<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 551 to 565.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/business-standard-may-3-2017-shyam-ponappa-policies-to-sustain-indias-market"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/events/poesis-in-the-information-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/news/livemint-navadha-pandey-june-4-2019-plugging-into-indias-broadband-revolution"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/the-blindfolded-gaze-of-the-law-and-pornography"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/platforms-power-and-politics-pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-february-2020"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/substantive-areas/new-pedagogies/piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/content-access/photos"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/pervasive-technologies-patent-pools.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/patent-pools"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/pervasive-technologies-research-proposal.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/telecom/blog/business-standard-may-3-2017-shyam-ponappa-policies-to-sustain-indias-market">
    <title>Policies to Sustain India's Market</title>
    <link>https://cis-india.org/telecom/blog/business-standard-may-3-2017-shyam-ponappa-policies-to-sustain-indias-market</link>
    <description>
        &lt;b&gt;The question is whether policies can be better framed to harness the market potential. Why is so much investment flowing into India's securities markets?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article published in the &lt;a class="external-link" href="http://www.business-standard.com/article/opinion/policies-to-sustain-india-s-market-117050301322_1.html"&gt;Business Standard&lt;/a&gt; on May 3, 2017 was also mirrored on &lt;a class="external-link" href="http://organizing-india.blogspot.in/2017/05/policies-to-sustain-indias-market.html"&gt;Organizing India Blogspot&lt;/a&gt; on May 4, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Probably because of  (a) India’s market size and (b) growth, despite all its inconsistencies  and difficulties. Are higher price-earnings multiples desirable? Yes if  they are sustained, because more capital is available for equivalent  productivity; otherwise, no. The question is whether policies can be  better framed to harness the market potential.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;India’s large market with its headroom for prosperity seems propelled partly by its own momentum, and its stocks partly by liquidity. The net investment in mutual funds in 2016-17 of Rs 3.43 lakh crore was reportedly double the previous year, the highest in the last decade. Domestic investment in pure equity funds in the last two years exceeded foreign portfolio investment (FPI), because of lower FPI and higher domestic investment. Retail investors grew in the last three years from 28.6 million to 39.3 million.  Other positive factors were a government with a strong mandate and falling oil prices. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Now, reasonable earnings from some large companies and rising global markets augur well, although earnings must improve broadly and a number of caveats remain. These relate to non-performing assets/loans (NPAs/NPLs), structural problems in sectors such as iron and steel, construction, power, telecom, transport, agriculture, continuing deficiencies in infrastructure and institutions, and in productivity. There are social pressures from divisive electioneering, a disturbing rise of exclusionary tendencies echoed globally, and government overreach. There are also self-induced crises because of inappropriate policies, as in telecom, unviable situations created by populism, or by judicial orders, as seen in telecom, coal and power. There could also be failure to improve productivity (by a third to 9 per cent, as during the growth years), or adverse external developments.  &lt;br /&gt;&lt;br /&gt;The room for improvement is epitomised by low per capita productivity. According to Bloomberg, the International Labour Organization’s output per worker for India in 2017 is 20 times lower than for Germany. Yet, expectations run high for India in reports from sources such as Euromonitor, the International Monetary Fund, London’s Centre for Economic and Business Research (CEBR), and PricewaterhouseCoopers (PwC). Euromonitor predicts India’s consumer market will be the third largest by 2030, ahead of Japan and Germany. Growth will be for products such as smartphones, automobiles, and durables such as  TV sets, refrigerators and air conditioners. For instance, India is the third largest market for smartphones after China and the US. In automobiles, India is the fifth largest market with over 3.3 million cars sold in 2016 and continues to attract global manufacturers.  &lt;br /&gt;&lt;br /&gt;However, Euromonitor cautions against rising inequality with the Gini index rising from 39.9 per cent  in 2011 to 41.6 per cent in 2016   and estimated at 43.4 per cent by 2030. The CEBR estimates that by 2028, India’s gross domestic product will be the third largest after China and the US. PwC forecasts that in 2050, India will be the second largest economy (in purchasing power parity) after China, the US being third and Indonesia fourth, with a caveat: “Emerging economies need to enhance their institutions and their infrastructure significantly if they are to realise their long-term growth potential.”&lt;br /&gt;&lt;br /&gt;Can our policies better contribute to realising this market potential? Consider the options. One approach is open exploitation, unmindful of whether the ownership and distribution of profits is domestic or foreign. Prices are determined solely by supply and demand, without government regulation or any other authority. Another extreme is that the government decides everything, which has been seen to fail. A third option is a mix, with open-market principles in areas that can sustain them, such as in consumer goods, tempered with appropriate regulation, e.g., against harmful substances. Ideally, policies should be for the long-term common good with sustainable levels of equitable access. Regulation is essential where network economics apply with few players, as in electricity and communications. Our mix is not ideal because realpolitik and populism overwhelm the need for deep understanding followed by the objective and convergent deliberation needed to frame beneficial policies (through sound institutions, also lacking).&lt;br /&gt;&lt;br /&gt;Our policies are often indifferent to where ownership lies, and sometimes, this is a problem. For example, heavy industries or electronics majors abroad often have government backing. Indian enterprises start with a disadvantage, because of restricted access to capital, and at higher cost. Another aspect is when the ownership of major local corporates with privileged access to markets changes to being majority foreign-owned, because the profits are sent abroad. Yet another is that we do not have ecosystems for manufacturing start-ups through commercialisation and scaling up, in terms of financing, production and procurement. Attention seems confined to early-stage start-ups or to small-and-medium enterprises, with no ecosystem to see them through to establishing scale, comparable, for instance, to the building up of Huawei through consistent procurement.&lt;br /&gt;&lt;br /&gt;Our greatest deficiency, however, remains lack of good infrastructure. Correcting this requires a long view, capital, slow payback and long lead times for results, usually beyond election cycles. Easily sidelined for populist measures for immediate gains, this area needs concerted, bipartisan, societal convergence. A case in point is telecom and broadband, where spectrum auctions loom again, even as operators struggle with low revenues and high debt from previous auctions. Another is the recent Supreme Court ruling against compensatory tariffs for two ultra-mega power projects at Mundra, of 4,000 Megawatt (Mw) (Tata) and 4,620 Mw (Adani), based on whether a “change in law” applies only to Indian laws. If the tariffs were upheld, five buyer states would get a lower than average price paid, substantially below the current market price. If these projects become unviable, they will add to the deadweight of NPAs. The banks they owe will also suffer, and there will be the opportunity cost of benefits foregone from the lower-priced electricity.&lt;br /&gt;&lt;br /&gt;There may be a case for prioritising infrastructure, beginning with defining our objectives and then framing policies to achieve them. For power projects, it’s reasonably priced electricity; for telecom, it’s reasonably priced services. Until these are made possible through appropriate policies, there’s little likelihood of realising our full potential. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/business-standard-may-3-2017-shyam-ponappa-policies-to-sustain-indias-market'&gt;https://cis-india.org/telecom/blog/business-standard-may-3-2017-shyam-ponappa-policies-to-sustain-indias-market&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2017-05-20T03:06:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/events/poesis-in-the-information-age">
    <title>Poesis in the Information Age: Language and its Limit[ation]s</title>
    <link>https://cis-india.org/a2k/events/poesis-in-the-information-age</link>
    <description>
        &lt;b&gt;Alec Schachner, an independent scholar, translator, multi-genre musician and sound artist will give a talk on the limits/limitations of languages at the Centre for Internet &amp; Society's office on January 30, 2015 at 5 p.m.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;The Talk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;An examination of the limits/limitations of language(s) through the lens of contemporary Vietnamese poetics and print culture, aiming to open a deeper dialogue on the nature of self/state expression and censorship in the age of internet connectivity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Alec Schachner&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Alec graduated from Columbia College with a degree in Sociocultural  Anthropology, English &amp;amp; Comparative Literature, Creative Writing and  Music Theory/Composition. Alec currently resides in Vietnam, where he  has served as lecturer on literature for 5 years with the Faculty of  English Linguistics and Literature at the Vietnam National University of  Social Sciences and Humanities HCMC. He is working on English  translations of several anthologies of Vietnamese poetry, one of which -  &lt;i&gt;the purification festival in April&lt;/i&gt; - just went to print across  VN earlier this month. He is also pursuing research into contemporary  Saigonese print culture and the social/cyber mileus surrounding literary  circles/movements in the post-Socialist cultural sphere.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/events/poesis-in-the-information-age'&gt;https://cis-india.org/a2k/events/poesis-in-the-information-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-01-26T13:57:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations">
    <title>PMA Policy and COAI Recommendations </title>
    <link>https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Communications and Information Technology on the 10th of February, 2012 released a notification &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; in the Official Gazette outlining the Preferential Market Access &lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt; Policy for Domestically Manufactured Electronic Goods 2012. The Policy is applicable to procurement of telecom products by Government Ministries/Departments and to such electronics that had been deemed to having security concerns, thus making the policy applicable to private bodies in the latter half. The Notification reasoned that preferential access was to be given to domestically manufactured electronic goods predominantly for security reasons. Each Ministry or Department was to notify the products that had security implications, with reasons, after which the notified agencies would be required to procure the same from domestic manufacturers. This policy was also meant to be applicable to even procurement of electronic goods by Government Ministries/Agencies for Governmental purposes except Defence. Each Ministry would be required to notify its own percentage of such procurement, though it could not be less than 30%, and also had to specify the Value Addition that had to be made to a particular product to qualify it as a domestically manufactured product, with the policy again specifying the minimum standards. The policy was also meant for procurement of electronic hardware as a service from Managed Service Providers (MSPs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The procurement was to be done as according to the policies of the each procuring agency. The tender was to be apportioned according to the procurement percentage notified and the preference part was to be allotted to the domestic manufacturer at the lowest bid price. If there were no bidders who were domestic manufacturers or if the tender was not severable, then it was to be awarded to the Foreign Manufacturer and the percentage adjusted as against other electronic procurement for that period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecom equipment that qualifies as domestically manufactured telecom products for preferential market access include: encryption and UTM platforms, Core/Edge/Enterprise routers, Managed leased line network equipment, Ethernet Switches, IP based Soft Switches, Media gateways, Wireless/Wireline PABXs, CPE, 2G/3G Modems, Leased-line Modems, Set Top Boxes, SDH/Carrier Ethernet/Packet Optical Transport Eqiupments, DWDN systems, GPON equipments, Digital Cross connects, small size 2G/3G GSM based Base Station Systems, LTE based broadband wireless access systems, Wi-Fi based broadband wireless access systems, microwave radio systems, software defined radio cognitive radio systems, repeaters, IBS, and distributed antenna system, satellite based systems, copper access systems, network management systems, security and surveillance communication systems (video and sensors based), optical fiber cable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy also mentioned the creation of a self-certification system to declare domestic value addition to the vendor. The checks would be done by the laboratories accredited by the Department of Information Technology. The policy was to be in force for a period of 10 years and any dispute concerning the nature of product was to be referred to the Department of Information Technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;International and Domestic Response to the Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There was a large scale opposition, usually from international sectors, towards the mooting of this policy. Besides business houses, even organizations like those of the United States Trades Representatives criticized the policy as being harmful to the global market and in violation of the World Trade Organization Guidelines.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Criticism also poured in from domestic bodies in terms of recommendations towards modification of the policy largely on three grounds: (i) the high domestic value addition requirement and the method of calculation of the same, (ii) the lack of a link between manufacturing and security and (iii) application of the policy to the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cellular Operations Association of India (COAI) in a letter dated March 15, 2012 to the Secretary of the Department Technology and Chairman of the Telecom Commission expressed its views on the telecom manufacturing in the country.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;The COAI stated that such a development had to be done realistically and holistically so that the whole eco-system was developed as a comprehensive whole. In that regard it also forwarded a study that had been commissioned by COAI and conducted by M/s. Booz and Company titled “Telecom Manufacturing Policy – Developing an Actionable Roadmap”. The report was a comprehensive study of the telecom industry and outlined the challenges and opportunities that lay on its development trajectory. It also talked about Government involvement in the development process. The Report while citing the market share of Indian Telecom Industry which would be around 3% &lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt; of the Global Market highlighted the fact that no country could be self-sufficient in technology. It further talked about the development of local clusters in order to cut costs and encourage manufacturing, while ensuring that the PMA Policy was consistent with the WTO Guidelines. It further recommended opening up of foreign investments and making capital available to ensure growth of innovation. Finally it highlighted the lack of a connection between manufacturing and security and instead stressed upon proper certification, checks and development of a comprehensive CIIP framework across all sensitive networks for security purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a further letter to the Joint Secretary of the Department of Information and Technology dated April 25, 2012 the COAI expressed some reservations concerning the draft guidelines that had been published along with the notification.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; While stressing upon the fact that a higher value addition would be impossible with the lack of basic manufacturing capabilities for the development of technological units, it also highlighted the need to redefine Bill of Materials which had been left ambiguous and subject to exploitation. It further highlighted the fact that allowing every Ministry to make its own specifications would lead to inconsistent definitions and an administrative challenge and hence such matters should be handled by a Central Body. Furthermore it opined that the calculation of BOMs and the Value Additions should be done using the concept of substantial transformation as has been given in the Booz Study. Furthermore, while discouraging the use of disincentives, it stated that one individual Ministry should be in charge of specifying such incentives to avoid confusion and for the sake of ease of business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another letter to a Member of the Department of Telecommunications dated July 12, 2012 the COAI stressed upon the futility of having high value additions as the same was impossible under the present scenario.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; There was a lack of manufacturing sector which had to be comprehensively developed backed by fiscal incentives and comprehensive policies. In spite of that, it stressed that no country could become self-reliant and that such policies, like the PMA, were reminiscent of the “license and permit raj” era. It further said that such policies should be consistent with WTO Guidelines and should not give undue preference to domestic manufacturers to the detriment of other manufacturers. Countering the security aspect, it said that the same had been addressed by the DoT License Amendment of May 31, 2011 whereby all equipments on the network would have to comply with the “Safe to Connect” standard, and stressed upon the lack of any link between manufacturing and security. Furthermore for calculation of Value Addition it suggested an alternative to the method proposed by the Government as the same would lead to disclosures of sensitive commercial information which were contained in the BOMs. The COAI said that the three stages as laid out in the Substantial Transformation (as mentioned in the Booz Study) should be used for calculating the VA. It made several proposals to develop the telecom manufacturing industry in India including provision of fiscal incentives, development of telecom clusters and comprehensive policies which led to harmonization with laws and creation of SEZs among other such benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October 2012 the Government released a draft notification notifying products due to security consideration in furtherance of the PMA Policy.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;The document outlined the minimum PMA and VA specification for a range of products. It also stated several security reasons for pursuing such a policy and stated that India had to be completely self-reliant for its active telecom products. It also contained data on the predicted growth of the telecom market in India. The COAI thereafter released a document commenting upon the draft notification of the Government.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides highlighting the fact that the COAI still had not received a response to its former comments, it again stressed upon the lack of a link between security and manufacturing. It reiterated its point on the impossibility of a complete self-reliance on any nation’s part, and stressed upon the need of involving other stakeholders in the promulgation of such policies. It also made changes to the notified list of equipments, reclassifying it according to technology and only listing equipments which had volumes. Furthermore it also suggested changes towards the calculation of value addition to include materials sourced from local suppliers, in-house assemblage to be considered local material and the calculation to be done for complete order and not for each item in the order. It further recommended a study be conducted and the industry be involved while predicting demands as such were dated and needed revision. The Government thereafter released a revised notification&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; on October 5, 2012 but it did not contain much of the commented changes that the COAI had proposed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thereafter in April 2013, the DeitY released draft guidelines&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; for providing preference to domestically manufactured electronic products in Government Procurement in further of the second part of the PMA Policy. The guidelines besides containing definitions to several terms such as BOM also prescribed a minimum of 20% domestic procurement while leaving the specifications onto individual Ministries. It recommended the establishment of a technical committee by the concerned Ministry or Department that would recommend value addition to products. It followed a BOM based calculation of Value Addition while leaving the matter of certification to be dealt by DeitY certified laboratories that are notified for such purposes by the concerned Ministry/Department. DeitY was the nodal ministry for monitoring the implementation of the policy while particular monitoring was left to each Ministry or Department concerned. Among the annexures were indicative lists of generic and telecom products and a format for Self Certification regarding Domestic Value Addition in an Electronic Product.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI thereafter released a revised draft containing its own comments on April 15, 2013.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The COAI pointed out faults in the definition of BOM. It highlighted the difficulty in splitting R&amp;amp;D according to countries, and also stressed upon the impractical usage of BOM in calculation of value addition as the same was confidential business information. As it had already suggested earlier, it reiterated the usage of the Substantial Transformation process for the calculation of Value Addition. While removing the lists of equipments mentioned, it further pointed out that the disqualification in the format for self-certification would be a very harsh disincentive and would result in driving away manufacturers. It suggested that there should be incentives for compliance instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI along with the Association of Unified Telecom Service Providers of India sent a letter dated January 24, 2013 to the Secretary, DoT containing their inputs on Draft List of Security Sensitive Telecom Products for Preferential Market Access (PMA).&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; It again stressed upon the fact that security and manufacturing were not related and that the security aspect had been dealt by the “Safe to Connect” requirement mandated by the DoT License Amendment. It talked of the impossibility of arriving at VA figures until the same is defined to internationally accepted norms. Further it opined that if the Government had security concerns it should consider VA at a network level in the configurations as would be deployed in the network or its segments rather at element or subsystem levels as the latter would leave too many calculations open and the procurement entities will find it very difficult to ensure if they meet the PMA requirement or not. It further stressed upon the need to comply with WTO Guidelines while stressing upon the need to pay heed to certification standards than pursue the unavailable link between manufacturing and security through a PMA Policy. Finally it suggested a grouping of telecom products for the policy based on technology rather than individual products.