<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 501 to 515.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/opensource.com-subhashish-panigrahi-october-24-2016-open-access-growth-indian-language-wikipedias"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/news/free-data-net-neutrality-discussion-on-trai-paper"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/cci-workshop-on-competition-law-and-policy.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/your-story-subhashish-panigrahi-october-20-2016-what-indian-language-wikipedias-can-do-for-greater-open-access-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/querying-wikipedia-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/lack-of-representation-of-non-western-world-in-creation-of-web-standards"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/technical-alternative-to-encrypted-media-extensions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/the-wire-anubha-sinha-october-12-2016-why-open-access-has-to-look-up-for-academic-publishing-to-look-up"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/news/first-post-naina-khedekar-october-10-2016-tech-for-the-blind-how-app-developers-can-help-end-the-disturbing-touchscreen-trend"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/factordaily-sunil-abraham-october-6-2016-services-like-twitterseva-are-not-the-silver-bullets-they-are-made-out-to-be"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/india-round-table-icmec-background-note.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/open-source-mayank-sharma-october-3-2016-indian-language-localization-community-meets-in-new-delhi"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/blogs/opensource.com-subhashish-panigrahi-october-24-2016-open-access-growth-indian-language-wikipedias">
    <title>How Open Access Content helps Fuel Growth in Indian-language Wikipedias</title>
    <link>https://cis-india.org/a2k/blogs/opensource.com-subhashish-panigrahi-october-24-2016-open-access-growth-indian-language-wikipedias</link>
    <description>
        &lt;b&gt;Mobile Internet connectivity is growing rapidly in rural India, and because most Internet users are more comfortable in their native languages, websites producing content in Indian languages are going to drive this growth. In a country like India in which only a handful of journals are available in Indian languages, open access to research and educational resources is hugely important for populating content for the various Indian language Wikipedias.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://opensource.com/life/16/10/open-access-growth-indian-language-wikipedias"&gt;Opensource.com&lt;/a&gt; on October 24, 2016.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Indian-language Wikipedias and open access&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Most commonly spoken Indian languages have had Wikipedia projects for almost a decade. Languages like &lt;a href="https://blog.wikimedia.org/2015/07/15/konkani-wikipedia-goes-live/" target="_blank"&gt;Konkani&lt;/a&gt; and &lt;a href="https://blog.wikimedia.org/2016/08/24/digest-tulu-wikipedia/" target="_blank"&gt;Tulu&lt;/a&gt; are new entrants in the Wikipedia family, and currently there are &lt;a href="http://wiki.wikimedia.in/List_of_Indian_language_wiki_projects" target="_blank"&gt;23 Indian language Wikipedias&lt;/a&gt;. One example of high-quality open access content is the &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Medicine/Open_Textbook_of_Medicine" target="_blank"&gt;Open Textbook of Medicine&lt;/a&gt;, an offline encyclopedia consisting of Wikipedia articles related to medicine, which was created by a &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Medicine/Members" target="_blank"&gt;group of dedicated volunteer&lt;/a&gt; medical professionals that happen to be Wikipedia editors. There is  enormous potential to grow Wikipedia in multiple languages with  high-quality, open content like this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To help fuel the growth of Wikipedia and its various projects, such as the Indian-language Wikipedias, the &lt;a href="https://en.wikipedia.org/wiki/Wikipedia_community" target="_blank"&gt;Wikipedia community&lt;/a&gt; has created an ecosystem with &lt;a href="https://en.wikipedia.org/wiki/List_of_Wikimedia_chapters" target="_blank"&gt;Wikimedia chapters&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_movement_affiliates" target="_blank"&gt;other affiliates&lt;/a&gt;, which are run by both volunteers and paid staff from the &lt;a href="https://wikimediafoundation.org/" target="_blank"&gt;Wikimedia Foundation&lt;/a&gt;, an organization responsible for fundraising, technical, and community support. In India, &lt;a href="http://wiki.wikimedia.in/" target="_blank"&gt;Wikimedia India&lt;/a&gt;, the Centre for Internet and Society’s &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K" target="_blank"&gt;Access to Knowledge program&lt;/a&gt; (CIS-A2K), and &lt;a href="https://meta.wikimedia.org/wiki/Punjabi_Wikimedians" target="_blank"&gt;Punjabi Wikimedians&lt;/a&gt; are three such official affiliates working on catalyzing the growth of the content and the communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whereas Wikimedia India focuses on expanding all the Indian-languages  content, Punjabi Wikimedians focus on Punjabi language content (in both  Gurmukhi and Shahmukhi scripts), and CIS-A2K focuses on five languages:  Kannada, Konkani, Marathi, Odia, and Telugu.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian-language Wikipedia projects can only grow with the help of  volunteers editing their own language Wikipedias and adding missing  information from a reliable sources, which is where open access content  can help.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Open in action&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 2016 International Open Access Week will be held October 24-30, 2016. The theme this year is &lt;a href="http://www.openaccessweek.org/profiles/blogs/theme-of-2016-international-open-access-week-to-be-open-in-action" target="_blank"&gt;Open in Action&lt;/a&gt;.  The announcement explains, "International Open Access Week has always  been about action, and this year's theme encourages all stakeholders to  take concrete steps to make their own work more openly available and  encourage others to do the same. From posting preprints in a repository  to supporting colleagues in making their work more accessible, this  year’s Open Access Week will focus on moving from discussion to action  in opening up our system for communicating research."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian contributors show the spirit of Open in Action as they help  add content to the various Indian-languages Wikipedias. They depend on  open access to research and other publications to help millions of  people, including those living in rural areas, who are joining us  online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license"&gt; &lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/opensource.com-subhashish-panigrahi-october-24-2016-open-access-growth-indian-language-wikipedias'&gt;https://cis-india.org/a2k/blogs/opensource.com-subhashish-panigrahi-october-24-2016-open-access-growth-indian-language-wikipedias&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2016-10-25T01:39:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/news/free-data-net-neutrality-discussion-on-trai-paper">
    <title>Free data, net neutrality: Discussion on TRAI paper</title>
    <link>https://cis-india.org/telecom/news/free-data-net-neutrality-discussion-on-trai-paper</link>
    <description>
        &lt;b&gt;Given the complicated issues around net neutrality, an open house discussion was held in Hyderabad on October 24, 2016 on Telecom Regulatory Authority of India’s consultation paper on free data. The event was organized by TRAI. Udbhav Tiwari attended the open house discussion.&lt;/b&gt;
        &lt;p&gt;The consultation paper by TRAI can be &lt;a class="external-link" href="https://goo.gl/CK3WjM"&gt;found here&lt;/a&gt;.  I largely espoused the position put forth by CIS in its Written Comments submitted to TRAI in June, 2016 which can be &lt;a class="external-link" href="https://goo.gl/4K1ssj"&gt;found here&lt;/a&gt;. The TRAI open house discussion was attended by:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Telenor&lt;/li&gt;
&lt;li&gt;Reliance Communications Ltd.&lt;/li&gt;
&lt;li&gt;Idea Cellular&lt;/li&gt;
&lt;li&gt;Aircel&lt;/li&gt;
&lt;li&gt;COAI &amp;amp; AUSPI&lt;/li&gt;
&lt;li&gt;IAMAI&lt;/li&gt;
&lt;li&gt;Datami&lt;/li&gt;
&lt;li&gt;Internet Freedom Foundation&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There was also a seminar on Unsolicited Downloads &amp;amp; Background Exchange organised by TRAI and IIT Hyderabad. The participants in the seminar were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Venki Nishtala, CTO, Rediff.com&lt;/li&gt;
&lt;li&gt;Ashwani Rana, Head of Connectivity &amp;amp; Access Policy, Facebook&lt;/li&gt;
&lt;li&gt;Sachin Yadav, Director Forensic Services, PWC&lt;/li&gt;
&lt;li&gt;Vijay Kolli, Head Mobile Strategy and Market Development, Akamai India&lt;/li&gt;
&lt;li&gt;Dr. Abhinav Kumar, Assistant Professor, IIT Hyderabad&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Also see the report on &lt;a class="external-link" href="http://www.indiantelevision.com/regulators/trai/free-data-net-neutrality-discussion-on-trai-paper-to-be-held-161020"&gt;Indian Television&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/news/free-data-net-neutrality-discussion-on-trai-paper'&gt;https://cis-india.org/telecom/news/free-data-net-neutrality-discussion-on-trai-paper&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Free Data</dc:subject>
    

   <dc:date>2016-10-25T01:34:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/cci-workshop-on-competition-law-and-policy.pdf">
    <title>CCI Workshop on Competition Law and Policy</title>
    <link>https://cis-india.org/a2k/blogs/cci-workshop-on-competition-law-and-policy.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/cci-workshop-on-competition-law-and-policy.pdf'&gt;https://cis-india.org/a2k/blogs/cci-workshop-on-competition-law-and-policy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-10-23T01:50:02Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/your-story-subhashish-panigrahi-october-20-2016-what-indian-language-wikipedias-can-do-for-greater-open-access-in-india">
    <title>What Indian Language Wikipedias can do for Greater Open Access in India</title>
    <link>https://cis-india.org/a2k/blogs/your-story-subhashish-panigrahi-october-20-2016-what-indian-language-wikipedias-can-do-for-greater-open-access-in-india</link>
    <description>
        &lt;b&gt;The number of internet users in India was expected to reach 460 million by 2015, as the growth in the previous year was 49 percent. The total number of users for Hindi content alone reached about 60 million last year.&lt;/b&gt;
        &lt;p&gt;This was published by &lt;a class="external-link" href="https://yourstory.com/2016/10/indian-language-wikipedia/"&gt;Your Story&lt;/a&gt; on October 20, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;State of Indian languages on the internet&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Based on a study, Internet activist Anivar Aravind &lt;a href="https://blog.smc.org.in/policy-brief-mobile-indian-lang/" rel="nofollow" target="_blank"&gt;mentioned&lt;/a&gt; that in 2014, although 89 percent of Indian population used mobile  phones, only 10 percent of the population used smartphones (contributing  to 13 percent of total mobile users). This means we can safely assume  that a large section of online activity in India is through mobile  devices ‑ thanks to the &lt;a href="http://economictimes.indiatimes.com/news/company/corporate-trends/price-war-idea-vodafone-and-bharti-airtel-to-slash-tariffs-to-compete-with-reliance-jio/articleshow/53971250.cms" rel="nofollow" target="_blank"&gt;declining data charges&lt;/a&gt; because of high competition. That said the mobile internet connectivity in &lt;a href="http://qz.com/56259/language-is-the-key-to-winning-indias-mobile-market/" rel="nofollow" target="_blank"&gt;rural India&lt;/a&gt; is growing at a fast pace and vernacular content plays an important role in this great journey. With over &lt;a href="https://yourstory.com/2015/11/news-aggregators-vernacular/" target="_blank"&gt;90 percent of the users&lt;/a&gt; being comfortable in their own native languages, websites that are  producing content in Indian languages are going to drive this bandwagon.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why open access is important for Indian languages?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://legacy.earlham.edu/%7Epeters/fos/overview.htm" rel="nofollow" target="_blank"&gt;Open access&lt;/a&gt;,  in a nutshell, would mean research outputs and other educational  resources that are free from restriction of access and use. The former  includes resources like journals that are not &lt;a href="https://www.theguardian.com/science/blog/2013/jan/17/open-access-publishing-science-paywall-immoral" rel="nofollow" target="_blank"&gt;paywalled&lt;/a&gt;,  and the latter is freedom from copyright restriction. Open access as a  movement encourages license migration ‑ a process of migrating from  several copyrighted license terms to &lt;a href="https://creativecommons.org/licenses/" rel="nofollow" target="_blank"&gt;Creative Commons licenses&lt;/a&gt; and &lt;a href="https://opensource.com/education/16/8/3-copyright-tips-students-and-educators" rel="nofollow" target="_blank"&gt;several other licenses&lt;/a&gt; that provide freedom to use, share and remix. In a country like India  where there are only a handful of research journals available in  vernacular languages, the need for open content becomes much more  important. The more the restricted content, the less will be the access  to knowledge. Creating more vernacular content with open licenses is  like digging a well in a dessert.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Indian language Wikipedias as open access journals&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It’s been almost a decade since most largely spoken Indian languages  started having a Wikipedia project of their own. Presently, there are &lt;a href="http://wiki.wikimedia.in/List_of_Indian_language_wiki_projects" rel="nofollow" target="_blank"&gt;23 Indian language Wikipedias&lt;/a&gt;, including newest entrants  like &lt;a href="https://blog.wikimedia.org/2015/07/15/konkani-wikipedia-goes-live/" rel="nofollow" target="_blank"&gt;Konkani&lt;/a&gt; and &lt;a href="https://blog.wikimedia.org/2016/08/24/digest-tulu-wikipedia/" rel="nofollow" target="_blank"&gt;Tulu&lt;/a&gt;. That said, these projects are growing with more and more &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Wikipedia_is_an_encyclopedia" rel="nofollow" target="_blank"&gt;encyclopedic content&lt;/a&gt; written with a &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view" rel="nofollow" target="_blank"&gt;neutral point of view&lt;/a&gt;, which any internet user will find useful. Wikipedia is considered as the &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Medicine/Open_Textbook_of_Medicine" rel="nofollow" target="_blank"&gt;people’s encyclopedia&lt;/a&gt; and hence can have quite contrasting content ‑ some being poor because  some volunteer editors lack expertise in high quality articles written  by professionals. A great example of creating very high quality content  in one particular subject area is &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Medicine/Open_Textbook_of_Medicine" rel="nofollow" target="_blank"&gt;Open Textbook of Medicine&lt;/a&gt; ‑ an offline encyclopedia consisting of Wikipedia articles related to medicine that was created by a &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Medicine/Members" rel="nofollow" target="_blank"&gt;group of dedicated volunteer&lt;/a&gt; medical professionals that happened to be Wikipedia editors. There is  enormous potential to grow Wikipedia in multiple languages with high  quality content.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How to grow open access in Indian languages using Wikipedia as a tool&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://www.huffingtonpost.in/subhashish-panigrahi-/8-challenges-in-growing-indian-language-wikipedias/" rel="nofollow" target="_blank"&gt;list of challenges&lt;/a&gt; to grow Wikipedia-like projects with volunteer effort could be endless.  And one of the biggest challenges is bringing self-motivated people who  are willing to contribute as volunteers. Also, there are many such  people who are not aware that they can contribute to Wikipedia. The &lt;a href="https://en.wikipedia.org/wiki/Wikipedia_community" rel="nofollow" target="_blank"&gt;Wikipedia community&lt;/a&gt; has created an ecosystem by having several &lt;a href="https://en.wikipedia.org/wiki/List_of_Wikimedia_chapters" rel="nofollow" target="_blank"&gt;Wikimedia chapters&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_movement_affiliates" rel="nofollow" target="_blank"&gt;other affiliates&lt;/a&gt; that are run by both volunteers and paid staff ‑ the &lt;a href="https://wikimediafoundation.org/" rel="nofollow" target="_blank"&gt;Wikimedia Foundation&lt;/a&gt;, a paid staff-run organisation that is responsible for fundraising, major technological and some community support. In India, &lt;a href="http://wiki.wikimedia.in/" rel="nofollow" target="_blank"&gt;Wikimedia India&lt;/a&gt;, Centre for Internet and Society’s &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K" rel="nofollow" target="_blank"&gt;Access to Knowledge program&lt;/a&gt; (CIS-A2K) and &lt;a href="https://meta.wikimedia.org/wiki/Punjabi_Wikimedians" rel="nofollow" target="_blank"&gt;Punjabi Wikimedians&lt;/a&gt; are three such official affiliates that are working on catalysing the  growth of the content and the communities. Where the affiliate Punjabi  Wikimedians focuses on Punjabi language (in both Gurmukhi and Shahmukhi  scripts), both Wikimedia India and CIS-A2K focus on all the Indian  languages. CIS-A2K also specially focuses on five languages; Kannada,  Konkani, Marathi, Odia and Telugu. Indian language Wikipedia projects  can only grow if people can edit their own language Wikipedias.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the &lt;a href="http://openaccessweek.org/" rel="nofollow" target="_blank"&gt;Open Access Week&lt;/a&gt;—a week dedicated for promoting &lt;a href="https://opensource.com/resources/what-open-access" rel="nofollow" target="_blank"&gt;Open Access&lt;/a&gt; globally—around the corner with “&lt;a href="http://www.openaccessweek.org/profiles/blogs/theme-of-2016-international-open-access-week-to-be-open-in-action" rel="nofollow" target="_blank"&gt;Open in Action&lt;/a&gt;” as the theme of the year, there is no better time for anyone who can read and write in their native Indian language.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/your-story-subhashish-panigrahi-october-20-2016-what-indian-language-wikipedias-can-do-for-greater-open-access-in-india'&gt;https://cis-india.org/a2k/blogs/your-story-subhashish-panigrahi-october-20-2016-what-indian-language-wikipedias-can-do-for-greater-open-access-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2016-10-22T04:12:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/querying-wikipedia-data">
