<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 501 to 515.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/project-tiger-2019-coordinator-position-open"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/project-tiger-2019-co-ordinator-position-open"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/programme-officer-privacy-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/programme-officer-digital-identity-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/programme-for-competition-law-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/programme-booklet.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/programme-associate-graphic-designer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/programme-associate-communications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/professor-balaram-talks-open-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/privacy-pornography-sexuality-a-video"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/privacy-v-transparency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/privacy-newsletter-february-2017.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-meeting-brussels-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/project-tiger-2019-coordinator-position-open">
    <title>Project Tiger 2019 Coordinator position open</title>
    <link>https://cis-india.org/a2k/project-tiger-2019-coordinator-position-open</link>
    <description>
        &lt;b&gt;To contribute to support, and coordinate of the work of the Project Tiger, we are looking for a creative, dedicated individual to join the team as a coordinator. Please note that women, especially those from socioeconomically marginalized communities, and women who are returning to work after a hiatus will be given preference.&lt;/b&gt;
        
&lt;h2 id="docs-internal-guid-01812897-7fff-d2bd-9fd3-137f0bc1811c" dir="ltr"&gt;Project Background&lt;/h2&gt;
&lt;p dir="ltr"&gt;In India, Wikipedia exists in&lt;a href="http://wiki.wikimedia.in/List_of_Indian_language_wiki_projects"&gt; 23 Indian languages&lt;/a&gt;. All of these Wikipedias are in the early growth phase having a range of articles from few thousands to 100,000+ articles. The typical size of an Indian language community is only to have around or less than 100 people making 5+ edits every month. While there are many social economic and technical reasons for the size and activity of the Indian language communities, learnings from successful projects in the past have demonstrated that we can provide specific interventions to support these communities.&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Many active Indian language Wikipedia editors tend to contribute more actively when they are provided support for contributing equipment and internet expenses. This was evident from the success of the pilot program&lt;a href="http://wiki.wikimedia.in/Equipment_Lending_and_Community_Support"&gt; initiated by the Wikimedia India chapter&lt;/a&gt;. The recently launched&lt;a href="https://meta.wikimedia.org/wiki/Hardware_donation_program"&gt; hardware donation program&lt;/a&gt; also had a lot of interest from the Indian region.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Wikipedia communities usually show interest participating in contests and edit-a-thons. Well known examples are&lt;a href="https://meta.wikimedia.org/wiki/Wikipedia_Asian_Month"&gt; Wikipedia Asian Month&lt;/a&gt;,&lt;a href="https://meta.wikimedia.org/wiki/WikiConference_India_2016/Punjab_Edit-a-thon"&gt; Punjab edit-a-thon&lt;/a&gt;,&lt;a href="https://meta.wikimedia.org/wiki/Women%27s_History_Month-2016"&gt; Women’s history month&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;More than 80% edits of all Wikipedias are made by around 2% editors of the community. While many editing promotion activities aspire to attract new editors who are hard to retain, we can sustain more editing activity by empowering existing active editors.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;Combining these insights, we propose to create locally relevant and high-quality content in Indian languages by launching this pilot program which will (a) support active and experienced Wikipedia editors through the donation of laptops and stipends for internet access and (b) sponsor a language-based contest that aims to address existing Wikipedia content gaps.&lt;/p&gt;
&lt;h2 dir="ltr"&gt;Responsibilities&lt;/h2&gt;
&lt;p dir="ltr"&gt;The CIS-A2K team is primarily based in the Bangalore office of CIS, and the Project Tiger coordinator, henceforth PTC, will be expected to work out of the same office.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;To support and drive outreach of the work being done by the CIS-A2K team, the PTC will be responsible includes but not limited to:&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Supporting Project tiger related communication, documentation and coordination&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Supporting Project Tiger Chromebook disbursal.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Supporting internet stipend distribution and reimbursement.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Supporting creation and updation of statistics.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Feedback collection and surveys.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Logistics coordination of offline events.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;&amp;nbsp;Characteristics of a coordinator&lt;/h2&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Accountability&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Awareness and sensitivity regarding issues of gender and sexuality&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Critical appreciation of open knowledge initiatives&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Effective communication&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Inclusive collaboration&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Intellectual curiosity and openness&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Respect for diversity&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Strong cross-cultural competency&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Ability to learn-at-work, especially about the Wikimedia ecosystem&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h2 dir="ltr"&gt;Eligibility criteria&lt;/h2&gt;
&lt;p dir="ltr"&gt;These are the eligibility criteria&lt;/p&gt;
&lt;h3 dir="ltr"&gt; Basic criteria&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Graduate in any discipline&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Fluent in English and excellent communication skills in English and working knowledge (or better) of at least one other Indian language
&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&amp;nbsp;Technical&lt;/h3&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Basic understanding of functioning of Wikipedia, and ideally of other Wikimedia projects too&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h2 dir="ltr"&gt;Location and Remuneration&lt;/h2&gt;
&lt;p dir="ltr"&gt;The position is based out of the Bangalore office of CIS.&lt;/p&gt;
&lt;p dir="ltr"&gt;Monthly remuneration will be decided after selection. Expected monthly remuneration is around INR 28,000. As this is a consultant position, no other benefit is available&lt;/p&gt;
&lt;h2 dir="ltr"&gt;Application Process&lt;/h2&gt;
&lt;p dir="ltr"&gt;We invite interested (and eligible) candidates to apply for the position before 10 June 2019 sending us the following documents to tito+ptc2019@cis-india.org (do not miss +ptc2019 part from the email id, it is a filter for us) with “Application for Project Tiger (Coordinator)” as the subject:&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Cover letter (2 pages): This should introduce your relevant academic, professional, and other experiences, and describe the kind of work you look forward to do as part of the CIS-A2K team. We strongly recommend reading the Supporting Indian Language Wikipedia Project page[&lt;a href="https://meta.wikimedia.org/wiki/Supporting_Indian_Language_Wikipedias_Program"&gt;1&lt;/a&gt;] on Meta while writing this cover letter, as well as for preparation for the interview to follow (if you are shortlisted for interview).&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;CV: This should provide details of your academic, professional, and other achievements&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Footnotes:&lt;/h3&gt;
[1] - &lt;a href="https://meta.wikimedia.org/wiki/Supporting_Indian_Language_Wikipedias_Program"&gt;https://meta.wikimedia.org/wiki/Supporting_Indian_Language_Wikipedias_Program&lt;/a&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/project-tiger-2019-coordinator-position-open'&gt;https://cis-india.org/a2k/project-tiger-2019-coordinator-position-open&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gopala</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-06-10T15:29:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/project-tiger-2019-co-ordinator-position-open">
    <title>Project Tiger 2019 Coordinator position open</title>
    <link>https://cis-india.org/jobs/project-tiger-2019-co-ordinator-position-open</link>
    <description>
        &lt;b&gt;To contribute to support, and coordinate of the work of the Project Tiger, we are looking for a creative, dedicated individual to join the team as a coordinator. Please note that women, especially those from socioeconomically marginalized communities, and women who are returning to work after a hiatus will be given preference.&lt;/b&gt;
        
