-bomb-to-cripple-delhi-airport/20111121 htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn24" href="#fr24"&gt;24&lt;/a&gt;]. Manu Kaushik and Pierre Mario Fitter, “Beware of the bugs,” Business Today, February 17, 2013, http://businesstoday.intoday.in/story/india-cyber-security-at-risk/1/191786.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn25" href="#fr25"&gt;25&lt;/a&gt;]. “Stuxnet ‘hit’ Iran nuclear plants,” BBC, November 22, 2010, http://www.bbc.com/news/technology-11809827.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn26" href="#fr26"&gt;26&lt;/a&gt;]. In this case, systems using Microsoft Windows and running Siemens Step7 software were targeted.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn27" href="#fr27"&gt;27&lt;/a&gt;]. Jonathan Fildes, “Stuxnet worm ‘targeted high-value Iranian assets’,” BBC, September 23, 2010, http://www.bbc.com/news/technology-11388018.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn28" href="#fr28"&gt;28&lt;/a&gt;]. Farhad Manjoo, “Don’t Stick it in: The dangers of USB drives,” Slate, October 5, 2010, http://www.slate.com/articles/technology/technology/2010/10/dont_stick_it_in.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn29" href="#fr29"&gt;29&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn30" href="#fr30"&gt;30&lt;/a&gt;]. “IBM invests in new $5bn chip fab in India, so is chip sale off?,” ElectronicsWeekly, February 14, 2014, http://www.electronicsweekly.com/news/business/ibm-invests-new-5bn-chip-fab-india-chip-sale-2014-02/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn31" href="#fr31"&gt;31&lt;/a&gt;]. NT Balanarayan, “Cabinet Approves Creation of Two Semiconductor Fabrication Units,” Medianama, February 17, 2014, http://articles.economictimes.indiatimes.com/2014-02-04/news/47004737_1_indian-electronics-special-incentive-package-scheme-semiconductor-association.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn32" href="#fr32"&gt;32&lt;/a&gt;]. Jamie Yap, “India bars foreign vendors from national broadband initiative,” ZD Net, January 21, 2013, http://www.zdnet.com/in/india-bars-foreign-vendors-from-national-broadband-initiative-7000010055/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn33" href="#fr33"&gt;33&lt;/a&gt;]. Kevin Kwang, “India holds back domestic-maker status for Huawei, ZTE,” ZD Net, February 6, 2013, http://www.zdnet.com/in/india-holds-back-domestic-maker-status-for-huawei-zte-70 00010887/. Also see “Huawei, ZTE await domestic-maker tag,” The Hindu, February 5, 2013, http://www.thehindu.com/business/companies/huawei-zte-await-domesticmaker-tag/article4382888.ece.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn34" href="#fr34"&gt;34&lt;/a&gt;]. Ellyne Phneah, “Huawei, ZTE under probe by Indian government,” ZD Net, May 10, 2013, http://www.zdnet.com/in/huawei-zte-under-probe-by-indian-government-7000015185/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn35" href="#fr35"&gt;35&lt;/a&gt;]. Devidutta Tripathy, “India investigates report of Huawei hacking state carrier network,” Reuters, February 6, 2014, http://www.reuters.com/article/2014/02/06/us-india-huawei-hacking-idUSBREA150QK20140206.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn36" href="#fr36"&gt;36&lt;/a&gt;]. “Products Certified,” Common Criteria Portal of India, http://www.commoncriteria-india.gov.in/Pages/ProductsCertified.aspx.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology'&gt;https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-09-15T10:53:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy">
    <title>Security, Governments, and Data: Technology and Policy</title>
    <link>https://cis-india.org/internet-governance/events/security-governments-data-technology-policy</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;About the Conference&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;&lt;strong&gt;Conference &lt;/strong&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;&lt;span&gt;Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with.  Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws &amp;amp; policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.&lt;/span&gt;&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;Panel Descriptions&lt;/h3&gt;
&lt;p align="left"&gt; &lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt;Challenges &amp;amp; Present Scenario&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities.  The Government of India has taken numerous steps to address and resolve such challenges.  In July 2013, the National Cyber Security Policy  was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52&lt;/span&gt;&lt;sup&gt;nd&lt;/sup&gt;&lt;span&gt; Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre.  CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Law &amp;amp; Policy&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things,  mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Architecture &amp;amp; Technology&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;International and Domestic Markets&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015.  Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised.  Towards this end, the Government of India  has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment.  Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the &lt;/span&gt;&lt;span&gt;Wassenaar agreement, they have yet to be accepted.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;/td&gt;