    <title>Querying Wikipedia Data</title>
    <link>https://cis-india.org/a2k/blogs/querying-wikipedia-data</link>
    <description>
        &lt;b&gt;Recently I wrote a blog about the stub article length of Wikipedia articles. I mentioned the difference in actual number of characters and the number of bytes used to define stub articles between English and Indian language Wikipedias. One can open any language Wikipedia, type Special:ShortPages in the search box to get the list of articles which have less than 2048 bytes.&lt;/b&gt;
        &lt;p&gt;Originally published blog can be &lt;a class="external-link" href="http://pavanaja.com/english/querying-wikipedia-data/"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;However, as already mentioned in that &lt;a class="external-link" href="http://pavanaja.com/english/utf-8-indic-stub-length-wikipedia/"&gt;blog&lt;/a&gt;, the number of bytes for Indian  languages to be considered as stub should be actually 2048*3 = 6144  bytes employing the same criteria. How to find the list of articles  fulfilling this condition?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This brings us to the topic of querying Wikipedia data. Wikimedia  Foundation Labs has put up a website wherein one can run SQL queries on  Wikimedia data. The URL of the website is &lt;a href="https://quarry.wmflabs.org" target="_blank"&gt;quarry.wmflabs.org&lt;/a&gt;.  When we open the website, we get a textbox wherein one can type the SQL  query which will run on Wikimedia data. In this example I will consider  Wikipedia only. But the queries can be run on the data of other  Wikimedia projects like Wikisource, Wikidata, Wiktionary, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One has to login with his/her Wikimedia login. After logging the SQL query can be typed in the textbox and the Submit Query button  has to be clicked. The result of execution of the query on Wikimedia  data will be displayed. In this blog I will throw more light on Kannada  Wikipedia. The database for Kannada Wikipedia is called knwiki_p.  Complete list of databases can be obtained by running the SQL query  “show databases”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To get the list of tables in Kannada Wikipedia, the following SQL queries have to be executed:&lt;/p&gt;
&lt;p class="callout"&gt;use knwiki_p;&lt;br /&gt;show tables;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To know the scheme of any table, run the query desc  &amp;lt;tablename&amp;gt;;. For example, to know the details of the table by name, issue the query &lt;span&gt;desc page;.&lt;/span&gt; The fields which are of importance in the current case is &lt;span&gt;page_title&lt;/span&gt; and &lt;span&gt;page_len&lt;/span&gt;. The following query will list all articles in Kannada Wikipedia which are having less than 6144 bytes.&lt;/p&gt;
&lt;p class="callout"&gt;use knwiki_p;&lt;br /&gt;select page_title, page_len&lt;br /&gt;from page where page_len &amp;lt; ‘6144’ and page_namespace = 0 and page_is_redirect = 0 order by page_len ;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some other useful queries are listed below:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;b&gt;Query&lt;/b&gt;&lt;/th&gt;&lt;th&gt;&lt;b&gt;What it does&lt;/b&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;Select Count(*) from page where page_namespace = 0 and page_is_redirect =0;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;Number of articles without redirect&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;&lt;span&gt;Select Count(*) from page where page_namespace = 0 and page_is_redirect =0 and page_len &amp;lt; 6144;&lt;/span&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Number of articles which are having bytes less than 6144&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;select * from user where user_name Like “P%”;&lt;/span&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;List all users whose username starts with letter “P”&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;&lt;span&gt;select user_id, user_name, user_editcount  from user where user_editcount &amp;gt;3000 order by user_editcount desc;&lt;/span&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;List all users with editcount more than 3000   &lt;span&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;SELECT&lt;/span&gt;
&lt;p&gt;&lt;span&gt;page_namespace,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;page_title,&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;page_len&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;FROM page&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;WHERE page_len &amp;gt; 175000&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;AND page_title NOT LIKE “%/%”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;ORDER BY page_namespace ASC;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;List of long articles (articles having  bytes more than 175000)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;SELECT rc_title as title, rc_comment as comments, count(*) as Edits&lt;/span&gt;
&lt;p&gt;&lt;span&gt;FROM recentchanges&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;WHERE rc_namespace = 0&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;GROUP BY 1 ORDER BY 3 DESC&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;LIMIT 100;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Most edited 100 pages during past one month&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;&lt;span&gt;SELECT log_title, COUNT(*) FROM logging WHERE log_type=”thanks” GROUP BY log_title ORDER BY COUNT(*) DESC LIMIT 100;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;Who have been thanked most&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Useful links -&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Research:Quarry"&gt;Details about Quarry&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://wikitech.wikimedia.org/wiki/Help:MySQL_queries"&gt;MySQL queries help&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/querying-wikipedia-data'&gt;https://cis-india.org/a2k/blogs/querying-wikipedia-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-10-21T14:51:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data">
    <title>Intelligence agencies will not have open access to Aadhaar data: UIDAI chief </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data</link>
    <description>
        &lt;b&gt;Intelligence agencies will not have free access to Aadhaar data, a top government official said on Thursday, looking to assuage fears of abuse of personal information.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/intelligence-agencies-will-not-have-open-access-to-aadhaar-data-uidai-chief/story-cAp5EEWA83IGRbbtGfMorN.html"&gt;published in the Hindustan Times&lt;/a&gt; on October 20, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI), which issued identity cards to 1.07 billion Indians, last month &lt;span class="st_readmore_sp"&gt;&lt;a href="http://www.hindustantimes.com/india-news/govt-to-keep-aadhar-record-for-7-years-activists-worried/story-jSY820Ee1ZnQNLL5vuWMOI.html" shape="rect" title="www.hindustantimes.com"&gt;decided to retain data&lt;/a&gt; &lt;/span&gt; related to the verification of Aadhaar-enabled transactions for seven years, leading to security concerns over data safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As reported by HT on Monday, privacy experts expressed concerns that  transaction data retained for so long could be accessed by the security  establishment for surveillance on individuals without sufficient  grounds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This fear is completely misplaced,” ABP Pandey, UIDAI’s chief executive officer told HT in an interview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security agencies can access the data only in case of national security after they get the nod of an oversight committee headed by the cabinet secretary. This committee has to clear every order made by the designated joint secretary-level officer before the information is shared, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“You cannot have any legal protection stronger than this,” Pandey added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar transaction data is not only protected by the most powerful, contemporary law to restrict access but also by strong cryptography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Even if someone attempts, the 2048-bit encryption is so strong that it will take them millions of computers and billions of years to decrypt the data,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A vocal critic of Aadhaar’s design, Sunil Abraham of the Centre for Internet and Society (CIS) suggested he wouldn’t rely too much on the legal framework. “You cannot put a legal band-aid on a broken technological solution. You need to get privacy and security right by design,” the director of the Bengaluru-based research body said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham said the problem could have been averted if the UIDAI did not store the data in a centralised form. Instead, it could have used its digital signature to sign proof of authentication that could be stored by the authenticating agency and the citizen on a smart card.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-21T01:32:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act">
    <title>MLATs and the proposed Amendments to the US Electronic Communications Privacy Act</title>
    <link>https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act</link>
    <description>
        &lt;b&gt;In continuance of our blog post on mutual legal assistance treaties (MLATs), we examine a new approach to international bilateral cooperation being suggested in the United States, by creating a mechanism for certain foreign governments to directly approach the data controllers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Published under Creative Commons License CC BY-SA. Anyone can distribute, remix, tweak, and build upon this document, even for commercial purposes, as long as they credit the creator of this document and license their new creations under the terms identical to the license governing this document&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="http://cis-india.org/internet-governance/blog/cross-border-cooperation-on-criminal-matters"&gt;previous article&lt;/a&gt; on MLATs we discussed, in some detail, what MLATs are and why they are needed.  One area which was briefly focused upon in that article was the limitations and criticisms of the MLAT mechanism, of which one of the main criticisms being the problems caused due to different legal standards in various jurisdictions as well as the time taken to process a request for information sent from one country to another. Talking specifically about the United States, where most internet companies are headquartered and hold large amounts of data, it typically takes months to process requests under MLATs and foreign governments often struggle to comprehend and comply with the legal standards in the United States for obtaining data for use in their investigations.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The requirement that a foreign government should take permission from, and comply with the requirements of a foreign government simply because the data needed happens to be controlled by a service provider based in a foreign country strikes many foreign law enforcement officials as damaging to security and law enforcement efforts, especially when they are requesting data pertaining to a crime between two of their own citizens that primarily took place on their soil.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These inefficiencies of the MLAT process lead to further problems of foreign governments attempting to apply their search and surveillance laws in an extraterritorial manner for example in 2014 the UK passed the Data Retention and Investigatory Powers Act, 2014 with gives the government the power to directly access data from foreign service providers if sought for specific purposes and the request is approved by the Secretary of State or other specified executive branch official.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Another response that may occur is if, frustrated by such inefficiencies of the existing systems, courts in foreign states start assuming extra territorial jurisdiction, as happened when a District Court in Vishakhapatnam restrained Google from complying with a subpoena issued by the Superior Court of California, ordering Google to share the password of the Gmail account belonging to an Indian citizen residing in Vishakhapatnam.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Solution proposed in the United States &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to overcome these inefficiencies, at least in the American context, the Department of Justice has proposed a legislation which seeks to make the process of foreign governments getting information from US based entities more streamlined by amending the provisions of the Electronic Communications Privacy Act (ECPA) of the United States (the “&lt;b&gt;Amendment&lt;/b&gt;”). These amendments have been proposed primarily for the US and UK to effectuate a proposed bilateral agreement whereby the UK government will be able to approach US companies directly with requests for information without going through the MLAT process or getting an order from a US court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Amendment seeks to ensure that requests from foreign governments for information from US entities get answered in a smooth manner by including those requests in the process for seeking information under the ECPA itself. This move would no doubt, make it easier for foreign governments to access data in the US, but such a move can be criticized on the ground that it would then allow all states, irrespective of their legal standards of privacy, etc. to get access to such information. This problem has been overcome in the amendment by adding a new section to Title 18 which would allow the Attorney General, with the concurrence of the Secretary of State to certify to the Congress that the legal standards in the contracting state which is being given access to the mechanism under the ECPA satisfies certain requirements specified in the chapter (and discussed below). Only after such a certification has been received by the Congress, a contracting state would be able to receive the benefits sought to be granted under the Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that the US administration is looking to use the US-UK Agreement as a standard to be followed for similar potential agreements with a number of other countries wherein the agencies in those countries could request information from US based entities through court orders through a properly specified legal framework. Though to our knowledge India has not been formally approached by the US government to enter into such an agreement, it is important to ask the question &lt;i&gt;viz&lt;/i&gt;. if approached:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Does India's present legal system meet the standards laid down in the amendment to the ECPA?&lt;/li&gt;
&lt;li&gt;And if they do, should India also seek to enter into such an Agreement with the United States?&lt;/li&gt;
&lt;li&gt;And if India does, what could be the implications for citizens and for countries in a similar position as India?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;We hope to be able to answer the above three questions, or at least throw some light on them, in the conclusion of this paper by relying upon the discussions contained herein.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Criticisms of the Amendment&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While such a mechanism may be very effective in addressing the needs of security agencies in investigation and prevention of criminal activities, one cannot accept such an overarching change in cross border enforcement without analyzing the consequences that such a proposal will have on the right to privacy. Some of these consequences have been highlighted by experts responding to the amendment:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Lack of Judicial Authorisation&lt;/i&gt;: The Amendment requires that the foreign governments have a process whereby a person could seek post-disclosure review by an independent entity instead of a warrant by a court.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; Although a court order is not the norm for interception even in Indian law, however under American law such protection is given to data held by American companies even though the data may belong to Indian citizens and this protection will no longer be available if the Amendment is passed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Vague Standard for requests&lt;/i&gt;: Under the domestic law of any state there is usually a large amount of jurisprudence regarding when search orders can be issued, such as the “probable cause” standard that is followed in the United States or similar standards that may be followed in other jurisdictions. This ensures that even when the wording of the law is not precise, which it cannot be for such a subjective issue, there is still some amount of clarity around when and under what circumstances such warrants may be issued. In contrast, the Amendment requires that the orders be based on “requirements for a reasonable justification based on articulable and credible facts, particularity, legality, and severity regarding the conduct under investigation.” Although the language here may seem reasonable but in the absence of any jurisprudence backing it, it becomes very vague and susceptible to misuse. &lt;i&gt;Disclosure without a Warrant&lt;/i&gt;: Under the current MLAT process as followed in the United States, a judge in the U.S. must issue a warrant based on probable cause in order for a U.S. company to turn over content to a foreign government. This requirement protects individuals abroad by requiring their governments to meet certain standards when seeking information held by U.S. companies. The Amendment seeks to remove this essential safeguard for a judicial warrant. The Amendment does not require requests from foreign governments to be based on a prior judicial authorization, since a large number of countries (including India) do not always require judicial orders for such orders.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Allows Real Time Surveillance by Foreign Governments&lt;/i&gt;: American privacy rights activists have raised the concern that the Amendment would allow foreign governments to conduct ongoing surveillance by asking American companies to turn over data in real time. The requirements that the foreign governments would have to fulfill to execute such an order are less stringent than those which have to be fulfilled by the American security agencies if they want to indulge in similar activities. When the U.S. government wants to conduct real-time surveillance, it must comply with the Wiretap Act, which imposes heightened privacy protections.