&lt;h2 id="docs-internal-guid-01812897-7fff-d2bd-9fd3-137f0bc1811c" style="text-align: justify;" dir="ltr"&gt;Project Background&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In India, Wikipedia exists in&lt;a href="http://wiki.wikimedia.in/List_of_Indian_language_wiki_projects"&gt; 23 Indian languages&lt;/a&gt;. All of these Wikipedias are in the early growth phase having a range of articles from few thousands to 100,000+ articles. The typical size of an Indian language community is only to have around or less than 100 people making 5+ edits every month. While there are many social economic and technical reasons for the size and activity of the Indian language communities, learnings from successful projects in the past have demonstrated that we can provide specific interventions to support these communities.&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Many active Indian language Wikipedia editors tend to contribute more actively when they are provided support for contributing equipment and internet expenses. This was evident from the success of the pilot program&lt;a href="http://wiki.wikimedia.in/Equipment_Lending_and_Community_Support"&gt; initiated by the Wikimedia India chapter&lt;/a&gt;. The recently launched&lt;a href="https://meta.wikimedia.org/wiki/Hardware_donation_program"&gt; hardware donation program&lt;/a&gt; also had a lot of interest from the Indian region.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Wikipedia communities usually show interest participating in contests and edit-a-thons. Well known examples are&lt;a href="https://meta.wikimedia.org/wiki/Wikipedia_Asian_Month"&gt; Wikipedia Asian Month&lt;/a&gt;,&lt;a href="https://meta.wikimedia.org/wiki/WikiConference_India_2016/Punjab_Edit-a-thon"&gt; Punjab edit-a-thon&lt;/a&gt;,&lt;a href="https://meta.wikimedia.org/wiki/Women%27s_History_Month-2016"&gt; Women’s history month&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;More than 80% edits of all Wikipedias are made by around 2% editors of the community. While many editing promotion activities aspire to attract new editors who are hard to retain, we can sustain more editing activity by empowering existing active editors.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Combining these insights, we propose to create locally relevant and high-quality content in Indian languages by launching this pilot program which will (a) support active and experienced Wikipedia editors through the donation of laptops and stipends for internet access and (b) sponsor a language-based contest that aims to address existing Wikipedia content gaps.&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Responsibilities&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The CIS-A2K team is primarily based in the Bangalore office of CIS, and the Project Tiger coordinator, henceforth PTC, will be expected to work out of the same office.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To support and drive outreach of the work being done by the CIS-A2K team, the PTC will be responsible includes but not limited to:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Supporting Project tiger related communication, documentation and coordination&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Supporting Project Tiger Chromebook disbursal.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Supporting internet stipend distribution and reimbursement.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Supporting creation and updation of statistics.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Feedback collection and surveys.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Logistics coordination of offline events.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h2 style="text-align: justify;"&gt;Characteristics of a coordinator&lt;/h2&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Accountability&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Awareness and sensitivity regarding issues of gender and sexuality&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Critical appreciation of open knowledge initiatives&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Effective communication&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Inclusive collaboration&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Intellectual curiosity and openness&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Respect for diversity&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Strong cross-cultural competency&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Ability to learn-at-work, especially about the Wikimedia ecosystem&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Eligibility criteria&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;These are the eligibility criteria&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Basic criteria&lt;/h3&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Graduate in any discipline&lt;/li&gt;
&lt;li&gt;Fluent in English and excellent communication skills in English and working knowledge (or better) of at least one other Indian language &lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;Technical&lt;/h3&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Basic understanding of functioning of Wikipedia, and ideally of other Wikimedia projects too&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Location and Remuneration&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The position is based out of the Bangalore office of CIS.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Monthly remuneration will be decided after selection. Expected monthly remuneration is around INR 28,000. As this is a consultant position, no other benefit is available&lt;/p&gt;
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Application Process&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We invite interested (and eligible) candidates to apply for the position before 7 June 2019 sending us the following documents to tito+ptc2019@cis-india.org (do not miss +ptc2019 part from the email id, it is a filter for us) with “Application for Project Tiger (Coordinator)” as the subject:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Cover letter (2 pages): This should introduce your relevant academic, professional, and other experiences, and describe the kind of work you look forward to do as part of the CIS-A2K team. We strongly recommend reading the Supporting Indian Language Wikipedia Project page[&lt;a href="https://meta.wikimedia.org/wiki/Supporting_Indian_Language_Wikipedias_Program"&gt;1&lt;/a&gt;] on Meta while writing this cover letter, as well as for preparation for the interview to follow (if you are shortlisted for interview).&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;CV: This should provide details of your academic, professional, and other achievements&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Footnotes:&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;[1] - &lt;a href="https://meta.wikimedia.org/wiki/Supporting_Indian_Language_Wikipedias_Program"&gt;https://meta.wikimedia.org/wiki/Supporting_Indian_Language_Wikipedias_Program&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/project-tiger-2019-co-ordinator-position-open'&gt;https://cis-india.org/jobs/project-tiger-2019-co-ordinator-position-open&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gopala</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-05-27T06:28:38Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/programme-officer-privacy-2019">
    <title>Programme Officer - Privacy</title>
    <link>https://cis-india.org/jobs/programme-officer-privacy-2019</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) is seeking applications for the position of Programme Officer, to undertake public policy research on privacy and related themes. For this position, we will hire one full time researcher, to be based in the Delhi office of CIS, for the duration of one year.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;To apply for this position please write to amber@cis-india.org along with a CV, two writing samples and contact details of two references, Interested candidates are invited to send their applications at the earliest — latest by April 30th.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Organisation Profile&lt;/h3&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa. Through its diverse initiatives, CIS explores, intervenes in, and advances contemporary discourse and practices around internet, technology and society in India, and elsewhere.&lt;/p&gt;
&lt;h3&gt;Privacy Research at CIS&lt;/h3&gt;
&lt;p&gt;While privacy has been a key subject of study for digital rights and development organisations in India for the last decade, recent and ongoing legal and policy developments have placed this issue at the forefront of human rights and regulatory research. CIS has conducted extensive research into the areas of privacy, data protection, data security, and was also a member of the Committee of Experts constituted under Justice A P Shah. CIS has also been cited multiple times in the Report of the Committee of Experts led by Justice Srikrishna. CIS values the fundamental principles of justice, equality, freedom and economic development and strongly advocates the right to privacy.&lt;/p&gt;
&lt;p&gt;Over the next year, CIS intends to look at several research questions on data protection which may include the global experience with privacy enforcement, need for effective redressal mechanisms, documenting the design of business models and data flows, regulation of social media big data, how data of disadvantaged groups including children may be protected. Additionally, while we now have the Supreme Court’s unanimous and emphatic recognition of the fundamental right to privacy, there is a need for research enquiry into several issues such as a clarification of  the scope of the Puttaswamy judgment, unpacking the different dimensions of privacy, how state actions interact with privacy.&lt;/p&gt;
&lt;h3&gt;The Role&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Research and analysis: Literature review, policy design, detailed analysis of research topics&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Knowledge management: Staying up-to-date on developments of interest to the project, and sharing/debating these with the team. Contributing to documentary and knowledge management processes&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Policy outreach and stakeholder engagement: Supporting the project manager in the dissemination of research findings in innovative formats. Attending, planning and executing events&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Writing op-eds, short notes, policy briefs and longer form academic writing for a range of audiences&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Presentations and formal discussions: Preparing and delivering presentations to various audiences&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Helping manage communications with stakeholders including international experts, regulators and policy makers&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Managing interns and team: Managing work outputs with our interns; coordinating research with team members and the project manager&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Qualifications and Skills&lt;/h3&gt;
&lt;p&gt;We are looking for professionals from law, regulatory theory and public policy backgrounds.&lt;/p&gt;
&lt;p&gt;We are looking for candidates who are interested in studying the regulatory challenges of notice and consent, state capacity, how business models thwart privacy and the future of privacy post Puttaswamy.&lt;/p&gt;
&lt;p&gt;This is a full-time position based out of Delhi. The position is for a duration of one year. Salary will be commensurate with qualifications and experience.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/programme-officer-privacy-2019'&gt;https://cis-india.org/jobs/programme-officer-privacy-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-04-15T06:53:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/programme-officer-digital-identity-2019">
    <title>Programme Officer - Digital Identity</title>
    <link>https://cis-india.org/jobs/programme-officer-digital-identity-2019</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) is seeking applications for the position of Programme Officer, to be associated with a two year long research project on digital identity. We may hire up to three Programme Officers as part of this project. The position is full time and will be based in the Delhi office of CIS. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;To apply for this position please write to amber@cis-india.org along with a CV, two writing samples and contact details of two references. Interested candidates are invited to send their applications at the earliest - latest by April 15th.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Organisation Profile&lt;/h3&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa. Through its diverse initiatives, CIS explores, intervenes in, and advances contemporary discourse and practices around internet, technology and society in India, and elsewhere.&lt;/p&gt;
&lt;h3&gt;About Digital Identity Project&lt;/h3&gt;
&lt;p&gt;We are embarking on a two year research project on digital identity. As governments across the globe are implementing new, digital foundational identification systems or modernizing existing ID programs, there is a dire need for greater research and discussion about appropriate design choices for a digital identity framework. There is significant momentum on digital ID, especially after the adoption of UN Sustainable Development Goal 16.9, which calls for legal identity for all by 2030. Instances of emerging  new digital identity schemes include national projects in Algeria, Belgium (mobile ID), Cameroon, Ecuador, Jordan, Kyrgyzstan, Italy, Iran, Japan, Senegal, Thailand, Turkey, major announcements in Afghanistan, ​Denmark, the Netherlands, Bulgaria, the Maldives, Norway, Liberia, Poland, Jamaica, Sri​ Lanka, Zambia and a pilot scheme in Myanmar.&lt;/p&gt;
&lt;p&gt;The nature of choices made towards the creation of a digital identity system have significant consequences for privacy, security, inclusivity, scalability, fraud-detection capabilities and implementation costs of the framework. These choices exist in the context of a complex set of political, legal, technological, economic, and societal factors. In this project we will be looking at technical policy options and appropriate uses of a digital identity ecosystem.&lt;/p&gt;
&lt;h3&gt;The Role&lt;/h3&gt;
&lt;p&gt;Your role will require you to work closely with our team on research and policy analysis, and to engage with external researchers from whom we will commission research. Doing so will involve the following activities.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Interdisciplinary research and analysis: Literature review, policy design, detailed analysis on topics including technology design options and appropriate uses of digital identity systems;&lt;/li&gt;
&lt;li&gt;Policy dissemination and stakeholder engagement: Supporting the Project Manager in the dissemination of research findings in innovative formats, as well as attending, planning, and executing events;&lt;/li&gt;
&lt;li&gt;Writing op-eds, short notes, policy briefs and longer form academic writing for a range of audiences;&lt;/li&gt;
&lt;li&gt;Presentations and formal discussions: Preparing and delivering presentations to various audiences;&lt;/li&gt;
&lt;li&gt;Helping manage communications with stakeholders including international experts, regulators and policy makers;&lt;/li&gt;
&lt;li&gt;Knowledge management: Staying up-to-date on developments of interest to the Initiative, and sharing and debating these with the team;&lt;/li&gt; 
&lt;li&gt;Contributing to documentary and knowledge management processes; and&lt;/li&gt;
&lt;li&gt;Managing interns and team: Managing work outputs with our interns, and coordinating research with team members and the Project Manager.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Qualifications and Skills&lt;/h3&gt;
&lt;p&gt;We are looking for up to three professionals who may come from the following backgrounds: law, regulatory theory, public policy, economics, ethics, technology and development studies.&lt;/p&gt;
&lt;p&gt;We are looking for candidates who can exhibit constructive problem-solving skills, sound analytical and critical thinking skills, with the ability to analyse issues from first principles and develop solutions.&lt;/p&gt;
&lt;p&gt;This is a full-time position based out of Delhi. The position is for a duration of two years. Salary will be commensurate with qualifications and experience.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/programme-officer-digital-identity-2019'&gt;https://cis-india.org/jobs/programme-officer-digital-identity-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    

   <dc:date>2019-03-29T11:02:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/programme-for-competition-law-and-policy">
    <title>Programme for Competition Law and Policy</title>
    <link>https://cis-india.org/internet-governance/files/programme-for-competition-law-and-policy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/programme-for-competition-law-and-policy'&gt;https://cis-india.org/internet-governance/files/programme-for-competition-law-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-07-04T16:20:52Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/programme-booklet.pdf">
    <title>Programme Booklet</title>
    <link>https://cis-india.org/internet-governance/blog/programme-booklet.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/programme-booklet.pdf'&gt;https://cis-india.org/internet-governance/blog/programme-booklet.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-11-20T04:30:25Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/programme-associate-graphic-designer">
    <title>Programme Associate (Graphic designer)</title>
    <link>https://cis-india.org/jobs/programme-associate-graphic-designer</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is seeking applications for the position of Programme Associate (Graphic designer), to support its Access to Knowledge (CIS-A2K) Programme. In keeping with efforts within the larger Wikimedia movement in encouraging an inclusive workplace and addressing issues of gender disparity