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pursuant to a Round Table Conference Organized by the Department of Information and Technology, AUSPI and COAI sent another letter dated April 15, 2013 to the Secretary, Department of Information and Technology.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; It reiterated several points that both the AUSPI and COAI had been suggesting to the Government on the Telecom Manufacturing Policy. It cited the examples of other manufacturing nations to reiterate the fact that no country could be completely self-reliant in manufacturing electronics and such positions would only lead to creation of an environment that would not be conducive to global business. It further stressed upon the need to change the manner of calculation of VA while highlighting the fact that every Department should notify its list of products having security implications and the list of telecom equipment should be deleted from the draft guidelines being issued by DeitY to ensure better implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A major change came in on July 8, 2013 when the Prime Minister’s Office made a press release withdrawing the PMA policy for review and withholding all the notifications that had been issued in that regard.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; It said that  he revised proposal will incorporate a detailed provision for project / product / sector specific security standards, alternative modes of security certification, and a roadmap for buildup of domestic testing capacity. It further noted that the revised proposal on PMA in the private sector for security related products will not have domestic manufacturing requirements, percentage based or otherwise and that the revised proposal will incorporate a mechanism for a centralised clearing house mechanism for all notifications under the PMA Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI thereafter on November 7, 2013 sent a letter to the DoT containing feedback on the list of items slated for Government procurement.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;It noted that there were 23 products on which PMA was applicable. It pointed out that there were no local manufacturers for many of the products notified. It also asked the Government to take steps to ensure that fiscal incentives were given to encourage manufacturing sector which was beset by several costs such as landing costs which acted as impediments to its development. It stressed upon the tiered development of the industry needed to ensure that a holistic and comprehensive growth is attained which would result in manufacturing of local products. It requested that the Government "focus on right enablers (incentives, ecosystem, infrastructure, taxation) as the outcome materializes once all of these converge."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The COAI sent a further letter dated November 13, 2013 to the DoT concerning the investment required in the telecom manufacturing industry.&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;It noted the projected required investment of 152bn USD in the telecom sector and that the Government had projected that 92% of the investment would have to come from the Private Sector. COAI, while stressing upon the need of the Government and the Private Industry to work in tandem with each other, suggested that the Government devise methods to attract investments in the telecom sectors from international telecom players and that the Telecom Equipment Manufacturing Council meet to review and revise methods for attracting such investments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pursuant to the PMO directive, DeitY released a revised PMA Policy on the 23rd of December, 2014.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; While there have been a few major changes, not all of recommendations by various bodies have been adhered to.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;The major changes in the revised policy included the exemption of the private sector from the policy and the removal of PMA Policy to equipments notified for security reasons. The manner of calculation of the domestic value addition has not been changed though there has been a reduction in the percentage of value addition needed to qualify a product as domestic product. Another addition has been of a two-tiered implementation mechanism for the Policy. Tier-I includes a National Planning and Monitoring Council for Electronic Products which would design a 10-year roadmap for the implementation of the policy including notification of the products and subsequent procurement. Under Tier-II, the Ministries and Departments will be issuing notifications specifying products and the technical qualifications of the same, after approval by the Council. The former notifications under the 2012 Policy, including the notification of 23 telecom products by Department of Telecom,&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; are still valid until revised further.&lt;a href="#fn21" name="fr21"&gt;[21] &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. No. 8(78)/2010-IPHW. Available at http://www.dot.gov.in/sites/default/files/5-10-12.PDF (accessed 03 June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Preferential Market Access&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;The PMA Debate, &lt;/i&gt;DataQuest at http://www.dqindia.com/dataquest/feature/191001/the-pma-debate/page/1 (accessed June 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/letter-to-dit-on-pma-notification.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Around $17bn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/letter-to-dit-on-pma-notification.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. The letter is available at http://www.coai.com/Uploads/MediaTypes/Documents/coai-to-dot-on-enhancing-domestic-manufacturing-of-telecom-equipment-bas.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. The notification no. 18-07/2010-IP can be found at http://www.coai.com/Uploads/MediaTypes/Documents/DoT-draft-notification-on-Policy-for-preference-to-domestically-manufactured-telecom-products-in-procurement-October-2012.pdf  (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. The commented COAI draft can be found at http://www.coai.com/Uploads/MediaTypes/Documents/Annexure-1-Comments-on-draft-notification-by-DoT.pdf (accessed  June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Available at http://www.coai.com/Uploads/MediaTypes/Documents/dots-notification-on-telecom-equipment-oct-5,-2012.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The draft guidelines can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pma_draft-govt-procurement-guidelines-april-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The COAI commented draft can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pma-draft-security-guidelines-15-april-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/jac-007-to-dot-on-Januarys-list-of-telecom-products-final.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/jac-to-moc-on-pma.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. The press release can be found at http://www.coai.com/Uploads/MediaTypes/Documents/pmo-on-pma.pdfhttp://www.coai.com/Uploads/MediaTypes/Documents/pmo-on-pma.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/COAI-letter-to-DoT-on-Feedback-on-List-of-Items-for-Govt-Procurement.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. The letter can be found at http://www.coai.com/Uploads/MediaTypes/Documents/COAI-letter-to-DoT-on-Investments-Required-(TEMC)-Nov%2013-2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. The Notification No. 33(3)/2013-IPHW can be found at http://deity.gov.in/sites/upload_files/dit/files/Notification_Preference_DMEPs_Govt_%20Proc_23_12_2013.pdf (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. For more information, see http://electronicsb2b.com/policy-corner/revised-preferential-market-access-policy/# (accessed June, 2014).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. The notification has been mentioned and discussed above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. A list of notifications dealing with electronic products except telecom products can be found on the website of DeitY at http://deity.gov.in/esdm/pma (accessed June, 2014).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations'&gt;https://cis-india.org/internet-governance/blog/pma-policy-and-coai-recommendations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>dipankar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-02T06:45:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/news/livemint-navadha-pandey-june-4-2019-plugging-into-indias-broadband-revolution">
    <title>Plugging into India’s broadband  revolution</title>
    <link>https://cis-india.org/telecom/news/livemint-navadha-pandey-june-4-2019-plugging-into-indias-broadband-revolution</link>
    <description>
        &lt;b&gt;After many false starts, the plan to wire India’s digital future may finally take off with Jio GigaFiber’s entry.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Navadha Pandey was &lt;a class="external-link" href="https://www.livemint.com/technology/tech-news/plugging-into-india-s-broadband-revolution-1559662971455.html"&gt;published in Livemint&lt;/a&gt; on June 4, 2019. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;All through 2018, 58-year-old Ashok Kumar Rai’s Lucknow-based small architecture firm used to spend a princely sum of ₹11,800 each month for the privilege of a good broadband internet connection. “We used to send building walk-through files to clients every day and the size of each file could go up to 1GB (gigabytes)," he says. Doling out cash for reliable internet was a necessity. All that changed when a new player, Atria Convergence Technologies Ltd (ACT), came to Rai’s upmarket Gomti Nagar neighbourhood in Lucknow. In the summer of 2019, Rai’s internet access speed has shot up from 4 to 150 Mbps (megabits per second). And the monthly bill has come crashing down to about ₹1,000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For far too long, India’s internet action lay centered in its metros, leaving out even relatively big cities like Lucknow. The fledgling online access push into smaller cities and rural India happened primarily via mobile data transmitted over wireless spectrum. Home broadband was nowhere in the picture. But all that seems set for some dramatic change. If the country’s richest man, Mukesh Ambani, has his way, high-speed broadband will become a reality in at least 1,600 cities.&lt;/p&gt;
&lt;p&gt;In the process, he aims to also leapfrog India from its current rank—134—in fixed-line broadband penetration to the top five with the help of Jio GigaFiber.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dream of a broadband revolution, however, has its fair share of detractors. Bhaskar Ramamurthi, for example, who helms the Centre of Excellence in Wireless Technology (CWEiT at Indian Institute of Technology Madras (IIT Madras), says: “Fiber penetration will take a long time in India."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The logic is simple: unlike mobile towers, fiber needs to reach each home physically. China’s broadband boom happened because it has rebuilt nearly its entire housing stock in the last 15 years, fuelled by a construction-led growth bubble. “In India, initially only all the upcoming new buildings may get connected to fiber-based (fast) internet," says Ramamurthi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But India’s untapped millions are about to set off a race. And this journey, which will clearly not be a cakewalk, has huge rewards in store. Sample this: India has 1.16 billion mobile subscribers but just 18.42 million wired broadband subscribers. And many of them, like Rai, are data hungry. There is an existing playbook: what happened to mobile broadband after 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2014, the cost of one GB of mobile data was ₹270. Now, it is ₹10 per GB. As a result, mobile data consumption has soared. In late-2014, an average user on Airtel’s network (India’s largest telecom operator back then) used 622 megabytes (MB) of data in a month. By late-2018, the number of users had tripled, but, despite a broader base, average data usage stood at 10GB a month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/LinkingIndia.jpg" alt="Linking India" class="image-inline" title="Linking India" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;First-mover advantage&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The expansion in wired broadband access may have far-reaching implications beyond a mere spike in data usage. When Mukesh Ambani, chairman and managing director of Reliance Industry Ltd which owns Reliance Jio Infocomm Ltd, declared optical fibre based fixed-line broadband as “the future" last July, the real play was not on the infrastructure itself, but the services that would ride on top—from smart home experiences to new forms of e-commerce. The revenue and the first-mover advantage lie in who gets to tap into the “ecosystem"—of how a household connects to the wider world to buy, watch, and exchange.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Essentially, new businesses could emerge to feed the “ecosystem". And some existing small and medium-scale businesses may finally become viable enough to expand and go big. Netflix, for example, emerged as one of the world’s largest video streaming platform, riding on top of the US broadband boom. But India already has a crowded pack of 34 web video streaming entertainment platforms, most of which have cropped up to sustain the attention of mobile data guzzling Indians. With wired broadband following mobile usage expansion, unlike in most other countries, India’s new-age internet businesses are likely to be unique and different.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Home-based surveillance and security systems could be one space that could gain significant traction, says Sunil Abraham, executive director of the Bengaluru-based think-tank Centre for Internet and Society. “If there are 40 families (in a high-rise apartment) who have babies and need surveillance facilities, each apartment going for an individual connection from a telecom service provider would involve a huge amount of money. But a fibre-based intranet or peer network could connect all 40 flats for a much smaller price," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There could also be unintended consequences for the country’s digital gender divide. Only 29% of India’s current internet users are women, according to a recent Unicef report. If the cost of wired broadband begins to crash—thereby increasing the number of homes which have access—women who will never get access to a phone (due to the cost of device and patriarchy) will finally be able to see things on the internet, says Nandini Chami, a researcher at IT for Change, a non-governmental organization. “How this negotiation will happen inside the house, we will have to wait and watch," she says. Household-level access would also confuse corporate entities trying to “hyper-profile" users since multiple people will be accessing the internet through shared devices at home, she adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But as internet access improves, making the digital economy more vital, Chami says, governments would have an important role in ensuring women get to use the internet “on terms that are empowering". “We can think of innovative models when fixed broadband becomes cheap. The household is not the space for this. It can be libraries which have special times for young girls or digital labs for women. We need to rethink the missed opportunity of the BharatNet and the national optic fibre network. Internet access should not stop at just the panchayat office. We must think of different points of access, particularly for women," Chami adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The possibility of many of these radical changes in both the social and business realms will, of course, entirely rely on the pace at which India goes broadband. Despite the rapid expansion in mobile internet, data originating from mobile devices still account for only 20% of India’s data consumption. That is why what happens in the wired broadband space will matter increasingly. And that is also why Jio is betting big on expanding the existing wired user base (18 million) to 50 million.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Jio gameplan&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jio is currently running beta trials for GigaFiber in New Delhi and Mumbai, providing 100GB of data at 100 Mbps for free, except for the ₹4,500 one-time deposit for a router. While the landline will come with unlimited calling facility, television channels will be delivered over the internet (Internet Protocol Television, or IPTV). The packaged trio of fast Internet, landline telephony, and television access will remain free for a while—similar to what had happened in the mobile phone services segment in 2016. After commercial launch, the per month cost is expected to be ₹600, roughly half of what similar services cost currently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jio’s rival Bharti Airtel Ltd has decided that it is not interested in the entire pie but just the creamy top layer. It will focus on premium customers and expand its broadband services across India’s top 100 cities, instead of copying Reliance Jio’s ambitious plan to create a fibre-optic network across the country. To achieve this, Airtel, which already has 2.36 million fibre customers, will stay focussed on high-rise buildings rather than horizontal deployment, as this business model is more economical and logical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dark horse in this race is, of course, ACT with its existing 1.42 million customers. Its presence is much smaller with just 18 cities, largely in the south India and the newly expanded zones of Delhi, Jaipur and Lucknow. On the ACT fibre network, average data consumption per user is already at 130GB a month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We have seen a 150% increase in average consumption in the last 18 months," says Bala Malladi, chief executive officer, ACT. “People are now looking at higher speeds and the experience is taking precedence over cost. In fact, even in the hinterland, people want higher speeds and non-buffered experience," he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But why hasn’t fibre penetration gone up if the demand is booming? Why did India miss the bus when other countries like the US have an 80% fibre penetration?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Policy paralysis&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, fibre is expensive to lay, unlike a SIM card which can be given away for free. Moreover, India till a few years ago was mostly a voice calls market and not a data market. Secondly, municipalities in India have complicated right-of-way (RoW) procedures which act as a big hurdle for digging and laying fibre. This is one of the reasons why even government (such as the Delhi government) plans to set up citywide surveillance and Wi-Fi hotspots have failed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The centre has finally issued a very good RoW model, but now every state has to come up with its own policy modelled on the central guidelines. They are taking their own sweet time," says Rajan Mathews, director general, Cellular Operators Association of India (COAI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of forward movement on these fixable policy issues assumes significance given the government’s focus on fibre in its National Digital Communications Policy-2018, which has a target of attracting $100 billion worth of investments in digital communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy’s goals include universal broadband for all, creating four million jobs in digital communications, and raising the share of digital communications in India’s gross domestic product (GDP) to 8% (from less than 6% in 2017). Deployment of five million public Wi-Fi hotspots by 2020 through a National Broadband Mission is also on the agenda. The key goal, however, is to provide 1 Gbps (gigabit per second) connectivity to all gram panchayats by 2020 and 10 Gbps by 2022.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sad reality is that the last five years were an absolute failure in laying fibre in the country. BharatNet, the flagship mission to connect 250,000 gram panchayats with broadband, which was being implemented by Bharat Broadband Network Ltd (BBNL), a special purpose vehicle set up under the department of telecommunications (DoT) in February 2012, has been a disappointment, to say the least.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has completed laying optical fibre cables across more than 100,000 gram panchayats in the first phase and had aimed to complete connecting the remaining 150,000 councils by March 2019. The second phase has seen “zero progress", according to government officials close to the matter. Pained by poor utilization of digital infrastructure, the Telecom Regulatory Authority of India (Trai) suggested auctioning BharatNet infrastructure on an “as is where is" basis after a meeting held in December at the prime minister’s office to take stock of the mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To start with, the DoT plans to monetize fibre assets built by the government under its flagship mission BharatNet through outright sale to private players or by leasing these assets for a 20-year period after a bidding process. If successful, it could boost connectivity in Indian villages, which have so far been kept out of the digital dividend.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bigger cities, however, will have a different consumption story. With intra-city fibre coverage leading to improved penetration, wired broadband would not just offer an enhanced content viewing experience, but also open doors for internet of things, or IoT. “Home security is going to become a big business going forward, riding on fibre. Even gaming will see a lot of traction as you can enjoy a 4K game in real-time, thanks to low latency and high speed of an optic network," Malladi of ACT says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The looming question, however, is how much investment can operators put in given the current low tariff environment in the telecom sector. Big players are stressed for funds and are diluting their non-core assets to generate funds to keep networks afloat. “If you are looking at what will happen in the next three years... I believe that there is a business case to be made and tariffs should sustain it (the investment)," Mathews says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether that happens or not could become an important footnote in India’s growth story. The far-reaching implications of fast internet access pushed billionaire tech entrepreneur Elon Musk, chief executive officer of Space Exploration Technologies Corp. (SpaceX), to launch 60 internet-beaming satellites last month. The grand scheme is a response to the practical constraint of laying fibre, a concern which is more pressing in India’s vast landmass.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike Musk, the country’s broadband dreams, however, still remain rooted to the ground—in the simple tech of optic fibre. And the success or failure of those dreams will be written by how fast the fibre network expands.&lt;/p&gt;
&lt;p&gt;&lt;aside class="fl"&gt;&lt;/aside&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/news/livemint-navadha-pandey-june-4-2019-plugging-into-indias-broadband-revolution'&gt;https://cis-india.org/telecom/news/livemint-navadha-pandey-june-4-2019-plugging-into-indias-broadband-revolution&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Navadha Pandey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2019-06-05T14:02:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/the-blindfolded-gaze-of-the-law-and-pornography">
    <title>Pleasure and Pornography: Pornography and the Blindfolded Gaze of the Law</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/the-blindfolded-gaze-of-the-law-and-pornography</link>
    <description>
        &lt;b&gt;In the legal discourse, pornography as a category is absent, except as an aggravated form of obscenity. Does this missing descriptive category assist in the rampant circulation of pornography, either online or offline? Rather than ask that question, Namita Malhotra, in this second post documenting her CIS-RAW project, explores certain judgments that indeed deal with pornographic texts and uncovers the squeamishness that ensures that pornography as an object keeps disappearing before the law.