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; The court orders for this purpose also require minimization of irrelevant information, are strictly time-limited, only available for certain serious crimes, etc.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; In Indian law any such request, apart from being time limited and being available only for certain specified purposes, also has to satisfy that interception is the only reasonable option to acquire such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Process to determine which countries can make demands is not credible&lt;/i&gt;: Under the Amendment, the Attorney General and the Secretary of State, would decide whether the laws and practices of the foreign government adequately meet the standards set forth in the legislation for entering into a bilateral agreement. Their decisions would not be liable to be reviewed by a court or in any administrative procedure. They could make their determinations based on information which is not available to the public and the criteria for making the decision are vague and flexible. Further these criteria have been described as “factors” and not “requirements”&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; so that even if some of them are not satisfied, the certification process can still be completed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Companies do not have the resources to determine if a request complies with the terms of the agreement&lt;/i&gt;: The Amendment does not provide any oversight to ensure that technology companies are only turning over information permitted in a specific bilateral agreement. For example, a bilateral agreement may permit disclosure of information only in response to orders that do not discriminate on the basis of religion, however, it may not be possible for the companies receiving the request to determine whether a particular request complies with that condition or not. The Amendment does not require that individual companies put in place requisite processes to weed out requests that may be non compliant with the provisions of the agreement; nor are there periodic audits to ensure that companies are properly responding to foreign government information requests.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Non compliance with Human Rights Standards&lt;/i&gt;: Under international human rights law, governments are allowed to conduct surveillance only based on individualized and sufficient suspicion; authorized by an independent and impartial decision-maker; necessary and proportionate to achieve a legitimate aim, including by being the least intrusive means possible.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; However the mechanism proposed by the Amendment falls woefully short of these standards.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One must not lose sight of the fact that most of the criticisms of the proposal that have been discussed above have been made in the context of, and based on the standards of privacy protection that are available to American citizens. If we look at it from an Indian perspective most of those protections are not available to Indian citizens in any case since independent judicial oversight is not a &lt;i&gt;sine qua non&lt;/i&gt; for access to information by the security agencies in India. Although the Amendment leaves open the question of how a request would be made by the foreign government to the individual Agreements, it may be safe to assume that were India to enter into such an Agreement with the United States, it would require the orders for access to comply with the standards laid down under Indian law before the relevant authorities send the request to the US based data controllers. At the least, this would ensure that the rights of Indian citizens currently guaranteed under Indian law, howsoever flawed they might be, would in all likelihood be safeguarded as per Indian law.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Certification from the Attorney General to the US Congress&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the above background if India were to enter into the agreement with the U.S Government   apart from actually negotiating and signing that Agreement, the Indian government will also have to ensure (if the Amendment is passed) that the Attorney General of the United States, with the concurrence of the Secretary of State gives a certificate to the Congress that Indian law satisfies the requirements set forth in the proposed section XXXX of Title 18.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be kept in mind that if the negotiations between India and the United States in this regard reach such a mature stage that the certification from the Attorney General is required, then that would mean that there is enough political will on both sides to ensure that such an arrangement actually comes to fruition. In this context it would not be unfair to assume that the Attorney General may have a slight bias towards opining that Indian laws do conform to the requirements of the Amendment, as the Attorney General would want to support the decision taken by the administration, and our analysis shall have a similar bias in order to be more contextual.&lt;/p&gt;
&lt;p&gt;The certification would, &lt;i&gt;inter alia&lt;/i&gt;, contain the determination of the Attorney General:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;That the domestic law of India affords robust substantive and procedural protections for privacy and civil liberties in light of the data collection and activities of the Indian government that will be subject to the agreement.It should be noted that the Amendment specifies various factors that should be taken into account to reach such a determination, which include whether the Indian government:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(i) has adequate substantive and procedural laws on cybercrime and electronic evidence, as demonstrated through accession to the Budapest Convention on Cybercrime, or through domestic laws that are consistent with definitions and the requirements set forth in Chapters I and II of that Convention; &lt;i&gt;Although India is not a signatory to the Budapest Convention the Information Technology Act, 2000 (which is the main legislation dealing with cybercrime) has penal provisions which have borrowed heavily from the provisions of the Budapest Convention.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;demonstrates respect for the rule of law and principles of nondiscrimination;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;The provisions of Article 14 as well as Article 21 of the Constitution of India demonstrates that the legal regime in India is committed to the rule of law and principles of non discrimination.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;adheres to applicable international human rights obligations and commitments or demonstrates respect for international universal human rights (including but not limited to protection from arbitrary and unlawful interference with privacy; fair trial rights; freedoms of expression, association and peaceful assembly; prohibitions on arbitrary arrest and detention; and prohibitions against torture and cruel, inhuman, or degrading treatment or punishment);&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;India is a signatory to a number of international human rights conventions and treaties, it has acceded to the International Covenant on Civil and Political Rights (ICCPR), 1966, International Covenant on Economic, Social and Cultural Rights (ICESCR), 1966, ratified the International Convention on the Elimination of All Forms of Racial Discrimination (ICERD), 1965, with certain reservations, signed the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW), 1979 with certain reservations, Convention on the Rights of the Child (CRC), 1989 and signed the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (CAT), 1984. Further the right to life guaranteed under Article 21 of the Constitution takes within its fold a number of human rights such as the right to privacy. Freedom of expression, right to fair trial, freedom of assembly, right against arbitrary arrest and detention are all fundamental rights guaranteed under the Constitution of India. &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;has clear legal mandates and procedures governing those entities of the foreign government that are authorized to seek data under the executive agreement, including procedures through which those authorities collect, retain, use, and share data, and effective of oversight of these activities;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;India has a number of legislations which govern the interception and request for information such as the Information Technology Act, 2000, the Indian Telegraph Act, 1885, Code of Criminal Procedure, 1973, etc. which put in place mechanisms governing the authorities and entities which can ask for information.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;has sufficient mechanisms to provide accountability and appropriate transparency regarding the government’s collection and use of electronic data; and&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Right to Information Act, 2005 provides the citizens the right to access any public document unless access to the same is prohibited due to the specific exemptions provided in the Act. It may be noted here that the provisions of the Right to Information Act are often frustrated by the bureaucracy by using exceptions such as “national security”, but for the purposes of this write up we are already assuming a bias towards fulfillment of these factors/conditions and therefore as long as there is even some evidence of compliance, the conditions will be considered as fulfilled by the Attorney General for the purposes of his certificate. &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;demonstrates a commitment to promote and protect the global free flow of information and the open, distributed, and interconnected nature of the Internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Telecom Regulatory Authority of India, which regulates telecom services in India has also issued the Prohibition of Discriminatory Tariffs for Data Services Regulations, 2016 which prohibits service providers from charging discriminatory tariffs for data services on the basis of content.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Other than Indian law, the certificate from the Attorney General will also have to certify certain issues which would have to be addressed in the bilateral agreement itself, &lt;i&gt;viz&lt;/i&gt;.:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;That the Indian government has adopted appropriate procedures to minimize the acquisition, retention, and dissemination of information concerning United States persons subject to the agreement.&lt;/li&gt;
&lt;li&gt;That the agreement requires the following with respect to orders subject to the agreement:&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;(i) The Indian government may not intentionally target a United States person or a person located in the United States, and must adopt targeting procedures designed to meet this requirement;&lt;/p&gt;
&lt;p&gt;(ii) The Indian government may not target a non–United States person located outside the United States if the purpose is to obtain information concerning a United States person or a person located in the United States;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) The Indian government may not issue an order at the request of or to obtain information to provide to the United States government or a third-party government, nor shall the Indian government be required to share any information produced with the United States government or a third-party government;&lt;/p&gt;
&lt;p&gt;(iv) Orders issued by the Indian government must be for the purpose of obtaining information relating to the prevention, detection, investigation, or prosecution of serious crime, including terrorism;&lt;/p&gt;
&lt;p&gt;(v) Orders issued by the Indian government must identify a specific person, account, address, or personal device, or any other specific identifier as the object of the Order;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Orders issued by the Indian government must be in compliance with the domestic laws of India, and any obligation for a provider of an electronic communications service or a remote computing service to produce data shall derive solely from Indian law;&lt;/p&gt;
&lt;p&gt;(vii) Orders issued by the Indian government must be based on requirements for a reasonable justification based on articulable and credible facts, particularity, legality, and severity regarding the conduct under investigation;&lt;/p&gt;
&lt;p&gt;(viii) Orders issued by the Indian government must be subject to review or oversight by a court, judge, magistrate, or other independent authority;&lt;/p&gt;
&lt;p&gt;(ix) Orders issued by the Indian government for the interception of wire or electronic communications, and any extensions thereof, must be for a fixed, limited duration; interception may last no longer than is reasonably necessary to accomplish the approved purposes of the order; and orders may only be issued where that same information could not reasonably be obtained by another less intrusive method;&lt;/p&gt;
&lt;p&gt;(x) Orders issued by the Indian government may not be used to infringe freedom of speech;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(xi) The Indian government must promptly review all material collected pursuant to the agreement and store any unreviewed communications on a secure system accessible only to those trained in applicable procedures;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(xii) The Indian government must segregate, seal, or delete, and not disseminate material found not to be information that is, or is necessary to understand or assess the importance of information that is, relevant to the prevention, detection, investigation, or prosecution of serious crime, including terrorism, or necessary to protect against a threat of death or seriously bodily harm to any person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(xiii) The Indian government may not disseminate the content of a communication of a U.S. person to U.S. authorities unless the communication (a) may be disseminated pursuant to Section 4(a)(3)(xii) and (b) relates to significant harm, or the threat thereof, to the United States or U.S. persons, including but not limited to crimes involving national security such as terrorism, significant violent crime, child exploitation, transnational organized crime, or significant financial fraud;&lt;/p&gt;
&lt;p&gt;(xiv) The Indian government must afford reciprocal rights of data access to the United States government;&lt;/p&gt;
&lt;p&gt;(xv) The Indian government must agree to periodic review of its compliance with the terms of the agreement by the United States government; and&lt;/p&gt;
&lt;p&gt;(xvi) The United States government must reserve the right to render the agreement inapplicable as to any order for which it concludes the agreement may not properly be invoked.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the discussion above that the proposed Amendment is a controversial piece of legislation which will affect the way law enforcement is carried out in the internet. While there is no doubt that proposing an alternate mechanism to the existing inefficient MLAT structure is definitely the need of the hour, whether the mechanism proposed in the proposed Amendment, with all the negative implications on privacy, is the right way forward is far from certain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for the three questions that we had sought out to answer in the beginning of this paper, we would not like to say that Indian law definitely conforms to all the requirements listed in the Amendments, but it can safely be said that it appears that if the governments of India and the United States so wish, it would not be difficult for the Attorney General of the United States to be able to give a certification to the Congress as required in the proposed Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other two questions as to whether India should try to opt for such an arrangement if given a chance and what would be the consequence for its people are somewhat related, in the sense that it is only by examining the consequences on its citizens that we will arrive at an answer as to whether India should opt for such an arrangement or not. The level of protections offered to Indian citizens under India law in terms of protection of their private data from government surveillance is lower than that which is offered to American citizens under American law. The growing influence of the internet is changing the citizen-state dynamic giving rise to increasing incidents where the government has to approach private actors for permission in order to carry out their governmental functions of providing security. This is because more and more private data of individual citizens is being uploaded on to the internet and controlled by private actors such as telecom companies, social media sites, etc. and the governments have to approach these private actors in case they want access to this information. The fact that the government has to approach private actors to get access to data gives private citizens some leverage to ask for better privacy protections in the context of state surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although this proposed Amendment may not affect the local surveillance laws in India, however it would definitely have an effect on the way that citizens’ data is protected and accessed by the government.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Explanation by the Assistant Attorney General attached to the proposed Amendment.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/"&gt;https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/"&gt;https://www.justsecurity.org/24145/u-s-u-k-data-sharing-treaty/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://spicyip.com/2012/04/clash-of-courts-indian-district-court.html"&gt;http://spicyip.com/2012/04/clash-of-courts-indian-district-court.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/"&gt;https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/"&gt;https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; &lt;a href="https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/"&gt;https://www.justsecurity.org/32529/foreign-governments-tech-companies-data-response-jennifer-daskal-andrew-woods/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; International Covenant on Civil and Political Rights, art. 17, Dec. 19, 1966, U.N.T.S 999, &lt;i&gt;cf. &lt;/i&gt;&lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing"&gt;https://www.aclu.org/letter/aclu-amnesty-international-usa-and-hrw-letter-opposing-doj-proposal-cross-border-data-sharing&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act'&gt;https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>MLATs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-28T01:09:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/lack-of-representation-of-non-western-world-in-creation-of-web-standards">