Women applicants are encouraged for this position, however this position for anyone to apply. 
&lt;/b&gt;
        
&lt;h2 style="text-align: justify;" dir="ltr"&gt;Context of the CIS-A2K programme&lt;/h2&gt;
&lt;div&gt;
&lt;p id="docs-internal-guid-8d18f614-7fff-d5c4-be6d-28f3f764eb25" style="text-align: justify;" dir="ltr"&gt;As an affiliate of the Wikimedia Foundation, the nonprofit behind Wikipedia and it’s sister projects, we design and implement different initiatives with an aim to create high-quality content and bring new contributors to Wikimedia projects in Indian languages. The initiatives are premised on various themes and seek to create a multilingual repository of knowledge using Wikimedia projects as a platform. You are encouraged to carefully read through the CIS-A2K work plan before making the application. You will work cohesively with the Wikimedia community and the Wikimedia India communities to meet the specific goals of each language community in India. You will be a part of a small team of 5 to 10 members doing high visibility and high impact work. Please learn more about CIS-A2K &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;span id="docs-internal-guid-5f922da4-7fff-0183-8ade-361428615ad1"&gt;Position summary&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-e54fd5f7-7fff-2831-5ae2-6fc620fbad9f"&gt;CIS-A2K is looking for an ideal candidate who will help the program as a graphic designer, the work will include creating and preparing graphic content such as images, media files etc related to the A2K programme. This will be a full-time position, based at the CIS office in Bengaluru. and. The designation will be Programme Associate (PA) &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-e54fd5f7-7fff-2831-5ae2-6fc620fbad9f"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span id="docs-internal-guid-e54fd5f7-7fff-2831-5ae2-6fc620fbad9f"&gt;Responsibilities&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;span id="docs-internal-guid-e54fd5f7-7fff-2831-5ae2-6fc620fbad9f"&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;&lt;span id="docs-internal-guid-e54fd5f7-7fff-2831-5ae2-6fc620fbad9f"&gt;Creating images, posters, banners, infographics, and other promotional materials for events and announcements, which will be circulated on social media channels and used in reports. &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="docs-internal-guid-e54fd5f7-7fff-2831-5ae2-6fc620fbad9f"&gt;Strategising and designing reports (progress reports, impact reports, and proposal forms), and newsletters,  to make them more accessible.&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="docs-internal-guid-e54fd5f7-7fff-2831-5ae2-6fc620fbad9f"&gt;Helping and working with Wikimedia community members to create relevant visual content.  &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="docs-internal-guid-e54fd5f7-7fff-2831-5ae2-6fc620fbad9f"&gt;Developing illustrations, logos, and other graphic material digitally or by hand.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;h2 id="docs-internal-guid-23c03375-7fff-ac7a-61f8-81e6ae57f6c5" style="text-align: justify;" dir="ltr"&gt;Required skills&lt;/h2&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Proven experience with graphic design (note related education qualification is a plus, but not mandatory)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;A strong portfolio of illustrations and visual communication material&lt;/li&gt;&lt;li&gt;The person must have good experience in creating and preparing graphic content using design software like Adobe Creative Suite, Inkscape, and GIMP (free software usage experience will be preferable)&lt;/li&gt;&lt;li&gt;Relevant degree holders will be given preference. &lt;/li&gt;&lt;li&gt;Prior knowledge of working with open knowledge or open-source community will be a plus.&amp;nbsp; &lt;/li&gt;&lt;li&gt;Candidates who are part of the Wikimedia community,&amp;nbsp; or who have experience in contributing to Wikimedia projects will be given preference. &lt;/li&gt;&lt;li&gt;Ability to work methodically and meet deadlines.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Location: The position is based out of the CIS’s Bangalore office.&lt;br /&gt;Remuneration: Compensation structure will be determined by the level of expertise, experience and current remuneration. &lt;br /&gt;To apply, please send your resume and cover letter to Tito Dutta (tito+gd@cis-india.org) by 24 May 2020 11:59 pm IST (applications won't be accepted after the deadline)&lt;/div&gt;
&lt;div&gt;Please do not miss the +gd part in the email, that is an email filter for us)&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-e54fd5f7-7fff-2831-5ae2-6fc620fbad9f"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/programme-associate-graphic-designer'&gt;https://cis-india.org/jobs/programme-associate-graphic-designer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gurshabad</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-05-12T16:01:42Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/programme-associate-communications">
    <title>Programme Associate (Communications)</title>
    <link>https://cis-india.org/jobs/programme-associate-communications</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is seeking applications for the position of Programme Associate (Communications), to support its Access to Knowledge (CIS-A2K) Programme. In keeping with efforts within the larger Wikimedia movement in encouraging an inclusive workplace and addressing issues of gender disparity

This position is presently open only to applicants who identify as women. 
&lt;/b&gt;
        
&lt;h2&gt;Context of the CIS-A2K programme&lt;/h2&gt;
&lt;p&gt;As an affiliate of the Wikimedia Foundation, the nonprofit behind Wikipedia and it’s sister projects, we design and implement different initiatives with an aim to create high-quality content and bring new contributors to Wikimedia projects in Indian languages. The initiatives are premised on various themes and seek to create a multilingual repository of knowledge using Wikimedia projects as a platform. You are encouraged to carefully read through the CIS-A2K work plan before making the application. You will work cohesively with the Wikimedia community and the Wikimedia India communities to meet the specific goals of each language community in India. You will be a part of a small team of 5 to 10 members doing high visibility and high impact work. Please learn more about CIS-A2K &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/CIS-A2K"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Position Summary&lt;/h2&gt;
&lt;p&gt;As Programme Associate, your job will be to support the Team’s larger goals -- growth of Indian language Wikipedias, other Wikimedia projects and the contributor communities. Your primary responsibility will be to support the Programme Associates -- that spearhead our on-ground programmatic activities -- with regular communication with the community and the outside world.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Responsibilities&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;Storytelling and all other forms of&amp;nbsp; of communication-related responsibilities&amp;nbsp; are two major focus areas of this job. You will explore&amp;nbsp; conventional to new media to share the stories of the many of volunteers that make Wikipedia and Wikimedia projects such great knowledge repositories&lt;/li&gt;&lt;li&gt;Creating original stories of challenges and success of the Indian language Wikimedia communities, including the ones&amp;nbsp; that we closely work with Being the interface between A2K team and the community and lead different kinds of communications activities&lt;/li&gt;&lt;li&gt;Sharing the work of the community and A2k team in a regular manner&amp;nbsp; through print media, &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter"&gt;newsletters&lt;/a&gt;, social media, mailing list updates, blog posts etc., including timely announcement of programme activities on these platforms&amp;nbsp;&lt;/li&gt;&lt;li&gt;Providing training on effective communications to the communities on a need basis and enabling them to independently tell their own stories in their own languages&lt;/li&gt;&lt;li&gt;Support with writing, review and editing of the annual work plan and reports of the programme&lt;/li&gt;&lt;li&gt;Interviewing Wikimedians under the ambit of the &lt;a class="external-link" href="https://commons.wikimedia.org/wiki/WikipediansSpeak"&gt;WikipediansSpeak&lt;/a&gt; project and beyond, and share the story of the Wikimedia community widely in the media&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Required skills&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;Good communication skill in writing and speaking, which will be required for correspondence, blog, report etc writing&lt;/li&gt;&lt;li&gt;Experience of blog post, report etc writing&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Prior experience of working in a collaborative community, preferably online.&lt;/li&gt;&lt;li&gt;Strong understanding of the internet and work of the Wikimedia movement.&lt;/li&gt;&lt;li&gt;Active participation as a Wikimedia volunteer would be an asset, though not a prerequisite. Demonstrated experience working in a global, multi-cultural team environment.&lt;/li&gt;&lt;li&gt;Must be fluent in English and at least one Indian language.&lt;/li&gt;&lt;li&gt;A good understanding of the cultural and knowledge universe of one&amp;nbsp; Indian language will be an added advantage.&lt;/li&gt;&lt;li&gt;Ability to integrate with and understand the complexity of the Indian Wikimedia community.&lt;/li&gt;&lt;li&gt;Prior experience/ knowledge in working with social media for professional communication would be an added advantage. &lt;/li&gt;&lt;li&gt;Prior experience/knowledge in liasioning with conventional print/broadcast media would be an added advantage. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Characteristics of the Programme Associate&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;High level of commitment: The Programme Associate should believe in the values of CIS and Wikimedia projects, exude enthusiasm for the mission and can powerfully embody and communicate the mission.&lt;/li&gt;&lt;li&gt;Intellectual curiosity and flexibility: Must enjoy tackling difficult, ambiguous problems and able to incorporate new knowledge into how one approaches situations and generates solutions, loves learning from others while expanding intellectual horizons.&lt;/li&gt;&lt;li&gt;Open and transparent: Have a high level of integrity and be comfortable working in a highly transparent fashion, open to input and feedback, a proactive and candid communicator who&amp;nbsp; isn't afraid to bring others in when things are off-track or when they need help and should be able to handle criticism in a mature fashion.&lt;/li&gt;&lt;li&gt;Community builder: It is essential that the Programme Associate sees themself&amp;nbsp; as a partner to and supporter of the Wikimedians who have and will continue to be the leaders in building the Wikimedia projects. The Programme Associate must be willing and able to work with a diverse array of people, many of whom come from non-traditional backgrounds and have a fervent commitment to Wikimedia movement’s community-led nature.&lt;/li&gt;&lt;li&gt;Strong cultural competency: Able to navigate in a global movement and on a global team in addition to navigating the complexity of India.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Location&lt;/strong&gt;: Candidate willing to work from CIS’s Bangalore office will be preferred. Remote working option may be considered for experienced Wikimedians&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Remuneration&lt;/strong&gt;: Compensation structure will be determined by the level of expertise, experience and current remuneration.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Do not send anymore application now. the last date is over&lt;/strong&gt;&lt;/em&gt;&lt;br /&gt;To apply, please send your resume to &lt;strong&gt;Tito Dutta (tito+comm@cis-india.org)&lt;/strong&gt; and cover letter by &lt;strong&gt;21 May 2020 (applications must be submitted with cover later before 21 May 11:59:00 IST, please ensure to apply through email only).&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/programme-associate-communications'&gt;https://cis-india.org/jobs/programme-associate-communications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gurshabad</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-08-09T13:51:27Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/professor-balaram-talks-open-access">
    <title>Professor Balaram talks Open Access</title>
    <link>https://cis-india.org/openness/professor-balaram-talks-open-access</link>
    <description>
        &lt;b&gt;Last week Tom Dane spoke with Professor P Balaram, Director of the Indian Institute of Science, about his thoughts on the Open Access movement. A podcast of the interview is available for download in the audio player within this post. 