&lt;td&gt;Key Note Speech&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;/td&gt;
&lt;td&gt;Challenges &amp;amp; Present Scenario&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;/td&gt;
&lt;td&gt;Law &amp;amp; Policy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;/td&gt;
&lt;td&gt;Architecture &amp;amp; Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;/td&gt;
&lt;td&gt;International &amp;amp; Domestic Markets&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.30&lt;/td&gt;
&lt;td&gt;Conclusion &amp;amp; Closing Remarks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-governments-data-technology-policy'&gt;https://cis-india.org/internet-governance/events/security-governments-data-technology-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-24T08:06:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india">
    <title>Security Standards for the Financial Technology Sector in India</title>
    <link>https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india'&gt;https://cis-india.org/internet-governance/resources/security-standards-for-the-financial-technology-sector-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>karan</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-11-15T12:56:04Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-march-26-2018-nilesh-christopher-security-experts-say-need-to-secure-aadhaar-ecosystem-warn-about-third-party-leaks">
    <title>Security experts say need to secure Aadhaar ecosystem, warn about third party leaks </title>
    <link>https://cis-india.org/internet-governance/news/economic-times-march-26-2018-nilesh-christopher-security-experts-say-need-to-secure-aadhaar-ecosystem-warn-about-third-party-leaks</link>
    <description>
        &lt;b&gt;The public reckoning of data leaks in India’s national ID database, Aadhaar is still on hold while reports of data leakage through third-parties keep coming. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nilesh Christopher was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/news/politics-and-nation/there-is-a-need-to-secure-full-aadhaar-ecosystem-experts/articleshow/63459367.cms"&gt;Economic Times&lt;/a&gt; on March 26, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While the Unique Identification Authority of India (UIDAI) has maintained that its database is secure and there are no breaches of &lt;a class="external-link" href="https://economictimes.indiatimes.com/topic/Aadhaar"&gt;Aadhaar&lt;/a&gt; data from its system, security researchers warn that leaks are happening in third-party sites and it is important for the agency to ensure that its ecosystem adopts measures to keep data safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Unique Identification Authority of India (&lt;a class="external-link" href="https://economictimes.indiatimes.com/topic/UIDAI"&gt;UIDAI&lt;/a&gt;) has maintained that its database is secure and there are no breaches of Aadhaar data from its system, security researchers warn that leaks are happening in third-party sites and it is important for the agency to ensure that its ecosystem adopts measures to keep data safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Securing an entire ecosystem is more important than secure individual databases,” said security researcher Srinivas Kodali. Over the weekend, technology publication &lt;a class="external-link" href="https://economictimes.indiatimes.com/topic/ZDnet"&gt;ZDnet &lt;/a&gt;citing an Indian security researcher said that it identified Aadhaar data leaks on a system run by a state-owned utility company &lt;a class="external-link" href="https://economictimes.indiatimes.com/topic/Indane"&gt;Indane&lt;/a&gt; that allowed anyone to access sensitive information like a name, Aadhar number, bank details. The leak was plugged soon after the report appeared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI came out with a strong statement denying the breach. “There is no truth in the story as there has been absolutely no breach of UIDAI’s Aadhaar database. Aadhaar remains safe and secure,” the government agency said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been no reports of any breach in the core database so far. However, it is the third-parties that have acted as weak links.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The simple parallel that can be drawn is, though Facebook’s core database of users information was secure, the data leak happened through third-party developers and organisation like Cambridge Analytica that have allegedly misused it,” Kodali said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case of Aadhar too, the allegations of breaches have not been on ‘Aadhaar database’ but rather at insecure government websites and third-parties with API access to the database. “In this aspect, the issue in Facebook and Aadhaar is similar. In both the cases there was no breach of database, but it was third parties that acted as the weakest link. In both cases, it was a legitimate means of access through API that was open for abuse,” said Sunil Abraham, executive director, Center for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI could take a leaf from Indian Space Research Organisation while handling &lt;a class="external-link" href="https://economictimes.indiatimes.com/topic/data-breach"&gt;data breach&lt;/a&gt; reports. The state-run space agency put out a note appreciating security researches for their efforts. An email ID to report flaws is more important than summoning people regarding data breaches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The fear of criminal prosecution hanging over the heads of ethical hackers would not help us develop a robust and strong security architecture,” said Karan Saini, a Delhi-based security researcher who first highlighted the Aadhaar leak at Indane.