    <title>(Lack of) Representation of Non-Western World in Process of Creation of Web Standards</title>
    <link>https://cis-india.org/a2k/blogs/lack-of-representation-of-non-western-world-in-creation-of-web-standards</link>
    <description>
        &lt;b&gt;World Wide Consortium (W3C) as a standard setting organization for the World Wide Web plays a very important role in shaping the web. We focus on the ongoing controversy related to Encrypted Media Extensions (EME) and found that there was a serious lack of participation from people from non-western countries. We also found serious lack of gender diversity in the EME debate.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;W3C is the organization which sets the standard for HTML 5. Recently it got surrounded by controversy due to the Encrypted Media Extensions (EME) draft specification (David Dorwin et al. 2016).  EME aims to prevent piracy of digital video by making it hard to download the unencrypted video stream. But it also raises lots of issues regarding implementation in Free and Open Source Software, Interoperability, Privacy, Security, Accessibility and fair use. (Cory Doctorow 2016)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this study we looked at aspects of the debate which both of the sides ignored, the third world! We found that out of 48 people who participated in the debate around EME on W3C's public-html mailing list, none of them were from the continents of Asia, Africa or South America. These regions make up almost 80 % of the world's population and more than 60 percent of world's internet users (Stats 2016). When a group of people doesn't get represented a in the standard making process it is expected that their concerns don't get represented either. The representation of people is specially important in the EME debate because laws around Digital Rights Management around the world are different.  For example Indian laws does not disallow manufacture and distribution of circumvention tools whereas the law in USA does (Prakash 2016b). The cultural norms around the world are quite different and also the conditions under which people use the internet are different. India has the lowest average internet speed across the world (Akamai 2016). A large of fraction of Indian population (37% in 2010) accesses internet through Cyber Cafés (TRAI 2016). These factors makes the ability to download digital content much more important for an Indian internet user than a North American or European internet user.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Methodology&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;We used BigBang&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; python package to download the achieves of the public-html mailing list at W3C.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Our dump contains all the messages between 31st August 2010 to 15th May 2016. Then we filtered out all the emails with EME, encrypted media or DRM in the subject line. There were 472 such emails. We then de-duplicated the list of senders as some senders used multiple emails in the course of discussion. There were 48 unique senders afters de duplication. Then we looked up their social media profiles (LinkedIn, Twitter, Github), personal website or page at employers site to determine the region they belong to and their gender. All the source code used for the analysis is available on our github repository.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Result&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Regional Diversity&lt;/h3&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Region&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Participant (%)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Email (%)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Africa&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0 (0)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0 (0)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Asia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0 (0)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0 (0)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Australia and New Zealand&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;5 (10.4)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;16 (3.4)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Europe&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;13 (27.1)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;146 (30.9)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;North America&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;30 (62.5)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;310 (65.7)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;South America&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0 (0)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0 (0)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Total&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;48 (100)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;472 (100)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;As mentioned in the Introduction above there was absolutely no participation from the whole continents of Africa, Asia, or South America with most of the emails being sent by North Americans.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Gender Diversity&lt;/h3&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Gender&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Participant(%)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Email(%)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Male&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;47 (97.9)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;466 (98.7)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Female&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1 (2.1)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6 (1.3)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Total&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;48 (100)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;472 (100)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There was only one women participating in the discussing contributing 1.3 % of the emails sent. The numbers reflects widely discussed lack of gender diversity in Tech and Open communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate inside W3C around EME also seriously lacked in gender diversity, which is typical of open communities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Stakeholder Community&lt;/h3&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Stakeholder Community&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Participants per work category&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Emails sent per stakeholder category&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;FOSS browser developer&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;56&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Digital Content Provider&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;186&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;DRM Platform Provider&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;100&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;47&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Security Researcher&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Other W3C Employee&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;None of the Above&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;71&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Total&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;48&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;472&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;We observe that there was no participation from the Security Researcher community and negligible participation from privacy community. Voice of Digital Content Provider was overrepresented with almost 40% of emails sent by them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Methodological remarks:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Participants are categorized on the basis stakes of their employer and not specifically on the work they do. For example someone who works on privacy in Google will be placed in "DRM platform provider" instead of "Privacy".&lt;/li&gt;
&lt;li&gt;W3C and Universities are considered to neutral and their employees are categorized by the work they do.&lt;/li&gt;
&lt;li&gt;Google's position is very interesting, it is a DRM provider as a browser manufacturer but also a content provider in Youtube and fair number of Google Employers are against EME due to other concerns. Therefore Christian Kaiser has been paced as Content provider because he works on Youtube, and everyone else has been placed as DRM provider.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion and Future Work&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The lack of diversity in W3C is not unique. (Graham, Straumann, and Hogan 2015) showed a significant western bias in Wikipedia, gender bias in Wikipedia has also a well known and is being actively worked upon. Internet Corporation for Assigned Names and Numbers has also been criticized for under representing interests of non North American and West European world (Prakash 2016a).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We hope that W3C and other organizations will increase the diversity in their standard making process so that global voices actually shape the global internet.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Acknowledgement&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This work was done during my internship at The Center for Internet &amp;amp; Society, India. I thank Sunil Abraham for useful and timely feedback and Pranesh Prakash, Amber Sinha and Udbhav Tiwari for informed discussions.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;References&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Akamai. 2016. “Akamai State of the Internet Q1 2016.” Accessed August 20. &lt;a href="https://www.akamai.com/uk/en/multimedia/documents/state-of-the-internet/akamai-state-of-the-internet-report-q1-2016.pdf"&gt;&lt;b&gt;https://www.akamai.com/uk/en/multimedia/documents/state-of-the-internet/akamai-state-of-the-internet-report-q1-2016.pdf&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Cory Doctorow. 2016. “Interoperability and the W3C: Defending the Future from the Present.” &lt;i&gt;Electronic Frontier Foundation&lt;/i&gt;. &lt;a href="https://www.eff.org/deeplinks/2016/03/interoperability-and-w3c-defending-future-present"&gt;&lt;b&gt;https://www.eff.org/deeplinks/2016/03/interoperability-and-w3c-defending-future-present&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;David Dorwin, Jerry Smith, Mark Watson, and Adrian Bateman. 2016. “Encrypted Media Extensions, W3C Editor’s Draft.” Accessed May 13. &lt;a href="https://w3c.github.io/encrypted-media/"&gt;&lt;b&gt;https://w3c.github.io/encrypted-media/&lt;/b&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Feminism, Geek. 2016. “Geek Feminism Wiki FLOSS.” &lt;i&gt;Geek Feminism Wiki&lt;/i&gt;. Accessed October 5. &lt;a href="http://geekfeminism.wikia.com/wiki/FLOSS"&gt;http://geekfeminism.wikia.com/wiki/FLOSS&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Graham, Mark, Ralph K. Straumann, and Bernie Hogan. 2015. “Digital Divisions of Labor and Informational Magnetism: Mapping Participation in Wikipedia.” &lt;i&gt;Annals of the Association of American Geographers&lt;/i&gt; 105 (6): 1158–78. doi:&lt;a href="https://doi.org/10.1080/00045608.2015.1072791"&gt;&lt;b&gt;10.1080/00045608.2015.1072791&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Prakash, Pranesh. 2016a. “CIS Statement at ICANN 49’s Public Forum.” &lt;i&gt;The Centre for Internet and Society&lt;/i&gt;. Accessed August 20. &lt;a href="http://cis-india.org/internet-governance/blog/icann49-public-forum-statement"&gt;&lt;b&gt;http://cis-india.org/internet-governance/blog/icann49-public-forum-statement&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Prakash, Pranesh. 2016b. “Technological Protection Measures in the Copyright (Amendment) Bill, 2010.” &lt;i&gt;The Centre for Internet and Society&lt;/i&gt;. Accessed August 20. &lt;a href="http://cis-india.org/a2k/blogs/tpm-copyright-amendment"&gt;&lt;b&gt;http://cis-india.org/a2k/blogs/tpm-copyright-amendment&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Stats, Internet Live. 2016. “Number of Internet Users (2016) - Internet Live Stats.” Accessed August 20. &lt;a href="http://www.internetlivestats.com/internet-users/"&gt;&lt;b&gt;http://www.internetlivestats.com/internet-users/&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;TRAI.. “Recommendations on National Broadband Plan.” Accessed August 20. &lt;a href="http://www.trai.gov.in/WriteReadData/Recommendation/Documents/Rcommendation81210.pdf"&gt;&lt;b&gt;http://www.trai.gov.in/WriteReadData/Recommendation/Documents/Rcommendation81210.pdf&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;hr /&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt; https://github.com/datactive/bigbang&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt; https://lists.w3.org/Archives/Public/public-html/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt; https://github.com/hargup/eme_diversity_analysis&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/lack-of-representation-of-non-western-world-in-creation-of-web-standards'&gt;https://cis-india.org/a2k/blogs/lack-of-representation-of-non-western-world-in-creation-of-web-standards&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gupta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Web Standards</dc:subject>
    
    
        <dc:subject>Encrypted Media Extensions</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-10-20T01:44:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/technical-alternative-to-encrypted-media-extensions">
    <title>Technical Alternative to Encrypted Media Extensions </title>
    <link>https://cis-india.org/a2k/blogs/technical-alternative-to-encrypted-media-extensions</link>
    <description>
        &lt;b&gt;This post is an analysis of the various technical alternatives to EME (encyrpted media extensions) that have emerged from the discussions at the World Wide Web Consortium (W3C). These alternatives and the proposed EME specification along six dimensions are examined. &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Encrypted Media Extensions (EME) are a draft specification&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; to standardize digital rights management (DRM) for audio and video at the browser level. The specification has been very controversial in the software community since it was first drafted in 2012. It was proposed by content providers and streaming service operators to ensure that content delivered to legitimate users is inaccessible to pirates. However, the proposed solution raised salient questions about interoperability, privacy, accessibility and implementation in Free and Open Source (FOSS) software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several parties have, over the course of the discussion at W3C, proposed several alternate technical alternatives. This report aims to analyze these alternatives and the proposed EME specification along six dimensions; technical copy protection, legal copy protection, interoperability/entry barriers for browsers, privacy, accessibility, and user security.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aims of the Specification&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Make it technically hard for a malicious user to pirate a particular media&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Have sufficient legal barriers to deter infringement&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;At the same time:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Ensure interoperability and make sure there are no entry barriers for new browsers&lt;/li&gt;
&lt;li&gt;Protect privacy of users&lt;/li&gt;
&lt;li&gt;Make sure the system doesn’t bring about security vulnerability&lt;/li&gt;
&lt;li&gt;Maintain accessibility for a person with disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Metrics of Comparison&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Technological Copy Protection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/EME.png" alt="EME" class="image-inline" title="EME" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the transfer of video content from the web server of the content provide to the user, there are multiple points where a malicious entity can capture the copyrighted content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We classify the technical strength of a DRM system depending on the point in transition where the capture can take place. Assuming the server is itself secure, the first point where the adversary can capture the media is during the transition from the server to the user’s device. Preventing such kind of interception is a standard problem and is in solved by the use of HTTPS. After the media stream reaches the device of the intended user, she can capture the before it is played on the media software. For example, in case of images or text, the user can usually save the media without the need of any special software or specialized technique. So the next step from content providers side is build restrictions in the software playing the media. The usual way to do this is by making sure that the media can be played only on certain software which doesn’t allow the user to copy the media. The software restrictions can be implemented using arbitrary codecs, scrambling or encryption. Technical restrictions at software level are always prone to be captured by screen capturing softwares, and hardware emulators which appears as output devices to media software but are used to save the media instead. To prevent capturing at software level there exists technologies such as HDCP&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; which protects the media during its transition from the media software to the output device. Although such technologies are also fallible to a user holding a video camera in front of the monitor. This weakness of the DRM systems is known as Analog Hole.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technological Copy Protection is:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;High: Infringer needs specialized hardware to capture the copyrighted content.&lt;/li&gt;
&lt;li&gt;Medium: Infringer needs specialized Software to capture the copyrighted content&lt;/li&gt;