&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Padmanabhan_Balaram"&gt;Professor P Balaram&lt;/a&gt; has been speaking on the Open Access movement for many years, and his position is nuanced. In this interview Balaram talks about the reasons he holds more hope currently for open-access archives over open-access journals, the importance of understanding the motivations of academics, and an idea for making institutional repositories more exciting.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~ 0:20 - &lt;/strong&gt;Some of Balaram's views: the difficulty of the 'author pays' model for open-access journals, but our ability to separate this from the project of open-access institutional repositories.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~3:00 -&lt;/strong&gt; clarifying the misleading idea that Indian scientists 'support' closed -access journals.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~4:30 -&lt;/strong&gt; on the origins of the Open Access movement: not as an enabler of the developing world, but as an effort by libraries to counteract rising journal costs.&lt;/p&gt;
&lt;p&gt;
&lt;object data="https://player.soundcloud.com/player.swf?url=http%3A%2F%2Fapi.soundcloud.com%2Ftracks%2F28047306&amp;amp;show_comments=true&amp;amp;auto_play=false&amp;amp;color=2de891" type="application/x-shockwave-flash" height="81" width="100%"&gt;
&lt;param name="allowscriptaccess" value="always"&gt;
&lt;param name="src" value="https://player.soundcloud.com/player.swf?url=http%3A%2F%2Fapi.soundcloud.com%2Ftracks%2F28047306&amp;amp;show_comments=true&amp;amp;auto_play=false&amp;amp;color=2de891"&gt;
&lt;/object&gt;
&lt;a href="http://soundcloud.com/cis-india/professorbalaramonopenaccess"&gt;Professor Balaram on Open Access&lt;/a&gt; by &lt;a href="http://soundcloud.com/cis-india"&gt;CIS_India&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~5:40 -&lt;/strong&gt; on the future of the Open Access movement.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~6:00 -&lt;/strong&gt; comparing open-access to the internet itself.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~6:50 - &lt;/strong&gt;the importance of the community in expanding open-access, and the task of convincing more academics to support it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~7:20 -&lt;/strong&gt; how to make institutional repositories like vibrant and social parks.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~8:10 -&lt;/strong&gt; the benefit of making repositories professionally competitive&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~9:00 -&lt;/strong&gt; the performance of the repositories at the Indian Institute of Science&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~9:30 -&lt;/strong&gt; the reasons why academics are currently slow to deposit papers, and how technology is making this easier.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~10:00 -&lt;/strong&gt; the idea of changing the law in India to maintain the copyright of publicly funded work.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;~10:50 -&lt;/strong&gt; on how to make repositories more engaging: with websites, blogs,  statistics, and rewards. More marketed, more dynamic, and the importance of  imagination.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/professor-balaram-talks-open-access'&gt;https://cis-india.org/openness/professor-balaram-talks-open-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>thomas</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-08-03T23:10:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/privacy-pornography-sexuality-a-video">
    <title>Privacy, pornography, sexuality (a video)</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/privacy-pornography-sexuality-a-video</link>
    <description>
        &lt;b&gt;The video is an attempt to use the material collected for purposes of provoking a discussion around privacy, pornography, sexuality and technology. It focuses largely on an Indian context, which most viewers would be familiar with. The video is pegged around the ban of Savita Bhabhi – a pornographic comic toon – but uses that to open up a discussion on various incidents and concepts in relation to pornography and privacy across Asia.&lt;/b&gt;
        
&lt;p&gt;









&lt;/p&gt;
&lt;p&gt; &lt;object height="344" width="425"&gt;&lt;param name="movie" value="http://www.youtube.com/v/iku2SafHlMs&amp;amp;hl=en_GB&amp;amp;fs=1&amp;amp;rel=0"&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;param name="allowscriptaccess" value="always"&gt;&lt;embed height="344" width="425" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://www.youtube.com/v/iku2SafHlMs&amp;amp;hl=en_GB&amp;amp;fs=1&amp;amp;rel=0"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/p&gt;
&lt;p align="right"&gt;&lt;br /&gt;&lt;object height="344" width="425"&gt;&lt;param name="movie" value="http://www.youtube.com/v/RXKN_2Hbu1I&amp;amp;hl=en_GB&amp;amp;fs=1&amp;amp;"&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;param name="allowscriptaccess" value="always"&gt;&lt;embed height="344" width="425" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://www.youtube.com/v/RXKN_2Hbu1I&amp;amp;hl=en_GB&amp;amp;fs=1&amp;amp;"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt; The project on pleasure and pornography will generate
outputs in different formats, but especially since it is meant to be
interdisciplinary (legal, critical, feminist, cybercultures, media and cinema
studies) it would be interesting to use different ways of communicating the
ideas that the project will develop. Several interviews have been conducted
(ranging from length of 30 mins to 2 hours) with contemporaries in India whose
work in different ways (quantitative research, historical research, filmmaking,
academic writings) intersects and relates to pornography – this includes Bharat
Murthy, Manjima Bhattacharjya, Nishant Shah, Ratheesh Radhakrishnan, Shohini
Ghosh and others.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The video above is an attempt to use the material collected
for purposes of provoking a discussion around privacy, pornography, sexuality
and technology. It focuses largely on an Indian context, which most viewers
would be familiar with. The video is pegged around the ban of Savita Bhabhi – a
pornographic comic toon – but uses that to open up a discussion on various
incidents and concepts in relation to pornography and privacy across Asia. For
instance what is the role of technology and how has it altered or not altered
relations between the citizen and the State, what are the stakes of the State
in sexual subjectivity of the citizens and what are the relations of gender,
pornography and debates around privacy in public discourse.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this post I would gesture towards the last category that
has not been touched upon earlier, in relation to countries such as Malaysia
and Indonesia. It has become important during the course of this project to
draw connections to work done in the global South. In legal studies, comparative
work around legal concepts of obscenity, pornography, vulgarity are most often
only in relation to America and United Kingdom, either for a strong tradition
of free speech and expression in both countries and because of historical
connections to common and legislative law in UK. However it is important to
examine the trajectories of similar legal paradigms (Malaysia) and even
different legal paradigms&amp;nbsp; (Indonesia)
across Asia to understand the mechanics of how pornography is constructed and
understood in legal and possibly cultural terms as well.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Here we look at instances of material that are described as
pornography in legal terms and how that legal category avoids taking onto
itself what could be described as hard core pornography, and instead focuses on
material that in the Indian context are described as obscene (see &lt;a href="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/the-blindfolded-gaze-of-the-law-and-pornography" class="external-link"&gt;first blog post&lt;/a&gt; on Indian law). In other parts of Asia, very often laws
that describe what is pornography play an important role in controlling women
and reinforcing gendered modes of access to media, information or to public
spaces. &lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt; &lt;/p&gt;
&lt;p&gt;The Indonesian Anti-pornography law instead of protecting
the privacy of individuals, regulates and controls the ways in which women can
participate in the public sphere. The law deals with appropriate garb, behaviour,
forms of artistic and video practices under the broad umbrella of the term &lt;em&gt;pornoaksi&lt;/em&gt; or pornographic action. In Indonesia as in other
parts of Asia, there has been over the last 4-5 years a flood of mobile and
webcam pornography uploaded by people themselves (couples and individuals),
which forms a large part of the erotic consumption in the country. The sheer
volume and circulation of these videos points to how technology is enmeshed in
sexual practices in even in the global South, contrary to what is written about
sexuality and technology that largely focuses on the phenomenon of
technology-sexuality in the global North around platforms such as Second Life&lt;a name="_ednref1" href="#_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/a&gt;
or aspects of virtual reality. However the new law (passed in 2008) does not address this phenomenon directly even though that was the reason for promulgation of the law, but instead focuses of the dubious and vague category of pornoaksi.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The law also allows for ordinary citizens to complain about obscene behaviour. According to gender and human rights activists in Indonesia, this gives a lot of leeway to the more socially conservative elements to complain and even attack film festivals, gatherings etc.  In an article (unpublished) about the anti pornography law, Julia Suryakusuma (a columnist and writer in Indonesia) says -&lt;/p&gt;
&lt;p&gt;