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“UIDAI is working on a policy to enable security experts to report issues in a legal and safe manner,” tweeted Ajay Bhushan Pandey, chief executive of India's Unique Identification Authority (UIDAI), the government department that administers the Aadhaar database. Seven months after the tweet, Pandey’s promise of a bug-reporting mechanism has still has not fructified.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-march-26-2018-nilesh-christopher-security-experts-say-need-to-secure-aadhaar-ecosystem-warn-about-third-party-leaks'&gt;https://cis-india.org/internet-governance/news/economic-times-march-26-2018-nilesh-christopher-security-experts-say-need-to-secure-aadhaar-ecosystem-warn-about-third-party-leaks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-26T22:37:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sectoral-privacy-research">
    <title>Sectoral Privacy Research</title>
    <link>https://cis-india.org/internet-governance/blog/sectoral-privacy-research</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, India has been researching privacy in India since the year 2010, with special focus on the following issues.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Right to Privacy has evolved in India since many decades, where the question of it being a Fundamental Right has been debated many times in courts of Law. With the advent of information technology and digitisation of the services, the issue of Privacy holds more relevance in sectors like Banking, Healthcare, Telecommunications, ITC, etc., The Right to Privacy is also addressed in light of the Sexual minorities, Whistle-blowers, Government services, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Consumer Privacy and other sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer privacy laws and regulations seek to protect any individual from loss of privacy due to failures or limitations of corporate customer privacy 	measures. The following articles deal with the current consumer privacy laws in place in India and around the world. Also, privacy concerns have been 	considered along with other sectors like Copyright law, data protection, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy - How to Enforce an Effective Protective Regime? &lt;a href="http://bit.ly/1a99P2z"&gt;http://bit.ly/1a99P2z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Information Technology Act: Do we have the Safeguards for Electronic Privacy? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Limits to Privacy http://bit.ly/19mPG6I &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Copyright Enforcement and Privacy in India &lt;a href="http://bit.ly/18fi9fM"&gt;http://bit.ly/18fi9fM&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy in India: Country Report http://bit.ly/14pnNwl &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Transparency and Privacy &lt;a href="http://bit.ly/1a9dMnC"&gt;http://bit.ly/1a9dMnC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Report of the Group of Experts on Privacy (Contributed by CIS) &lt;a href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The (In) Visible Subject: Power, Privacy and Social Networking &lt;a href="http://bit.ly/15koqol"&gt;http://bit.ly/15koqol&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and the Indian Copyright Act, 1857 as Amended in 2010 &lt;a href="http://bit.ly/1euwX0r"&gt;http://bit.ly/1euwX0r&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Should Ratan Tata be afforded the Right to Privacy? &lt;a href="http://bit.ly/LRlXin"&gt;http://bit.ly/LRlXin&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Information Technology (Guidelines for Cyber Café) Rules, 2011 &lt;a href="http://bit.ly/15kojJn"&gt;http://bit.ly/15kojJn&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Broadcasting Standards Authority Censures TV9 over Privacy Violations! &lt;a href="http://bit.ly/16L4izl"&gt;http://bit.ly/16L4izl&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection Enough? &lt;a href="http://bit.ly/1bvaWx2"&gt;http://bit.ly/1bvaWx2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, speech at stake in cyberspace	&lt;a href="http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1"&gt;http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Q&amp;amp;A to the Report of the Group of Experts on Privacy &lt;a href="http://bit.ly/TPhzQQ"&gt;http://bit.ly/TPhzQQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy worries cloud Facebook's WhatsApp Deal 	&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal"&gt; http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ GNI Assessment Finds ICT Companies Protect User Privacy and Freedom of Expression &lt;a href="http://bit.ly/1mjbpmL"&gt;http://bit.ly/1mjbpmL&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ A Stolen Perspective &lt;a href="http://bit.ly/1bWHyzv"&gt;http://bit.ly/1bWHyzv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection enough? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough"&gt; http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ I don't want my fingerprints taken &lt;a href="http://bit.ly/aYdMia"&gt;http://bit.ly/aYdMia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Keeping it Private &lt;a href="http://bit.ly/15wjTVc"&gt;http://bit.ly/15wjTVc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Personal Data, Public Profile &lt;a href="http://bit.ly/15vlFk4"&gt;http://bit.ly/15vlFk4&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Why your Facebook Stalker is Not the Real Problem &lt;a href="http://bit.ly/1bI2MSc"&gt;http://bit.ly/1bI2MSc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Private Eye &lt;a href="http://bit.ly/173ypSI"&gt;http://bit.ly/173ypSI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ How Facebook is Blatantly Abusing our Trust &lt;a href="http://bit.ly/OBXGXk"&gt;http://bit.ly/OBXGXk&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Open Secrets &lt;a href="http://bit.ly/1b5uvK0"&gt;http://bit.ly/1b5uvK0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Brother is Watching You &lt;a href="http://bit.ly/1cGpg0K"&gt;http://bit.ly/1cGpg0K&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Banking/Finance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy in the banking and finance industry is crucial as the records and funds of one person must not be accessible by another without the due 	authorisation. The following articles deal with the current system in place that governs privacy in the financial and banking industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Banking: Do Indian Banking Standards Provide Enough Privacy Protection? &lt;a href="http://bit.ly/18fhsTM"&gt;http://bit.ly/18fhsTM&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Finance and Privacy &lt;a href="http://bit.ly/15aUPh6"&gt;http://bit.ly/15aUPh6&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Making the Powerful Accountable &lt;a href="http://bit.ly/1nvzSpC"&gt;http://bit.ly/1nvzSpC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Telecommunications -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The telecommunications industry is the backbone of current technology with respect to ICTs. The telecommunications industry has its own rules and 	regulations. These rules are the focal point of the following articles including criticism and acclaim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Telecommunications: Do We Have the Safeguards? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Media Law &lt;a href="http://bit.ly/18fgDfF"&gt;http://bit.ly/18fgDfF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ IP Addresses and Expeditious Disclosure of Identity in India &lt;a href="http://bit.ly/16dBy4N"&gt;http://bit.ly/16dBy4N&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Telecommunications and Internet Privacy Read more: &lt;a href="http://bit.ly/16dEcaF"&gt;http://bit.ly/16dEcaF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices &lt;a href="http://bit.ly/KT9BTy"&gt;http://bit.ly/KT9BTy&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy_encryption"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy_encryption &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Security: Privacy, Transparency and Technology 	&lt;a href="http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog"&gt; http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog &lt;/a&gt; y&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Sexual Minorities -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the internet is a global forum of self-expression and acceptance for most of us, it does not hold true for sexual minorities. The internet is a place 	of secrecy for those that do not conform to the typical identities set by society and therefore their privacy is more important to them than most. When 	they reveal themselves or are revealed by others, they typically face a lot of group hatred from the rest of the people and therefore value their privacy. 	The following article looks into their situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Privacy and Sexual Minorities http://bit.ly/19mQUyZ&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Health -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy between a doctor and a patient is seen as incredibly important and so should the privacy of a person in any situation where they reveal more 	than they would to others in the sense of CT scans and other diagnoses. The following articles look into the present scenario of privacy in places like a 	hospital or diagnosis center.