&lt;li&gt;Low: Infringer needs only commonly available software and hardware to capture the copyrighted content&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Copy Protection (Legal)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Jurisdictions across the world have laws which make it illegal to circumvent technological protections methods for the protections of Copyright. The most famous of them is the Section 1201 of the United States Digital Millennium Copyright Act (DMCA). For content providers who wish to use TPMs to prevent piracy of their copyrighted work, these laws provide additional layers of protection. DMCA disallows circumventing a technical measure which effectively control access to copyrighted work, also it disallows the “manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component” which is primarily designed to circumvent a DRM.  .&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legal protection against infringement is high in DRM system if:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;High: Circumventing the DRM and creating tools to enable that is illegal unconditionally&lt;/li&gt;
&lt;li&gt;Medium: Circumventing the DRM and creating tools to enable that is illegal depending the intent and circumstances&lt;/li&gt;
&lt;li&gt;Low: Circumventing the DRM and creating tools to enable that is legal.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;DRM systems have been criticized for leaving users’ devices vulnerable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security of a user using the DRM system is:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;High: The system don’t require any elevated permissions&lt;/li&gt;
&lt;li&gt;Medium: The system only requires elevated software permissions&lt;/li&gt;
&lt;li&gt;Low: The system requires both elevated hardware or software permission&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy of user using the DRM systems is:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;High: The system doesn’t collect minimal information&lt;/li&gt;
&lt;li&gt;Medium: The system only collects non personally identifiable information&lt;/li&gt;
&lt;li&gt;Low: The system collects personally identifiable information&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Accessibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;DRM systems can turn out to be problematic for providing accessibility for disabled persons. In case of video service can be made accessible by providing access to closed captions for a video and by modifying the stream to make it accessible to color blind people. However, a DRM system could present unnecessary barriers for people trying to provide accessibility solutions. There can be technical barrier in the process of handling the video stream&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;W3C Technical Architecture Group (TAG) suggested following guidelines to maintain accessibility in Encrypted Media Extensions:&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;ensuring that media content may be redirected to certain system services&lt;/li&gt;
&lt;li&gt;ensuring that every piece of digital content is available in its original form (for example, subtitles are not blended into video, etc)&lt;/li&gt;
&lt;li&gt;ensuring that standard operations (adjusting contrast, using third-party subtitles or audio-stream) may be applied to restricted media&lt;/li&gt;
&lt;li&gt;ensuring that restricted media from different sources provided by different EME systems (for example, video from one source and sign-language interpretation of that video from another source) may be used simultaneously&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;We say accessibility in a DRM system is:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;High: If all the of the guidelines are met&lt;/li&gt;
&lt;li&gt;Medium: If two more points in the guideline are met&lt;/li&gt;
&lt;li&gt;Low: If less than points of the guideline are met&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Interoperability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Interoperability of any system is important to keep the entry barriers low for a new producer to enter the market. Interoperability of a DRM system for browsers is:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;High: The full spec is available for implementation on royalty free basis&lt;/li&gt;
&lt;li&gt;Medium: The full spec is not available, but can be implemented through reverse engineering without legal barriers.&lt;/li&gt;
&lt;li&gt;Low: Third parties may restrict new browsers from implementing the spec through legal means.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Specifications&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;EME Specification&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;EME specification only defines the javascript component of the system and the large component called Content Decryption Module(CDM) is left undefined.  The CDM can be hardware based using technologies like HDCP, which prevents screen capture. The CDM can be software based and can return the decrypted video to the browser to render, or it can use its own media stream and render it by itself. Most of the CDMs in use are proprietary but there can exist CDMs which are fully specified and are open source. The implications for copy protection, privacy, accessibility and security depends on the CDM used. Interoperability of EME spec is very low because there are not only technical barriers due lack of full specification but also legal barriers as browsers may need to get into a contract with the dominant CDM providers to add support for their CDM.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Obfuscation (Arbitrary Codec)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Charles Pritchard pointed out the HTML5 video specification is codec agnostic, hence the content providers can stream the media using an arbitrary codec which only supported by the media provider.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; So even if the user captures the video stream it cannot be pirated without reverse engineering the codec. Although reverse engineering is usually allowed by DRM laws hence the legal protection is low.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Since the codec support is provided through OS, there is no need to modify the browser and the system can be supported by any browser without any technical or legal barriers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;HTTPS and JS encryption&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Tab Atkins proposed using JS encryption using browser and &amp;lt;video&amp;gt; element&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. Since the technique requires the a malicious user to implement the full &amp;lt;video&amp;gt; spec to decrypt the video, the scheme provides moderate technical copy protection.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Encryption using video tag&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to David Singer encrypted video can be played through the existing &amp;lt;video&amp;gt; tags where the content file says its content-ID and is marked as protected, someone who has the DRM to play the content installed and has brought the keys to play it can watch the video.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As a concrete example he talked about protected .m4p audio files from iTunes library, which plays just fine on Safari.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Plugin System (Flash)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Existing plugin system, mainly Flash is be used to as a technical measure to prevent copyright infringement. It is more interoperable than EME because any browser with a correct implementation of NPAPI can provide support for Flash&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Technical Alternative &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Copy Protection Technical&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Interoperability&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Copy Protection Legal&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Security&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Obfuscation (Arbitrary Codec)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Medium&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Low&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Depends on Implementation Details&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Encryption using video tag&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Medium to High&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Medium&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Depends on Implementation Details&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Depends on Implementation Details&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Depends on Implementation Details&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;HTTPS and JS decryption&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Medium&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Depends on Implementation Details&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;EME&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Depends on CDM&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Low&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Depends on CDM&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Depends on CDM&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Depends on CDM&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Plugin (Flash)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;High&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Medium&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Medium&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Medium&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Low&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Low&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Encrypted Media Extensions W3C Candidate Recommendation &lt;a href="https://www.w3.org/TR/encrypted-media/"&gt;https://www.w3.org/TR/encrypted-media/&lt;/a&gt;. For a general overview see https://hsivonen.fi/eme/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; HDCP Whitepaper, &lt;a href="https://web.archive.org/web/20080920191718/http:/www.digital-cp.com/files/documents/04A897FD-FEF1-0EEE-CDBB649127F79525/HDCP_deciphered_070808.pdf"&gt;https://web.archive.org/web/20080920191718/http://www.digital-cp.com/files/documents/04A897FD-FEF1-0EEE-CDBB649127F79525/HDCP_deciphered_070808.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 1201, US Digital Millennium Copyright Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://github.com/w3ctag/eme/blob/master/EME%20Proposal.md#accessibility-1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://lists.w3.org/Archives/Public/public-html/2012Feb/0328.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 1201, Digital Millennium Copyright Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://lists.w3.org/Archives/Public/public-html/2012Feb/0456.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://lists.w3.org/Archives/Public/public-html/2012Feb/0422.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://lists.w3.org/Archives/Public/public-html/2012Feb/0433.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://lists.w3.org/Archives/Public/public-html/2012Feb/0427.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Using HDCP is possible with compatible hardware&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The implementation itself doesn’t require additional cookies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Spec allows CDMs which do not act as DRM, but the content providers may not support them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Adobe’s new Flash DRM comes with selective output control&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://arstechnica.com/business/2010/05/adobes-new-flash-drm-comes-with-selective-output-control&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Flash Player provides some accessibility functionalities &lt;a href="https://www.adobe.com/accessibility/products/flash/captions.html"&gt;https://www.adobe.com/accessibility/products/flash/captions.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Soltani, Ashkan and Canty, Shannon and Mayo, Quentin and Thomas, Lauren and Hoofnagle, Chris Jay, Flash Cookies and Privacy (August 10, 2009). Available at SSRN: &lt;a href="http://ssrn.com/abstract=1446862"&gt;http://ssrn.com/abstract=1446862&lt;/a&gt; or &lt;a href="http://dx.doi.org/10.2139/ssrn.1446862"&gt;http://dx.doi.org/10.2139/ssrn.1446862&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/technical-alternative-to-encrypted-media-extensions'&gt;https://cis-india.org/a2k/blogs/technical-alternative-to-encrypted-media-extensions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gupta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Encrypted Media Extensions</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-10-20T00:16:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages">
    <title>Here is why government twitter handles have been posting offensive and partisan messages </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages</link>
    <description>
        &lt;b&gt;You have failed us big time Mr Kejriwal, for your petty political gains you can become headlines for Pakistani press,” read a tweet on October 5 from @IndiaPostOffice, the official twitter handle of the Indian postal service.&lt;/b&gt;
        &lt;div align="justify" id="div_storyContent"&gt;
&lt;p&gt;The article by Danish Raza was &lt;a href="http://www.hindustantimes.com/india-news/here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages/story-TETZblpE9F2JVzTYOALMjL.html"&gt;published in the Hindustan Times&lt;/a&gt; on October 15, 2016. Nishant Shah was quoted.&lt;/p&gt;
&lt;hr size="2" width="100%" /&gt;
&lt;p&gt;It was a reference to Delhi Chief Minister Arvind Kejriwal urging the  Prime Minister to counter Pakistan’s propaganda over surgical strikes.&lt;/p&gt;
&lt;p&gt;Within hours, India Post tweeted an apology saying that the account was hacked.&lt;/p&gt;
&lt;p&gt;This is the latest in a series of opinions and statements posted from  official twitter handles of government departments and bodies. Of late,  the Twitter handles meant to broadcast information related to  government programmes have appeared like personal accounts tweeting  slander and criticism.&lt;/p&gt;
&lt;p&gt;Last month, the Twitter handle of Digital India tweeted a poem in  Hindi calling on the Indian Army to persistently fire at protesters in  Kashmir.&lt;/p&gt;
&lt;p&gt;In August, the Twitter handle of Startup India retweeted a post  suggesting that the Indian Army should ‘take care’ of #Presstitutes, a  reference to sections of Indian media critical of the government.&lt;/p&gt;
&lt;p&gt;The tweets expose loopholes in the government’s social media policy  and raise questions about the norms followed in the recruitment of  social media professionals for ministries and government institutions.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Work in Progress&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The process of adopting new tools is work in progress. While the  government agencies are trying to leverage social media to enhance  citizen engagement, for the vast majority of government bodies, it is  unexplored territory. Babus who have traditionally been dealing in  paperwork and file notings are overwhelmed to see hash tags and trends.  With a tech- savvy Prime Minister at the helm, every government  department is trying to increase its digital footprint. At the same  time, they face the challenge of reinterpreting existing work ethics and  codes of conduct and applying them to the use of social media.  Ministries such as the Ministry of External Affairs, Information &amp;amp;  Broadcasting and the Prime Minister’s Office which have cohesive  programmes and big mandate, have separate social media wings of their  own with well- defined protocols. But these are exceptions.&lt;/p&gt;
&lt;p&gt;Overall, the government bodies lack social media guidelines for their  own efforts or which others can learn from. According to Chinmayi Arun,  executive director, Centre for Communication Governance, National Law  University, Delhi, mistakes are bound to happen given that everyone is  new to social media. But it should be non-negotiable that when anything  is said using an official governmental handle, the government should  take more responsibility than just saying ‘oops’. “One of course is a  clear and unequivocal statement apologising and taking back whatever was  said. However, it should take pro-active measures to train and test  people who handle its public-facing accounts and publish a clear  monitoring and accountability mechanism by which they can be called to  account. It should not be open to anyone to misuse the government’s  official handles in this manner,” said Arun.&lt;/p&gt;
&lt;p&gt;One of the areas where the lack of sensitisation is apparent is the  usage of the same mobile device for multiple twitter handles – the most  common reason for such goof-ups cited by social media consultants  attached to various government departments. “I believe these were  inadvertently posted by people handling these accounts. It may neither  have been their mandate nor their intention. It happens when the person  has configured multiple twitter handles from the same device and ends up  posting from the wrong account,” said Amit Malviya, BJP’s National  Convener, IT.&lt;/p&gt;
&lt;p&gt;The majority of ministries and government departments do not give  phones to members of the social media teams. It is up to the individual  to use his personal device or get an additional one to manage the  professional handle (s). A mistake will happen if a comment which was to  be posted from the personal handle is posted from the official handle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Twitter Goof-ups from GoI Accounts&lt;/b&gt;&lt;/p&gt;
&lt;div class="wrapbox"&gt;&lt;img src="http://www.hindustantimes.com/static/ht2016/10/twitter_goofs.jpg" width="100%&amp;quot;/" /&gt;&lt;/div&gt;
&lt;p&gt;“Because of the personalised and individual nature of social media,  it is easy to forget that they are representing an institution and not  themselves when using these handles. This also suggests the lack of  public usage training in these organisations, and the need to educate  our public actors in using social media with more responsibility as  office bearers of an institution rather than a personal expression or an  opinion,” said Nishant Shah, co-founder of the Centre for Internet and  Society, Bangalore.&lt;/p&gt;
&lt;p&gt;Another issue is that access to the account is given to multiple  people. “Each one of them brings their individual personality and  politics to their operation of the handle,” said Shah.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Hiring Issues&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
Part of the problem lies in the fact that there is no standard  protocol on who can access the twitter handle of Indian government  bodies and how this person or team is hired.