&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;When Justicia, blindfolded, cannot see the profane …&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;In the legal discourse, pornography as a category is absent, except as an aggravated form of obscenity (1). Does this missing descriptive category assist in the rampant circulation of pornography, either online or offline? Rather than ask that question, I would like to explore certain judgments that indeed deal with pornographic texts and uncover the squeamishness that ensures that pornography as an object keeps disappearing before the law.&lt;/p&gt;
&lt;p&gt;For instance, in the case of Fatima Riswana V. Chennai &amp;amp; Ors. (2)&amp;nbsp; both the public prosecutor and counsel for the petitioners applied to the court for transfer to another (male) judge, to save the District Lady Judge from embarrassment. The order for transfer was passed, so that the District Lady Judge does not have to view certain CDs that are part of the evidence. The justification for this is that the 'said trial would be about the exploitation of women and their use in sexual escapades by the accused, and the evidence in the case is in the form of CDs, viewing of which would be necessary in the course of the trial; therefore, for a woman Presiding Officer it would cause embarrassment'.&lt;/p&gt;
&lt;p&gt;This is a rather obvious case, where explicit and pornographic material is made to disappear before the eyes of the law, gesturing towards the larger complicity that allows society and law to create a ruckus about Richard Gere and Shilpa Shetty’s kiss, HBO's English movie channel, dance bars and other such aspects of the sleazy modernity that we inhabit (3), but simultaneously is oblivious to circulation of pornography, both online and offline.&lt;/p&gt;
&lt;p&gt;In a rather confrontational visual juxtaposition, I place Savita Bhabhi alongside Husain’s Mother India, to be able to ask several questions, including the question of which one’s existence has been more threatened by the law. There is almost no doubt about it; Savita Bhabhi’s chequered career as a slutty housewife has been marred only by two scandals (and several almost patriotic accounts of India having finally arrived (4)) – once when a child sent an MMS about his teacher and it made references to Savita Bhabi, which led to some mention of action that might be taken against the website (5), and another time when Karan Johar (Mid Day, Delhi – 31 March 2009) remarked that one of the characters, Jeet, has a look similar to that given to Amitabh Bachchan in 'Kabhi Alvida Naa Kehna', and this might be a case of copyright infringement. Neither of these have resulted in any serious charge against the alleged anonymous producers, Indian Porn Empire, or what is more probable, the blocking of the website regardless of whether the producers/creators can be found and prosecuted. However Husain’s untitled painting, which surfaced on a website for an auction for victims of a Kashmir earthquake in 2006 (two years after it was first sold by the painter), was dragged to court on serious charges of obscenity, which fortunately led to a rather progressive judgment on obscenity by the Delhi High Court.&lt;/p&gt;
&lt;p&gt;Returning to the two images of nude women, obscenity law in India has laid down that “nudity in art and literature is not per se evidence of obscenity”. As stated in the judgment that dealt with the circulation of Hussain’s untitled painting (later titled 'Bharat Mata') 'the work as a whole must be considered, the obscene matter must be considered by itself and separately to find out whether it is so gross and its obscenity so decided that it is likely to deprave and corrupt those whose minds are open to influences of this sort'.&amp;nbsp; What renders an object obscene is the transaction rather than the text -- a transaction involving the depiction-consumption of the female body , and the sexualisation of the viewer who in turn sexualises the object. It is not just that the painting/image may already be sexualized but also that the public is in turn sexualised by looking at it (and sexualises it with its
gaze), thus making them vulnerable to the perversion that is modernity
itself and the pornographic gaze (Nitya Vasudevan and Namita A. Malhotra, State of Desire - Unpublished article). To put it simply, the anxiety of the state is not just about the object, but also about its circulation in the public, and the meanings it acquires through these series of transactions.&lt;/p&gt;
&lt;p&gt;Legal and public discourse is often obsessed with the various meanings that become possible because of the placing of this naked body - or the transactions of this naked body with the context, background, narrative that it is placed in. Though seemingly sexualised already as a naked body (this can be refuted not only by the Indian court but various examples in art, religious architecture, etc.) the meanings it may carry are further complicated when it is placed in a pornographic comic online, bearing a crown and saying 'I will be Miss India', or as a faceless hazy outline in the foreground of the map of India. Hussain’s depiction of the naked woman on the map of India, embodying India (in pain or anger) carries many jostling, conflicting meanings. Inspite of the furore over the painting, the High Court finally held that the painting was not obscene, stating that the intention of the painter was to evoke sympathy for a woman – indeed a nation – in distress (6) . However what is intriguing, is that Savita Bhabi’s body, her markings of Indian-ness, her poses and postures are not examined to that extent either by the court or the public.&lt;/p&gt;
&lt;p&gt;Pornography, as obscenity in its aggravated form or explicit depiction of sexual acts without a relevant or coherent narrative, has been dropped from both legal discourse and academic and cultural analysis--is it possible to surmise that this has happened because it can be read as a blank slate, a place where meanings cannot be read, felt or inferred? Pornographic movies are spliced into mainstream films, circulate
surreptitiously through video stores, piracy markets or though online
spaces that cannot be easily accessed because of regulations and
filters in most places –- colleges, homes, schools, offices, cybercafes
(7) etc. Can we surmise that the transaction of the sexualized gaze with the obscene object has been, in this way, so removed from public gaze that it does not merit discomfort and anxiety for the state or public, unless it nefariously slips into public discourse (DPS MMS, Noida MMS, Mysore Mallige)? As long as it is a secretive (even if mass) consumption, it does not disturb the heternormative familiar and familial in the manner that an object whose obscenity is not quite obvious or clear does – for example, HBO's English movie channel (8).&lt;/p&gt;
&lt;p&gt;In this context, let us look at an excerpt from the progressive judgment on Hussain’s painting, which demonstrates the extent to which the court has to read the meanings of an image to determine whether it is obscene or not, but simultaneously, by not ever having to interact with a pornographic text, the court (or the public) does not have to see that there are many meanings embedded in such an image as well.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;'One of the tests in relation to judging nude/semi nude pictures of women as obscene is also &lt;strong&gt;a particular posture or pose or the surrounding circumstances&lt;/strong&gt; which may render it to be obscene, but in the present painting, apart from what is already stated above, the &lt;strong&gt;contours of the woman’s body represent nothing more than the boundaries/map of India.&lt;/strong&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Even if a different view had to be taken that if the painter wanted to depict India in human form, it may have been&lt;strong&gt; more appropriate to cloth the woman in some manner may be by draping a sari &lt;/strong&gt;or by a flowing cloth etc., but that alone cannot be made a ground to prosecute the painter.&lt;/em&gt; &lt;em&gt;There can be a numbers of postures or poses that one can think of which can really stimulate a man’s deepest hidden passions and desires. To my mind, art should not be seen in isolation without going into its onomatopoetic meaning and it is here I quote Mr. Justice Stewart of the US Supreme Court in Jacobellis v. Ohio 378 U.S. 184 (1964) who defined ‘obscenity’ as, “I will know it when I see it”. The nude woman in the impugned painting is not shown in any peculiar kind of a pose or posture nor are her surroundings so painted which may arouse sexual feelings or that of lust in the minds of the deviants in order to call it obscene. The &lt;/em&gt;&lt;em&gt;&lt;strong&gt;placement of the Ashoka Chakra&lt;/strong&gt; or the States in the painting
is also not on any particular body part of the woman which may be
deemed to show disrespect to the Ashoka Chakra/States and the same was
conceded by the learned counsel for the respondent during the course of
the arguments advanced. &lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;It is possible that some persons may hold a more orthodox or conservative view on the depiction of Bharat Mata as nude in the painting but that itself would not suffice to give rise to&amp;nbsp; a&amp;nbsp; criminal prosecution of&amp;nbsp; a person&amp;nbsp; like&amp;nbsp; the petitioner who may have more liberal thoughts in respect of mode and manner of depiction of Bharat Mata.' &lt;/em&gt;(9)&lt;/p&gt;
&lt;p&gt;A body that doesn’t carry inscriptions of cities on different body parts, but is definitely inscribed as Indian is that of Savita Bhabi – from the mangalsutra that never comes off even during doggy-style sex, the sari that slips off rather easily, the bindi, the gestures and mannerisms, to the stories that place her in sexual encounters with familiar people – the bra salesman, the old boyfriend, the cousin, the doctor, the woman colleague, the boss, the aging star and many others.&lt;/p&gt;
&lt;p&gt;Savita Bhabhi thus carries as many confusing, jostling meanings as a pornographic text. For instance, she refers to recession and aspirations to become Miss India. She ventures into the fantasy world of her fans, since many of her stories are drawn from their stories on the Savita Bhabi website and fansite –- whether these stories are make-believe or true is irrelevant. These resonances of the text beyond mere sexual arousal are obvious.&amp;nbsp; Even if one were to ignore Linda Williams (10) and inferences from Foucault that pornography becomes one of the many forms in which knowledge of pleasure is organised, it is obvious that from varied perspectives within film studies and legal studies, pornography merits examination. Williams' point also seems to provide some insight into why pornographic circulation doesn't merit much anxiety from the state or in the law; if pornography is organised in consonance with the heteronormative familiar and familial and accessible primarily by men, then maybe it is not such a big surprise that the state or the law is not really invested in controlling pornography, since pornography itself is controlling modes of sexuality and/or sexual expression.&lt;/p&gt;
&lt;p&gt;Returning to the comparison, Hussain's untitled nude body on the map of India is literally marked. She carries these inscriptions -- Gujarat on one breast, Bangalore between her thighs, Chennai on her calves, Goa on her hip. Savita Bhabi is marked by her sari, her bindi, her blouse, her aesthetic sense, her fantasies of film stars, her  stories of encounters in dressing rooms and myriad other recognizable details -- that mark her as Indian, or at least as living in India, in an Indian (albeit a privileged fair North Indian) body. However, it is Husain's untitled painting -- not called Bharat Mata (and the painting doesn't seem to signify a maternal relation but that of a wounded woman or pained woman) -- that goes to court on charges of obscenity.&lt;/p&gt;
&lt;p&gt;Before looking at the few judgments that deal with the actual pornographic text, I take a detour to look at another iconic female figure -- that of Justice. Though clothed, she is blindfolded, so as to be able to discern even a fraction of a slip in the scales of justice; visual cognition would not be sufficient for her to recognise such a slip. As explained by Costas Douzinas, ('The Legality of the Image, lecture – December, 1999), ‘Justice must be blindfolded to avoid the temptation of facing the concrete person and putting individual characteristics before the abstract logic of the institution'. Martin Jay traces the trajectory of how justice became blindfolded through the ages, in the article 'Must Justice Be Blind' (11). Justice was initially wide-eyed and alert; she was blindfolded by the Fool in a period when corruption of the rulers was rampant; she was immortalised by Vermeer as staring at empty scales; and in a transitory state before being completely blinded she had two heads, with a pair of eyes that could see, and a pair that was blindfolded -- shielded, maybe, from the profane and from embarrassment.&lt;/p&gt;
&lt;p&gt;I look at this blindness of the judicial system that allows pornography to circulate, while pinning down the obscene and examining minutely its various meanings. The obscene ('Satyam Shivam Sundarmam', 'Prajapati' – a Bengali magazine which carries short stories, 'Lady Chatterley’s Lover', 'Bandit Queen') is examined firstly, for whether it is so gross, though grossness or vulgarity as such is not enough to establish obscenity. And secondly, for whether it has the tendency to deprave and corrupt those whose minds are open to such influences and into whose hands -- or rather, vision -- such an object might fall (this is what allows for the circulation in limited publics -- adult audiences, time slots on television).&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Hard and Near Hard Pornography: Close Encounters of the Law with the Profane&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the case of Anonymous vs. the Commissioner Of Police (12), yet another encounter takes place between the embarrassed law and the pornographic text. The excerpt below describes the encounter of two women advocates asked by the court to examine what movies are being exhibited at a specific theatre. In the peculiar clash of social mores, that ensure who has access to pornography, and the law, that ensures equal access to all legally sanctioned media to everyone, the movie theatre was held responsible for violating the fundamental right of women to have access to their premises -- and thus access to pornography. &lt;br /&gt;&lt;br /&gt;&lt;em&gt;'We approached the booking counter of Rs. 20/- and asked for tickets. The booking clerk first informed us that it is an English movie and it is not meant for ladies to view. When we insisted for tickets, he asked us to come inside the booking room from the main entrance of the theatre. When we were entering the theatre, the gate-man informed us that ladies are not permitted as it is a "SEX MOVIE".&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;However, we walked into the booking room. Booking clerk issued us Box-A tickets and further asked us to see the Manager before taking seats. We did not see the Manager but directly went to Box-A and took seats. Even the Box-A doorman asked us to leave the theatre advising us that we being ladies cannot see it as the movie is a "SEX MOVIE". When the movie began at 12.00 P.M. simultaneously the Manager along with two men switched on the lights in Box-A and asked us to leave the hall immediately. Since he repeatedly insisted us to leave, we both came out of Box-A. On coming out we enquired as to why we should not see the movie, to which the Manager replied that it is a "BF". On asking for further clarification of "BF", the Manager stated that it means "BLUE FILM". When we asked him to identify himself, he informed us that he is Mr. Prasad, Manager of the Theatre, as such he has every right to ask us to leave. When we asked as to how it was not advertised that the movie is meant for men only, he retorted that "It is understood that whenever English movies are played in this theatre, ladies are strictly not permitted." As such we were forced to leave the theatre immediately.'&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;The question before the court was whether the films exhibited in this theatre were being exhibited in accordance with&amp;nbsp; the censor certificate or whether there was any tampering; whether there was any other device or contrivance to interpolate or intermingle blue films with any otherwise innocent-looking film. Here, though the court had taken it upon itself to address the pornographic text, it ran into a series of complications when merely trying to access the text or the evidence itself, as two women advocates were sent to determine if there was an illegal film exhibition taking place. Pornography seems to be continuously disappearing even on the rare occasion when it is addressed directly by the court, especially in the court's attempt to precisely locate the moment of transaction of the gaze with the pornographic object.&lt;/p&gt;
&lt;p&gt;The court, when allowed to examine the film exhibited, found that it was 'a hotch potch of short films, advertisement films, party propaganda films, Hindi and Telugu feature film bits'. (13) The court finally located the pornographic segments (squeezing breasts in a tub, cunnilingus, brutal murder scene) and the court’s comment was that 'normal scenes were replaced by sexy scenes'. The recommendation of those who examined the films that were ostensibly being spliced into &lt;em&gt;Secret Games 3&lt;/em&gt; and &lt;em&gt;Dark Dancers&lt;/em&gt; is that, 'The only course proper is not to permit entry into the country for such films which prima facie may be &lt;strong&gt;classified hard or near-hard&lt;/strong&gt;'. Though the term near-hard is amusing and unique classification of pornography, maybe it's a Freudian slip by a judicial system caught between disgusted arousal and embarrassment.&lt;/p&gt;
&lt;p&gt;Finally, in this judgment, the court had to acknowledge its own blindness&amp;nbsp; -- that there is ‘some hole somewhere in the system so that even excised portions by the Censor Board of the films have found their way to the theatres’, including portions that were never passed through the censor certification process at all. &lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Whose Hard-On (or Near Hard-On) Are We Looking for: The Law in Its Search for the Profane&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;In 2005, two teenagers frolicking were captured on a mobile phone camera, and the clip circulated first through mobile phones and then subsequently on the internet. The clip sparked off a phenomenon of hidden camera and mobile phone clips -- a booming pornographic enterprise now on the internet. For a split second, it seemed as though any kind of desire could become pornographic, captured in an ubiquitous medium and transmitted throughout the country. That thrill and anxiety was possibly grasped at slightly in Anurag Kashyap’s &lt;em&gt;Dev.D&lt;/em&gt;, where Chanda -- the prostitute, or the other of the good girl -- is the one depicted as the unknown girl who was part of the MMS clip. Very few films have been able to grasp the visceral embarrassment and immediacy of desire as &lt;em&gt;Dev.D&lt;/em&gt; does, and it is possibly not the story of Chanda, but that of Paro that achieves this. Paro, who sends nude pictures of herself across continents; Paro, the cyber-sexer; Paro, the entirely relatable slut who cycles with a mattress across fields of mustard in small town Punjab because she desires sex.&lt;/p&gt;
&lt;p&gt;After three and a half years (countless MMSs, one movie reference, and a few academic articles later) the court passes judgment in this case – of who possibly can be held liable for the circulation of the MMS clip online, and specifically its sale on Bazee.com (an eBay subsidiary) by an IIT student (Avnish Bajaj vs State on 29/5/2008 by Muralidhar J.). In this case, it is not the pornographic text that keeps slipping and eluding the grasp of the court; the problem is in the inability, especially in the age of the internet, to fix the transactions around such an object that is rapidly changing hands and circulating at an exponential speed through the internet.&lt;/p&gt;
&lt;p&gt;The court is in a bind -- the wrong person is accused. Not the corporate body of Bazee but the CEO of Bazee himself (the boy is a juvenile so is facing lesser charges in the juvenile court). The court has the responsibility to fix the blame of the circulation of the obscene object on Avinash Bajaj, without being able to establish that there is any knowledge on his part about the existence of the clip. Though the court was able to establish that there was negligence on the part of Bazee in running the website (in spite of notification, the clip remained on sale for a whole working day after the complaint), and that the filters used by Bazee were obviously inadequate to control what is sold through the website, it was still not possible to find the CEO liable for obscenity charges. If the company had been charged, this would have been possible. Eventually, even though obscenity as a charge couldn’t stick, similar provisions in the IT Act (Section 67 read with Section 85) were used to charge Avinash Bajaj himself, as opposed to Bazee (the corporate body or the company itself).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Here again the court is forced to confront a pornographic text only in instances where there has been a public furore around it, and the eventual judgment is not likely to be able to even remotely address the phenomenon of MMS clips and hidden camera footage from cybercafes and hostels that has been spawned as a result of this incident. The slippery transaction of the gaze with the pornographic object is difficult to fix though in a different way from the earlier judgment – here the pornographic nature of the text is understood rather than examined, more for its violation of privacy than actual elements of obscenity. But it is still hard to determine for the law, especially with the internet, how and by whom has circulation of the pornographic object has taken place and to fix these transactions to ensure legal culpability.&lt;/p&gt;
&lt;p&gt;*****&lt;br /&gt;Curiously this tale of women advocates and judges as representatives of law and justice, who are averting their gaze from the pornographic text or find that the text is constantly eluding their legal stare, must deal in its closure with the figure of the male judge. Anne McClintock’s male judge in her article ‘Screwing the System’ (14) is a judge who gets a hard-on each time he sentences a prostitute -- a judge who otherwise pays to be beaten by the very same prostitutes. The Hidayatullah paradox of obscenity law is that the judge who decides on obscenity has to decide on the basis of whether he is affected, or rather aroused -- and if he is turned on, then how is he any longer the reasonable judge, or even the 'reasonable man' who can be expected to pass judgment with the dispassionate authority of law? The work of both Shrimoyee N. Ghosh (on the dance bar judgment) and Lawrence Liang (on cinema and the law) on the relation between law and affect, gestures towards an interesting puzzle for us to consider here: if we could look into the eyes of justice, if she were not blindfolded, what would we see? And is the purpose of the blindfold indeed to prevent us from observing the affective life of law itself – its arousal, disgust and embarrassment?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Endnotes:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;1.&amp;nbsp; Ranjit Udeshi v. State of Maharashtra. Only in the recent fairly progressive judgment on Hussain’s painting, that held eventually after examining it, that it was not obscene, was there an attempt at giving some distinction to the category of pornography apart from it being an aggravated form of obscenity and to say that it, as a class of objects, images, paintings, videos, is designed for sexual arousal, while other material which may or may not be obscene is meant to have other meanings. Such reading of the author’s intentions is a convoluted way of restating Justice Potter’s statement – 'I know it (hard core), when I see it'. &lt;br /&gt;2.&amp;nbsp; Fatima Riswana v. State Rep. By A.C.P., Chennai &amp;amp; Ors.Case No.: Appeal (crl.) 61-62 of 2005&lt;br /&gt;3.&amp;nbsp; -'…in a clear shift of subject matter, what we are now seeing is an explicitly politicized moral censor looking at all this—looking not so much at the sex industry as at society-in-general, at society itself now theatricalised into a morbid stage of sleaze'. Ashish Rajadhyaksha, in his essay ‘Is Realism Pornographic?,’ which deals with the writings of Pramod Navalkar, former Minister for Culture in Maharashtra, points to how explicit or hard-core pornography does not seem to be the concern as much as a whole range of practices attached to the phenomenon of modernity&lt;br /&gt;4. Anastasia Guha, The Beatitudes Of A Bountiful Bhabhi, Tehelka, Vol 5, Issue 19, Dated May 17, 2008. Available online at http://www.tehelka.com/story_main39.asp?filename=hub170508the_beatitudes.asp &lt;br /&gt;5.&amp;nbsp; Savitha Bhabi threatened, http://infotech.indiatimes.com/quickiearticleshow/3476748.cms &lt;br /&gt;6.&amp;nbsp; For instance, the court held that in Bandit Queen, the nudity during the sequence of rape and torture of Phoolan Devi is necessary in the narrative and essential for the impact and the moral that the story is trying to convey – her anger with the upper caste feudal landlords and her quest for justice become identifiable for the viewer, and hence the nudity is in fact necessary in the story, and has no ‘tendency to deprave or corrupt’.&lt;br /&gt;7.&amp;nbsp; The regulation of cybercafes takes place in a manner reminiscent of how cinema spaces such as movie theatres were sought to be regulated by the colonial law. Current laws demand placing of computers so monitors face outward, use of identity cards for every visit, data retention for at least a month for most users, etc. &lt;br /&gt;8.&amp;nbsp; Though the latter might be a valid assumption (and certainly beneficial for us) it is an assumption whose presumptuous certainties are shaken in the age of the internet, especially that primarily men access pornography and cyber sex through these newly opening up online spaces.&lt;br /&gt;9. Maqbool Fida Husain v. Raj Kumar Pandey CRL. REVISION PETITION No. 114/2007. Decided on 08-05-2008&lt;/p&gt;