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Health and Privacy &lt;a href="http://bit.ly/16L1AJX"&gt;http://bit.ly/16L1AJX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Concerns in Whole Body Imaging: A Few Questions &lt;a href="http://bit.ly/1jmvH1z"&gt;http://bit.ly/1jmvH1z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. e-Governance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main focus of governments in ICTs is their gain for governance. There have many a multiplicity of laws and legislation passed by various countries 	including India in an effort to govern the universal space that is the internet. Surveillance is a major part of that governance and control. The articles 	listed below deal with the issues of ethics and drawbacks in the current legal scenario involving ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ E-Governance and Privacy &lt;a href="http://bit.ly/18fiReX"&gt;http://bit.ly/18fiReX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Governmental Databases &lt;a href="http://bit.ly/18fmSy8"&gt;http://bit.ly/18fmSy8&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Killing Internet Softly with its Rules &lt;a href="http://bit.ly/1b5I7Z2"&gt;http://bit.ly/1b5I7Z2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Cyber Crime &amp;amp; Privacy &lt;a href="http://bit.ly/17VTluv"&gt;http://bit.ly/17VTluv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Understanding the Right to Information &lt;a href="http://bit.ly/1hojKr7"&gt;http://bit.ly/1hojKr7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Perspectives on the 2012-2013 Goa Beach Shack Policy &lt;a href="http://bit.ly/ThAovQ"&gt;http://bit.ly/ThAovQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Identifying Aspects of Privacy in Islamic Law 	&lt;a href="http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt; http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ What Does Facebook's Transparency Report Tell Us About the Indian Government's Record on Free Expression &amp;amp; Privacy? 	&lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; -us-about-indian-government-record-on-free-expression-and-privacy &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 	&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet Privacy in India 	&lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt; http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-i &lt;/a&gt; &lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt;ndia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet-driven Developments - Structural Changes and Tipping Points &lt;a href="http://bit.ly/10s8HVH"&gt;http://bit.ly/10s8HVH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data Retention in India &lt;a href="http://bit.ly/XR791u"&gt;http://bit.ly/XR791u&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 2012: Privacy Highlights in India &lt;a href="http://bit.ly/1kWe3n7"&gt;http://bit.ly/1kWe3n7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Dog is Watching You! The Sci-fi Future of Animal and Insect Drones &lt;a href="http://bit.ly/1kWee1W"&gt;http://bit.ly/1kWee1W&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy Law in India: A Muddled Field - I 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-priv &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; acy-law-in-india-a-muddled-field-1 &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Four Parts of Privacy in India 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"&gt; http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Right to Privacy in Peril 		&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Microsoft Releases its First Report on Data Requests by Law Enforcement Agencies around the World		&lt;a href="http://bit.ly/1kWjylM"&gt;http://bit.ly/1kWjylM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Criminal Law Amendment Bill 2013 - Penalising 'Peeping Toms' and Other Privacy Issues &lt;a href="http://bit.ly/1dO46o5"&gt;http://bit.ly/1dO46o5&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy vs. Transparency: An Attempt at Resolving the Dichotomy		&lt;a href="http://cis-india.org/openness/blog-old/privacy-v-transparency"&gt;http://cis-india.org/openness/blog-old/privacy-v-transparency&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation		&lt;a href="http://bit.ly/1sJME9j"&gt;http://bit.ly/1sJME9j&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Prevent the Installation of RFID tags in Vehicles &lt;a href="http://bit.ly/1hxidzU"&gt;http://bit.ly/1hxidzU&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The National Privacy Roundtable Meetings &lt;a href="http://bit.ly/158ayNW"&gt;http://bit.ly/158ayNW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Transparency Reports - A Glance on What Google and Facebook Tell about Government Data Requests		&lt;a href="http://bit.ly/19NYTal"&gt;http://bit.ly/19NYTal&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS and International Coalition Calls upon Governments to Protect Privacy &lt;a href="http://bit.ly/18oOTDk"&gt;http://bit.ly/18oOTDk&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000 for Adjudication in the State of Maharashtra		&lt;a href="http://bit.ly/16dKyoo"&gt;http://bit.ly/16dKyoo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee		&lt;a href="http://bit.ly/17eZntz"&gt;http://bit.ly/17eZntz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS Supports the UN Resolution on "The Right to Privacy in the Digital age" &lt;a href="http://bit.ly/1c2A89q"&gt;http://bit.ly/1c2A89q&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Brochures from Expos on Smart Cards, e-Security, RFID &amp;amp; Biometrics in India &lt;a href="http://bit.ly/1f714fN"&gt;http://bit.ly/1f714fN&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Electoral Databases - Privacy and Security Concerns &lt;a href="http://bit.ly/Mb4ktM"&gt;http://bit.ly/Mb4ktM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Net Neutrality and Privacy &lt;a href="http://bit.ly/1khi1GQ"&gt;http://bit.ly/1khi1GQ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Intermediary Liability Resources &lt;a href="http://bit.ly/1hRT8OD"&gt;http://bit.ly/1hRT8OD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Feedback to the NIA Bill &lt;a href="http://bit.ly/1ePhUeg"&gt;http://bit.ly/1ePhUeg&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India's Identity Crisis &lt;a href="http://bit.ly/1lTRuuz"&gt;http://bit.ly/1lTRuuz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook, Privacy, and India &lt;a href="http://bit.ly/a2HzhT"&gt;http://bit.ly/a2HzhT&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Private censorship and the Right to Hear 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear"&gt; http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Your Privacy is Public Property (Rules issued by a control-obsessed government have armed officials with widespread powers to pry into your private 		life. &lt;a href="http://cis-india.org/news/privacy-public-property"&gt;http://cis-india.org/news/privacy-public-property&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The India Privacy Monitor Map &lt;a href="http://bit.ly/19A5mCZ"&gt;http://bit.ly/19A5mCZ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security can Co-Exist &lt;a href="http://bit.ly/193fPXi"&gt;http://bit.ly/193fPXi&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; A Street View of the Private and The Public (&lt;a href="http://bit.ly/15VKmdf"&gt;http://bit.ly/15VKmdf&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Sense and Censorship &lt;a href="http://bit.ly/14KFwyo"&gt;http://bit.ly/14KFwyo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Government access to private sector data &lt;a href="http://bit.ly/18rjd1X"&gt;http://bit.ly/18rjd1X&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India: Privacy in Peril &lt;a href="http://bit.ly/1g5QbZj"&gt;http://bit.ly/1g5QbZj&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State &lt;a href="http://bit.ly/1nkg8Ho"&gt;http://bit.ly/1nkg8Ho&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Who Governs the Internet? Implications for Freedom and National Security &lt;a href="http://bit.ly/1hnnJ2a"&gt;http://bit.ly/1hnnJ2a&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;7. Whistle-blowers -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whistle-blowers are always in a difficult situation when they must reveal the misdeeds of their corporations and governments due to the blowback that is 	possible if their identity is revealed to the public. As in the case of Edward Snowden and many others, a whistle-blowers identity is to be kept the most 	private to avoid the consequences of revealing the information that they did. This is the main focus of the article below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Privacy Rights of Whistle-blowers &lt;a href="http://bit.ly/18GWmM3"&gt;http://bit.ly/18GWmM3&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Cloud and Open Source -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud computing and open source software have grown rapidly over the past few decades. Cloud computing is when an individual or company uses offsite 	hardware on a pay by usage basis provided and owned by someone else. The advantages are low costs and easy access along with decreased initial costs. Open 	source software on the other hand is software where despite the existence of proprietary elements and innovation, the software is available to the public 	at no charge. These software are based of open standards and have the obvious advantage of being compatible with many different set ups and are free. The 	following article highlights these computing solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, Free/Open Source, and the Cloud &lt;a href="http://bit.ly/1cTmGoI"&gt;http://bit.ly/1cTmGoI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. e-Commerce -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the fastest growing applications of the internet is e-Commerce. This includes many facets of commerce such as online trading, the stock exchange 	etc. in these cases, just as in the financial and banking industries, privacy is very important to protect ones investments and capital. The following 	article's main focal point is the world of e-Commerce and its current privacy scenario.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy in e-Commerce http://bit.ly/1dCtgTs&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sectoral-privacy-research'&gt;https://cis-india.org/internet-governance/blog/sectoral-privacy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:46:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/standards/second-response">