"But is the so-called ‘Anti-Pornography Law’ indeed aimed
against ‘pornography’, or is really directed against women and the freedoms won
through post-Soeharto democratization? The Law, I will argue, is, in fact,
based on a social construction of ‘morality’ and womanhood that masks as
religion but which is, in fact, a potent combination of social conservatism and
political opportunism."&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The video ends with a very moving press conference
by the Malaysian State Assemblywoman offering her resignation because intimate
(but not pornographic) pictures of her had been circulated without her consent
by her ex-boyfriend. The incident was a transparent ploy by an opposing
political party to denounce a formidable opponent and attempts to use public
discourse around obscenity, vulgarity to limit the politician’s participation
in the public sphere.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The video was also part of a discussion around privacy,
agency and security organized at the recent Internet Governance Forum in Egypt
in November, 2009&lt;a name="_ednref2" href="#_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/a&gt; and was
screened at the beginning of the workshop to spear head a discussion between
varied participants. The workshop was organized by Alternative Law Forum, Association for Progressive Communication - Women's Networking Support Programme and Center for Internet and Society. The IGF saw an intense focus on issues of privacy
especially in relation to issues of data aggregation and control over private
and public data of individuals by corporate entities. The video and the session
was an attempt to bring into the focus of such discussions, issues more
pertinent from a feminist, queer or theoretical perspective.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt;
&lt;hr align="left" size="1" width="33%" /&gt;


&lt;div id="edn1"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a name="_edn1" href="#_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/a&gt; Coming of
age in Second Life, Tom Boellstorff : An ethnography of Second Life that looks
at various aspects of practices online including friendship, sexuality,
marriage, aspirations and desires.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn2"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a name="_edn2" href="#_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/a&gt; More
details of this workshop (concept note, speakers) are available on the IGF
website at &lt;a href="http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=WSProposals2009View&amp;amp;wspid=275"&gt;http://www.intgovforum.org/cms/index.php/component/chronocontact/?chronoformname=WSProposals2009View&amp;amp;wspid=275&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;

&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/privacy-pornography-sexuality-a-video'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/privacy-pornography-sexuality-a-video&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>namita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>women and internet</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Obscenity</dc:subject>
    