&lt;p&gt;10.&amp;nbsp; Williams, Linda. Hard Core: Power, Pleasure and the Frenzy of the Visible. Berkeley: University of California Press, 1989&lt;br /&gt;11.&amp;nbsp; Costas Douzinas, Lynda Nead (Eds), Law and the Image: the Authority of Art and the Aesthetics of Law. University of Chicago Press, 1999&lt;br /&gt;12.&amp;nbsp; Anonymous Letter-Un-Signed vs The Commissioner Of Police And Others on 26 December, 1996&lt;br /&gt;13.&amp;nbsp; For a judicial system that is invested in narrative film or narrative structure for reasons of copyright law (see generally Anne Baron, The Legal Property of Film) or for aesthetic reasons, as is evident from the judgment in Bandit Queen (that held nudity when she was paraded naked in front of the villagers to not be obscene because those scenes are needed for a narrative impact – for people to feel moved and disgusted by Phoolan Devi’s plight) it must also be a different kind of horror to find films chopped up into twenty sundry pieces, the last piece thrown somewhere else.&lt;br /&gt;14.&amp;nbsp; Anne McClintock, Screwing the System: Sexwork, Race and the Law, Boundary 2, Vol. 19, No. 2, Feminism and Postmodernism (Summer, 1992), 70-95. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/the-blindfolded-gaze-of-the-law-and-pornography'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/the-blindfolded-gaze-of-the-law-and-pornography&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>namita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>histories of internet in India</dc:subject>
    
    
        <dc:subject>Obscenity</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    
    
        <dc:subject>Art</dc:subject>
    
    
        <dc:subject>cybercultures</dc:subject>
    
    
        <dc:subject>women and internet</dc:subject>
    
    
        <dc:subject>YouTube</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>cyberspaces</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>History</dc:subject>
    

   <dc:date>2011-08-02T08:37:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/platforms-power-and-politics-pdf">
    <title>Platforms, Power, and Politics pdf</title>
    <link>https://cis-india.org/raw/platforms-power-and-politics-pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/platforms-power-and-politics-pdf'&gt;https://cis-india.org/raw/platforms-power-and-politics-pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-07-07T15:15:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-february-2020">
    <title>Platformisation of Domestic Work in India: Report (February 2020)</title>
    <link>https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-february-2020</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-february-2020'&gt;https://cis-india.org/raw/platformisation-of-domestic-work-in-india-report-february-2020&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-17T07:21:17Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research">
    <title>Plan for open access to science research</title>
    <link>https://cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research</link>
    <description>
        &lt;b&gt;The policy is open to comments from the public till July 25.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Renuka Phadnis was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/plan-for-open-access-to-science-research/article6235389.ece"&gt;published in the Hindu&lt;/a&gt; on July 22, 2014. T. Vishnu Vardhan gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ever felt frustrated while reading a science research journal online,  only to see the message “to continue reading, subscribe now”? That may  soon change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Department of Science and Technology and the Department of  Biotechnology (DBt) under the Ministry of Science and Technology have  drafted a policy that says publicly-funded scientific work published in  science journals must adhere to open access (OA) norms, enabling anyone  to read online content on science research for free.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OA is an initiative of Open Archives Initiative (OAI), an organisation  which works for greater reach and free access to online science research  funded by public money.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;T. Vishnu Vardhan, Programme Director, Access to  Knowledge, Centre for Internet and Society, Bangalore, which assisted  DST in drawing up the draft policy, said that in the absence of OA  norms, commercial publishers were making money with content generated by  scientists who used public funds for research.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, those sceptical of the DST initiative are asking whether availability on the Net is equivalent to “public domain”. Concerns have also been raised about the quality of content provided through OA, as honing raw research material into scholarly journals requires rigour that commands a cost. Ramakrishna Ramaswamy, Fellow of the Indian Academy of Sciences, Hyderabad, said it was much more important to make reliable information available to the public, at a reasonable charge, because “the price of keeping it free has a cost”. The draft of the DBT-DST Open Access Policy is open to comments from the public till July 25.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research'&gt;https://cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-25T07:07:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain">
    <title>Pitroda seeks to put govt information in public domain</title>
    <link>https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain</link>
    <description>
        &lt;b&gt;In the first-ever Indian government press conference on Twitter, Sam Pitroda, adviser to Prime Minister Manmohan Singh on public information infrastructure and innovations, championed the cause of putting government information in the public domain to usher in openness and empowerment. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Surabhi Agarwal's article was &lt;a class="external-link" href="http://origin-www.livemint.com/Politics/5xXKN9JH15noiYuQtVQtrL/Governments-first-ever-conference-on-Twitter-to-begin-short.html"&gt;published in LiveMint&lt;/a&gt; on September 25, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;img alt="  " src="http://origin-www.livemint.com/rw/LiveMint/Period1/2012/09/26/Photos/sam%20pitroda1--621x414.jpg" title="  " /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, we have the Right to Information (Act) but the information is locked up in files,” he said in a video that was uploaded on YouTube before the conference started. Pitroda said the government has various plans to build robust information infrastructure on a scale that has never been done before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I firmly believe that information is the fourth pillar of democracy along with (the) legislature, executive and judiciary,” he tweeted as opening remarks during the press conference titled “Democratization of information”.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img alt="photo" height="220" src="http://origin-www.livemint.com/rf/Image-330x220/LiveMint/Period1/2012/09/26/Photos/web_socialmedia.jpg" width="330" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Even though Pitroda largely reiterated the government’s already announced plans in the space of digitization, the move to hold a press conference over Twitter has been largely construed as as a sign that the administration, criticised for attempting to rein in social media, is trying to come to terms with it.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, executive director of Bangalore-based research organization Centre for Internet and Society, said too much shouldn’t be read into Pitroda holding a press conference on Twitter. One government bureaucrat available on Twitter for a fixed period doesn’t make up for the non-existence of the government on social media, he said. “They (government) should be available all the time.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The department of electronics and information technology recently issued guidelines for government agencies on improved engagement with citizens through social media. Tuesday’s press conference may spark a trend of more such engagements on social media platforms by government agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pitroda said that the public information infrastructure (PII) will include a national knowledge network that will connect 1,500 nodes for universities, colleges, research labs and libraries along with connecting 250,000 panchayats in the country through fibre optics. The information network will be operational in the next two year, Pitroda said in the YouTube video.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s open data platform (&lt;i&gt;http://www.data.gov.in&lt;/i&gt;), the beta site for which was launched some time ago, will provide access to government data and documents, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the government’s battles with the Internet continue over issues of regulation, which have often been construed as censorship, an increasing number of political leaders and agencies have been using the route to get their message across.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gujarat chief minister &lt;a href="http://origin-www.livemint.com/Search/Link/Keyword/Narendra%20Modi"&gt;Narendra Modi&lt;/a&gt; has sought to engage with people through video chat on &lt;a href="http://origin-www.livemint.com/Search/Link/Keyword/Google+"&gt;Google+&lt;/a&gt; Hangout. West Bengal chief minister and Trinamool Congress (TMC) chief &lt;a href="http://origin-www.livemint.com/Search/Link/Keyword/Mamata%20Banerjee"&gt;Mamata Banerjee&lt;/a&gt; has been using &lt;a href="http://origin-www.livemint.com/Search/Link/Keyword/Facebook"&gt;Facebook&lt;/a&gt; to make public her views on recent economic and political developments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Prime Minister’s Office (PMO) has also been communicating over Twitter in the recent past. The authorities have sought to block accounts that style themselves as belonging to the Prime Minister. Account holders have said that some of these are satirical in nature.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain'&gt;https://cis-india.org/news/www-livemint-september-25-2012-surabhi-agarwal-pitroda-seeks-to-put-govt-information-in-public-domain&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    

   <dc:date>2012-09-27T05:13:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia">
    <title>Pirates, Plagiarisers, Publishers</title>
    <link>https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia</link>
    <description>
        &lt;b&gt;This article attempts to rescue not by denying the charges of plagiarism, but by charting an alternative trajectory of plagiarism so that each successive instance does not amplify our sense of embarrassment and crisis in the academy. The article by Prashant Iyengar was published in the Economic &amp; Political Weekly, February 26, 2011, Vol XLVI No 9.&lt;/b&gt;
        &lt;p&gt;"Copying one book is plagiarism; copying several is research." Unknown &lt;a href="#1"&gt;1&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Someone must have slandered Indian academia, for, without having done anything new or different, allegations of plagiarism have suddenly been tumbling out of India’s ‘top’ universities in these past few years.&lt;/p&gt;
&lt;p&gt;In October 2002, a group of physicists from Stanford University, including three Nobel laureates, addressed a letter to the (then) President Abdul Kalam complaining of plagiarism by the Vice Chancellor of Kumaon University.&lt;a href="#2"&gt;2&lt;/a&gt; In January 2006, a professor from IIM Bangalore was dismissed for plagiarism.&lt;a href="#3"&gt;3&lt;/a&gt; In February 2008, a professor from the Sri Venkateswara University in Tirupathi was accused of having plagiarized up to 70 papers between 2004 and 2007.&lt;a href="#4"&gt;4&lt;/a&gt; In October 2010, IIT Kharagpur was forced to set up a committee to investigate allegations of plagiarism by one of its professors and three doctoral candidates.&lt;a href="#5"&gt;5&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;And so on. It seems Benjamin Franklin’s adage about originality being “the art of concealing your sources” thrives today in Indian academia. Something is rotten in the State of academic research. Evidently, we even know exactly what it is: Some years ago, the Association of Indian Universities invited students to a research contest. The pamphlet advertising the contest contained a remarkably prolix account of the causes of the general decline in academic research:&lt;/p&gt;
&lt;p&gt;Of late, &lt;b&gt;research has become a subservient component in the university&lt;/b&gt; functioning. It is &lt;b&gt;not considered a lucrative career option&lt;/b&gt;. Apart from this, &lt;b&gt;resource constraints, lack of commitment, lack of proper encouragement&lt;/b&gt;, etc., are the impediments that are affecting the quality of research in our institutions of higher education. Another important factor for the deterioration of the quality of research is the &lt;b&gt;absence of adequate training and other capacity building&lt;/b&gt; endeavour in our system, which has &lt;b&gt;restricted students’ creativity only to rote memory&lt;/b&gt;. &lt;a href="#6"&gt;6&lt;/a&gt; (emphasis mine)&lt;/p&gt;
&lt;p&gt;Similarly, we are periodically reminded, as in this instance, by the chief of the Defence Research and Development Organisation that “India lacks quality academic organisations and research and development institutions that breed inventions in technology. This is the major reason behind India's failure in breaking new ground in inventions and innovations.”&lt;a href="#7"&gt;7&lt;/a&gt; Other news reports bemoan the fact that “Indian patent filings lag behind global average" with the total “number of filings by residents being just three per million people in its population, compared with the world average of 250”&lt;a href="#8"&gt;8&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Accounts such as these, which abound in the press and journals, typically trace a “decline” hypothesis according to which the quality of academic research in India, once rigorous and upright, has fallen precipitously in recent times. Poor quality of academic research is then portrayed as a function of the impoverishment of the academy itself. Concealed within this auto-critique is an envy of putatively ideal systems in other countries which exhibit values that are an inversion of those identified as ours: i.e. they privilege research, are well-resourced, file the statistically approved average number of patents, allow students’ creativity free rein, and do not restrict their creativity only to rote memory. Lurking underneath these criticisms is also the anxiety that the arrival of the internet has, far from invigorating indigenous research in India, facilitated plagiarism on a wider scale than previously imaginable. What do we make of all this self-slander?&lt;/p&gt;
&lt;p&gt;In this essay I will attempt to rescue Indian academic research, not by denying the charges of plagiarism, but by charting an alternative trajectory of plagiarism so that each successive instance does not amplify our sense of embarrassment and crisis in the academy.&lt;/p&gt;
&lt;p&gt;I begin by drawing on my own prior study on student research in law universities in India&lt;a href="#9"&gt;9&lt;/a&gt; to provide a rough account of how law students approach research. However inappropriate, I use some of my observations in the course of that study as a microcosmic model for how research is conducted by students across the country today.&lt;/p&gt;
&lt;p&gt;Next, I will attempt to show how the charge of plagiarism only acquires its pungency after the installation of a particularly western ‘Romantic’ conception of creativity that is hinged on the ‘genius’ figure. My point here is not one of cultural difference – we may or may not have conflicting traditions of (literary) creativity in India - but of heterogeneity of possible standpoints from which creativity can be judged, which have been deprecated or forgotten since this modern conception took root. While this idea is itself not ‘original’, having been made by numerous authors on whose work I draw upon here&lt;a href="#10"&gt;10&lt;/a&gt; , I am interested here in how it can inform our reaction to quotidian reports of plagiarism in the contemporary. Specifically, I think our understanding of 'originality-as-genius’ is a relatively recent historical product, and is definitely not the 'natural' or universal parameter by which literature and arts have been judged. I would assert that contemporary practices on the Internet restore us to (or renew the salience of) some of these pre-modern practices of authorship where originality in its Cartesian sense may not necessarily be determinative of value.&lt;/p&gt;
&lt;p&gt;I would however hasten to add that this does not lead us inexorably to the conclusion that our traditional understanding of plagiarism has to abandoned. In the case of academic writing, 'Romantic' standards of originality have been rigorously upheld and policed by the spectral might of the University. Here, the ritual demonstration of cartesian orginality  is not only a condition of success, but a minimum qualification for survival and advancement in this domain. With the stakes being so high, the temptation to pass off others' works as one's own is great, in contrast to the risks of being caught. This does not mean that everyone resorts to it, only that there are structural factors in the academy that make practices of plagiarism more 'rational' than, perhaps, in other domains&lt;a href="#11"&gt;11&lt;/a&gt; .&lt;/p&gt;
&lt;p&gt;To begin, then with my conclusions, I think that dulling the keenness of ‘cartesian originality’ in the University could be an important component in the serious task of educational reform. Equally, I aim, in this article to rehabilitate the term plagiarism so as to diminish the sense of embarrassment that seems to come naturally to us when we speak of Indian research.&lt;/p&gt;
&lt;h3&gt;Student ‘research’ in Law Schools in India&lt;/h3&gt;
&lt;p&gt;The content and observations in this section draw from a study that I had conducted in 2006 on student research in national law universities in India. During the study I had interviewed 40 students and eleven faculty members across three National Law Universities. &lt;a href="#12"&gt;12&lt;/a&gt; I will focus here on the themes from those surveys that directly address the issue of research and plagiarism.&lt;/p&gt;
&lt;p&gt;By way of background, in a typical national law university following a semester model, a student must submit up to 5 research papers (of lengths varying from 20 to 50 pages) a semester – or ten papers a year. In the duration of her five year legal education, a student from a national law university in India would have submitted anywhere between 48 (NALSAR) to 70 (NLIU Jodhpur) research papers of varying lengths. Given an average class-size of 80, and 5 batches in every university, a guesstimate indicates an average output of about 4000 papers of varying quality from every national law university annually. The table below contains a rough back-of-envelope enumeration of the research output of five national law universities in India, drawn from respective university prospectuses and websites.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;NALSAR&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;NLSIU&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;NLIU&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;NLU&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;GNLU&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Intake&lt;/td&gt;
&lt;td&gt;&lt;b&gt;80&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;80&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;80&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;80&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;160&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Max Strength&lt;/td&gt;
&lt;td&gt;&lt;b&gt;400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;800&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Academic Unit&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Semester&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Trisemester&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Trisemester&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Semester&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Semester&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Law Courses&lt;/td&gt;
&lt;td&gt;&lt;b&gt;40&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;51&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;48&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;54&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;51&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Non-Law Courses&lt;/td&gt;
&lt;td&gt;&lt;b&gt;10&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;10&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;26&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;8&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;9&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Number of research papers&lt;br /&gt;per student through the &lt;br /&gt;duration of the 5 year course&lt;/td&gt;
&lt;td&gt;&lt;b&gt;18&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;50-60&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;65-74&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;55-62&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;55-60&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Max number of research &lt;br /&gt;papers per semester / trisemester&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1900&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;2000&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;2200&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;4000&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Number of student&lt;br /&gt;research papers per year&lt;br /&gt;(approx)&lt;/td&gt;
&lt;td&gt;&lt;b&gt;3800&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;4200&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6000&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;4400&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;8000&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;By any estimate, this volume of research is staggering and should ordinarily be a cause for pride. However law universities are also beset with the same anxieties of poor research ‘quality’ and plagiarism that characterize the broader academy. While my previous study contains a fuller discussion on the causes of poor legal research at these universities, I would like, here, to only reproduce some of my survey conclusions from that study that would feed the discussion for the later sections of this paper.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;From my surveys it appeared that both students and faculty shared a sense that the research burden on students in these universities was excessive and too onerous to facilitate high quality research.&lt;/li&gt;
&lt;li&gt;Students respond to the high research load by budgeting their efforts – working more intensely on some research assignments while neglecting others. This accorded with the responses from faculty members who reported an extremely low number of high quality research papers turned in. Responses from faculty indicate that a high percentage of papers received fall under a median category between ‘high quality’ and ‘abjectly low quality’ – i.e. there are a large number of papers which, while offering a cogent account of the topic do not add any insight of their own.&lt;/li&gt;