    <title>Second Response to Draft National Policy on Open Standards for e-Governance</title>
    <link>https://cis-india.org/openness/publications/standards/second-response</link>
    <description>
        &lt;b&gt;Another draft (labelled "version 2", dated May 26, 2009) of the draft national policy on open standards for e-governance was made available to Fosscomm, while many software companies were speaking out against NASSCOM's position on the policy.  CIS drafted a second response addressing both the allegations against NASSCOM as well as the few shortcomings we perceive in the draft policy.&lt;/b&gt;
        
&lt;p&gt;To&lt;br /&gt;Shri Shankar Aggrawal&lt;br /&gt;Joint Secretary (e-Governance)&lt;br /&gt;Department of Information Technology&lt;br /&gt;Ministry of Communications and Information Technology&lt;/p&gt;
&lt;p&gt;Tuesday, July 7, 2009&lt;/p&gt;
&lt;p&gt;Dear Sir,&lt;/p&gt;
&lt;h3&gt;Sub: Comments on Draft National Policy on Open Standards for e-Governance (version 2)&lt;/h3&gt;
&lt;p&gt;I am writing on behalf of the Centre for Internet and Society, which is a Bangalore-based civil society organization involved both in research and policy advocacy.&amp;nbsp; Public accountability and digital pluralism are two of our core concerns, and it is for this that we are writing to you today.&amp;nbsp; As a natural corollary of our mission, we aim at representing the concerns of citizens and consumers.&amp;nbsp; You would recall that we had submitted comments to the call for comments you had put out for the draft National Policy on Open Standards for e-Governance last year (archived at &amp;lt;http://cis-india.org/advocacy/os/iosp/the-response/&amp;gt;). &amp;nbsp;&lt;/p&gt;
&lt;p&gt;We have recently received what appears to be a newer draft (version 2) of the National Policy on Open Standards for e-Governance, dated May 26, 2009.&amp;nbsp; We are yet again very pleased to note the progressive nature of this document and wish to congratulate the government on its decision to promote the interests of the citizens of India over the narrow partisan interests of a few companies which wish to promote proprietary standards.&lt;/p&gt;
&lt;p&gt;It has brought to our notice by some in the software industry that the National Association of Software and Services Companies (NASSCOM) has argued for the dilution of the definition of open standards by including standards licensed under “reasonable and non-discriminatory” terms to be considered “open”, and has also called for multiple standards in the same domain to be considered valid as a rule under the policy.&amp;nbsp; We believe both these demands go against the interest of consumers of standards — which in this case is the Indian government — and are thus against the interest of citizens as well, since the Indian government handles data on behalf of its citizens.&lt;/p&gt;
&lt;p&gt;Even “reasonable and non-discriminatory” terms of licensing of standards are in fact discriminatory as they prevent the development of free/libre/open source software based on those standards.&amp;nbsp; And while having multiple implementations of a standard is beneficial as it increases consumer (i.e., governmental) choice, having multiple incompatible standards is detrimental to the government's interest as the policy itself recognizes in paragraph 4.2, and the very purpose (as enumerated&amp;nbsp; in paragraphs 1, 3, and 4) of having standards is defeated.&amp;nbsp; Even if the multiple standards are bi-directionally interoperable, additional costs are incurred in having concurrent multiple standards.&lt;/p&gt;
&lt;p&gt;Thus, one hopes that the the threshold of “national interest” mentioned in paragraph 6.4.1 is set to a high level.&amp;nbsp; Lastly, the views put forth by NASSCOM seem not to be truly legitimate as it has been the complaint of some that NASSCOM did not hold an open consultation with its own members before formulating its views.&amp;nbsp; There are software giants, including IBM, Sun, and Red Hat, that have openly criticized the NASSCOMM position on open standards.&amp;nbsp; More importantly, NASSCOM's position does not concur with what we believe is in the best interest of small and medium software enterprises, which constitute the bulk of the Indian software industry. We pray that you shall keep this in mind while considering NASSCOM's views.&lt;/p&gt;
&lt;p&gt;We believe that apart from the technical reasons to favour open standards, there are many public interest reasons as well.&amp;nbsp; We believe that the adoption of open standards is a step towards the promotion of equitable access to knowledge to all the people of our country.&amp;nbsp; We further believe that public accountability will be served greatly by adoption of an open standards policy by the Central and State governments.&amp;nbsp; While even developed countries (such as those of the EU) are mandating open standards in all governmental departments, processes, and interactions, it is developing countries that stand to gain most from open standards.&amp;nbsp; Proprietary standards place a larger burden on developing economies than developed as developing economies have a greater need to participate in the global network by using standards, but do have lesser capabilities than developed economies in terms of paying for royalties.&lt;/p&gt;
