<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 751 to 765.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/odisha-tv-february-9-2016-subhashish-panigrahi-net-neutrality-advocates-rejoice-as-trai-bans-differential-pricing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-february-9-2016-alnoor-peermohamed-net-neutrality-advocates-hail-trai-verdict"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/net-gain"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20WIPO%20Initiatives%20-%2005%20March-%202016.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20NLSIU%20-%2004%20March%202016.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/looking-closer-at-porn-with-x-ray-spectacles-savita-bhabhi-mms-video-and-others"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/navigating-the-digitalisation-of-finance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/resources/national-telecom-policy-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/national-telecom-policy-2012"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage">
    <title>Net Neutrality and the Law of Common Carriage</title>
    <link>https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage</link>
    <description>
        &lt;b&gt;Net neutrality makes strange bedfellows. It links the truck operators that dominate India’s highways, such as those that carry vegetables from rural markets to cities, and Internet service providers which perform a more technologically advanced task.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/net-neutrality-law-of-common-carriage.pdf" class="internal-link"&gt;&lt;b&gt;Download PDF&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last decade, the truckers have opposed the government’s attempts to impose the obligations of common carriage on them, this has resulted in strikes and temporary price rises; and, in the years ahead, there is likely to be a similar – yet, technologically very different – debate as net neutrality advocates call for an adapted version of common carriage to bind Internet services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality demands a rigorous examination that is not attempted by this short note which, constrained by space, will only briefly trace the law and policy of net neutrality in the US and attempt a brief comparison with the principles of common carriage in India. Net neutrality defies definition. Very simply, the principle demands that Internet users have equal access to all content and applications on the Internet. This can only be achieved if Internet service providers: (i) do not block lawful content; (ii) do not throttle – deliberately slow down or speed up access to selected content; (iii) do not prioritise certain content over others for monetary gain; and, (iv) are transparent in their management of the networks by which data flows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost exactly a year ago, the District of Columbia Circuit Court of Appeals – a senior court below the US Supreme Court – struck down portions of the ‘Open Internet Order’ that was issued by the Federal Communications Commission (FCC) in 2010. Although sound in law, the Court’s verdict impeded net neutrality to raise crucial questions regarding common carriage, free speech, competition, and others. More recently, Airtel’s announcement of its decision to charge certain end-users for VoIP services – subsequently suspended pending a policy decision from the Telecom Regulatory Authority of India (TRAI) – has fuelled the net neutrality debate in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because of its innovative technological history in relation to the Internet, the US has pioneered many legal attempts to regulate the Internet in respect of net neutrality. In 1980, when Internet data flowed through telephone lines, the FCC issued the ‘Computer II’ regime which distinguished basic services from enhanced services. The difference between the two turned on the nature of the transmission. Regular telephone calls involved a pure transmission of data and were hence classified as basic services. On the other hand, access to the Internet required the processing of user data through computers; these were classified as enhanced services. Importantly, because of their essential nature, the Computer II rules bound basic services providers to the obligations of common carriage whereas enhanced services providers were not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is common carriage? Common law countries share a unique heritage in respect of their law governing the transport of goods and people. Those that perform such transport are called carriers. The law makes a distinction between common carriers and other carriers. A carrier becomes a common carrier when it “holds itself out” to the public as willing to transport people or goods for compensation. The act of holding out is simply a public communication of an offer to transport, it may be fulfilled even by an advertisement. The four defining elements of a common carrier are (i) a holding out of a willingness (a public undertaking) (ii) to transport persons or property (iii) from place to place (iv) for compensation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Common