   <dc:date>2011-08-02T08:37:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing">
    <title>Privacy, Free/Open Source, and the Cloud </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing</link>
    <description>
        &lt;b&gt;A look into the questions that arise in concern to privacy and cloud computing, and how open source plays into the picture. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;Cloud computing, in basic terms,&amp;nbsp; is internet-based computing where shared resources and services are taken from the primary infrastructure of the internet and provided on demand. Cloud computing creates a shared network between major corporations like Google, Microsoft, Amazon and Yahoo. In this way, cloud systems are related to grid computing systems/service- oriented architectures, and create the potential for the entire I.T. infrastructure to be programmable. Because of this, cloud computing establishes a new consumption and delivery standard for IT services based on the internet. It is a new consumption and delivery model, because it is made up of services delivered through common centers and built on servers which act as a point of access for the computing needs of consumers.&amp;nbsp; The access points facilitate the tailoring and delivering of targeted applications and services to consumers.&amp;nbsp; Details are taken from the users, who no longer need to have an understanding of, or control over the technology infrastructure in the cloud that supports their desired application.&lt;/p&gt;
&lt;p&gt;There are both corporate and consumer implications for such a system. For example, according cloud computing lowers the barriers to entry for corporations and new services. It also enables innovative enterprise in locations where there is an insufficient supply of human or other resources through the provision of inexpensive hardware, software, and applications. The consumer, in turn, is provided with information that he or she is projected to be interested in based on information he or she has already “consumed.”&amp;nbsp; Thus, for example: Google has the ability to monitor a person’s consuming habits through searches and to reduce those habits to a pattern which selects applications to display – and consumption of those reinforces the pattern.&lt;/p&gt;
&lt;h3&gt;Privacy Concerns:&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Though cloud computing can be a useful tool for&amp;nbsp; consumers, corporations, and countries, cloud computing poses significant privacy concerns for all actors involved. For the consumer, a major concern is that future business models may rely on the use of personal data from consumers of cloud services for advertising or behavioral targeting. This concern brings to light the fundamental problem of cloud computing which is that consumers consent to the secondary use of their personal data only when they are signing up for services, and that “consent” is almost automatically generated. How can the cloud assure users that their private data will be properly protected? It is true that high levels of encryption can be (and are) used, and that many companies also take other precautionary measures, but protective measures vary, and the secondary sources that gain access to information may not protect it as well as the initial source.&amp;nbsp; Moreover, even strong protection measures are vulnerable to hackers. As well, what happens if a jurisdiction, like the Indian government, gains access to information about a foreign national?&amp;nbsp;&amp;nbsp; India still does not have a comprehensive data protection law, nor does it have many forms of redress for violations of privacy. How is that individuals information protected?&lt;/p&gt;
&lt;p&gt;These questions give rise to other privacy concerns with respect to the data that is circulated and stored on the cloud, which are the questions of territory, sovereignty, and regulation. Many of these were brought up at the Internet Governance Forum, which took place on the 16th of September including: Which jurisdiction has authority in cases of dispute or digital crime? If you lose data or your data is damaged, stolen, or manipulated, where do you go? Is the violation enforced under local laws, and, if so, under the law of the violator or the law of the violated?&amp;nbsp; If international law, who can access the tribunals, and which tribunals have this jurisdiction?&amp;nbsp; What if a person's data is replicated in two data centres in two different countries? &amp;nbsp;Are the data subject to scrutiny by the officials of all three?&amp;nbsp; Is there a remedy against abuse by any of them?&amp;nbsp; Does it matter whether the country in which the data centre resides does not require a warrant for government access?&amp;nbsp; And how will a consumer know any of that up front?&amp;nbsp; As a corollary, if content is being sent to one country but resides on a data centre in another country, whose data protection standards apply?&amp;nbsp; For example, certain governments in Europe require data retention for limited amount of time for purposes for law enforcement, but other countries may allow retention of data for shorter or longer periods of time.&lt;/p&gt;
&lt;h3&gt;How are privacy, free/open source, and the cloud related ?&lt;/h3&gt;
&lt;p&gt;Eben Moglen, a professor from Columbia law school, and founder and chairman of the Software Freedom Law Center who spoke on cloud computing, privacy, and free/open software at the Indian Institute for science on Thursday September 25, had another solution to the privacy concerns that arise out of the cloud. His lecture explains how the internet has moved from a tool that once promoted equality between people – no servants and no masters – to a tool that reinforces social hierarchies. The reinforcement of these hierarchies is directly related to the language used and communication facilitated between the computer and the individual.&amp;nbsp; Professor Moglen describes how initially, when computers were first introduced to the public, humans spoke directly to computers, and computers responded directly to humans. This open, two-way communication changed when Microsoft, Apple, and IBM removed the language between humans and computers and created proprietary software based on a server-client computing relationship. By removing the language between humans and computers, these corporations dis-empowered individuals. Professor Moglen used this as a springboard to address the privacy concerns that come up in cloud computing. Privacy at its base is the ability of an individual to control access to various aspects of self, such as decisional, informational, and locational. In having the ability to control these factors, privacy consists of a relation between a person and another person or an entity. Professor Moglen postulated that free/open access to code would make the internet an environment where choices over that relationship were still in the hands of an individual, and, among other protections, the individuals could build up their desired levels of privacy.&lt;/p&gt;
&lt;h3&gt;Is free/open software the solution?&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Eben Moglen's solution to the many privacy concerns that arise out of cloud computing is the application and use of free software/open source by individuals.&amp;nbsp; Unlike some applications on the cloud, open source is free, and once an individual has access to the code, that person can control how a program functions, including how a program uses personal information, and thus the person would be able to protect their privacy. Of course, this presumes that the consumer of the internet is sophisticated enough to access and manipulate code.&amp;nbsp; But even putting that presumption aside, is the ability to write code enough to protect data (will help you protect data better – add more security)?&amp;nbsp; Perhaps if a person could create his own server and bypass the cloud, but this does not seem like an ideal (or practical) solution. Though free/open source is an important element that should be incorporated into cloud computing, free/open source depends on open standards.&amp;nbsp;According to Pranesh Prakash, in his presentation at the Internet Governance Forum, the role of standards in ensuring interoperability is critical to allowing consumers to choose between different devices to access the cloud, to choose between different software clients, and to shift between one service and another. This would include moving information, both the data and the metadata, from one cloud to another. Clouds would need to be able to talk to one another to enable data sharing, and open source is key to this, though it is important to note that if one uses free/open source, they must set up their own infrastructure.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Even though Moglen believes that free/open source software brings freedom and provides the solution to protect an individual’s privacy in the context of cloud computing, he was not speaking to the specific context of India. To do that, it is important to expand the definitions that one uses of free/open source and privacy, and then to contextualize them.&amp;nbsp; Looking closely at the words “free/open source,” they are not limited to access to a software's code, even though that is free/open source’s base.&amp;nbsp; For the ideology of free/open source to work, access to code is just a key to the puzzle. A person, community, culture and state must understand the purpose of free/open source, know how to use it,&amp;nbsp; and know how it can be applied in order for it to be transformative, liberating, and protective. There needs to be a shared understanding that free/open source is&amp;nbsp; not just about being able to change code, but about a shared commitment to sharing code and making it transparent and accessible. In the United States and other countries,&amp;nbsp; free/open source did not just enter into American society and immediately fix issues of&amp;nbsp; privacy by bringing freedom, as it seems Professor Moglen is suggesting free/open source will do in India.&amp;nbsp;&amp;nbsp;&amp;nbsp; Though Professor Moglen promises freedom and privacy protection through free/open source, perhaps this is not an honest appraisal of the technology.&amp;nbsp; Free/open source, if not equally accessed or misapplied, protects neither freedom nor privacy.&amp;nbsp; As noted above, even if a person has access to code, he can protect data only to a certain extent.&amp;nbsp; Thus, he might think that he has created a privacy wall around information that actually is readily accessible.&amp;nbsp; In other words, free/open source cannot be the only answer to freedom, but instead a piece to a collective answer.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:50:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/privacy-v-transparency">
    <title>Privacy vs. Transparency: An Attempt at Resolving the Dichotomy</title>
    <link>https://cis-india.org/openness/blog-old/privacy-v-transparency</link>
    <description>
        &lt;b&gt;The right to privacy has been articulated in international law and in some national laws. In a few countries where the constitution does not explicitly guarantee such a right, courts have read the right to privacy into other rights (e.g., the right to life, the right to equal treatment under law and also the right to freedom of speech and expression).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;With feedback and inputs from Sumandro Chattapadhyay, Elonnai Hickok, Bhairav Acharya and Geetha Hariharan&lt;/i&gt;. I would like to apologize for not providing proper citation to Julian Assange when the first version of this blog entry was published. I would also like to thank Micah Sifry for drawing this failure to his attention. The blog post originally published by Omidyar Network &lt;a class="external-link" href="http://www.openup2014.org/privacy-vs-transparency-attempt-resolving-dichotomy/"&gt;can be read here&lt;/a&gt;. Also see &lt;a class="external-link" href="http://newint.org/features/2015/01/01/privacy-transparency/"&gt;http://newint.org/features/2015/01/01/privacy-transparency/&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In other countries where privacy is not yet an explicit or implicit  right, harm to the individual is mitigated using older confidentiality  or secrecy law. After the Snowden affair, the rise of social media and  the sharing economy, some corporations and governments would like us to  believe that “privacy is dead”. Privacy should not and cannot be dead,  because that would mean that security is also dead. This is indeed the  most dangerous consequence of total surveillance as it is technically  impossible to architect a secure information system without privacy as a  precondition. And conversely, it is impossible to guarantee privacy  without security as a precondition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The right to transparency [also known as the right to information or  access to information] – while unavailable in international law – is  increasingly available in national law. Over the last twenty years this  right has become encoded in national laws – and across the world it is  being used to hold government accountable and to balance the power  asymmetry between states and citizens. Independent and autonomous  offices of transparency regulators have been established. Apart from  increasing government transparency, corporations are also increasingly  required to be transparent as part of generic or industry specific  regulation in the public interest. For instance, India’s Companies Act,  2013, requires greater transparency from the private sector. Other areas  of human endeavor such as science and development are also becoming  increasingly transparent though here it is still left up to  self-regulation and there isn’t as much established law. Within science  and research more generally, the rise of open data accompanied the  growth of the Open Access and citizen science movement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So the question before us is: Are these two rights – the right to  transparency and the right to privacy – compatible? Is it a zero-sum  game? Do we have to sacrifice one right to enforce the other?  Unfortunately, many privacy and transparency activists think this is the  case and this has resulted in some conflict. I suggest that these  rights are completely compatible when it comes to addressing the  question of power. These rights do not have to be balanced against one  another. There is no need to settle for a sub-optimal solution. &lt;b&gt;Rather this is an optimization problem and the solution is as follows: privacy protections must be inversely proportionate to power and as Julian Assange says transparency requirements should be directly proportionate to power.&lt;/b&gt;&lt;a href="#fn*" name="fr*"&gt;[*] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In most privacy laws, the public interest is an exception to privacy. If  public interest is being undermined, then an individual privacy can be  infringed upon by the state, by researchers, by the media, etc. And in  transparency law, privacy is the exception. If the privacy of an  individual can be infringed, transparency is not required unless it is  in the public interest. In other words, the “public interest” test  allows us to use privacy law and transparency law to address power  asymmetries rather than exacerbate them. What constitutes “public  interest” is of course left to courts, privacy regulators, and  transparency regulators to decide. Like privacy, there are many other  exceptions in any given transparency regime including confidentiality  and secrecy. Given uneven quality of case law there will be a temptation  by the corrupt to conflate exceptions. Here the old common-law  principle of “there is no confidence as to the disclosure of iniquity” –  which prevents confidentiality law from being used to cover malfeasance  or illegality – can be adopted in appropriate jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 10 years ago, the transparency movement gave birth to yet another  movement – the open government data movement. The tension between  privacy and transparency is most clearly seen in the open government  data movement. The open government data movement in some parts of the  world is dominated by ahistorical and apolitical technologists, and some  of them seem intent on reinventing the wheel. In India, ever since the  enactment of the Right to Information Act, 2003, 30 transparency  activists are either killed, beaten or criminally intimidated every  year. This is the statistic from media coverage alone. Many more  silently suffer. RTI or transparency is without a doubt one of the most  dangerous sectors within civil society that you could choose to work in.  