&lt;p&gt;A few ministries (example: the ministry of railways) have a team  comprising of government employees and staff of private agencies  handling their account. Others have outsourced the job to agencies.&lt;/p&gt;
&lt;p&gt;During the campaigning for the 2009 election, political parties got  outside expertise to mark their presence online. The selection  parameters of social media consultants – established public relations  firms in some cases and individuals in others – was not uniform.&lt;/p&gt;
&lt;section class="story_top_news"&gt;
&lt;div class="news_photo"&gt;&lt;img src="http://www.hindustantimes.com/rf/image_size_800x600/HT/p2/2016/10/15/Pictures/16-10-ht-weup-1-15_636b22d4-92ec-11e6-b1ee-4de56c7571da.jpg" /&gt;&lt;/div&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;/section&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Unlike the traditional public relations officers who are from the  Indian Information Services cadre, the social media consultants were  selected based on their expertise in the field, political affiliation,  and proximity to a party or leader.&lt;/p&gt;
&lt;p&gt;Those who started handling social media accounts of political parties  and leaders included trolls and social media influencers. “Parties got  youngsters who were politically motivated and willing to work for  political parties. They became cheaper alternatives for social media  experts,” said Ishan Russel, political communication consultant.&lt;/p&gt;
&lt;p&gt;After the NDA came to power, almost every ministry outsourced its  digital expertise to agencies. Many individuals who were earlier  directly working with leaders and parties got back with them via  agencies. “If an agency is looking for people to handle the twitter  account or Facebook page of a certain ministry in the BJP government,  then those who are politically inclined towards the BJP will apply for  the vacancies and their chances of getting hired are also much higher  than someone who is neutral or known to be an AAP sympathiser,” said  Vikas Pandey, 32-year-old software engineer, who headed the “I Support  Namo” campaign on Facebook and Twitter, as a volunteer for the BJP.&lt;/p&gt;
&lt;p&gt;Last year, the Prime Minister felicitated more than a dozen social  media enthusiasts, including Vikas. The move raised eyebrows because  many felt that the government was encouraging trolls. “It illuminates  the fact that trolls have found gainful employment in the Government of  India. Also that the entire edifice of the centre is being taken over by  woefully undereducated bigots,” said Swati Chaturvedi, senior  journalist and author.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Agency, the Soft Target&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
Till the time the government staff is well versed with social media  tools, attributing the mistakes to an ‘outside agency’ appears to be the  norm.
&lt;p&gt;In the case of the twitter goof-up involving Startup India, Commerce  and Industry minister Nirmala Sitharaman blamed a private agency that  was managing the account of Startup India. “The retweets were done by an  employee of the agency hired by the department of industrial policy and  promotion. The person assigned by the agency for this particular job is  not decided by the department and is the sole prerogative of the  agency,” she said.&lt;/p&gt;
&lt;p&gt;S Radha Chauhan, CEO of National e-Governance Division, attributed  the controversial post from Digital India’s twitter handle to an agency  called Trivone. “The person responsible had mistakenly tweeted from the  official handle what he wanted to tweet from his personal account,” said  Chauhan.&lt;/p&gt;
&lt;p&gt;Those familiar with the functioning of the government’s social media  verticals say that agencies are mentioned to cover up for mistakes often  committed by someone from the government staff. “When in crisis, blame  the agency, is the thumbrule the government follows. The fact is that  each twitter post is approved by the client before it is posted,” said a  senior executive with a digital marketing firm attached to a ministry  which has recently earned lot of praise for its social media  initiatives.&lt;/p&gt;
&lt;p&gt;Nishtha Arora, social media and digital consultant in a reputed ad  agency, was handling a political account till very recently. She said  that the client required her to just randomly tweet or RT to be heard by  the followers of a tech-savvy minister and be his digital mouthpiece.  “I often had to draft tweets which looked like press releases,” she  said.&lt;/p&gt;
&lt;p&gt;“Digital faux pas is blamed on to someone who might be an expert in  the field but yet has to bow down to the client pressure so that their  agenda for the day is met and the said government body or ministry  remains in the news,” she added.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages'&gt;https://cis-india.org/internet-governance/news/hindustan-times-danish-raza-october-15-2016-here-is-why-government-twitter-handles-have-been-posting-offensive-and-partisan-messages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Twitter</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-16T03:24:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/the-wire-anubha-sinha-october-12-2016-why-open-access-has-to-look-up-for-academic-publishing-to-look-up">
    <title>Why Open Access Has To Look Up For Academic Publishing To Look Up</title>
    <link>https://cis-india.org/openness/the-wire-anubha-sinha-october-12-2016-why-open-access-has-to-look-up-for-academic-publishing-to-look-up</link>
    <description>
        &lt;b&gt;In an important development, the US Federal Trade Commission has filed a complaint against the India-based OMICS group for harassing authors to publish in its journals.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://thewire.in/72286/open-access-academic-publishing/"&gt;published in the Wire&lt;/a&gt; on October 12, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;“…&lt;/span&gt;&lt;i&gt;&lt;span&gt;if  you are a member of the knowledge elite, then there is free access, but  for the rest of the world, not so much … Publisher restrictions do not  achieve the objective of enlightenment, but rather the reality of  ‘elite-nment.” &lt;/span&gt;&lt;/i&gt;&lt;span&gt;Lawrence Lessig&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In 2011, &lt;/span&gt;&lt;span&gt;speaking impassionately&lt;/span&gt; &lt;a href="http://cds.cern.ch/record/1345337" rel="external nofollow" target="_blank" title="to an audience at CERN"&gt;&lt;span&gt;to an audience at CERN&lt;/span&gt;&lt;/a&gt;&lt;span&gt; – one of the world’s largest institutions for nuclear physics research,  headquartered in Geneva – Lessig, a professor of law at Harvard Law  School and a political activist, highlighted the crisis of access to  scientific scholarship. Indeed, over the last six decades, public access  to scholarly works has diminished. Works that can be freely searched  and read represent only a sliver of the entire wealth of human  knowledge. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;With the emergence of academic journals in the seventeenth century, the practice of exchanging manuscripts for review and comments became popular, leading to the establishment of the peer-review system. In fact, until the eighteenth century, there existed a strong belief in the intellectual commons and traditions of sharing knowledge between scholars. These traditions dated back to scholarship flourishing in ancient Greece. Open access was the default, and not the exception to the norm.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;However, by the nineteenth century,  there occurred a game-changing shift in the approach to knowledge  production. It was theorised that the commons approach was inefficient  and that knowledge needed to be exclusively owned to spur further  production. This was in line with the incentive theory of copyright law,  which was an added justification to the commoditisation of knowledge.  In such circumstances, all scholarly works increasingly came to be  fortified within the expensive walls of academic journals. Journals left  no stone unturned to capitalise on scholars vying to get published in  prestigious titles (&lt;i&gt;Nature&lt;/i&gt;, &lt;i&gt;Lancet&lt;/i&gt;, &lt;i&gt;Cell&lt;/i&gt;, etc.).&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The business model rarely rewarded authors or peer reviewers. On the contrary, some journals required authors to pay a considerable fee to publish their work. Subscription charges to such research, a large part of which was funded by the government (i.e. taxpayers), hit the roof and could be afforded only by elite institutions. And with the advent of the digital age, the fortresses moved online. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;However, before the internet arrived, there had been efforts to counter the entrenchment of scholarly works. They were mostly in the nature of social movements, located broadly within the philosophical umbrella of openness. The nineties marked a significant increase in the modes of access, through devices connected to the internet. Previously a fringe movement, openness was now entering the realms of publishing, software, standards development, education and data. It manifested in Linux, Wikipedia, open web standards, open educational resources, open government data, Creative Commons and, particularly, open access publishing. Just last month, a UN report called for open access to research to improve public health. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Open access publishing was a breakaway from the traditional scholarly publishing model. It offered a different model of &lt;/span&gt;&lt;i&gt;&lt;span&gt;online&lt;/span&gt;&lt;/i&gt;&lt;span&gt; research publication informed by the principles of transparency, free access and unrestricted access. &lt;/span&gt;&lt;a href="http://legacy.earlham.edu/%7Epeters/fos/overview.htm" rel="external nofollow" target="_blank" title="Three key definitions"&gt;&lt;span&gt;Three key definitions&lt;/span&gt;&lt;/a&gt;&lt;span&gt; exist, and the &lt;/span&gt;&lt;span&gt;Budapest Open Access Initiative&lt;/span&gt;&lt;span&gt; (2002) provides &lt;a href="http://www.budapestopenaccessinitiative.org/read" rel="external nofollow" target="_blank" title="a good overview"&gt;a good overview&lt;/a&gt; of it:&lt;/span&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;span&gt;&lt;span&gt;There are many degrees and kinds of  wider and easier access to this literature. By ‘open access’ to this  literature, we mean its free availability on the public internet,  permitting any users to read, download, copy, distribute, print, search,  or link to the full texts of these articles, crawl them for indexing,  pass them as data to software, or use them for any other lawful purpose,  without financial, legal, or technical barriers other than those  inseparable from gaining access to the internet itself. The only  constraint on reproduction and distribution, and the only role for  copyright in this domain, should be to give authors control over the  integrity of their work and the right to be properly acknowledged and  cited.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Further, open access is &lt;/span&gt;&lt;a href="http://legacy.earlham.edu/%7Epeters/writing/jbiol.htm" rel="external nofollow" target="_blank" title="compatible"&gt;&lt;span&gt;compatible&lt;/span&gt;&lt;/a&gt;&lt;span&gt; with &lt;/span&gt;&lt;a href="http://legacy.earlham.edu/%7Epeters/fos/overview.htm#copyright" rel="external nofollow" target="_blank" title="copyright"&gt;&lt;span&gt;copyright&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://legacy.earlham.edu/%7Epeters/fos/overview.htm#peerreview" rel="external nofollow" target="_blank" title="peer review"&gt;&lt;span&gt;peer review&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://legacy.earlham.edu/%7Epeters/fos/overview.htm#journals" rel="external nofollow" target="_blank" title="revenue"&gt;&lt;span&gt;revenue&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (even profit), print, preservation, &lt;/span&gt;&lt;a href="http://dash.harvard.edu/handle/1/4322577" rel="external nofollow" target="_blank" title="prestige"&gt;&lt;span&gt;prestige&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://dash.harvard.edu/handle/1/4552042" rel="external nofollow" target="_blank" title="quality"&gt;&lt;span&gt;quality&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, career-advancement, indexing, and other features and supportive services associated with conventional scholarly literature&lt;/span&gt;&lt;span&gt; (as Peter Suber &lt;/span&gt;&lt;span&gt;&lt;a href="http://legacy.earlham.edu/%7Epeters/fos/overview.htm" rel="external nofollow" target="_blank" title="wrote"&gt;wrote&lt;/a&gt; in&lt;/span&gt;&lt;span&gt; 2004).  The model broadly offers two routes: gold and green. Gold open access  involves publication in an open access journal. The journal provides for  peer-review, retention of copyright by the author and in most cases  requires author-side fees. Green open access involves publishing a work  in an online repository, with/without peer-review. The models have  several variations, and adoption often depends on their suitability for a  particular discipline. Many &lt;/span&gt;&lt;span&gt;institutions &lt;a href="http://sparcopen.org/coapi/" rel="external nofollow" target="_blank" title="now have"&gt;now have&lt;/a&gt; an&lt;/span&gt; &lt;span&gt;Open Access Mandate policy&lt;/span&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Latest challenges to open access publishing&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For a 15-year-old movement  (formally), open access publishing is making a serious dent in the  market for scholarly publications. It has emerged as a formidable  competitor to the traditional model. How else do you explain the &lt;/span&gt;&lt;a href="https://www.techdirt.com/articles/20160718/02211935003/just-as-open-competitor-to-elseviers-ssrn-launches-ssrn-accused-copyright-crackdown.shtml" rel="external nofollow" target="_blank" title="unfortunate acquisition"&gt;&lt;span&gt;unfortunate acquisition&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of SSRN –&lt;/span&gt;&lt;span&gt; one  of the largest online open access repositories – by the largest  publisher of academic journals, Elsevier, earlier this year? Where,  within a few days of Elsevier gaining control, &lt;/span&gt;&lt;span&gt;users began to notice&lt;/span&gt; &lt;a href="https://www.techdirt.com/articles/20160718/02211935003/just-as-open-competitor-to-elseviers-ssrn-launches-ssrn-accused-copyright-crackdown.shtml" rel="external nofollow" target="_blank" title="problematic takedowns"&gt;&lt;span&gt;problematic takedowns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of articles on SSRN.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The acquisition was a severe blow to open access publishing. To be fair, there remain certain issues intrinsic to open access publishing models that need urgent resolution. For instance, while some open access journals provide high quality services at levels comparable to that of paywalled journals, a large majority has been unable to reach reasonable standards of publication.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Further, as it has emerged lately, many are yet to crack the business  model while a few are driven by malicious attempts to con authors. Most  commercial open access publishers have resorted to a system of levying  from the authors an article-processing charge (APC). These publishers  include large players such as the &lt;i&gt;Public Library of Science&lt;/i&gt; journals  and BioMed Central. APCs are justified as necessary costs for  publication. Thus, sometimes they are reasonably applied only to  peer-reviewed submissions. However, sometimes they are blatantly misused  by publishers who quote exorbitant APCs. As a result, APCs have become a  serious concern for the academic community, with the reentry of an  undesirable price barrier which has shifted the burden from the reader  to the author.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In one noteworthy development, the US  Federal Trade Commission (FTC) has filed a complaint against the OMICS  group for deceiving authors and misrepresenting its editorial quality.  The OMICS group has its roots in Hyderabad and runs a multitude of open  access journals. It carried a notorious reputation for soliciting  articles profusely, and then holding the articles hostage unless the  authors paid hefty fees for their publication. It apparently charged the  fees for conducting peer-review, which as this &lt;/span&gt;&lt;span&gt;harrowing&lt;/span&gt; &lt;a href="https://www.wired.com/2016/09/ftc-cracking-predatory-science-journals/" rel="external nofollow" target="_blank" title="account"&gt;&lt;span&gt;account&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of an author&lt;/span&gt;&lt;span&gt; reveals, was an utter sham. It also seems that the group targeted  unsuspecting scholars from developing countries, where there was a  higher concentration of early-career researchers eager to get their  works published.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Holding articles hostage and  releasing unchecked versions must have already caused irreparable damage  to several researchers’ reputations. In this day of web-caching and  -indexing facilities, one wonders if the researchers will ever be able  to obliterate linkages to their unchecked manuscripts. Further, in the  long run, this phenomenon will ruin or suppress promising careers –  especially from developing countries. As a result, the present &lt;/span&gt;&lt;span&gt;lack of diversity in top-rung academia&lt;/span&gt; &lt;a href="https://www.wired.com/2016/09/ftc-cracking-predatory-science-journals/" rel="external nofollow" target="_blank" title="may not be eliminated"&gt;&lt;span&gt;may not be eliminated&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for a long time.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Such harmful, predatory practices have not escaped the FTC’s notice, and it has stated that it will pursue cases of similar nature to protect authors and consumers. This is the first time in the world when a governmental authority has taken cognisance of predatory practices in OA publishing. This will hopefully lead to an appropriate cleansing effect of the players in this field, and enhance the credibility of open access journals.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Thus, self-regulation and standard-setting remains an area for improvisation in the open access publishing community. At the cusp of the movement, proposed structures were mired in legal and economic arguments. It is yet to overcome the challenge of economic sustainability and mature into a stable as well as replicable business model. The movement will be celebrating the Open Access Week for the ninth year later this month. It has gifted scholars immeasurably and lent itself to the progress of science and arts. Here’s hoping the community will iron out the remaining challenges to further strengthen the movement soon. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/the-wire-anubha-sinha-october-12-2016-why-open-access-has-to-look-up-for-academic-publishing-to-look-up'&gt;https://cis-india.org/openness/the-wire-anubha-sinha-october-12-2016-why-open-access-has-to-look-up-for-academic-publishing-to-look-up&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2016-10-12T16:22:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/news/first-post-naina-khedekar-october-10-2016-tech-for-the-blind-how-app-developers-can-help-end-the-disturbing-touchscreen-trend">