carriers discharge a public trust. By virtue of their unique position and essential function, they are required to serve their customers equally and without discrimination. The law of carriage of goods and people places four broad duties upon common carriers. Firstly, common carriers are bound to carry everyone’s goods or all people and cannot refuse such carriage unless certain strict conditions are met. Secondly, common carriers must perform their carriage safely without deviating from accepted routes unless in exceptional circumstances. Thirdly, common carriers must obey the timeliness of their schedules, they must be on time. And, lastly, common carriers must assume liabilities for the loss or damages of goods, or death or injuries to people, during carriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Computer II regime was issued under a telecommunications law of 1934 which retained the classical markers and duties of common carriers. The law extended the principles of common carriage to telephone services providers. In 1980, when the regime was introduced, the FCC did not invest Internet services with the same degree of essence and public trust; hence, enhanced services escaped strict regulation. However, the FCC did require that basic services and enhanced services be offered through separate entities, and that basic services providers that operated the ‘last-mile’ wired transmission infrastructure to users offer these facilities to enhanced services providers on a common carrier basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1996, the new Telecommunications Act revisited US law after more than sixty years. The new dispensation maintained the broad structure of the Computer II regime: it recognised telecommunications carriers in place of basic services providers, and information-services providers in place of enhanced services. Carriers in the industry had already converged telephone and Internet communications as a single service. Hence, when a user engaged a carrier that provided telephone and broadband Internet services, the classification of the carrier would depend on the service being accessed. When a carrier provided broadband Internet access, it was an information-services provider (not a telecommunications carrier) and vice versa. Again, telecommunications carriers were subjected to stricter regulations and liability resembling common carriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1998, the provision of broadband Internet over wired telephone lines through DSL technologies was determined to be a pure transmission and hence a telecommunications service warranting common carriage regulation. However, in 2002, the FCC issued the ‘Cable Broadband Order’ that treated the provision of cable broadband through last-mile wired telephone transmission networks as a single and integrated information service. This exempted most cable broadband from the duties of common carriage. This policy was challenged in the US Supreme Court in 2005 in the Brand X case and upheld.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Significantly, the decision in the Brand X case was not made on technological merits. The case arose when a small ISP that had hitherto used regular telephone lines to transmit data wanted equal access to the coaxial cables of the broadcasting majors on the basis of common carriage. Instead of making a finding on the status of cable broadband providers based on the four elements of common carriage, the Court employed an administrative law principle of deferring to the decisions of an expert technical regulator – known as the Chevron deference principle – to rule against the small ISP. Thereafter wireless and mobile broadband were also declared to be information services and saved from the application of common carriage law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking advantage of this exemption from common carriage which released broadband providers from the duty of equal access and anti-discrimination, Comcast began from 2007 to degrade P2P data flows to its users. This throttling was reported to the FCC which responded with the 2008 ‘Comcast Order’ to demand equal and transparent transmission from Comcast. Instead, Comcast took the FCC to court. In 2010, the Comcast Order was struck down by the DC Circuit Court of Appeals. And, again, the decision in the Comcast case was made on an administrative law principle, not on technological merits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Comcast case, the Court said that as long as the FCC treated broadband Internet access as an information service it could not enforce an anti-discrimination order against Comcast. This is because the duty of anti-discrimination attached only to common carriers which the FCC applied to telecommunications carriers. Following the Comcast case, the FCC began to consider reclassifying broadband Internet providers as telecommunications carriers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the 2010 ‘Open Internet Order’, the FCC attempted a different regulatory approach. Instead of a classification based on common carriage, the new rules recognised two types of Internet service providers: (i) fixed