In contrast, not a single open data activist has ever been killed,  beaten or criminally intimidated. I suspect this is because open data  activists do not sufficiently challenge power hierarchies. Let us look a  little bit closely at their work cycle. When a traditional transparency  activist asks a question, that is usually enough to get them into  trouble. When an open data activist publishes an answer [a dataset  nicely scrubbed and machine readable, or a visualization, or a tool]  they are often frustrated because nobody seems interested in using it.  Often even the activist is unclear what the question is. This is because  open data activist works where data is available. Open data activists  are obsessed with big datasets, which are easier to find at the bottom  of the pyramid. They contribute to growing surveillance practices [the  nexus between Internet giants, states, and the security establishment]  rather that focusing on sousveillance [citizen surveillance of the  state, also referred to as citizen undersight or inverse surveillance].  They seem to be obsessed only with tools and technologies, rather than  power asymmetries and injustices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, a case study to make my argument easier to understand – Aadhaar  or UID, India’s ambitious centralized biometric identity and  authentication management system. There are many serious issues with its  centralized topology, proprietary technology, and dependence on  biometrics as authentication factors – all of which I have written about  in the past. In this article, I will explain how my optimization  solution can be applied to the project to make it more effective in  addressing its primary problem statement that corruption is a necessary  outcome of power asymmetries in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its current avatar – the Aadhaar project hopes to assign  biometric-based identities to all citizens. The hope is that, by doing  authentication in the last mile, corruption within India’s massive  subsidy programmes will be reduced. This, in my view, might marginally  reduce retail corruption at the bottom of the pyramid. It will do  nothing to address wholesale corruption that occurs as subsidies travel  from the top to the bottom of the pyramid. I have advocated over the  last two years that we should abandon trying to issue biometric  identities to all citizens, thereby making them more transparent to the  state. Let us instead issue Aadhaar numbers to all politicians and  bureaucrats and instead make the state more transparent to citizens.  There is no public interest in reducing privacy for ordinary citizens –  the powerless – but there are definitely huge public interest benefits  to be secured by increasing transparency of politicians and bureaucrats,  who are the powerful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government has recently introduced a biometric-based  attendance system for all bureaucrats and has created a portal that  allows Indian citizens to track if their bureaucrats are arriving late  or leaving early. This unfortunately is just bean counting [for being  corrupt and being punctual are not mutually exclusive] and public access  to the national portal was turned off because of legitimate protests  from some of the bureaucrats. What bureaucrats do in office, who they  meet, and which documents they process is more important than when they  arrive at or depart from work. The increased transparency or reduced  privacy was not contributing to the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of first going after small-ticket corruption at the bottom of  the pyramid, maximization of public interest requires us to focus on the  top, for there is much greater ROI for the anti-corruption rupee. For  example: constructing a digital signature based on audit trails that  track all funds and subsidies as they move up and down the pyramid.  These audit trails must be made public so that ordinary villagers can be  supported by open data activists, journalists, social entrepreneurs,  and traditional civil society in verification and course correction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I hope open data activists, data scientists, and big data experts will  draw inspiration from the giants of the transparency movement in India. I  hope they will turn their attention to power, examine power asymmetries  and then ask how the Aadhaar project can be leveraged to make India  more rather than less equal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Videos&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: justify; "&gt;Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/tDf8TFjxqiQ" width="560"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/lPHWkYZjqzo" width="560"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The videos can also be watched on Vimeo:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class="external-link" href="http://vimeo.com/111729069"&gt;Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://vimeo.com/111748146"&gt;Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector &lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].&lt;a class="external-link" href="http://prospect.org/article/real-significance-wikileaks"&gt;http://prospect.org/article/real-significance-wikileaks&lt;/a&gt; “Transparency should be proportional to the power that one has.”&lt;/p&gt;
&lt;p&gt;Read the presentation on Risky Business: Transparency, Technology, Security and Privacy made at the Pecha Kucha session &lt;a href="https://cis-india.org/openness/blog-old/risky-business.odp" class="internal-link"&gt;here&lt;/a&gt;. (ODP File, 35 kb)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Disclaimer: The views, opinions, and positions expressed by             the author(s) of this blog are theirs alone, and do not             necessarily reflect the views, opinions, or positions of             Omidyar Network. We make no representations as to accuracy,             completeness, timeliness, suitability or validity of any             information presented by individual authors of the blogs and             will not be liable for any errors, omissions, or delays in             this information or any losses, injuries or damages arising             from its display or use.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/privacy-v-transparency'&gt;https://cis-india.org/openness/blog-old/privacy-v-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2015-03-08T06:26:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/privacy-newsletter-february-2017.pdf">
    <title>Privacy Newsletter February 2017</title>
    <link>https://cis-india.org/internet-governance/files/privacy-newsletter-february-2017.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/privacy-newsletter-february-2017.pdf'&gt;https://cis-india.org/internet-governance/files/privacy-newsletter-february-2017.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-07-20T14:00:13Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-meeting-brussels-bangalore">
    <title>Privacy Meeting: Brussels – Bangalore</title>
    <link>https://cis-india.org/internet-governance/events/privacy-meeting-brussels-bangalore</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Bangalore welcomes you to a talk on privacy by Gertjan Boulet and Dariusz Kloza on August 14, 2013, 5.00 p.m. to 8.00 p.m.&lt;/b&gt;
        &lt;p&gt;Slides from the talk can be &lt;a href="https://cis-india.org/internet-governance/blog/privacy-meeting-brussels-bangalore.pdf" class="internal-link"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h2&gt;Draft Agenda&lt;/h2&gt;
&lt;table class="listing grid"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00 &lt;br /&gt;17.15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Brief    presentation of the Research Group on Law, Science, Technology and    Society (LSTS) at the Vrije Universiteit Brussel (VUB), Belgium&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.15&lt;br /&gt;18.15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Session on "new tools" to protect privacy and personal data. A case-study on (European) approach to privacy impact assessment&lt;br /&gt;&lt;br /&gt;&lt;/b&gt;This    session will provide an overview to the main findings of the projects  carried out by   VUB-LSTS (predominantly) with regard to privacy impact  assessments  (PIA),  starting with the EU co-funded PIAF (“A Privacy  Impact  Assessment  Framework for data protection and privacy rights”;   2011-2012), which reviewed existing PIA frameworks worldwide,  surveyed  opinions of  national data protection authorities (DPAs) on an  optimal  PIA policy  and, finally, provided a set of recommendations for  PIA  policy-makers  and practitioners.&lt;/p&gt;
&lt;p&gt;This session will be concluded by proposing adaptation of the    so-called environmental democracy to the needs and reality of privacy.&lt;/p&gt;
&lt;p&gt;The points in this session will be contrasted with the experience of India.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.15&lt;br /&gt;18.45&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Session on co-operation of data protection authorities&lt;br /&gt;&lt;/b&gt;
&lt;p style="text-align: justify; "&gt;"Improving    Practical and Helpful cooperation between Data Protection   Authorities",  2013-15. This session will provide a preliminary   analysis of the  (legal) factors that pose as obstacles to and/or  encourage  co-operation between DPAs  worldwide in enforcing privacy and  data protection  laws. Such an  analysis aims at creating a  'wish-list', i.e. at  identifying what  measures could be taken to  reduce barriers and to  further foster  co-operation.&lt;br /&gt;&lt;br /&gt;This  session will be concluded by  discussing what DPAs' can learn about  co-operation from  European and  international competition law.&lt;/p&gt;
&lt;p&gt;The points in this session will be contrasted with the experience of India.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18.45&lt;br /&gt;19.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.00&lt;br /&gt;19.15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Small session on big data&lt;br /&gt;&lt;/b&gt;The   focus of this session will  be on the challenges posed to sovereignty  by  cross-border law  enforcement access to big data. The Belgian  Yahoo-case  will be  discussed as it is emblematic of a reality with  broad national  claims  to access data in a trans-border context.&lt;/p&gt;
&lt;p&gt;Indian perspectives on this topic will be taken into account.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.15&lt;br /&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Open discussion&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Materials&lt;/h2&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Wright, David, Kush Wadhwa, Paul De Hert, and Dariusz Kloza, &lt;i&gt;A Privacy Impact Assessment Framework for Data Protection and Privacy Rights&lt;/i&gt;, 2011. &lt;a href="http://piafproject.eu/ref/PIAF_D1_21_Sept2011Revlogo.pdf"&gt;http://piafproject.eu/ref/PIAF_D1_21_Sept2011Revlogo.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Hosein, Gus, and Simon Davies, &lt;i&gt;Empirical    Research of Contextual Factors Affecting the Introduction of Privacy    Impact Assessment Frameworks in the Member States of the European  Union&lt;/i&gt;, 2012. &lt;a class="external-link" href="http://piafproject.eu/ref/PIAF_deliverable_d2_final.pdf"&gt;http://piafproject.eu/ref/PIAF_deliverable_d2_final.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;De Hert, Paul, Dariusz Kloza, and David Wright, &lt;i&gt;Recommendations for a Privacy Impact Assessment Framework for the European Union&lt;/i&gt;, 2012. &lt;a href="http://piafproject.eu/ref/PIAF_D3_final.pdf"&gt;http://piafproject.eu/ref/PIAF_D3_final.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kloza    Dariusz, Moscibroda Anna, Boulet Gertjan, “Improving Co-operation    Between Data Protection Authorities: First Lessons from Competition    Law.” in &lt;i&gt;Jusletter IT. Die Zeitschrift für IT und Recht&lt;/i&gt;, published by Weblaw AG. &lt;a href="http://jusletter-it.weblaw.ch/issues/2013/20-Februar-2013/2128.html"&gt;http://jusletter-it.weblaw.ch/issues/2013/20-Februar-2013/2128.html&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kloza Dariusz, “Public voice in privacy governance: lessons from environmental democracy”, in Erich Schweighofer (ed.), &lt;i&gt;KnowRight 2012 conference proceedings&lt;/i&gt; [forthcoming].&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;h2&gt;Other resources&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;PHAEDRA project: &lt;a href="http://www.phaedra-project.eu"&gt;http://www.phaedra-project.eu&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;PIAF project: &lt;a href="http://piafproject.eu"&gt;http://piafproject.eu&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;PIAw@tch, the PIA observatory:  &lt;a href="http://piawatch.eu"&gt;http://piawatch.eu&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;The Speakers&lt;/h2&gt;
&lt;h3&gt;Gertjan Boulet&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Gertjan  Boulet holds a joint LL.M/MPhil (2010) from Leuven University (Belgium)  and Tilburg University (the Netherlands) where he successfully  completed a Research Master of Laws programme focused on legal methods  and interdisciplinary research. He started to work as a doctoral  researcher at the Research Group on Law, Science, Technology and Society  (LSTS) at the Vrije Universiteit Brussel in January 2013 for the  EU-funded research project 'Improving Practical and Helpful cooperAtion  bEtween Data PRotection Authorities' (PHAEDRA). Before, he was a  freelance researcher at VUB, and became a member of the programming  committee of the annual conference 'Computers, Privacy &amp;amp; Data  Protection' (CPDP). Prior to joining the Vrije Universiteit  Brussel, Gertjan worked for the Brussels Airport Company (2010) and the  law firm DLA Piper (2011). He also completed internships at the Belgian  Public Prosecutor (2007), the Constitutional Court of Belgium (2012) and  the Belgian Privacy Commission (2013).&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Gertjan.png" alt="Gertjan Boulet" class="image-inline" title="Gertjan Boulet" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Gertjan Boulet&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;div class="cvtext"&gt;
&lt;h3 style="text-align: justify; "&gt;Dariusz Kloza&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Dariusz (Darek) Kloza is a doctoral researcher at  the Research Group on Law, Science, Technology, and Society (LSTS) and  the Institute for European Studies (IES) at Vrije Universiteit Brussel  (VUB). He holds both an LL.M. in Law and Technology (2010) from the  Tilburg Institute for Law, Technology, and Society (TILT) at Tilburg  University (with distinction) and a master degree in law from University  of Białystok (2008). He was also an exchange student at University of  Copenhagen (2007-2008). His research is focused on fundamental rights in  the digital era (especially privacy and data protection), liability of  intermediary service providers and private international law. His  doctoral research focuses on positive procedural obligations for privacy  and data protection from the European perspective.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He has been involved in researching privacy and data protection issues in a number of EU co-funded projects, such as PIAF (&lt;i&gt;Privacy Impact Assessment Framework for data protection and privacy rights&lt;/i&gt;), PHAEDRA (&lt;i&gt;Improving Practical and Helpful cooperAtion bEtween Data PRotection Authorities&lt;/i&gt;) and ADVISE (&lt;i&gt;Advanced Video Surveillance archives search Engine for security applications&lt;/i&gt;).  He has also contributed to the work of the European Commission’s Task  Force for Smart Grids, aimed at ensuring high level of privacy and  personal data protection in smart grids/metering.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Dariusz.png" title="Dariusz Kloza" height="227" width="225" alt="Dariusz Kloza" class="image-inline" /&gt;&lt;br /&gt;&lt;b&gt;Dariusz Kloza&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-meeting-brussels-bangalore'&gt;https://cis-india.org/internet-governance/events/privacy-meeting-brussels-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-12T07:56:53Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report">
    <title>Privacy Matters, Guwahati — Event Report</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report</link>
    <description>
        &lt;b&gt;On June 23, a public seminar on “Privacy Matters” was held at the Don Bosco Institute in Karhulli, Guwahati. It was organised by IDRC, Society in Action Group, IDEA Chirang, an NGO initiative working with grassroots initiatives in Assam, Privacy India and CIS and was attended by RTI activists and grass roots NGO representatives from across the North Eastern region: Manipur, Arunachal Pradesh, Tripura, Nagaland, Assam and Sikkim. The event focused on the challenges and concerns of privacy in India.&lt;/b&gt;
        