    <title>Tech for the blind: How app developers can help end the ‘disturbing touchscreen trend’</title>
    <link>https://cis-india.org/accessibility/news/first-post-naina-khedekar-october-10-2016-tech-for-the-blind-how-app-developers-can-help-end-the-disturbing-touchscreen-trend</link>
    <description>
        &lt;b&gt;At their introduction, touchscreens was so refreshing and how we had rushed to get those touch devices. Meanwhile, there was a separate world that came crashing down with the advent of touch enabled phones. Just like me, I’m sure not many may have thought how touchscreens almost ended the messaging ability of visually impaired. Now, with services moving from phone calls to online (services and apps), it’s getting more difficult.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Naina Khedekar was published in &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/tech-for-the-blind-how-app-developers-can-help-end-the-disturbing-touchscreen-trend-339542.html"&gt;First Post&lt;/a&gt; on October 10, 2016.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;We met Nirmita Narasimhan, a Policy Director at The Centre for Internet and Society (CIS) in Bengaluru, who has been instrumental in putting in place policies such as the copyright to benefit visually impaired. Nirmita is visually impaired herself, but that didn’t stop her from completing her law from Delhi University, and alongside she also completed her MA, M.Phil and PHD. While she is not writing policies or engaged in her passion for classical singing, she is busy playing a full time mom to two sons. But, it wasn’t easy, as back in 1995, when she was planning to pursue higher studies there weren’t many digital resources, and the ones like JAWS carried an outrageous price tag of $1000!&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Lack of digital resources and struggle to study&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nirmita grew up in Delhi and it was at the age of nine that she started developing the vision problem. Her vision kept deteriorating and as a student in a mainstream school, she struggled with studies. Her parents had to read out everything to her; and there was also a stage when she used to enlarge everything and photocopy it. But, she finished her 10th and 12th grades with the help of a writer, and without any resources for electronics or digital books.&lt;br /&gt;&lt;br /&gt;She then went on to learn German. However, soon realised that a translator cannot be dependent on someone else to read and look at the dictionary at all times. “You can’t have a career as a translator or interpreter if you need someone who knows German to constantly sit beside you and read to you all the time,” she explained. So, that put an end to her German sojourn.&lt;br /&gt;&lt;br /&gt;She then decided to study law, and says, probably was one of the only students to have passed without reading a single book from the library. She relied on notes and had to choose 5-6 questions as each answer needed a lot of reading. She completed law from Delhi University and simultaneously pursued per passion for music.&lt;br /&gt;&lt;br /&gt;It was after that reality dawned when no one was ready to offer her a job. After knocking all doors, from top firms to single advocates, she found it very difficult. She then started working for a blind advocate, but it wasn’t real work and she wasn’t getting paid for it. She later moved to Bengaluru, and after some research work with a law firm, she joined CIS.&lt;br /&gt;&lt;br /&gt;“CIS was a turning point. So, all the problems that I faced are the ones I want to fix, she said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction to software that could read out to users&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It was in her final year of studies around 2001, when a neighbour pointed out an article that spoke about a new software that reads out to users at the National association for the blind. Nirmita said the software was called Kurzweil 1000 wherein you could scan your books and it could read out to you. But books had to be of really good quality and the software cost Rs 50,000. After a long debate and financial crisis, she decided to go with it, as that was the only way to move ahead.&lt;br /&gt;&lt;br /&gt;She was excited with the free CD that was bundled called Literature 3.O that had 2000 books and kept her awake nights reading these books. Later, she also started using JAWS.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;‘Disturbing’ trend of touch phones&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It was around 2013, when the rest of the world was planning which touch smartphone to buy, it was a disturbing trend with mobile phones at least when blind and low visually persons are concerned. “Keyboards were gone. We got touch phones and it was a nightmare. There was nothing to feel. I am not comfortable text messaging even today. There is a screen reader on Android called Talkback, which is very good, but it works above a certain version, and all devices above that are touch phones. Moreover, it isn’t quite enough when you are outdoors and the voice input just doesn’t work,” she said.&lt;br /&gt;&lt;br /&gt;Blackberry had a QWERTY but screen reader was not that great and the iPhone wasn’t affordable, she adds. “Everyone was rushing to the market to buy second hand keyboard phones, but they didn’t support good reading technologies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Affordable software for blind, and support from leading OS makers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Easy availability, price and customer support have been a hindrance when it comes to software to assist blind. And the next agenda for Nirmita is building just that.&lt;br /&gt;&lt;br /&gt;In 2012, they got funding for a project to develop text to speech in Indian language and work at enhancing a screen reader dubbed non visual desktop access (NVDA). “It’s an open source project, a good solution that is scalable. People cannot afford JAWS and that will make it difficult for them to ever start using screen readers,” she added.&lt;br /&gt;&lt;br /&gt;Moreover, support for languages is another problem. JAWS only supports English and Hindi, and is a closed system with lack of India support.&lt;br /&gt;&lt;br /&gt;It was also a struggle earlier as the project is for a social cause and not a full-fledged company, and required special skill set as the open source works with Windows. “After a long time, we now have a team in IIT Delhi and there has been some work and improvement. Many of us have begun shifting to NVDA, and under hat project we have started undertaking training so that we can teach others. 10- 15 organisations run these training and we supports numerous regional languages including Hindi, Marathi, Konkani, Gujarati and more. So, still need refinement, but at least there’s something, she adds.&lt;br /&gt;&lt;br /&gt;“Now, we need to scale it, improve and train more people. The software can work on Android smartphones, irrespective of the display,” she said.&lt;br /&gt;&lt;br /&gt;While there is an app for everything, and many standalone apps have been built for the visually impaired, Nirmita calls in for universal app design. A principle that every time a product is built, designed or developed, it can be done in a way considering the blind. Yes, why a separate app, when developers can add support for the blind. Nirmita talks about the hindrances when trying to book a taxi from Ola and the inability to place orders from BigBasket. A set of standard rules could help iron out the creases. In govt procurement bills, accessibility should be made mandatory.&lt;br /&gt;&lt;br /&gt;Google and Apple OSes lead in the market, and if these OS makers add a mandate on how the same app should also assist the blind, a lot can change. “What is specially made is useful, but if what is made in an accessible manner then there won’t be two worlds,” she adds.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Copyright policy and other initiatives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The copyright policy may mean nothing to many of us, but for people with disability it was a big turning point. Some years ago the law said you cannot convert a book into any other format for people with disability, unless you get the permission of the publisher. So, if one lakh books were published in India, only minuscule 500-600 books were converted into braille or audio formats and these were usually text books.&lt;br /&gt;&lt;br /&gt;“We started campaigning that we have a right to read. We should be able to pick and convert any book we want. Whatever people are reading and talking in news we should be able to access it and children should get access to all such books, “she said.&lt;br /&gt;&lt;br /&gt;Nirmita explains how this isn’t a difficult task anymore, thanks to technology. It is simpler to convert and access these books. Yes, the problem of expensive technology still exists, but she along with a tech team has also begun working on that with new affordable software that could make it affordable for all. After struggling for almost 3-4 years, it was in 2012 that the new law was passed, allowing anyone with reading disabilities to convert any book into a format that helps them.&lt;br /&gt;&lt;br /&gt;Meanwhile, she is also working on how all websites should be accessible by all including the blind. With the emergence of e-governance, it is important for everyone to follow a standard that will help this happen. Explaining further, she said that there are standards for digital accessibility called Web Content Accessibility Guidelines (WCAG) and it came up with guidelines for Indian govt websites and a part of those dealt with accessibility. They have divided it into advisory and mandatory. And, accessibility comes under mandatory.&lt;br /&gt;&lt;br /&gt;Another initiative involved was teaming up with Universal Service Obligation Fund (USOF) |”Whenever you pay a telephone bill, a part of it goes to USOF and they are supposed to use it for communities underserved and in rural areas. We teamed up to assist visually impaired, and a pilot scheme was launched, “she explained further. However, it was a chase for the project and the output wasn’t as they had expected.&lt;br /&gt;&lt;br /&gt;Though copyright has solved the problem, we are still converting our own books, she added. There hasn’t been help. Opening an online digital library, wherein every time a publisher publishes a book, they can give a digital format that can help blind, which can then be shared with others.&lt;br /&gt;&lt;br /&gt;People in villages still use Braille. There also need to be training to teach them. And, the primary way to reach in rural areas with resource centres associated with organisations. Technology has made many things simpler, and a few standards could definitely help bridge the gap.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/news/first-post-naina-khedekar-october-10-2016-tech-for-the-blind-how-app-developers-can-help-end-the-disturbing-touchscreen-trend'&gt;https://cis-india.org/accessibility/news/first-post-naina-khedekar-october-10-2016-tech-for-the-blind-how-app-developers-can-help-end-the-disturbing-touchscreen-trend&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2016-10-10T12:46:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/factordaily-sunil-abraham-october-6-2016-services-like-twitterseva-are-not-the-silver-bullets-they-are-made-out-to-be">
    <title>Services like TwitterSeva aren’t the silver bullets they are made out to be </title>
    <link>https://cis-india.org/internet-governance/blog/factordaily-sunil-abraham-october-6-2016-services-like-twitterseva-are-not-the-silver-bullets-they-are-made-out-to-be</link>
    <description>
        &lt;b&gt;TwitterSeva is great, but it should not be considered a sufficient replacement for proper e-governance systems. This is because there are several serious shortcomings with the TwitterSeva approach, and it is no wonder that enthusiastic police officers and bureaucrats are somewhat upset with the slow deployment of e-governance applications. They are also right in being frustrated with the lack of usability and scalability of existing applications that hold out the promise of adopting private sector platforms to serve citizens better.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Centre for Internet         and Society, wrote this in response to the &lt;a href="http://factordaily.com/twitter-helping-india-reboot-public-services-publicly/" target="_blank"&gt;FactorDaily story&lt;/a&gt; on TwitterSeva, a         special feature developed by Twitter’s India team to help         citizens connect better with government services. Sunil's article in FactorDaily can be &lt;a class="external-link" href="http://factordaily.com/twitterseva-egovernance-public-services/"&gt;read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Let’s take a look at why the TwitterSeva approach is not adequate:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Vendor and Technology Neutrality:&lt;/b&gt; Providing a       level ground for competing technologies in e-governance has been a       globally accepted best practice for about 15 years now. This is       usually done by using open standards policies and interoperability       frameworks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does have a national open standards policy, but the       National Informatics Centre &lt;a href="http://www.nic.in/" target="_blank"&gt;(NIC)&lt;/a&gt; has only published one chapter of the       Interoperability Framework for e-Governance .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The thing is, while Twitter might be the preferred choice for       urban elites and the middle class, it might not be the choice of       millions of Indians coming online. By implicitly signaling to       citizens that Twitter complaints will be taken more seriously than       e-mail or SMS complaints, the government is becoming a salesperson       for Twitter. Ideally, all interactions that the state has with       citizens should be such that citizens can choose which vendor and       technology they would like to use. Ideally, the government should       have its own work-flow so that it can harvest complaints, feedback       and other communications from all social media platforms be it       Twitter or &lt;a href="https://identi.ca/" target="_blank"&gt;Identica&lt;/a&gt;,       Facebook or &lt;a href="https://joindiaspora.com/" target="_blank"&gt;Diaspora&lt;/a&gt;,       and publish responses back onto them.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;By implicitly signalling to citizens that Twitter complaints           will be taken more seriously than e-mail or SMS complaints,           the government is becoming a salesperson for Twitter&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Apart from undermining the power of choice for citizens, lack of       vendor and technology neutrality in government use of technology       undermines the efficient functioning of a competitive free market,       which is the bedrock of future innovation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When it comes to micro-blogging, Twitter has established a near       monopoly in India. There are no clear signs of harm and therefore       it would not be wise to advocate that the Competition Commission       of India investigate Twitter. However, if the government helps       Twitter tighten its grip over the Indian market, it is preventing       the next cycle of creative destruction and disruption. Therefore,       e-governance applications should ideally only “loosely couple”       with the APIs of private firms so that competition and innovation       are protected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Holistic Approach and Accountability:&lt;/b&gt; Ideally, as the Electronic Service Delivery Bill 2011 had       envisaged, every agency within the government was supposed to       (within 180 days of the enactment of the Act) do several things:       publish a list of services that will be delivered electronically       with a deadline for each service; commit to service-level       agreements for each service and provide details of the manner of       delivery; provide an agency-level grievance redressal mechanism       for citizens unhappy with the delivery of these electronic       services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notwithstanding the 180-day commitment, the Bill required that       “all public services shall be delivered in electronic mode within       five years” after the enactment of the Bill with a potential       three-year extension if the original deadline was not met. The       Bill also envisaged the constitution of a Central Electronic       Service Delivery Commission with a team of commissioners who       “monitor the implementation of this Bill on a regular basis” and       publish an annual report which would include “the number of       electronic service requests in response to which service was       provided in accordance with the applicable service levels and an       analysis of the remaining cases.”