&lt;li&gt;Both students and faculty reported generally, the existence of a high degree of plagiarism (defined as the inclusion of extrinsic material without attributing sources) sourced both from amongst their peers as well as from extrinsic sources. Although most students (78%) claimed never to have directly copied from other students’ papers, many (67%) admitted to having shared their papers with other students either for ‘reference’, or more commonly, for adaptation/reuse in their assignments. The responses to whether they had any reservations against the practice were diverse with more students in favour of the practice of plagiarism (47%) than against (30%). Without admitting to participating it in themselves, 60% of respondents characterised the prevalence of ‘copy/paste’ plagiarism in research on their campus as ‘Rampant’ or ‘High’. Many reasons were forthcoming for the prevalence of this practice among which the more frequently stated included: ‘High work pressure’, ‘lack of time’ ‘lack of incentive to do high quality research’, ‘lack of emphasis by evaluators on high quality academic work’, ‘pointlessness of repeating identical research from scratch’. Other less common reasons offered were ‘emphasis on sheer volume to the neglect of quality of analysis’ and ‘disingenuousness of topics’ and ‘Laziness’.&lt;/li&gt;
&lt;li&gt;Over half the students surveyed had never published their research in journals. This despite the fact that 75% of respondents reported that at least 1 of their research papers was either publishable immediately or with modifications. More than half the respondents reported upwards of three papers that they themselves regarded as ‘publishable’.&lt;/li&gt;
&lt;li&gt;One of the common reasons that the faculty identified for the incidence of plagiarism was that students had begun to stereotype teachers who were unlikely to check or be able to check for plagiarism and would submit entirely plagiarised papers to them. Other reasons included the difficulty of checking the huge number of papers they received individually for plagiarism and also the fact that students had an unreasonably high workload coupled with the lack of enough incentive to do thorough research. &lt;br /&gt;&lt;br /&gt;“Intuition” and “checking the number of sources” was still the common mode of detecting plagiarism although some faculty made creative use of the internet – particularly Google.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Faculty was asked if a paper that appeared plagiarized to a high degree, but also indicated that the student had put in an intelligent compilation of materials, would be acceptable by them. The response to this was largely affirmative with some faculty members saying that most papers would correspond to that category and this standard was imperative for a majority of students to pass! Most faculty required that the source material at least be acknowledged.&lt;/li&gt;
&lt;li&gt;With regard to their research sources, there was a clear bias in favour of online sources almost to the exclusion of other sources. One respondent even rated online sources as being “more important than libraries”, and even claimed that she always began her legal research on the internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It is evident then from the foregoing account that the law universities are poor representatives of ‘original’ scholarship. The career of students through the law school seems to be marked by a blithe collaboration with faculty in which a Nelson’s eye is turned to their less-obvious plagiarisms. Although it is possible to adopt a high moralistic tone and condemn these practices, in the remainder of this paper I would like to marshal resources that would lend some dignity to them. In the section that follows, I will argue firstly, that there are rival conceptions of originality which privilege the recombination of existing information, rather than being fixated on ivory-towered ex nihilo originality.&lt;br /&gt;Under this conception, even the pastiche works by lazy law students emerge as eminently ‘original’. Secondly, I argue that slavish imitation is never always only that, and have long been recognized as an integral aspect of the creative process itself.&lt;/p&gt;
&lt;h3&gt;‘Originality’ is only a special effect of reception&lt;/h3&gt;
&lt;p&gt;In his fascinating book Original Copy, Robert Macfarlane draws on George Steiner’s vocabulary to contrast two different narratives of literary creation – The first, creatio, espouses “a hallowed vision of creation as generation” which “connotes some brief, noumenal moment of afflatus or inspiration’ during which the author composes her work.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;..the creative urge is dramatized as pulsing deep within the fastness of the individual self, and the solitary writer is seen to conjure ideas into the influence proofed chamber of his or her imagination. &lt;a href="#13"&gt;13&lt;/a&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;By contrast, the second conception of literary creativity, inventio, which is commonly found both in literary postmodernism and Augustan aesthetics, conceives of “creation as rearrangement” and “refuse[s] to believe in the possibility of creation out of nothing, or in the uninfluenced literary work”.&lt;a href="#14"&gt;14&lt;/a&gt; Instead this view “privileges the act of making out of extant material”. According to these “recombinative theories”, the creating mind is conceived&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;“as a lumber-room in which are stored innumerable verbal odds and ends. The supposedly ‘original’ writer in fact works with ‘inherited lexical, grammatical, and semantic counters, combining and recombining them into expressive executive sequences’. &lt;a href="#15"&gt;15&lt;/a&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;As an instance of this latter view, Macfarlane cites the example of Derrida who coined the term itérabilité to describe “the semantic drift which inevitably occurs between consecutive uses of the same text”. Derived from a combination of the Latin verb iterare (meaning ‘to repeat’) and the Sanskrit word itara (meaning ‘other’), the word “valuably  emphasizes ‘the logic which links repetition to alterity’. For Derrida, the repetition of a text inescapably involves its alteration: you can never step twice in the same poem, paragraph, or word.”&lt;/p&gt;
&lt;p&gt;I find this latter conception, especially Derrida’s concept of itérabilité to be a valuable tool with which to think through the practices of the law students I interviewed. While being derived from a plurality of (frequently unacknowledged sources), their papers were never mere ‘slavish’ repetitions, but always contained an element of alterity.&lt;/p&gt;
&lt;p&gt;Paradoxically, the networked information age that we inhabit both facilitates and preempts the flourishing of ‘recombinative creativity’. On the one hand, the abundance of informational resources that the internet puts at a researcher’s disposal, as well as the ease of word-processing makes it easy to rapidly refashion materials into a pastiche of one’s own. On the other hand, the illusion of novelty that such work may produce is capable of being dispelled equally swiftly, and more efficiently than ever before through the use of special applications designed to detect plagiarism. If, as MacFarlane suggests, originality is not “an indwelling quality of writerly production, but instead a function of readerly perception, or more precisely readerly ignorance (the failure to discern a writer’s sources)”, then the emergence of the internet has nearly made this form of originality impossible, by making this reader ignorance extremely evanescent (lasting only until the reader’s next Google search). The ability of students to pass off plagiarised material as their own will hinge increasingly on their ability to alter it unrecognizably, at which point the output is no longer a mere slavish imitation, but something new altogether – ‘quality research’.&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;In an essay on pre-print culture&lt;a href="#16"&gt;16&lt;/a&gt; , Lawrence Liang demonstrates that the notion that prior to print technology, the task of writing was reduced to that of slavish copying by scribes is false. As Liang notes, the real story is slightly more complicated.&lt;/p&gt;
&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;
&lt;div&gt;Acting as annotators, compilers, and correctors, medieval bookowners and scribes actively shaped the texts they read. For instance, they might choose to leave out some of the Canterbury Tales, or contribute one of their own. They might correct Chaucer’s versification every now and then. They might produce whole new drafts of Chaucer by combining one or more of his published versions with others.&lt;a href="#17"&gt;17&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;
&lt;p&gt;With the arrival of print technology, however, a fundamental transformation occurs in the way the activities of writing and reading. Liang quotes an extended passage from Rebecca Lynn’s study of reading and writing practices in medieval England&lt;a href="#18"&gt;18&lt;/a&gt; that captures this change:&lt;/p&gt;
&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;the benefits readers derived from the press, in terms of better access to authorized texts, were countered by a profound loss of opportunity for inventive forms of reception. They were free to take with the texts they recopied. Manuscript culture encouraged readers to edit or adapt freely any text they wrote out, or to re-shape the texts they read with annotations that would take the same form as the scribe's initial work on the manuscript. &lt;i&gt;The assumption that texts are mutable and available for adaptation by anyone is the basis, not only for this quotidian functioning of the average reader, but also for the composition of the great canonical works of the period&lt;/i&gt;.&lt;a href="#19"&gt;19&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div&gt;
&lt;p&gt;Is it possible, in the light of this insight about the creative element of copying in pre-print days, to revise our pathological accounts of contemporary plagiarism? &lt;a href="#20"&gt;20&lt;/a&gt; Can we view plagiarism not as an offence against the ‘author’ity of knowledge, but in a sense as a reversion to a more primordial tradition in which the availability of a text presumes and is premised upon its availability for adaptation. As described previously, responses from interviews with faculty indicates a grudging tolerance of plagiarism in student research.&lt;/p&gt;
&lt;p&gt;This tolerance, stemming from an acknowledgement that even acts of compilation are not wholly without a creative element, seems to restore us to such an understanding of ‘creative’ reading akin to what has been described above.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;Few years ago, a famous author of textbooks on Intellectual Property law in India was discovered to have plagiarised close to two hundred pages of his new book on the Right to Information. The pages had been lifted verbatim from the manuscript sent by a famous law professor to the same publisher. When the matter came to light, the first author pleaded ignorance. After an ugly out-of-court tussle between the professor and the publisher (who happen to be one of India’s more powerful legal-publishing houses), a compromise was reached wherein the professor’s book would be published with a note inserted stating that 200 of his pages had been included in the other ‘author’s’ book.&lt;/p&gt;
&lt;p&gt;I conclude this essay with this piece of copyright ‘gossip’ in order to highlight a couple of ironies that it animates. The first is, of course, the delicious irony that a famous author, of IP books no less, would stoop to such lows. (Could academic writing in any discipline be above suspicion now that academic writing in IP, that guardian discipline of genius ‘originality’, has proven susceptible to plagiarism?) The second irony is that this person’s reputation as the ‘author’ of a book, and of a genre of books survives despite the fact that he may not have penned even a single word of his book – which prompts us to ponder what function the author truly serves here. Lastly, I find the fact curious that both books continue to be displayed – and sold - in various legal bookstores, frequently side-by- side. The ‘fact’ of the plagiarism seems not to have significantly impacted sales of either author’s tome.&lt;/p&gt;
&lt;p&gt;Tempting as it may be, one must resist treating this example as either exceptional or paradigmatic. Publishers in India in many cases do lead authors by their nose, and this is particularly so in the case of text-book publishing. However, this does not mean that original – in the Cartesian sense - academic writing does not continue to be produced in India. I feel this instance points us to the limits of the argument I have made in the preceding section. As well as it may be to celebrate ‘recombinative’ accounts of creativity in students, wholesale plagiarism with impunity by big name authors backed by large publishing houses cannot be easy to endure. In our acceptance of a combinatorial ‘inventio’ theory of creativity, it would be unwise too hastily to jettison the more austere creatio theory. As Macfarlane points out, popular attitudes to originality and plagiarism have moved between the two narratives of originality in a dialectical fashion so that they can best be thought of as “enmeshed .., or existing in a kind of helical wrap: each requiring the other for its support, counter-definition, and continued existence. Neither ever obliterates the other.”&lt;a href="#21"&gt;21&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;However they may have been produced, we regard our ‘works’ not merely as our property but also relationally through ethics of propriety. In other words, what we write is our “own” not in the way that our shoe is our own, but in the sense that our friends are our own. Plagiarism in this context most closely approaches its original Latin roots – plaga: to convert a freeman into a slave22. – as the unjust enslavement or capture of our work by someone else.&lt;br /&gt;What role has the internet played in this crisis of plagiarism? Despite the inherent promiscuity of the medium, I think that the arrival of the internet has not actually changed our practices in relation to plagiarism. So the fact that I may blithely pirate movies and music on the internet does not mean, automatically, that I adopt 'piracy' as my research methodology for academic writing. Our choices remain as they were – to acknowledge or not, with the latter being increasingly more risky in an age when exposure is only a google search away.&lt;/p&gt;
&lt;p&gt;Finally, how does all of this relate to the question I posed at the start viz: what do we make of this self-slander? I think it will not do to simply declare ourselves innocent of the charge of plagiarism. (As Josef K’s prison chaplain says, that is what the guilty usually do.) But equally we must be careful, to continue with a Kafkaesque metaphor, not to see the gallows being constructed in the distance and hang ourselves on the presumption they are being erected solely for us. Kafka alone, of course, does not supply good grist for policy decisions. A possible way forward would be to import the cinematic notion of plagiarism into academic writing: Not all that is unacknowledged is unoriginal (as my &lt;br /&gt;example from student research at law universities shows), but this does not extend to a license to appropriate all as one's own (the example of the famous IP author who plagiarised 200 pages from a professor). The former is a function of the dominant, awkward alien aesthetic imposed by the University, which requires academic writing to be dully impersonal and abstract. Finding it too taxing, most students resort to a clumsy pastiche rather than, for instance, shifting to a more narrative style which they may be more comfortable with. The internet allows their pastiche to be more colorful than before.&lt;/p&gt;
&lt;p&gt;The latter is plainly an ethical failing by someone who believes they can get away with impunity. The internet does not impact them in any way except that their 'crime' once discovered circulates endlessly on the internet (As this IP author discovered to his dismay).&lt;/p&gt;
&lt;p&gt;In deciding what is to be done, however, I would advise our policy makers to make haste, only slowly.&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;Notes&lt;/h2&gt;
&lt;div&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;Lindey, A., 1952. &lt;i&gt;Plagiarism and originality&lt;/i&gt;, Harper., New York, P.2&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;Chu, S. et al., 2002. Letter from the group of Professors of Physics of Stanford University to the President of India. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://www.stanford.edu/dept/physics/publications/PDFfiles/india.pdf"&gt;http://www.stanford.edu/dept/physics/publications/PDFfiles/india.pdf&lt;/a&gt; [Accessed December 22, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;Seethalakshmi, S., 2006. IIM-B prof held violating copyright. The Times of India. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2006-01-05/bangalore/27803993_1_iim-b-p-g-apte-copyright-violation"&gt;http://timesofindia.indiatimes.com/city/bangalore/IIM-B-prof-held-violatingcopyright/ articleshow/1359149.cms?curpg=2&lt;/a&gt; [Accessed December 21, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;Tewari, M., 2008. Indian professor guilty of plagiarism. DNA India. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://www.dnaindia.com/india/report_indian-professor-guilty-of-plagiarism_1152417"&gt;http://www.dnaindia.com/india/report_indian-professor-guilty-of-plagiarism_1152417&lt;/a&gt; [Accessed December 21, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;Singh, K., 2010. IIT-K sets up panel to probe plagiarism charges. Indian Express. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://www.expressindia.com/latest-news/iitk-sets-up-panel-to-probe-plagiarism-charges/695196/"&gt;http://www.expressindia.com/latest-news/iitk-sets-up-panel-to-probe-plagiarism-charges/695196/&lt;/a&gt; [Accessed December 21, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;"Anveshan: Student Research Convention." Association of Indian Universities. Apr 2008. Research Division. 30 Apr 2008 &amp;lt;http://www.aiuweb.org/Research/research.asp&amp;gt;.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="7"&gt;Josy Joseph , ‘India lacks R&amp;amp;D base, laments DRDO chief ‘, (2000), [Internet], Available from: &amp;lt;&lt;/a&gt;&lt;a class="external-link" href="http://www.rediff.com/news/2000/aug/11josy1.htm"&gt;http://www.rediff.com/news/2000/aug/11josy1.htm&lt;/a&gt;&amp;gt; [Accessed 21 April 2008]&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="8"&gt;‘Indian patent filings lag behind global average’, [Internet], Available from: &amp;lt;&lt;/a&gt;&lt;a class="external-link" href="http://www.eetimes.com/electronics-news/4075557/Indian-patent-filings-lag-behind-global-average"&gt;http://www.eetimes.com/news/latest/showArticle.jhtml?articleID=204702703&lt;/a&gt;&amp;gt; [Accessed 21 April 2008]&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="9"&gt;Iyengar, P., 2008. Open Information Policy for Student Research in Law Universities. SSRN eLibrary. &lt;br /&gt;Available at:&lt;/a&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1555689"&gt; http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1555689&lt;/a&gt; [Accessed December 24, 2010].&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="10"&gt;See for instance, Rose, M., 1993. &lt;i&gt;Authors and Owners: The Invention of Copyright&lt;/i&gt;, Cambridge, Mass: &lt;br /&gt;Harvard University Press. Woodmansee, M., 1984. The Genius and the Copyright: Economic and Legal&lt;br /&gt;Conditions of the Emergence of the 'Author'. &lt;i&gt;Eighteenth-Century Studies&lt;/i&gt;, 17(4), 425-448.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="11"&gt;For instance, the charge of plagiarism in the domain of cinema seems to have a significantly diluted charge. Bollywood has been accused frequently of aping Hollywood, although this does not stand in the way of it immense popularity and renown. Ramesh Sippy's Sholay is regarded as having been influenced by John Sturges' The Magnificent Seven, itself being similarly 'influenced' by Akira Kurosawa's The Seven Samurai. On the modern definition of originality which requires us all to be 'perfectly uninfluenced', this qualifies as plagiarism. This definition however did not stand in the way of Sholay becoming an iconic film for Indian cinema.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="12"&gt;Respectively The National Academy of Legal Studies and Research (NALSAR), the National Law School of India University (NLSIU) and the National University of Juridical Sciences (NUJS).Although this sample is not sufficiently representative to make statistically kosher extrapolations – indeed, I make no such claim - I think the responses I received affirmed certain interesting observable trends about student research, that would seem commonsensical to anyone who teaches in India. To that extent, I think this data yields some interesting starting points for the theme of the current paper.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="13"&gt;Macfarlane, R., 2007. Original Copy: Plagiarism and Originality in Nineteenth-Century Literature, Oxford: Oxford University Press. p.2&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="14"&gt;Ibid, p.4&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="15"&gt;Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="16"&gt;Liang, L., 2009. A Brief History of the Internet from the 15th to the 18th Century. In N. Rajan, ed. &lt;i&gt;The Digitized Imagination&lt;/i&gt;. Routledge India, pp. 15-36.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="17"&gt;Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="18"&gt;Schoff, R.L., 2004. Freedom from the Press: Reading and Writing in Late Medieval England. Harvard University. Available at: &lt;/a&gt;&lt;a class="external-link" href="http://sunzi.lib.hku.hk/ER/detail/hkul/3516592"&gt;http://sunzi.lib.hku.hk/ER/detail/hkul/3516592&lt;/a&gt;. cited in Liang, L., 2009. A Brief History of the Internet from the 15th to the 18th Century. In N. Rajan, ed. The Digitized Imagination. Routledge India, pp. 15-36.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="19"&gt;Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="20"&gt;For instance the ‘epidemic of plagiarism’ language typified in this BBC article Precey, Matt. “Study shows 'plagiarism epidemic'.” BBC 17 Jan 2008. 13 May 2008 &amp;lt;&lt;/a&gt;&lt;a class="external-link" href="http://news.bbc.co.uk/2/hi/uk_news/england/cambridgeshire/7194850.stm"&gt;http://news.bbc.co.uk/1/hi/england/cambridgeshire/7194850.stm&lt;/a&gt;&amp;gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="21"&gt;Supra n. 12, at p. 17&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="22"&gt;See Voltaire, 1824. &lt;i&gt;A philosophical dictionary: from the French&lt;/i&gt;, J. and H. L. Hunt. (Accessed from Google Books)&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;Also see these:&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://epw.in/epw/uploads/articles/15759.pdf"&gt;Economic and Political WEEKLY&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://originalfakes.wordpress.com/2011/03/03/epw-article-on-plagiarism/"&gt;Originalfakes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1775582"&gt;Social Science Research Network&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia'&gt;https://cis-india.org/a2k/blogs/plagiarism-in-indian-academia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>prashant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-05-29T05:55:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/substantive-areas/new-pedagogies/piracy">
    <title>Piracy</title>
    <link>https://cis-india.org/about/substantive-areas/new-pedagogies/piracy</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;h3&gt;Context&lt;/h3&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p align="justify"&gt;Loss of
	civil liberties as a result of increased and indiscriminate
	enforcement activities by State and private bodies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Conflation
	of piracy with concepts such as terrorism, child pornography and
	drug trafficking which prevents legitimate off-line and online
	sharing and growth of P2P technologies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Long
	term social impact of sizable section of the citizenry that views
	themselves as operating outside the law.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Research Agenda&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p align="justify"&gt;Analyse
	different acts that are considered piracy from legal, enforcement,
	corporate and general public perspectives. Document changes in the
	definition of piracy over time in different contexts. Interrogate
	the double standards employed by corporations, film industry using
	case-studies such as T-Series, YouTube/torrent leaks, etc.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Study
	the prevalence of piracy in different regions of the world, market
	segments, technologies and sections of society.  Document the
	social, cultural, technological and economic repercussions of these
	increased levels of piracy. For example: a) understanding how piracy
	contribute to increased consumer choice; b) examining the
	correlation between P2P and piracy-based distribution and
	enhancement of reputation and growth in market share of individual
	artists, bands and small companies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Document
	the contribution of pirates to the development of cutting edge
	technologies and pushing of the limits of end-user experience.