providers, which transmitted to homes, and, (ii) mobile providers, which were accessed by smartphones. The rules required both types of providers to ensure transparency in network management, disallowed blocking of lawful content, and re-imposed the anti-discrimination requirement to forbid prioritised access or throttling of certain content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before they were even brought into effect, Verizon challenged the Open Internet Order in the same court that delivered the Comcast judgement. The decision of the Court is pending. Meanwhile, in India, Airtel’s rollback of its announcement to charge its pre-paid mobile phone users more for VoIP services raises very similar questions. Like the common law world, India already extends the principles of common carriage to telecommunications. Indian jurisprudence also sustains the distinction between common carriage and private carriage, and applies an anti-discrimination requirement to telecommunications providers through a licensing regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI must decide if it wants to continue this distinction. No doubt, the provision of communications services through telephone and the Internet serves an eminent public good. It was on this basis that President Obama called on the FCC to reclassify broadband Internet providers as common carriers. Telecommunications carriers, such as Airtel, might argue that they have expended large sums of money on network infrastructure that is undermined by the use of high-bandwidth free VoIP applications, and that the law of common carriage must recognise this fact. And still others call for a new approach to net neutrality outside the dichotomy of common and private carriage. Whatever the solution, it must be reached by widespread engagement and participation, for Internet access – as the government’s Digital India project is aware – serves public interest.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage'&gt;https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-23T11:09:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/odisha-tv-february-9-2016-subhashish-panigrahi-net-neutrality-advocates-rejoice-as-trai-bans-differential-pricing">
    <title>Net Neutrality Advocates Rejoice As TRAI Bans Differential Pricing</title>
    <link>https://cis-india.org/internet-governance/blog/odisha-tv-february-9-2016-subhashish-panigrahi-net-neutrality-advocates-rejoice-as-trai-bans-differential-pricing</link>
    <description>
        &lt;b&gt;India would not see any more Free Basics advertisements on billboards with images of farmers and common people explaining how much they benefited from this Facebook project.&lt;/b&gt;
        &lt;p&gt;The article by Subhashish Panigrahi was &lt;a class="external-link" href="http://odishatv.in/opinion/net-neutrality-advocates-rejoice-as-trai-bans-differential-pricing-125476/"&gt;published by Odisha TV &lt;/a&gt;on February 9, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Because the Telecom Regulatory Authority of India (TRAI) has taken a historical step by banning differential pricing without discriminating services. In their notes TRAI has explained, “In India, given that a majority of the population are yet to be connected to the internet, allowing service providers to define the nature of access would be equivalent of letting TSPs shape the users’ internet experience.” Not just that, violation of this ban would cost Rs. 50,000 every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook planned to launch Free Basics in India by making a few websites – mostly partners with Facebook—available for free. The company not just advertised aggressively on bill boards and commercials across the nation, it also embedded a campaign inside Facebook asking users to vote in support of Free Basics. TRAI criticized Facebook’s attempt to manipulate public opinion. Facebook was also heavily challenged by many policy and internet advocates including non-profits like Free Software Movement of India and Savetheinternet.in campaign. The two collectives strongly discouraged Free Basics by moulding public opinion against it with Savetheinternet.in alone used to send over 2.4 million emails to TRAI to disallow Free Basics. Furthermore, 500 Indian start-ups, including major names like Cleartrip, Zomato, Practo, Paytm and Cleartax, also wrote to India’s Prime Minister Narendra Modi requesting continued support for Net Neutrality – a concept that advocates equal treatment of websites – on Republic Day. Stand-up comedians like Abish Mathew and groups like All India Bakchod and East India Comedy created humorous but informative videos explaining the regulatory debate and supporting net neutrality. Both went viral.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technology critic and Quartz writer Alice Truong reacted to Free Basics saying; “Zuckerberg almost portrays net neutrality as a first-world problem that doesn’t apply to India because having some service is better than no service.