&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;The Electronic Service Delivery Bill 2011 had a much more           comprehensive and accountable plan for e-governance adoption           in the country&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Citizens suffering from non-compliance with the provisions of the       Bill and unsatisfied with the response from the agency level       grievance redressal mechanism could appeal to the Commission. The       state or central commissioners after giving the government       officials an opportunity to be heard were empowered to impose a       fine of Rs 5000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the piecemeal approach of TwitterSeva, the Bill had a much       more comprehensive and accountable plan for e-governance adoption       in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Right To Transparency:&lt;/b&gt; Some of the       interactions that the government has with citizens and firms may       have to be disclosed under the obligation emerging from the Right       to Information Act for disclosure to the public or to the       requesting party. Therefore it is important that the government       take its own steps for the retention of all data and records —       independent of the goodwill and lifecycles of private firms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter is only 10 years old. It took 10 years for Orkut to shut       down. Maybe Twitter will shut down in the next 10 years. How then       will the government comply with RTI requests? Even if the       government is not keen on pushing for data portablity as a right       for consumers (just like mobile number portability in telecom, so       that consumers can seamlessly shift between competing service       providers), it absolutely should insist on data portability for       all government use.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;Twitter is only 10 years old. It took 10 years for Orkut to           shut down. Maybe Twitter will shut down in the next 10 years.           How then will the government comply with RTI requests?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;This will allow it to shift to a) support multiple services, b)       shift to competing/emerging services c) incrementally build its       own infrastructure and also comply with the requirements of the       Right to Information Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. Privacy:&lt;/b&gt; Unfortunately, thanks to the       techno-utopians behind the Aadhaar project, the current government       is infected with “data ideology.” There is an obsession with       collecting as much data as possible from citizens, storing it in       centralized databases and providing “dashboards” to bureaucrats       and politicians. This is diametrically opposed to the view of the       security community.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;Unfortunately, thanks to the techno-utopians behind the           Aadhaar project, the current government is infected with “data           ideology”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;For example, Bruce Schneier posted on his blog in March this year       (in a piece titled ‘&lt;a href="https://www.schneier.com/blog/archives/2016/03/data_is_a_toxic.html" target="_blank"&gt;Data is a Toxic Asset&lt;/a&gt;‘) saying: “What all       these data breaches are teaching us is that data is a toxic asset       and saving it is dangerous. This idea has always been part of the       data protection law starting with the 2005 EU Data Protection       Directive expressed as the principle of “Data Minimization” or       “Collection Limitation”. More recently technologists and policy       makers also use the phrase “Privacy by Design”. Introducing an       unnecessary intermediary or gate-keeper between what is       essentially transactions between citizens and the state is an       egregious violation of a key privacy principle.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Middle Class and Elite Capture:&lt;/b&gt; The use of       Twitter amplifies the voices of the English-speaking, elite, and       middle class citizens at the expense of the voices of the poor.       While elites don’t exhibit fear when tagging police IDs and making       public complaints from the comforts of their gated communities       with private security guards shielding them the violence of the       state, this might be a very intimidating option for the poor and       disempowered.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;While elites don’t fear tagging police IDs and making public           complaints from the comforts of their gated communities,           it’s intimidating for the disempowered&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;While the system may not be discriminatory in its design, it will       have disparate impact on different sections of our society. In       other words, the introduction of TwitterSeva will exacerbate power       asymmetries in our society rather than ameliorating them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The canonical scholarly reference for this is Kate Crawford’s &lt;a href="https://hbr.org/2013/04/the-hidden-biases-in-big-data" target="_blank"&gt;analysis&lt;/a&gt; of City of Boston’s StreetBump       smartphone, which resulted in an over-reporting of potholes in       elite neighbourhoods and under-reporting from poor and elderly       residents. This meant that efficiency in the allocation of the       city’s resources was only a cover for increased discrimination       against the powerless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. Security:&lt;/b&gt; The most important conclusion to       draw from the Snowden disclosure is that the tin-foil conspiracy       theorists who we used to dismiss as lunatics were correct. What       has been established beyond doubt is that the United States of       America is the world leader when it comes to conducting mass       surveillance on netizens across the globe. It is still completely       unclear how much access the NSA has to the databases of American       social media giants. When the complete police force of a state       starts to use Twitter for the delivery of services to the public,       then it may be possible for foreign intelligence agencies to use       this information to undermine our sovereignty and national       security.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/factordaily-sunil-abraham-october-6-2016-services-like-twitterseva-are-not-the-silver-bullets-they-are-made-out-to-be'&gt;https://cis-india.org/internet-governance/blog/factordaily-sunil-abraham-october-6-2016-services-like-twitterseva-are-not-the-silver-bullets-they-are-made-out-to-be&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-06T16:31:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/india-round-table-icmec-background-note.pdf">
    <title>India Round-table ICMEC Background Note</title>
    <link>https://cis-india.org/internet-governance/files/india-round-table-icmec-background-note.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/india-round-table-icmec-background-note.pdf'&gt;https://cis-india.org/internet-governance/files/india-round-table-icmec-background-note.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-10-05T15:04:37Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/open-source-mayank-sharma-october-3-2016-indian-language-localization-community-meets-in-new-delhi">
    <title>Indian language localization community meets in New Delhi</title>
    <link>https://cis-india.org/openness/news/open-source-mayank-sharma-october-3-2016-indian-language-localization-community-meets-in-new-delhi</link>
    <description>
        &lt;b&gt;Localization is one of the less glamorous aspects of computing. Despite the fact that less than 6% of the world speaks English, a majority of projects don't feel inclined to accommodate the rest of the population. One of the primary reasons for sticking to English is the steep learning curve and the lack of standardization in various aspects of the localization process.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The post by Mayank Sharma was &lt;a class="external-link" href="https://opensource.com/life/16/10/gilt-conference"&gt;published by Opensource.com&lt;/a&gt; on October 3, 2016. Dr. U.B. Pavanaja was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://fuelproject.org/" target="_blank"&gt;FUEL Project&lt;/a&gt; organized the &lt;a href="http://gilt.fuelproject.org/" target="_blank"&gt;GILT conference&lt;/a&gt; in New Delhi, India September 24-25 to highlight and address these  issues. The annual event showcases the efforts of language technology  organizations and volunteer communities, but this year's also gave a  platform for non-technical users to voice their concerns. The Indic  computing developers were joined by academics, reporters, language  researchers, publishers, and entrepreneurs who rely on localization  tools to connect and interact with audiences in the various regional  languages in India. The brainstorming between the two groups, both on  and off the stage, was one of the highlights of the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img height="236" src="https://opensource.com/sites/default/files/resize/group_1-520x236.jpg" width="520" /&gt; &lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;sup&gt;Mozilla ran a two-day hackathon  alongside the conference that was attended by teams from India, Nepal  and Germany. Photo by Rajesh Ranjan. All Rights Reserved.&lt;/sup&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Focus on standardization&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Another recurring theme discussed in detail at the conference was the  need for standardization. The FUEL Project spearheads standardization  efforts with its terminology management system to preserve consistency  across translations. The project also created translation style guides  for various languages, including Spanish, German, French, Scottish  Gaelic, and several Indian languages. In addition to these guides, the  project is also working on a couple of tools to help maintain the  accuracy of the translations. One that caught the attention of the  translators at the conference is the Unicode Text Rendering Reference  System (UTRRS). It's a web app that lets you enter a character, word, or  phrase and then compares it to a reference image generated by a text  rendering engine.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The current state of localization&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The conference began with an inaugural address by the keynote  speakers. Rajesh Ranjan, who heads the FUEL Project and is currently the  open source community manager at the Indian Government's National  eGovernance Division (NeGD), kicked things off by talking about the  evolution of the 8-year-old project. There was also an enlightening  address by Jeff Beatty, who heads localization efforts at Mozilla. He  talked about the role of his alma mater, the University of Limerick, in  the initiation and growth of multilingual computing. Later, Vinay  Thakur, director of project development at NeGD, discussed the Indian  Government's increased interest in localization and listed the various  initiatives currently underway.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was also reiterated by Mahesh Kulkarni, assistant director at  CDAC's GIST research labs. He talked about the scale of the government's  plan for making all its official websites available in all the  officially recognized 22 Indian languages.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Addressing problems&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Kulkarni also chaired a panel discussion later in the day. The panel  members talked about the issues plaguing the localization community and  what it would take to solve them. Sudhanwa Jogalekar, a well-respected  contributor to Indic computing, suggested that translators should get  ISO certified as a first step toward standardization. Jogalekar pointed  to the ISO 7001:2015 standard, which certifies conformity in translation  services. Another panel member, Prabhat Ranjan, executive director of  the technology think tank TIFAC, talked about the stress on translation  in the Vision 2035 document recently released by the Indian Prime  Minister Narendra Modi. Ranjan's team found English to Hindi translation  easier when documents are first translated into another Indian  language. Based on this experience, Ranjan bounced the idea of agreeing  on a meta language to ease the translation process.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;A chat with the Document Foundation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The conference also had a video conference session by the Document  Foundation's Italo Vignoli about LibreOffice. While the talk was fairly  overview-ish the Q&amp;amp;A generated some valuable suggestions that  Vignoli promised to take up with the LibreOffice developers. One of the  concerns raised by Pavanaja U.B. was that localizing the office suite  was a cumbersome process, as it involved recompiling the entire  application. Pavanaja, who is well-known in the localization community  for creating the Kannada version of the Logo programming language,  requested Vignoli ask LibreOffice developers to brainstorm a less  tedious process for the localizers. Later in the day, Pavanaja also  talked about his experience localizing Wikipedia in Kannada and Tulu  languages.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Unicode&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;img height="292" src="https://opensource.com/sites/default/files/resize/karunakar-520x292.jpg" width="520" /&gt; &lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;sup&gt;Karunakar G demos an in-development spell checker for the Hindi language. Photo by Mayank Sharma. &lt;a href="https://creativecommons.org/licenses/by/3.0/" target="_blank"&gt;CC-BY 3.0&lt;/a&gt;.&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second day began with a session on the evolution and current  status of the Unicode standard. It was delivered by Karunakar G, one of  the stalwarts of the Indic localization community. A longtime  localization developer, Karunakar also demoed the support for Indian  languages in LibreOffice. He highlighted a few missing features, such as  the lack of an Indic thesaurus and autocorrect functionality.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Sailfish OS&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Karunakar was followed by Raju Vindane, who introduced the audience to the &lt;a href="https://sailfishos.org/" target="_blank"&gt;Sailfish OS&lt;/a&gt;. He also demoed the only Sailfish OS phone available in the Indian market, the &lt;a href="https://en.wikipedia.org/wiki/Aqua_Fish" target="_blank"&gt;Intex Aqua&lt;/a&gt;,  which retails for about $90. Vindane mentioned that while the community  is encouraged to contribute and improve the Indic translations to the  Sailfish OS project, these wouldn't be included in the Indian phone, as  Intex does its translations in-house.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Other highlights&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;img height="292" src="https://opensource.com/sites/default/files/resize/ryan-520x292.jpg" width="520" /&gt; &lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;sup&gt;Ryan Northey asks the community to explore the use of XLIFF (XML Localization Interchange File Format). Photo by Mayank Sharma. &lt;a href="https://creativecommons.org/licenses/by/3.0/" target="_blank"&gt;CC-BY 3.0&lt;/a&gt;.&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The day also had introductory presentations by Ryan Northey, lead  developer at Translate House, and Satdeep Gill from the WikiTongues  project. Northey mentioned that there's been a disconnect between  software development and localization, and that going forward  localization should become a part of the software development cycle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the scheduled sessions, there were several fruitful  discussions during lunch and tea breaks. The presentation-free exchange  of gray matter between the stalwarts and the young padawans were a  delight to witness. The 2016 edition of the GILT conference helped bring  together longtime developers and experts from the government with niche  communities and individuals working on different aspects of  localization in various parts of the country. The conference ended with  the participants hoping that the Government's increased focus on  localization would translate into a considerable leap in the quality and  quantity of localized content and localization tools.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/open-source-mayank-sharma-october-3-2016-indian-language-localization-community-meets-in-new-delhi'&gt;https://cis-india.org/openness/news/open-source-mayank-sharma-october-3-2016-indian-language-localization-community-meets-in-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-10-03T13:26:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