	Analysing different techniques for movie, book, television,
	software and music piracy employed by individuals and industries.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Identify
	and document various factors which contribute to high level of
	piracy in developing countries. Design and propose strategies and
	policy positions such as: parallel imports, compulsory licensing,
	media surcharge and open licenses to reduce levels of copyright
	infringement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Document
	and analyze various methods and methodologies for studying and
	tracking piracy. For example aggregation and consolidation of P2P
	statistics by companies such as Big Champagne. Provide technical
	strategies for those engaged in legitimate sharing to protect their
	privacy and civil rights against surveillance technologies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Studying
	national and regional laws that governs copyright infringement and
	propose changes that protect Access to Knowledge. Examining case law
	for trends, including analysis of the kinds of punishments which are
	prescribed for copyright infringement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Documenting
	due procedure for enforcement against individuals and organizations?
	Analyzing the legal validity of evidence submitted by enforcement
	agencies for different forms of alleged off-line and online
	copyright infringement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Document
	and analyse the
	attention paid by developing country policy makers to piracy in
	different markets and technologies. Identify and monitor state
	agencies engaged in tracking piracy and undertaking enforcement
	activities?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;How do
	citizens justify acts of piracy? How do they view themselves and
	others as criminals?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Document
	the correlation between high speed Internet connections and
	peer-to-peer file sharing programmes and illegal and legal sharing
	of knowledge.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.enotes.com/internet-piracy-article"&gt;Internet
	Piracy—An introduction&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://209.85.175.104/search?q=cache:dy2BJ2AiV84J:www.cs.armstrong.edu/sjodis/COURSES/2070/SWPiracy.ppt+what+is+internet+piracy&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=6&amp;amp;gl=uk"&gt;Introduction
	to Internet Piracy&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.moreintelligentlife.com/node/719"&gt;Internet
	piracy is good for films&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://portal.unesco.org/culture/en/files/28696/11513329261panethiere_en.pdf/panethiere_en.pdf"&gt;The
	persistence of piracy: the consequences for creativity, for culture,
	and for sustainable development&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="5"&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.ft.com/cms/s/0/e72884f6-6175-11dd-af94-000077b07658.html?nclick_check=1"&gt;Music
	industry ‘should embrace illegal websites’&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="6"&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://ivana-dee.blogspot.com/2008/07/causes-of-ilegal-music-products.html"&gt;Causes
	of illegal music product’s existence&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="7"&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.guardian.co.uk/technology/2008/feb/23/piracy.internet"&gt;Creativity
	policy pits internet providers against pirates&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;ol start="8"&gt;&lt;li&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.mindjack.com/feature/piracy051305.html"&gt;Piracy
	is good?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/substantive-areas/new-pedagogies/piracy'&gt;https://cis-india.org/about/substantive-areas/new-pedagogies/piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>royson</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2009-01-26T10:23:49Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/content-access/photos">
    <title>Photos</title>
    <link>https://cis-india.org/openness/publications/content-access/photos</link>
    <description>
        &lt;b&gt;Photographs of Open Access Day&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/content-access/photos'&gt;https://cis-india.org/openness/publications/content-access/photos&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-12-01T13:17:32Z</dc:date>
   <dc:type>Folder</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/pervasive-technologies-patent-pools.pdf">
    <title>Pervasive Technologies: Patent Pools</title>
    <link>https://cis-india.org/a2k/blogs/pervasive-technologies-patent-pools.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/pervasive-technologies-patent-pools.pdf'&gt;https://cis-india.org/a2k/blogs/pervasive-technologies-patent-pools.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-06-27T07:16:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/patent-pools">
    <title>Pervasive Technologies: Patent Pools</title>
    <link>https://cis-india.org/a2k/blogs/patent-pools</link>
    <description>
        &lt;b&gt;In this research paper, Nehaa Chaudhari gives an analysis of patent pools. She discusses the working of a patent pool, study patent pool in other areas of technology, and patenting in telecom and related technology.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="https://cis-india.org/a2k/blogs/pervasive-technologies-patent-pools.pdf" class="internal-link"&gt;Click to download the full research paper here&lt;/a&gt;&lt;/b&gt; (PDF, 475 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The network landscape over the past few years has been characterized by several battles of supremacy between two or more rival technologies. &lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; These battles have included, &lt;i&gt;inter alia, &lt;/i&gt;the constant efforts at besting rivals in the arena of patenting innovations in technology, often as a result characterised by the imposition of high royalties on rivals, for the use of one’s patents. However, having realised that such efforts at besting the other could prove detrimental for all parties concerned in the long run, and stall technological advancements which would in turn translate into lower business revenue, mechanisms were devised to ensure a relatively equitable utilization of patents in the market place. One such mechanism that has been developed is that of patent pools.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patent pools have been developed around most areas of high end technology and research and development. Over the course of this paper, the author has confined herself to a study on patent pools in the area of telecommunications, and the issues to be addressed therein. Specifically, the author will be dealing with patent pools around 3G, 4G, LTE, TD-SCDMA and TD-LTE technologies. Within this framework, the author seeks to examine what are patent pools, whether and what kind of patent pools exist, their associated costs, their licensing arrangements and the structure of the payment of royalty, and the feasibility of these patent pools.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Understanding Patent Pools&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Patent pools are agreements among patent owners through which patent owners combine their patents, waiving their exclusive rights to the patent to enable others, or themselves, to obtain rights to license the pooled patents.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Therefore, such pools may be focussed either on cross licensing, that is companies mutually making their patents available to each other, or on out licensing, that is, a group of companies making a collection of patents available to companies that do not or might not have patents of their own to contribute to the pool.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Typically, modern patent pools combine patents of various companies and are around inventions that are required to implement an established industry standard, are licensed as  a whole (on an &lt;i&gt;all or nothing basis) &lt;/i&gt;and not as individual licenses for patents owned by various companies within that pool, and are available  to any non member for licensing.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;Such licensing is done under a standard agreement and royalty rates, on a non discriminatory basis. The exception to this rule is that if certain members have contributed patents to the pool, they may receive more favourable terms, in recognition  of their cross licensing relationship to the pool.&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;When viewed from a law and economics perspective, patent pools are seen to be an efficient institutional solution to various problems that arise when companies have complementary intellectual property rights, and these rights are essential to new technologies being used and employed. &lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;However, this perspective also warns about the antitrust risks that may arise when competitors or potential competitors are involved in the coordination of their intellectual property. For instance, such pools may be used to allocate markets or otherwise chill competition. &lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The Working of a Patent Pool&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Generally, a patent pool may be administered in one of two ways- it may either have an administrative entity, or may also just be a system of cross licensing between two firms.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; In case of the former, the licensing agency may be one of the patent holders, &lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; or may be an independent licensing company (e.g. MPEG).&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ownership of patents within the pool is retained by the owners, who then license them to the operator/administrator on a non exclusive basis, with sub licensing rights. This means that the owners are free to continue to license their patents on an individual basis, and the administrator also has the right to further license the patents to any party who is interested in licensing from the patent pool.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; The responsibility of managing licensing and licenses is vested in the operator/administrator of the patent pool. Licensees are required to report sales and pay royalties to the pool administrator, who in turn would enforce the conditions of the license.&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;The distribution of royalties between the members of the pool is on the basis of a formula which may, or may not be transparent to non member licensees, with the pool operator retaining a management fee.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;Typically, pool licenses are also structured in a manner so as to render difficult early termination by the licensee. The nature of the contract, once signed by a licensee, is typically binding in nature. Therefore, this would mean that the administrator of the patent pool could sue the licensee for non performance of the contract.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; However, unless a pool operator is a member of the pool itself, it cannot sue for the infringement of patents. &lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; Therefore, in the event that a patented technology were to be utilised without having taken a license, one or more of the individual patent owners would be required to take legal action. The involvement of the pool operator would be limited to being a part of any settlement discussions, if they were to occur, since one of the options for the alleged infringer could be to obtain a license for the patent pool.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Drawing Parallels with Other Patent Pools&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In this section of the paper, the author seeks to study patent pools in other areas of technology in order to better understand the structure and pricing of patent pools.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The ‘3C DVD’ Patent Pool &lt;/b&gt;&lt;br /&gt;Established in 1998, the &lt;i&gt;3C DVD Patent Pool&lt;/i&gt; was the brainchild of &lt;i&gt;Philips&lt;/i&gt;, &lt;i&gt;Sony&lt;/i&gt; and &lt;i&gt;Pioneer&lt;/i&gt;, and &lt;i&gt;L.G.&lt;/i&gt; was subsequently inducted as a member. &lt;i&gt;Philips&lt;/i&gt; acts as a licensing administrator for patents held by all the companies, which are over two hundred in number. These patents include those for the manufacture of the DVD players, and for the manufacture of the DVD disks themselves. &lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; The player license per unit royalty was set as 3.5% of the net selling price of each player sold. This was subject to a minimum fee of $7 per unit, which after January 1, 2000 became $5 per unit. The disc license royalty was set as $0.05 per disc sold.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The ‘DVD- 6C’ Patent Pool&lt;/b&gt;&lt;br /&gt;Established in June 1999, the members of this pool at the time of its inception were &lt;i&gt;Hitachi&lt;/i&gt;, &lt;i&gt;Matsushita&lt;/i&gt;, &lt;i&gt;Mitsubishi&lt;/i&gt;, &lt;i&gt;Time&lt;/i&gt; &lt;i&gt;Warner&lt;/i&gt;, &lt;i&gt;Toshiba&lt;/i&gt;, and &lt;i&gt;JVC&lt;/i&gt;. This pool was also for the DVD-ROM and the DVD- Video formats, with &lt;i&gt;Toshiba &lt;/i&gt;acting as the administrator. &lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;The royalties were set at $.075 per DVD Disc and 4% of the net sales price of DVD players and DVD decoders, with a minimum royalty of $4.00 per player or decoder, which saw a substantial reduction in 2003.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Subsequently, there were various changes that were made to this group, including the inclusion of newer standards, the joining and subsequent departure of IBM and other organizations as a member etc. &lt;i&gt;Hitachi&lt;/i&gt; and &lt;i&gt;Panasonic&lt;/i&gt; also act as regional agents in certain regions of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The MPEG LA pool&lt;br /&gt;&lt;/b&gt;The MPEG-2 is a standard for describing the coding of data &lt;i&gt;inter alia, &lt;/i&gt;on DVD discs. For MPEG-2, a patent pool has been established, where the administrator is an independent, external organization known as the MPEG Licensing Authority, that set itself the aim to develop a patent pool for this standard.&lt;b&gt; &lt;/b&gt; &lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; The MPEG LA invited parties that thought they owned patents essential to this standard to join the program, which took off in 1997. At present, the pool has over a hundred patents and thousands of licensees.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Patenting in Telecom and Related Technology&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In this section of the paper, the author examines the working of patenting and patent pools in the telecommunications sector and in areas of related technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Early Developments and the Emergence of GSM&lt;br /&gt;&lt;/b&gt;Patent pools are slowly developing into a key component of the telecommunications and the technological industry. The technology industry has been said to be an &lt;i&gt;ecosystem&lt;/i&gt;, wherein there is a complex correlation between those who develop the technology and those who implement it in the creation and development of products.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; In the telecommunications industry for instance, each handset manufacturer has declared only a small percentage of the various types of intellectual property assets that are necessary to implement a 3G compatible cellular phone. Therefore, the working in such a context is that various companies develop different technologies, and the same is shared by various manufacturers that seek to make use of this technology.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The revival of patenting in the sector of telecommunications, post a period of decline in the decades of the 19540s to the 1980s, is attributed to the advent of the GSM standard for mobile communications in Europe.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;In 1988, the main European operators invited equipment suppliers and developed a procedure wherein manufacturers would have to give up their intellectual property rights and to provide free world wide licenses for essential patents.&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; After opposition from the manufacturers, the approach was modified to one wherein the operators required the suppliers to sign a declaration agreeing to serve all of the GSM community on fair, reasonable and non discriminatory conditions.&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; In the early 1990s, Motorola by refusing to grant non discriminatory licenses for its substantial portfolio of essential patents and only agreeing to enter into cross license agreements further intensified the debate over IPRs in telecommunications. The company only lifted these restrictions after various countries across the world expressed a preference for this standard. The experience in this standard has demonstrated that it would not be accurate to expect that all parties holding essential patents would be willing to license them to all interested parties.&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt; Companies were only willing to relax their licensing conditions once revenue generating opportunities increased.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The 3G3P and the UMTS&lt;br /&gt;&lt;/b&gt;In July 2000 the 3G Patent Platform Partnership (3G3P) and its 18 partners notified various agreements to the end of establishing a worldwide patent platform. The purpose behind this was disclosed to be that of providing a voluntary and cost effective mechanism to evaluate, verify and license patents that were essential for third generation (3G) mobile communication systems.&lt;a href="#fn29" name="fr29"&gt;[29] &lt;/a&gt;It was also claimed that the said agreements would have pro competitive effects and that the purpose behind this Platform was the facilitation of access to technology and consequent entry into the markets.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; On the intellectual property front, the purpose was to reduce cost uncertainties and the delays that were accompaniments of licensing numerous essential patents for complex technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it has often been considered to be a patent pool, this arrangement has been said to be only similar to a patent pool.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; The 3G3P itself has argued that since it was a mere facilitator of transactions between patent holders and licensees, and that membership was open to both licensors and licensees as opposed to only licensors as in the case of patent pools, it would be fallacious to classify the Platform as a patent pool. Further, it has also been argued that licensing by members is not restricted to the Platform and that there was no bundling or real pooling of the patents &lt;i&gt;per&lt;/i&gt; &lt;i&gt;se&lt;/i&gt; and those licensees have the opportunity to pick and choose between patents with the licensing being carried out on a bilateral basis. Additionally, unlike in a patent pool, there is no single license between the patent holders as a collective and the licensee, and the parties have a choice between the Standard License of the Platform, and a negotiable individual license.