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The decision of the Indian government has been largely welcomed in the country and outside. In support of the move, Web We Want programme manager at the World Wide Web Foundation Renata Avila has said; “As the country with the second largest number of Internet users worldwide, this decision will resonate around the world. It follows a precedent set by Chile, the United States, and others which have adopted similar net neutrality safeguards. The message is clear: We can’t create a two-tier Internet – one for the haves, and one for the have-nots. We must connect everyone to the full potential of the open Web.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are mixed responses on the social media, both in support and in opposition to the TRAI decision. Josh Levy, Advocacy Director at Accessnow, has appreciated saying, “India is now the global leader on #NetNeutrality. New rules are stronger than those in EU and US.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Had differential pricing been allowed, it would have affected start-ups and content-based smaller companies adversely as they could never have managed to pay the high price to a partner service provider to make their service available for free. On the other hand, tech-giants like Facebook could have easily managed to capture the entire market. Since the inception, the Facebook-run non-profit Internet.org has run into a lot of controversies because of the hidden motive behind the claimed support for social cause.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/odisha-tv-february-9-2016-subhashish-panigrahi-net-neutrality-advocates-rejoice-as-trai-bans-differential-pricing'&gt;https://cis-india.org/internet-governance/blog/odisha-tv-february-9-2016-subhashish-panigrahi-net-neutrality-advocates-rejoice-as-trai-bans-differential-pricing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-02-23T02:10:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-february-9-2016-alnoor-peermohamed-net-neutrality-advocates-hail-trai-verdict">
    <title>Net neutrality advocates hail Trai verdict</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-february-9-2016-alnoor-peermohamed-net-neutrality-advocates-hail-trai-verdict</link>
    <description>
        &lt;b&gt;Facebook 'disappointed' with the ruling on differential pricing.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alnoor Peermohamed appeared in the &lt;a class="external-link" href="http://www.business-standard.com/article/companies/net-neutrality-advocates-hail-trai-verdict-116020800974_1.html"&gt;Business Standard&lt;/a&gt; on February 9, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India has demonstrated what a forward looking and pro-&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Net+Neutrality" target="_blank"&gt;net neutrality &lt;/a&gt;policy  looks like, experts and net neutrality advocates said after the Telecom  Regulatory Authority of India (Trai) turned down a proposal to allow &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Differential+Pricing" target="_blank"&gt;differential pricing &lt;/a&gt;services to function in the country.&lt;br /&gt; &lt;br /&gt; “This ruling has happened in the face of enormous lobbying on the one side by very large &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Companies" target="_blank"&gt;companies &lt;/a&gt;and  a ragtag bunch of people on the other. In spite of that, to see the  right thing has prevailed, which is in the national interest and not  what was masqueraded as national interest is very gratifying. This has  not often taken place in policy making in India,” says Sharad Sharma,  convenor, iSPIRT, a lobby group for indigenous software product firms.&lt;br /&gt; &lt;br /&gt; Net neutrality activists across the world have lauded Trai’s decision not to allow large firms such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;and  Airtel to divide the Internet and offer selected services for free to  consumers. The one year-long fight that began when Airtel proposed to  offer internet companies the chance to offer customers their services  for free, ended in &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Trai" target="_blank"&gt;Trai &lt;/a&gt;stipulating fines of Rs 50,000 a day for companies offering differential pricing services, which is capped at Rs 50 lakh.&lt;br /&gt; &lt;br /&gt; “This has resulted now in the most expensive and stringent regulation on  differential pricing that exists anywhere in the world. Activists  around the world would be looking to India and will definitely be using  this landmark order to fight against &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zero+Rating" target="_blank"&gt;zero rating &lt;/a&gt;elsewhere,” said Pranesh Prakash, policy director at the Centre for Internet and Society (CIS), a think tank.&lt;br /&gt; &lt;br /&gt; Facebook, which was one of the biggest stakeholders in the drive to  allow differential pricing services in the country, said it was  disappointed with the ruling. The firm has been accused of supporting  net neutrality in the US, but standing in its way in India to get  permissions to provide its &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Free+Basics" target="_blank"&gt;Free Basics &lt;/a&gt;platform in India.