&lt;p&gt;On the document itself, while there are many reasons to hail it, we believe there are still a few shortcomings which we wish to bring to your notice.&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Issue 1: Possibility of following letter of policy while violating its spirit&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Explanation&lt;/strong&gt;&lt;br /&gt;Sometimes private companies can interfere with the standardisation process by exerting undue influence on the members of the standard setting body.&amp;nbsp; That such undue influence have been sought to be applied even in India recently shows that this is not mere conjecture or idle speculation.&amp;nbsp; Given this background, the document should note this as a problem and note that remedial measures could be undertaken in the event such undue influence comes to light.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Resolution&lt;/strong&gt;&lt;br /&gt;Introduce language, such as that used in the EU EIF, stating:&lt;br /&gt;“Practices distorting the definition and evolution of open standards must be addressed immediately to protect the integrity of the standardisation process.”&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Issue 2: Patenting and licensing of government-developed standards&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Explanation&lt;/strong&gt;&lt;br /&gt;Paragraph 6.3 of the draft policy allows the government to opt for the development of a new standard by a Government of India-identified agency in case no standard is found to meet the government's functional requirements.&amp;nbsp; However, it is not clear under what terms this standard will be available.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Resolution&lt;/strong&gt;&lt;br /&gt;Introduce a paragraph 6.3.1 stating:&lt;br /&gt;“Any standard developed by or on behalf of the government shall be patent-free and the specifications of such a standard will be published online and will be available to all for no cost.&amp;nbsp; Along with the standard, the government shall also provide, or shall cause to be provided, a free/libre/open source reference implementation of that standard.”&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Issue 3: No framework provided for review or phasing out interim standards&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Explanation&lt;/strong&gt;&lt;br /&gt;Paragraph 6.2 permits the government to adopt a non-open “interim” standard (one which does not fulfil all the mandatory requirements of open standards as laid out in 5.1) if no open standard exists in the specific domain for which the standard is required.&amp;nbsp; This however does not have a clause necessitating the phasing out of such an interim standard.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Resolution&lt;/strong&gt;&lt;br /&gt;A review mechanism should be provided for periodic evaluation of all standards selected by the government, especially those designated as interim standards.&amp;nbsp; A new paragraph 7.1.1 could be added:&lt;br /&gt;“All standards selected through the processes outlined in this policy shall undergo an annual review by the Apex Body on e-Governance Standards, and all those designated as interim standards shall be reviewed biannually.”&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Issue 4: Problematic definition in the glossary&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Explanation&lt;/strong&gt;&lt;br /&gt;In Appendix A, the definition of “patents” (A.12) states: “The additional qualification 'utility patents' is used in countries such as the United States to distinguish them from other types of patents but should not be confused with utility models granted by other countries. Examples of particular species of patents for inventions include biological patents, business method patents, chemical patents and software patents.”&amp;nbsp; Many of these references are U.S.-specific and are not valid forms of patents in India (e.g. biological patents, business method patents, and software patents).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Resolution&lt;/strong&gt;&lt;br /&gt;Delete the last two sentences in A.12&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;We once again wish to compliment the government on developing such a strong policy on open standards, and hope that our suggestions are incorporated into the text of the final version.&amp;nbsp; We further hope that the policy will be notified at the earliest, as there has already been considerable opportunity for the public and industry to comment on the draft versions of the policy.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Yours sincerely,&lt;/p&gt;
&lt;p&gt;Pranesh Prakash&lt;br /&gt;Programme Manager&lt;br /&gt;Centre for Internet and Society&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/standards/second-response'&gt;https://cis-india.org/openness/publications/standards/second-response&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Software Patents</dc:subject>
    

   <dc:date>2009-07-07T16:49:37Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