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; A Standard License provides for Standard Royalty Rate, a Maximum Cumulative Royalty Rate and a Cumulative Royalty Rate.&lt;a href="#fn33" name="fr33"&gt;[33] &lt;/a&gt;Bilateral transactions on the other hand, are negotiated between the parties where the consideration is to be determined on &lt;i&gt;fair and equitable&lt;/i&gt; terms.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt; This Platform also provides for a price cap, which, instead of being absolute and set at a pre-determined royalty rate, is a &lt;i&gt;default five percent maximum (not minimum) cumulative royalty rate for potential licensees per product category.&lt;/i&gt;&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; The royalty rate for each individual patent will differ for each of the licensees and this depends on the patent portfolio under each product category that the licensee has chosen.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The concerns and challenges of the GSM experience were well perceived during the determination of the course of action for UMTS. European actors were especially wary of &lt;i&gt;Qualcomm&lt;/i&gt; and expected the firm to demand high license fees, with some even fearing them to be in excess of 10%.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt; Subsequently, various attempts at developing licensing schemes failed, until 2004 and the establishment of the W-CDMA Patent Licensing Programme for UMTS FDD patents.&lt;a href="#fn38" name="fr38"&gt;[38] &lt;/a&gt;At the outset, seven licensors offered their patents as a bundle to prospective licensors, a number which decreased over time.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Development of LTE Patent Pools&lt;br /&gt;&lt;/b&gt;The next stage in the process of innovation in the realm of telecommunications was the development of the Long Term Evolution (LTE) Standard, which while being essential to 4G technology has also seen application in the realm of 3G. Consequently, patent pools or similar structures have been developed in these areas. LTE patents are being viewed as among the most valuable intellectual property resource in the mobile telecommunications industry, with most operators around the world building LTE networks.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per in a study conducted in 2011, 23% of the patents about this technology were owned by &lt;i&gt;L.G. Electronics&lt;/i&gt;, with &lt;i&gt;Qualcomm&lt;/i&gt; coming in second with 21%. &lt;i&gt;Motorola Mobility, InterDigital, Nokia&lt;/i&gt; and &lt;i&gt;Samsung&lt;/i&gt; each owned 9%, China’s &lt;i&gt;ZTE&lt;/i&gt; owned about 6%&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt; and &lt;i&gt;Nortel&lt;/i&gt; owned 4%, which were later sold to a consortium of &lt;i&gt;Apple, EMC, Ericsson, Microsoft, Research in Motion (RIM)&lt;/i&gt; and &lt;i&gt;Sony&lt;/i&gt;, after &lt;i&gt;Nortel&lt;/i&gt; filed for bankruptcy in 2009.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt; &lt;i&gt;Ericsson&lt;/i&gt; also independently owns 2% of the patent pool and &lt;i&gt;RIM&lt;/i&gt; owns 1%.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; However, another analysis&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; of IP databases conducted by &lt;i&gt;ZTE&lt;/i&gt; in 2011 revealed differing results. As per this analysis, &lt;i&gt;InterDigital &lt;/i&gt;was the leader, with its Patent Holdings arm controlling 13% and the Technology arm controlling 11% of LTE essential patents. &lt;i&gt;Qualcomm&lt;/i&gt; controlled 13%, &lt;i&gt;Nokia&lt;/i&gt; and &lt;i&gt;Samsung&lt;/i&gt; 9% each, &lt;i&gt;Ericsson&lt;/i&gt; controlled 8%, as did &lt;i&gt;Huawei&lt;/i&gt;, &lt;i&gt;ZTE&lt;/i&gt; controlled 7%, &lt;i&gt;L.G&lt;/i&gt;. controlled 6% and &lt;i&gt;NTT&lt;/i&gt; &lt;i&gt;DoCoMo&lt;/i&gt; brought up the rear with 5%. The remaining 11% was held by various other firms.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; It is to be realized that these studies have often come under criticism from different companies, with each of them eager to portray themselves as the market leader.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Setting aside criticism driven by corporate egos, the principle of it, that is, the difficulty in assessing and valuing patents cannot be disputed. Valuing patents is far from merely counting the number of patents owned by a company. The complications are especially evident when it comes to determining which of these patents are essential and which of them aren’t. Additionally, the worth of these patents varies depending on the existence or the absence of certain conditions, including transfer restrictions, cross licensing arrangements, ownership and market conditions.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aforesaid discussion reveals the complexity and the fragmentation of the LTE environment, which further underscored the need to have patent pools in this field. Although the need for a patent pool was realized in 2009-2010, given that the WCDMA patent pool had been met with very limited success,&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; industry watchers were reluctant to be optimistic. This was in part fuelled by the understanding of the attitude of dominant players, wherein they continued to believe that they could derive more monetary, cross licensing and litigation defence value if they did not pool their patents.&lt;a href="#fn49" name="fr49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The development of LTE patent pools can be traced back to 2009, and the response of &lt;i&gt;Via Licensing&lt;/i&gt;¸&lt;i&gt; Sisvel&lt;/i&gt; and &lt;i&gt;MPEG LA&lt;/i&gt; to a Request for Information on forming such a patent pool by the &lt;i&gt;Next Generation Mobile Network Alliance (NGMN).&lt;/i&gt;&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; &lt;i&gt;Sisvel’s&lt;/i&gt; proposal, which it subsequently made at a public conference in 2010 sought to demonstrate that patent pools could prevent excessive costs from royalty stacking.&lt;a href="#fn51" name="fr51"&gt;[51] &lt;/a&gt;Among various other examples, &lt;i&gt;Roberto Dini&lt;/i&gt;, the founder of &lt;i&gt;Sisvel&lt;/i&gt; suggested that if patents were to be licensed individually, for instance, 85 patents for MPEG video at 50 cents apiece would cost $42.50. As opposed to this, the patent pool charged $2.50.&lt;a href="#fn52" name="fr52"&gt;[52]&lt;/a&gt; In 2011, the &lt;i&gt;NGMN&lt;/i&gt; reiterated its recommendation to all stakeholders in the mobile industry that were interested in developing patent pools to hasten their development process to avoid further delays in LTE licensing.&lt;a href="#fn53" name="fr53"&gt;[53]&lt;/a&gt; The &lt;i&gt;NGMN&lt;/i&gt; also went on to state that it would be ideal if all the parties were to agree on a single patent pool that promoted reasonable royalties, offered certainty on the availability of the licenses for patents and created a framework for evaluation of their essentiality, where the value of the patents essential to the pool would be established by the industry.&lt;a href="#fn54" name="fr54"&gt;[54]&lt;/a&gt; These recommendations were not without their fair share of criticism, both, from industry watchers&lt;a href="#fn55" name="fr55"&gt;[55]&lt;/a&gt; and from vendors.&lt;a href="#fn56" name="fr56"&gt;[56]&lt;/a&gt; Notwithstanding these reservations, both, &lt;i&gt;Sisvel&lt;/i&gt;&lt;a href="#fn57" name="fr57"&gt;[57]&lt;/a&gt; and &lt;i&gt;Via&lt;/i&gt; &lt;i&gt;Licensing&lt;/i&gt; have gone on to issue calls for patents for the purposes of creating patent pools in the LTE marketplace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Sisvel &lt;/i&gt;LTE Patent Pool materialized in late 2012, wherein licenses were offered under a portfolio of patents essential to LTE.&lt;a href="#fn58" name="fr58"&gt;[58]&lt;/a&gt; The pool includes patents owned by &lt;i&gt;Cassidian&lt;/i&gt;, the &lt;i&gt;China Academy of Telecommunication Technology, the Electronics and Telecommunications Research Institute, France Telecom, TDF&lt;/i&gt;, and &lt;i&gt;KPN&lt;/i&gt;, in addition to some patents that had been originally filed by &lt;i&gt;Nokia &lt;/i&gt;but were acquired by &lt;i&gt;Sisvel &lt;/i&gt;in 2011.&lt;a href="#fn59" name="fr59"&gt;[59]&lt;/a&gt; The pool is also open to other organizations that have patents essential to LTE. At present, the current portfolio of these patents is available under standard terms and conditions. The running royalty rate is 0.99 Euros per device.&lt;a href="#fn60" name="fr60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having promised a launch within a few months in June, 2012&lt;a href="#fn61" name="fr61"&gt;[61]&lt;/a&gt; &lt;i&gt;Via Licensing &lt;/i&gt;has also developed its own LTE Patent Pool, with the initial companies in this pool being &lt;i&gt;AT&amp;amp;T, &lt;/i&gt;&lt;i&gt;Clearwire Corporation, DTVG Licensing, HP, KDDI Corporation, MTT DoCoMo, SK Telecom, Telecom Italia, Telefónica&lt;/i&gt; and &lt;i&gt;ZTE.&lt;/i&gt;&lt;a href="#fn62" name="fr62"&gt;[62]&lt;/a&gt; Like &lt;i&gt;Sisvel’s&lt;/i&gt; Patent Pool, this pool is also open to other organizations that believe they possess essential LTE patents, and they are encouraged to submit the same for evaluation.&lt;a href="#fn63" name="fr63"&gt;[63]&lt;/a&gt; The patent pool floated by &lt;i&gt;Via&lt;/i&gt; leans heavily towards service providers, but some of the big players in the industry including &lt;i&gt;Nokia, Ericsson, Huawei Technologies&lt;/i&gt; and &lt;i&gt;Samsung&lt;/i&gt; &lt;i&gt;Electronics&lt;/i&gt; are conspicuous by their absence.&lt;a href="#fn64" name="fr64"&gt;[64]&lt;/a&gt; This absence is felt even in &lt;i&gt;Sisvel’s&lt;/i&gt; patent pool, with the reasoning being proposed&lt;a href="#fn65" name="fr65"&gt;[65]&lt;/a&gt; that these key patent holders may prefer private licensing and subsequent litigation over pooled resources in patent pools.&lt;a href="#fn66" name="fr66"&gt;[66]&lt;/a&gt; Understandably, the launch of the LTE Patent Pools has been met with approval by the &lt;i&gt;NGMN&lt;/i&gt;&lt;a href="#fn67" name="fr67"&gt;[67]&lt;/a&gt; but given the nascent stages in which both of these pools find themselves, it would be premature to comment (without first observing for a few months) the likelihood of their success or failure and how they would play out against each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The TD-SCDMA and the TD-LTE&lt;br /&gt;&lt;/b&gt;Reportedly, China has spent several billion dollars on the import of analog and GSM technology,&lt;a href="#fn68" name="fr68"&gt;[68]&lt;/a&gt; and the country’s mobile communications industry continues to be dominated by foreign players.&lt;a href="#fn69" name="fr69"&gt;[69]&lt;/a&gt; Therefore, in continuation of a purportedly &lt;i&gt;growing trend&lt;/i&gt;&lt;a href="#fn70" name="fr70"&gt;[70]&lt;/a&gt; in the area of telecommunications as well, domestically developed systems are being preferred and developed over standardized technologies that enjoy strong patent protection outside China.&lt;a href="#fn71" name="fr71"&gt;[71]&lt;/a&gt; Besides the avoidance of paying royalties to foreigners, the idea is also to use China’s strong market presence and have more participants in China’s home grown technology.&lt;a href="#fn72" name="fr72"&gt;[72]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Time Divisional- Synchronous Code Division Multiple Access (TD-SCDMA), developed by the &lt;i&gt;China Academy of Telecommunications Technology (CATT)&lt;/i&gt;, in collaboration with &lt;i&gt;Datang &lt;/i&gt;and&lt;i&gt; Siemens&lt;/i&gt;&lt;a href="#fn73" name="fr73"&gt;[73]&lt;/a&gt; is a Chinese indigenously developed 3G technology standard developed by China to reduce its dependence on western standards.&lt;a href="#fn74" name="fr74"&gt;[74]&lt;/a&gt; Interestingly however, it has been reported that the Chinese hold core patent technology only about 7% whereas most of the rest of it is taken by other foreign organizations.&lt;a href="#fn75" name="fr75"&gt;[75]&lt;/a&gt; In 2000, an industry consortium, the TD-SCDMA forum was established. The participants were &lt;i&gt;China&lt;/i&gt; &lt;i&gt;Mobile, China Telecom, China Unicom, Huawei, Motorola, Nortel, &lt;/i&gt;and&lt;i&gt; Siemens&lt;/i&gt;, with the objective of developing and supporting this technology. Government support was received in 2002, following which the &lt;i&gt;TD-SCDMA Industry Alliance &lt;/i&gt;was founded by well known market players including &lt;i&gt;Datang&lt;/i&gt;, &lt;i&gt;SOUTEC&lt;/i&gt;, &lt;i&gt;Holley&lt;/i&gt;, &lt;i&gt;Huawei&lt;/i&gt;, &lt;i&gt;LENOVO, ZTE, CEC&lt;/i&gt; and &lt;i&gt;China&lt;/i&gt; &lt;i&gt;Putian&lt;/i&gt;. There has also been the creation of various joint ventures with international giants such as &lt;i&gt;Alcatel&lt;/i&gt;, &lt;i&gt;Ericsson&lt;/i&gt;, &lt;i&gt;Nokia&lt;/i&gt;, (erstwhile) &lt;i&gt;Nortel&lt;/i&gt;, &lt;i&gt;Philips&lt;/i&gt;, &lt;i&gt;Samsung&lt;/i&gt; and &lt;i&gt;Siemens&lt;/i&gt; have also been created.&lt;a href="#fn76" name="fr76"&gt;[76]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information about the existence of patent pools in this technology has been hard to come by. One of the few to write about patent pools in his 2008 paper,&lt;a href="#fn77" name="fr77"&gt;[77]&lt;/a&gt; &lt;i&gt;Dazheng Wang&lt;/i&gt; proposes patent pools as a solution to the problem of commercialization of TD-SCDMA. He suggests that the framework of this patent pool should be on the industry principles of fair, reasonable and non discriminatory licensing terms for essential patents, with the end result being one of increased innovation and competition and an overall increase in market presence. Interestingly, a few articles&lt;a href="#fn78" name="fr78"&gt;[78]&lt;/a&gt; on blog posts on the internet speak about the existence of patent pools and their apparent misuse&lt;a href="#fn79" name="fr79"&gt;[79]&lt;/a&gt; as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is submitted that these inconsistencies regarding the division of patents between various patent holders, where the percentage of patents held by each company have been pegged differently,&lt;a href="#fn80" name="fr80"&gt;[80]&lt;/a&gt; and about the existence of a patent pool or not raise pressing concerns about the payment of royalties and how licensing works in such a situation. On a very basic level, in order to be able to pay royalties and enter into licensing agreements, the existence of an identified, non disputed patent holder would be the &lt;i&gt;sine qua non, &lt;/i&gt;which seems to be missing in the case of patents for TD-SCDMA. This problem is only further compounded by the lack of clarity on the very existence of patent pools. Had there been specified patent pools, the issues of determination of essential patents and the setting of royalties and licensing fees would have been standardized, a situation that cannot be invoked, without dispute, in the present Chinese context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is further submitted that despite China being the world’s largest market for mobile communications, and its progress from a mere importer to a developer of some parts of technology,&lt;a href="#fn81" name="fr81"&gt;[81]&lt;/a&gt; the Chinese experiment with TD-SCDMA seems to have met with limited success, in comparison to what was envisaged. For instance, while an agency had forecast that the number of TD-SCDMA subscribers in 2010 would be 34 million, by April, 2010 there were only 8 million or (even lower) subscribers.&lt;a href="#fn82" name="fr82"&gt;[82]&lt;/a&gt; One of the reasons for preferring other standards, for instance, the W-CDMA is the number of handsets compatible with the same and the consequent variety that is available to the consumer. To illustrate, one could look at the figures from June, 2010. At this point of time &lt;i&gt;China Unicom&lt;/i&gt; had 94 models for W-CDMA from twenty four manufacturers including nine foreign ones, whereas &lt;i&gt;China Mobile&lt;/i&gt; had only twenty eight models that were compatible with TD-SCDMA.&lt;a href="#fn83" name="fr83"&gt;[83]&lt;/a&gt; Interestingly, if one were to measure popularity in terms of sheer numbers, TD-SCDMA would emerge the winner over W-CDMA by a couple of million subscribers, but if the growth rate were to be considered, W-CDMA would come out on top. While TD-SCDMA grew only by 24%, W-CDMA has grown at 32% monthly since the start of its service is October, 2009.&lt;a href="#fn84" name="fr84"&gt;[84]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;China’s experiments with creating its home grown telecommunication standards have not stopped with the development of the TD-SCDMA, with the country being on track in the development of the TD-LTE. Reports suggest that although the systems are in ‘trial’ mode officially, the 4G spectrum situation remains uncertain.&lt;a href="#fn85" name="fr85"&gt;[85]&lt;/a&gt; It is submitted that although this is in the nascent stages as compared to the TD-SCDMA, the concerns expressed earlier about TD-SCDMA and the suggestions made therein for the technology to realise its full potential would be equally applicable in this scenario as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, in light of this discussion it would not be fallacious to conclude that while the TD-SCDMA, and now more recently the TD-LTE standard might still be in its nascent stages, on a fundamental level it seems to have not fulfilled the objectives with which it was developed, especially given that a sizeable portion of its patents continue to be owned by foreign corporations. In addition to the challenges of attracting subscribers, it would also need to streamline its system of patents, royalties and licensing, if it wants to have a truly global or even national presence. To this end perhaps patent pools structured along the lines of those being developed or in place for other mobile communication technologies might provide a viable solution meriting consideration.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Concluding Observations&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;One of the fundamental concerns that plague most downstream organizations in the mobile communications sector is the prevalence of high licensing fees that need to be paid on essential patents, the cost of which often trickles down to the customers. A study on the licensing arrangements prevalent at the moment&lt;a href="#fn86" name="fr86"&gt;[86]&lt;/a&gt; reveals that as of the moment, the result of royalty rate caps is that they save money for downstream manufacturers, but this is at the expense of upstream licensors. The most significant savers are the ones downstream with no IP to trade, and vertically integrated companies while losing some revenue, are able to save significantly more in reduced expenses.&lt;a href="#fn87" name="fr87"&gt;[87]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, it comes as no surprise that efforts at limiting aggregate licensing fees have been at the forefront over the past couple of years. It is in this scenario that patent pools have developed, with operators such as &lt;i&gt;Via Licensing&lt;/i&gt; and &lt;i&gt;Sisvel&lt;/i&gt; even promoting themselves as being able to put together patent pools that would greatly limit licensing fees.&lt;a href="#fn88" name="fr88"&gt;[88] &lt;/a&gt;However, some owners of intellectual property continue to find bilateral licensing and cross licensing to be more profitable as opposed to patent pools.