&lt;br /&gt; &lt;br /&gt; “Our goal with Free Basics is to bring more people online with an open,  non-exclusive and free platform. While disappointed with the outcome,  we’ll continue our efforts to eliminate barriers and give the  unconnected an easier path to the internet and the opportunities it  brings,” Facebook said in a statement.&lt;br /&gt; &lt;br /&gt; Nikhil Pahwa, founder of Medianama, who ran a campaign called  Savetheinternet against Facebook’s Free Basics called this a victory to  the youth of India, saying “this outcome indicates what happens when  young people actually participate in a governance process”.&lt;br /&gt; &lt;br /&gt; According to Pahwa, there’s far too much cynicism about governments not  doing the right thing. “We hope this is the beginning of something new:  of people believing that they can make a difference, and persevering  towards helping form policies that ensure equity and freedom for  everyone.”&lt;br /&gt; &lt;br /&gt; He added: “There are many internet-related issues that have still to be  looked at, especially internet shutdowns, censorship and the encryption  policy. These impact all of us, and we should be ready to voice our  point of view, and the government looks like it is listening.”&lt;br /&gt; &lt;br /&gt; India’s software sector lobby group Nasscom, which had stood against  Facebook’s Free Basics platform and for net neutrality in general  congratulated Trai for its ruling to disallow zero-rating and  differential pricing services in the country.&lt;br /&gt; &lt;br /&gt; “Our submission highlighted the importance of net neutrality principles,  non-discriminatory access and transparent business models aligned to  the goal of enhancing internet penetration in the country. The Trai  announcement resounds with the submission made by Nasscom and we would  like to congratulate Trai for enshrining the principles of net  neutrality,” R Chandrashekhar, president of Nasscom, said in a  statement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-february-9-2016-alnoor-peermohamed-net-neutrality-advocates-hail-trai-verdict'&gt;https://cis-india.org/internet-governance/news/business-standard-february-9-2016-alnoor-peermohamed-net-neutrality-advocates-hail-trai-verdict&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-02-14T11:16:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia">
    <title>Net Neutrality across South Asia</title>
    <link>https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) and the Observer Research Foundation in association with Centre for Global Communication Studies, Annenberg School for Communication, University of Pennnsylvania and Internet Policy Observatory is organizing this event at the Observer Research Foundation's office in New Delhi from 10 a.m. to 5 p.m., on December 12, 2015.&lt;/b&gt;
        &lt;h3&gt;Context&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality can broadly be understood as the principle of non-discrimination which in practice allows the internet to be free and open by preventing service providers from slowing or interfering with the transfer of data. Net neutrality has risen as a global policy issue, yet cultural, political, commercial, and economical factors influence how net neutrality is understood and addressed in a particular context. Indeed, the factors driving the net neutrality debate, the way in which governments are addressing net neutrality, the role and response of industry, the public response, and the role of civil society has been varied across contexts. The topic of net neutrality is not limited to a technical debate and brings together a number of issues including the right to access, the right to freedom of expression, fair competition practices, and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This conference seeks to bring together domain experts, industry, government, and civil society across South Asia to understand how net neutrality is understood in different contexts, how it is being addressed from a policy point of view, what the varying public dialogues around net neutrality are, and what role civil society can play in influencing the debate.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/concept-note-network-neutrality-in-south-asia" class="internal-link"&gt;&lt;strong&gt;Download the Concept Note&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/NN_Conference%20Report.pdf" class="internal-link"&gt;&lt;b&gt;Download Event Report &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia'&gt;https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-02-27T08:09:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/net-gain">
    <title>Net Gain</title>
    <link>https://cis-india.org/news/net-gain</link>
    <description>
        &lt;b&gt;The draft Electronic Service Delivery Bill, 2011, is aimed at making government services available online. But there are many hurdles to bringing in effective e-governance, says Hemchhaya De&lt;/b&gt;
        