&lt;p&gt;Unfortunately many of the scheduled invitees had to drop out owing to developments on the Lokpal issue at the Centre, and simultaneously Guwahati was witnessing unrest following an agitation over land rights that left three persons dead.&lt;/p&gt;
&lt;p&gt;Welcoming the participants, Prashant Iyengar, lead researcher for Privacy India, gave an introduction to the objectives of Privacy India, and briefed the gathering about the thematic “Privacy Matters” consultations previously held across the country in Kolkata, Bangalore and Ahmedabad. Mr. Iyengar also gave a background to issues that India is facing in concern with &amp;nbsp;privacy, &amp;nbsp;explaining &amp;nbsp;the &amp;nbsp;many &amp;nbsp;contexts &amp;nbsp;that &amp;nbsp;privacy &amp;nbsp;can &amp;nbsp;be &amp;nbsp;found &amp;nbsp;in, and &amp;nbsp;raising questions such as: Why is &amp;nbsp;privacy important? How can it be maintained with the way technology is encroaching upon our lives? And how can we make privacy laws functional?&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/P1.jpg/image_preview" alt="Privacy Guwahati - 1" class="image-inline image-inline" title="Privacy Guwahati - 1" /&gt;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"Privacy objectives are to raise awareness, spark civil action and promote democratic dialogue around privacy challenges and violations in India. One of Privacy India’s goals is to build consensus towards the promulgation of a comprehensive privacy legislation in India through consultation with the public, legislators and the legal and academic community."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Prashant Iyengar, Privacy India.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;Event Sessions&lt;/h2&gt;
&lt;p&gt;The structure of the event was one of open discussion, with presentations made by those who wanted to share. Throughout the day, the conversation fell into three main topics including: privacy and the RTI, privacy and the UID, and privacy and surveillance in the context of North East India.&lt;/p&gt;
&lt;h3&gt;Privacy and the RTI&lt;/h3&gt;
&lt;p&gt;Prashant Iyengar opened the discussion on privacy and the RTI by highlighting the tension between the&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;need for transparency of the State, and the need to protect the privacy of public figures. For many&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;participants privacy and transparency was a new concept that they had&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; &amp;nbsp;just started thinking&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;about. Participant Rakesh (HRLN, Manipur)&amp;nbsp;spoke on the shortcomings that he saw in the RTI Act noting that though the RTI brings some transparency to society, many citizens still do not understand the extent of their Right to Information as it is protected under the Act. Furthermore, the RTI Act is still not applied equally across the country, and the transparency that the RTI tries to achieve is still in very nascent stages. Lowang, a participant from Aru &amp;nbsp;nachal Pradesh, shared the importance of drawing a line between privacy and transparency when it comes to information related to education and health. Anjuman Azra Begum, a research scholar working on indigenous people rights, noted the irony of the RTI as it is meant to bring transparency to the state, yet all ministers and MLA’s take an oath of secrecy, not transparency. Anjuman also spoke on the fact that the RTI often fails to protect the privacy of sensitive issues, such as sexual balance. She echoed Rakesh’s comment on the inaccessibility of the RTI, sharing that for a common person to exercise his/her rights is a very daunting task. Anthony Debbarmun, a human rights activist from Tripura noted that he felt that the North Eastern states are by and large seen as resource (land) by the centre and has shown no concern for citizens and their well-being. Government is seen as a dictator in this &amp;nbsp;region, &amp;nbsp;hence &amp;nbsp;the &amp;nbsp;question — Transparency &amp;nbsp;for &amp;nbsp;whom?, &amp;nbsp;Privacy &amp;nbsp;for &amp;nbsp;Whom? &amp;nbsp;The distinction between the transparency brought about by the RTI and individual privacy was also made. It was pointed out that the RTI is concerned with transparency of the State, but individual privacy is separate from this concept.&lt;/p&gt;
&lt;pre&gt;&lt;strong&gt;Personal Experiences Shared&lt;/strong&gt;&lt;/pre&gt;
&lt;p&gt;Anjuman Azra Begum shared her sister’s experience with the RTI. Her sister had applied for a job in 2008. Their family filed an RTI for details of the procedure, but was denied details by the RTI officer, who said that furnishing details would violate the privacy of other candidates. This example raises questions about when it is appropriate for RTI officers to withhold information in the name of privacy, and what mechanisms can be put in place to ensure that the RTI does not use privacy as a way to deny information. Lowang also shared his experience with the RTI. He had filed an RTI asking for answer sheets because he doubted the appointment of police personnel. He was told that the cost in total would be Rs.2000, when in reality each sheet costs Rs.2 — &amp;nbsp;the misconstruing of facts was another example of how RTI officials restrict access information indirectly. From these examples the concern about RTI officials using privacy as an excuse to deny information was brought to the surface. To highlight the problems with the current implementation of the RTI and the lack of basic knowledge of how to use the RTI Mhao Lotha from the DICE Foundation shared &amp;nbsp;a &amp;nbsp;personal &amp;nbsp;experience &amp;nbsp;of &amp;nbsp;his &amp;nbsp;friend &amp;nbsp;who &amp;nbsp;had &amp;nbsp;filed &amp;nbsp;an &amp;nbsp;RTI &amp;nbsp;against &amp;nbsp;the &amp;nbsp;fishery department, and the RTI official simply shouted at her. L. Rima told a similar story as Mhao Lotha. &amp;nbsp;In &amp;nbsp;her &amp;nbsp;experience &amp;nbsp;the &amp;nbsp;RTI &amp;nbsp;is &amp;nbsp;good &amp;nbsp;in &amp;nbsp;theory, &amp;nbsp;but &amp;nbsp;in &amp;nbsp;practice &amp;nbsp;it &amp;nbsp;has &amp;nbsp;become &amp;nbsp;a commercial platform, where officers pay money to applicants for RTI cases to be taken off.&lt;/p&gt;
&lt;p&gt;From the discussion and the shared experiences it was clear that the RTI, although a strong law on paper, &amp;nbsp;still &amp;nbsp;faces many challenges in implementation that a privacy law could also face, and that the fact that if more privacy is brought into the RTI, it will become yet another way for the State to avoid disclosing information.&lt;/p&gt;
&lt;pre&gt;&lt;strong&gt;Questions to Consider&lt;/strong&gt;&lt;/pre&gt;
&lt;ul&gt;&lt;li&gt;Can a &amp;nbsp;privacy &amp;nbsp;law &amp;nbsp;be &amp;nbsp;made &amp;nbsp;to be &amp;nbsp;functional &amp;nbsp;in the &amp;nbsp;same &amp;nbsp;way &amp;nbsp;that &amp;nbsp;the RTI is functional?&lt;/li&gt;&lt;li&gt;In terms of the RTI who should have more privacy? &amp;nbsp;Who should be more transparent? Can NGOs be held accountable under the RTI?&lt;/li&gt;&lt;li&gt;What mechanism should be established to enforce the balance between privacy and transparency?&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Privacy and Security/Law Enforcement in the North East of India&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/p2.jpg/image_preview" alt="Guwahati 2" class="image-inline image-inline" title="Guwahati 2" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Another important discussion held during the conference was the practices of law enforcement in the North East, security, and privacy. Because the North East is in a state of armed conflict several laws such as the Armed Forces Special Powers Act, Sedition Act and provisions in the IPC give immunity to security forces. &amp;nbsp;This has led to gross&amp;nbsp;violation of citizens’ privacy by law enforcement agencies&amp;nbsp;&amp;nbsp;— as the acts give large amounts&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;of power &amp;nbsp; to &amp;nbsp; law &amp;nbsp;enforcement &amp;nbsp;agencies with &amp;nbsp;little &amp;nbsp;or &amp;nbsp;no accountability, &amp;nbsp;and &amp;nbsp;the &amp;nbsp;acts &amp;nbsp;are &amp;nbsp;often &amp;nbsp;misused.&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Furthermore, the security laws that exist in the North East explicitly prohibit access to individual personal information. For example, in the Assam Police Manual, which is followed by police in the North East — no papers can be given out to the public except to the investigation officer — this includes personal information such as medical records and post-mortem reports. &amp;nbsp;Anjuman shared an example of how this rule violates individual privacy. In her example, a victim was not allowed access her own medical report, but her medical records were being circulated among police, doctors, and media. &amp;nbsp;This example highlights how privacy and the right to information can go hand in hand as it was the victim’s right to access her own medical file, and at the same time getting access to her own medical file is an act of personal privacy protection.&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Personal Experiences Shared&lt;/strong&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Participants shared how individual privacy is often violated by the army, as it is allowed to enter and search any space without warrant, if there is any type of “suspicion”. They also shared how phone tapping and random monitoring is a common practice by both the army and civil police. For example, one day the police recorded a conversation by Director of the Police, Wireless who was giving a lecture on how to lead an effective agitation. The transcript was handed to the high court and the director punished. Other examples include policemen frisking women in public, newspapers publishing police frisking women in public, and law enforcement agencies compelling pregnant women to give birth in open in front of people. The discussion surrounding privacy and security/law enforcement highlighted an important way in which privacy is violated in the North East. The unregulated action of law enforcement acts as a very real and dangerous way in which individual privacy is violated on a daily basis.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Questions to Consider&lt;/strong&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Can privacy legislation regulate the acts of law enforcement agencies?&lt;/li&gt;&lt;li&gt;Will privacy legislation be implemented differently in the North East because of the armed conflict?&lt;/li&gt;&lt;li&gt;Will a privacy law supersede other laws such as the AFSPA?&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Privacy and the UID&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;During &amp;nbsp; the &amp;nbsp; conference &amp;nbsp; the &amp;nbsp; discussion &amp;nbsp; also briefly focused on the UID and privacy. It was shared&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;that there had yet&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;to&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;be UID consultations in the North East of India. The only information individuals had about the UID was that it was going to allow individuals to access BPL benefits more easily.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Questions around the UID included: why is the UID needed for citizens living within their own country? How will the UID impact and help families who send their children to gather rations from the ration shops? What is the connection between the UID and the expected privacy law? What is the connection between the UID and intelligence agencies? What would UID mean to people living in border areas?&lt;/p&gt;
&lt;div&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;h3&gt;Privacy as a Fundamental Right&lt;/h3&gt;
&lt;/div&gt;
&lt;p&gt;In the closing discussion Prashant Iyengar shared different examples of privacy in Indian case law, and the various ways in which the Supreme Court has defined privacy as a right that is implicit in the right to life. The participants discussed what privacy means to them, and what they thought a right to privacy should entail. Among the points raised, it was brought up that privacy should be a right that is legally protected for sovereign individuals. The law should also include parameters and limitations in order to protect an individual’s autonomy. Furthermore, privacy should be understood and linked to the concept of human rights and individual rights. From the closing session, and the above sessions many themes and &amp;nbsp;questions &amp;nbsp;pertaining &amp;nbsp;to &amp;nbsp;privacy &amp;nbsp;came &amp;nbsp;out &amp;nbsp;that &amp;nbsp;will &amp;nbsp;need &amp;nbsp;to &amp;nbsp;be addressed &amp;nbsp;when considering the way forward &amp;nbsp;for a privacy legislation including:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Property rights and privacy&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy rights of minorities&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy and the UID&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy and law enforcement agencies&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy as a fundamental right&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;The interplay of privacy law and traditional law&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;a href="https://cis-india.org/internet-governance/publications/guwahati-privacy.pdf" class="internal-link" title="Guwahati Event Report [PDF]"&gt;Download the Event Report here&lt;/a&gt; [PDF, 178 kb]&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-26T10:31:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