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the key concerns when it comes to fore when dealing with how patent pools are structured is about the distribution of income received from royalties within the members of the pool, which ties in with the bigger question of classifying patents as essential and non essential. More often than not, patent pools also have to grapple with the problem of members having conflicting interests. For instance, manufacturers have the incentive to cap aggregate royalties of certain essential patents that they would use in manufacturing, in order to reduce their licensing costs. However, these manufacturers could have also brought their own essential patents to the pool, perhaps of a new way of doing things, and would certainly be averse of having caps imposed on these royalties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the key other considerations that patent pools need to take into account include the royalty rates affixed. In an interview some time ago, the founder of &lt;i&gt;Sisvel&lt;/i&gt;, went on to state that while affixing these royalty rates, there could be no discrimination against licensees, since that would be a sure fire way of ensuring the collapse of the patent pool.&lt;a href="#fn89" name="fr89"&gt;[89]&lt;/a&gt; Additionally, patent pools also need to account for the difference in regulatory mechanism and their execution that exists across jurisdictions. For instance, customs officials in France pay a lot more attention to counterfeit goods than they would to patent infringing products, whereas those in Germany would have a keen eye on the latter.&lt;a href="#fn90" name="fr90"&gt;[90]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Various other concerns have also been identified with regard to patent pools over time. One of these is that they could potentially eliminate competition that comes from outside of patent pools.&lt;a href="#fn91" name="fr91"&gt;[91]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, patent pools are not all inclusive, since participation is entirely voluntary. Therefore, patent pools would not even be reasonably expected to cover all essential patents required to make a standardised product. This problem is rendered even more complex as a result of the presence of multiple patent pools around the same technology, as in the case of DVDs and more recently, LTE technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In sum, while portfolio cross licenses and patent pools can be helpful in resolving issues created by patent thickets by reducing transaction costs for licensees, while preserving to a definitive extent financial incentives for inventors to commercialize their existing inventions and undertake new research, the significant shortcomings of these pools also need to be taken into account before they can be heralded as the solution to problems presented by complex patent landscapes. While voluntary patent pools might have proved to be beneficial in some respects, the imposition of patent pools would be a fallacious approach to undertake.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Hui Yan, &lt;i&gt;The 3G Standard Setting Strategy and Indigenous Innovation Policy in China: Is TD-SCDMA a Flagship?, &lt;/i&gt;DRUID Working Paper No 07-01, available at http://www2.druid.dk/conferences/viewpaper.php?id=1454&amp;amp;cf=9 (last accessed 07 12 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Josh Lerner and Jean Tirole, &lt;i&gt;Efficient Patent Pools,&lt;/i&gt; 4 Am.  Econ.  Rev. 691, 691 (2004)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;i&gt;Patent Pools- Some Not So Frequently Answered Questions, &lt;/i&gt;available at &lt;a href="http://blog.patentology.com.au/2012/11/patent-pools-some-not-so-frequently.html"&gt;http://blog.patentology.com.au/2012/11/patent-pools-some-not-so-frequently.html&lt;/a&gt; (last accessed 10 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Philip B. Nelson, &lt;i&gt;Patent Pools: An Economic Assessment of Current Law and Policy, &lt;/i&gt;Rutgers Law Journal, Volume 38:539, 559 (2007)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Roger B. Andewelt,  Analysis of Patent Pools Under the Antitrust Laws, 53 ANTITRUST L.J. 611, 611 (1984).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Philips has been known to have been the licensing agency for patent pools where it was a member&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. &lt;i&gt;Supra &lt;/i&gt;note 3&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. &lt;i&gt;Supra &lt;/i&gt;note 3&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;i&gt;Supra &lt;/i&gt;note 3&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;i&gt;Supra &lt;/i&gt;note 3&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. &lt;i&gt;Supra &lt;/i&gt;note 3&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. &lt;i&gt;Supra &lt;/i&gt;note 3&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. &lt;i&gt;Supra &lt;/i&gt;note 3&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Rudi Bekkers et. al., &lt;i&gt;Patent Pools and Non Assertion Agreements: Coordination Mechanisms for Multi Party IPR Holders in Standardization&lt;/i&gt;, available at &lt;a href="http://www-i4.informatik.rwth-aachen.de/Interest/EASST_Bekkers_Iversen_Blind.pdf"&gt;http://www-i4.informatik.rwth-aachen.de/Interest/EASST_Bekkers_Iversen_Blind.pdf&lt;/a&gt; 22 (last accessed 09 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 17 at 23.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 17 at 23.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Keith Mallinson, &lt;i&gt;Fixing IP Prices with Royalty Rate Caps and Patent Pools, &lt;/i&gt;available at &lt;a href="http://ipfinance.blogspot.in/2011/07/fixing-ip-prices-with-royalty-rate-caps.html"&gt;http://ipfinance.blogspot.in/2011/07/fixing-ip-prices-with-royalty-rate-caps.html&lt;/a&gt; (last accessed 10 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt; See Appendix 1 for a graphical representation of declared intellectual property assets in 2009.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 17 at 25&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 17 at 27&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 17 at 27&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 17 at 28&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Dessy Choumelova, &lt;i&gt;Competition Law Analysis of Patent Licensing Agreements- the Particular Case of 3G3P, &lt;/i&gt;available at  &lt;a href="http://ec.europa.eu/competition/publications/cpn/2003_1_41.pdf-"&gt;http://ec.europa.eu/competition/publications/cpn/2003_1_41.pdf-&lt;/a&gt; 41 (last accessed 10 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. &lt;i&gt;Id &lt;/i&gt;at 42.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. &lt;i&gt;Id &lt;/i&gt;at 42.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. &lt;i&gt;Id &lt;/i&gt;at 42-43.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. &lt;i&gt;Id&lt;/i&gt; at 43.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 17 at 29.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 17 at 39.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 17 at 39.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Elizabeth Woyke,&lt;i&gt; Identifying the Tech Leaders in LTE Wireless Patents, &lt;/i&gt;available at &lt;a href="http://www.forbes.com/sites/elizabethwoyke/2011/09/21/identifying-the-tech-leaders-in-lte-wireless-patents/"&gt;http://www.forbes.com/sites/elizabethwoyke/2011/09/21/identifying-the-tech-leaders-in-lte-wireless-patents/&lt;/a&gt; (last accessed 08 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Caroline Gabriel, &lt;i&gt;ZTE Claims 7% of LTE Essential Patents, &lt;/i&gt;available at &lt;a href="http://www.rethink-wireless.com/2011/01/11/zte-claims-7-lte-essential-patents.htm"&gt;http://www.rethink-wireless.com/2011/01/11/zte-claims-7-lte-essential-patents.htm&lt;/a&gt; (last accessed 09 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 40.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Keith Mallinson, &lt;i&gt;Mallinson: Uncertain Futures in LTE Patent Pool Licensing, &lt;/i&gt;available at &lt;a href="http://www.fiercewireless.com/europe/story/mallinson-uncertain-outlook-patent-pool-licensing/2010-08-25"&gt;http://www.fiercewireless.com/europe/story/mallinson-uncertain-outlook-patent-pool-licensing/2010-08-25&lt;/a&gt; (last accessed 10 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr51" name="fn51"&gt;51&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr52" name="fn52"&gt;52&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: left; "&gt;[&lt;a href="#fr53" name="fn53"&gt;53&lt;/a&gt;]. &lt;i&gt;NGMN Board Recommendation on LTE Patent Pool, &lt;/i&gt;available at &lt;a href="http://4g-portal.com/ngmn-board-recommendation-on-lte-patent-pool"&gt;http://4g-portal.com/ngmn-board-recommendation-on-lte-patent-pool&lt;/a&gt; (last accessed 10 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr54" name="fn54"&gt;54&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr55" name="fn55"&gt;55&lt;/a&gt;]. Caroline Gabriel, &lt;i&gt;NGMN’s Calls for an LTE Patent Pool Will be Futile in the Current IPR Climate&lt;/i&gt;, available at &lt;a href="http://www.4gtrends.com/articles/53511/ngmns-calls-for-an-lte-patent-pool-will-be-futile-/"&gt;http://www.4gtrends.com/articles/53511/ngmns-calls-for-an-lte-patent-pool-will-be-futile-/&lt;/a&gt; (last accessed 11 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr56" name="fn56"&gt;56&lt;/a&gt;]. Michelle Donegan, &lt;i&gt;Vendors Balk at LTE Patent Pool Proposal, &lt;/i&gt;available at &lt;a href="http://www.lightreading.com/document.asp?doc_id=212362"&gt;http://www.lightreading.com/document.asp?doc_id=212362&lt;/a&gt; (last accessed 11 December, 2012).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr57" name="fn57"&gt;57&lt;/a&gt;]. &lt;i&gt;SISVEL: Patent Pool for 3G Long Term Evolution (LTE), &lt;/i&gt;available at &lt;a href="http://www.thefreelibrary.com/SISVEL%3A+Patent+Pool+for+3G+Long+Term+Evolution+(LTE).-a0199544458"&gt;http://www.thefreelibrary.com/SISVEL%3A+Patent+Pool+for+3G+Long+Term+Evolution+(LTE).-a0199544458&lt;/a&gt; (last accessed 08 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr58" name="fn58"&gt;58&lt;/a&gt;]. &lt;i&gt;LTE Patent Pool from Sisvel&lt;/i&gt;, available at &lt;a href="http://4g-portal.com/lte-patent-pool-from-sisvel"&gt;http://4g-portal.com/lte-patent-pool-from-sisvel&lt;/a&gt; (last accessed 09 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr59" name="fn59"&gt;59&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr60" name="fn60"&gt;60&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr61" name="fn61"&gt;61&lt;/a&gt;]. Mike Dano, &lt;i&gt;Via Promises LTE Patent Pool Launch Within Months, &lt;/i&gt;available at &lt;a href="http://www.fiercewireless.com/story/licensing-promises-lte-patent-pool-launch-within-months/2012-06-15"&gt;http://www.fiercewireless.com/story/licensing-promises-lte-patent-pool-launch-within-months/2012-06-15&lt;/a&gt; (last accessed 07 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr62" name="fn62"&gt;62&lt;/a&gt;]. &lt;i&gt;LTE Patent Pool Available Through Via’s Licensing Program, &lt;/i&gt;available at &lt;a href="http://4g-portal.com/lte-patent-pool-available-through-vias-licensing-program"&gt;http://4g-portal.com/lte-patent-pool-available-through-vias-licensing-program&lt;/a&gt; (last accessed 10 December, 2012).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr63" name="fn63"&gt;63&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr64" name="fn64"&gt;64&lt;/a&gt;]. Stephen Lawson, &lt;i&gt;Lte Patent Pool Brings Together Technologies From At&amp;amp;T, Zte, Hp And Others, &lt;/i&gt;available at &lt;a href="http://www.computerworld.com/s/article/9232043/LTE_patent_pool_brings_together_technologies_from_AT_amp_T_ZTE_HP_and_others"&gt;http://www.computerworld.com/s/article/9232043/LTE_patent_pool_brings_together_technologies_from_AT_amp_T_ZTE_HP_and_others&lt;/a&gt; (last accessed 09 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr65" name="fn65"&gt;65&lt;/a&gt;]. Peter White, &lt;i&gt;Sisvel LTE Patent Pool Emerges After All- Majors Still Hold Back from Committing, &lt;/i&gt;available at &lt;a href="http://www.rethink-wireless.com/2012/11/05/sisvel-lte-patent-pool-emerges-all-majors-hold-committing.htm"&gt;http://www.rethink-wireless.com/2012/11/05/sisvel-lte-patent-pool-emerges-all-majors-hold-committing.htm&lt;/a&gt; (last accessed 09 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr66" name="fn66"&gt;66&lt;/a&gt;]. Shankar Pandiath, &lt;i&gt;Sisvel Launches Patent Pool for 3G Long Term Evolution (LTE), &lt;/i&gt;available at &lt;a href="http://next-generation-communications.tmcnet.com/topics/nextgen-voice/articles/314957-sisvel-launches-patent-pool-3g-long-term-evolution.htm"&gt;http://next-generation-communications.tmcnet.com/topics/nextgen-voice/articles/314957-sisvel-launches-patent-pool-3g-long-term-evolution.htm&lt;/a&gt; (last accessed 09 December, 2012).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr67" name="fn67"&gt;67&lt;/a&gt;].&lt;i&gt;NGMN Board Welcomes Launch of LTE Patent Pool, &lt;/i&gt;available at &lt;a href="http://4g-portal.com/ngmn-board-welcomes-launch-of-lte-patent-pool"&gt;http://4g-portal.com/ngmn-board-welcomes-launch-of-lte-patent-pool&lt;/a&gt; (last accessed 09 December, 2012).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr68" name="fn68"&gt;68&lt;/a&gt;]. ELSPETH THOMSON AND JON SIGURDSON (EDS.), CHINA’S SCIENCE AND TECHNOLOGY SECTOR AND THE FORCES OF GLOBALIZATION 17 (2008, World Scientific Publishing Company, Singapore).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr69" name="fn69"&gt;69&lt;/a&gt;]. Cong Cao, &lt;i&gt;Challenges for Technological Development in China’s Industry, &lt;/i&gt;available at &lt;a href="http://chinaperspectives.revues.org/924"&gt;http://chinaperspectives.revues.org/924&lt;/a&gt; (last accessed 11 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr70" name="fn70"&gt;70&lt;/a&gt;]. Peter Zura, &lt;i&gt;China Launches TD-SCDMA Telecom Standard&lt;/i&gt;¸ available at &lt;a href="http://271patent.blogspot.in/2006/01/china-launches-td-scdma-telecom.html"&gt;http://271patent.blogspot.in/2006/01/china-launches-td-scdma-telecom.html&lt;/a&gt; (last accessed 10 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr71" name="fn71"&gt;71&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr72" name="fn72"&gt;72&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr73" name="fn73"&gt;73&lt;/a&gt;]. &lt;i&gt;TD-SCDMA (time division synchronous code division multiple access)&lt;/i&gt;, available at &lt;a href="http://searchmobilecomputing.techtarget.com/definition/TD-SCDMA"&gt;http://searchmobilecomputing.techtarget.com/definition/TD-SCDMA&lt;/a&gt; (last accessed 07 December, 2012).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr74" name="fn74"&gt;74&lt;/a&gt;]. SHAHD AKHTAR AND PATRICIA ARINTO (EDS.), DIGITAL REVIEW OF ASIA PACIFIC : 2009-2010 8 (2010, Sage Publications, New Delhi).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr75" name="fn75"&gt;75&lt;/a&gt;]. &lt;i&gt;Supra &lt;/i&gt;note 1 at 2. See Appendix 2 for the breakup of patent holding. However, see details on &lt;i&gt;Infra&lt;/i&gt; note 78 for a contradictory view, wherein China claims to own 30% of all TD-SCDMA patents.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr76" name="fn76"&gt;76&lt;/a&gt;]. Pierre Vialle, &lt;i&gt;On the relevance of Indigenous Standard Setting Policy: the Case of  TD-SCDMA in China, &lt;/i&gt;2&lt;sup&gt;nd&lt;/sup&gt; International Conference on Economics, Trade and Development, (2012) 36 IPEDR 184-185 (IACSIT Press, Singapore).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr77" name="fn77"&gt;77&lt;/a&gt;]. Dazheng Wang, Patent Pool: &lt;i&gt;A Solution to the Problem of TD-SCDMA’s Commercialization&lt;/i&gt;, &lt;a href="http://ieeexplore.ieee.org/xpl/login.jsp?tp=&amp;amp;arnumber=5076744&amp;amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F5076660%2F5076661%2F05076744.pdf%3Farnumber%3D5076744"&gt;http://ieeexplore.ieee.org/xpl/login.jsp?tp=&amp;amp;arnumber=5076744&amp;amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F5076660%2F5076661%2F05076744.pdf%3Farnumber%3D5076744&lt;/a&gt; (last accessed 11 December, 2012).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr78" name="fn78"&gt;78&lt;/a&gt;]. &lt;i&gt;China Owns 30% of TD-SCDMA Related Patents, &lt;/i&gt;available at  &lt;a href="http://www.cn-c114.net/582/a310685.html"&gt;http://www.cn-c114.net/582/a310685.html&lt;/a&gt; (last accessed 11 December, 2012).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr79" name="fn79"&gt;79&lt;/a&gt;]. &lt;i&gt;The Legal Regulation on Patent Pool Misuse, &lt;/i&gt;available at &lt;a href="http://www.socpaper.com/the-legal-regulation-on-patent-pool-misuse.html"&gt;http://www.socpaper.com/the-legal-regulation-on-patent-pool-misuse.html&lt;/a&gt; (last accessed 11 December, 2012).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr80" name="fn80"&gt;80&lt;/a&gt;]. &lt;i&gt;Supra &lt;/i&gt;notes 75 and 78.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr81" name="fn81"&gt;81&lt;/a&gt;]. Tomoo Marukawa, &lt;i&gt;Chinese Innovations in Mobile Telecommunications: Third Generation vs. “Guerrilla Handsets”, &lt;/i&gt;Paper presented at the IGCC Conference: Chinese Approaches to National Innovation, La Jolla, California, June 28-29, 2010 at 1.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr82" name="fn82"&gt;82&lt;/a&gt;]. &lt;i&gt;Id &lt;/i&gt;at 8.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr83" name="fn83"&gt;83&lt;/a&gt;]. &lt;i&gt;Id &lt;/i&gt;at 9.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr84" name="fn84"&gt;84&lt;/a&gt;]. &lt;i&gt;Id&lt;/i&gt; at 9.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr85" name="fn85"&gt;85&lt;/a&gt;]. &lt;i&gt;China to Speed Up TD-LTE Process, &lt;/i&gt;available at &lt;a href="http://www.tdscdma-forum.org/en/news/see.asp?id=11998&amp;amp;uptime=2012-11-29"&gt;http://www.tdscdma-forum.org/en/news/see.asp?id=11998&amp;amp;uptime=2012-11-29&lt;/a&gt; (last accessed 08 December, 2012)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr86" name="fn86"&gt;86&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 23.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr87" name="fn87"&gt;87&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr88" name="fn88"&gt;88&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 23.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr89" name="fn89"&gt;89&lt;/a&gt;]. &lt;i&gt;Sisvel’s Patent Strategy, &lt;/i&gt;available at &lt;a href="http://www.managingip.com/Article/2400452/Sisvels-patent-strategy.html"&gt;http://www.managingip.com/Article/2400452/Sisvels-patent-strategy.html&lt;/a&gt; (last accessed 12 December, 2012).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr90" name="fn90"&gt;90&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr91" name="fn91"&gt;91&lt;/a&gt;]. &lt;i&gt;Supra&lt;/i&gt; note 23.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/patent-pools'&gt;https://cis-india.org/a2k/blogs/patent-pools&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2013-07-03T06:57:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/pervasive-technologies-research-proposal.pdf">
    <title>Pervasive Technologies: Access to Knowledge in the Marketplace</title>
    <link>https://cis-india.org/a2k/pervasive-technologies-research-proposal.pdf</link>
    <description>
        &lt;b&gt;Pervasive technologies (mass-market networked communication technologies) are transforming the way in which people across the world access knowledge media. The prices of mobile phones and netbooks have plummeted, even as penetration and use have reached near-ubiquitous levels. In many ways, these commercial devices are fulfilling the promise that socially beneficial initiatives like One Laptop Per Child were never able to fully deliver on.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/pervasive-technologies-research-proposal.pdf'&gt;https://cis-india.org/a2k/pervasive-technologies-research-proposal.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-09-25T04:47:36Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