&lt;p&gt;At a time when India is hotly debating the Lokpal Bill, another significant piece of legislation is about to make its way to Parliament this monsoon session. The government has mooted the draft Electronic Service Delivery Bill, 2011, to ensure that all ministries and government departments provide their services to citizens online.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The bill, drafted by the department of information technology (DIT) under the ministry of communication and information technology, could have far-reaching benefits for citizens. If implemented, one would no longer have to stand in long queues, make frequent trips to government offices and deal with red tape in order to procure even such basic documents as driving licences or land record copies.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Of course, the key question is whether the necessary infrastructure will be in place to allow citizens to access these services via the electronic mode. In a country where active Internet user penetration in rural areas is as low as 2.13 per cent, the feasibility of e-governance depends on the state providing enough number of access centres.&lt;/p&gt;
&lt;p&gt;E-governance is not a completely new concept in India. The Centre laid down an ambitious National e-Governance Plan (NeGP) in 2006 and roped in industry bodies like Nasscom to facilitate the delivery of e-services. According to a Nasscom report, there has been substantial progress in NeGP. Of the 1,100 services targeted under the plan, over 600 services in both government-to-citizen (G2C) and government-to-business (G2B) domains across central ministries and state departments can now be accessed electronically.&lt;/p&gt;
&lt;p&gt;However, many experts feel that the NeGP has not lived up to its promise. "Progress in NeGP has been slow," says Subhash Bhatnagar, honorary adjunct professor at IIM, Ahmedabad, and member of the steering committee of the 12th Five Year Plan (2012-17) for the communication and IT and information sector.&lt;/p&gt;
&lt;p&gt;That said, some states have been running successful e-government projects. “Take Karnataka’s online delivery and management of land records,” says Bhatnagar. “The online system offers services to ordinary people on a first-come, first-served basis without subjecting them to the whims and fancies of babus.”&lt;/p&gt;
&lt;p&gt;However, Karnataka is an exception rather than the rule and many states are lagging behind when it comes to extending e-governance. “IIM, Ahmedabad, carried out an e-governance impact assessment study in 12 states. West Bengal is one state which hasn’t fared well and it figures in the bottom half of the list,” reveals Bhatnagar.&lt;/p&gt;
&lt;p&gt;The draft Electronic Service Delivery Bill aims to exert pressure on states and government departments to fully automate or computerise their services to citizens. Crucially, it sets a clear time limit for delivering online services. The bill says, “every competent authority of the appropriate Government” is required to publish or specify the services that will be digitised within six months from the commencement of the law. “If there’s any delay, departments have to explain it in writing,” says a senior official of the DIT who does not wish to be named.&lt;/p&gt;
&lt;p&gt;The bill further mandates that all public services should be delivered in electronic modes within five years from the commencement of the law. This period may be extended by not more than three years.&lt;/p&gt;
&lt;p&gt;In addition to a grievance redressal mechanism, the bill proposes setting up a Central Electronic Service Delivery Commission to enforce the provisions of the law. The commission should comprise a central chief commissioner and not more than two central commissioners — all of whom shall have “worked as secretary or equivalent level… either in the central government or in the state government”.&lt;/p&gt;
&lt;p&gt;Many experts feel that the proposed legislation is a step in the right direction. “The bill will reduce red tape and promote efficient services in various government departments,” says Payal Chawla, partner, Hemant Sahai Associates, a Delhi-based law firm. “The time limit of five years with an extension of a maximum of three years to bring all the services in the purview of the legislation is well-intended.”&lt;/p&gt;
&lt;p&gt;Agrees Sunil Abraham, executive director, Centre for Internet and Society (CIS), a Bangalore-based organisation which carries out research in IT. “The bill ensures that government departments publicly commit to Service Level Agreements (SLAs) and demonstrate compliance to these SLAs,” he says. “Like the RTI Act, there is an office of the central chief commissioner which can penalise officials who don’t provide electronic services or comply with their own SLAs.”&lt;/p&gt;
&lt;p&gt;But others argue that the bill is too open-ended. “I’d have liked to see the services specified clearly,” says Neel Ratan, executive director, PricewaterhouseCoopers. “Just starting an e-service isn’t enough — the quality or level of performance of the service needs to be ascertained as well. The bill seems to be silent on how quality can be ensured.”&lt;/p&gt;
&lt;p&gt;Bhatnagar too feels that the draft bill should have first clearly defined what “electronic service delivery” is all about. All it says is “electronic service delivery means the delivery of services through electronic mode including, inter alia, the receipt of forms and applications, issue or grant of any licence, permit, certificate, sanction or approval and the receipt or payment of money”.&lt;/p&gt;
&lt;p&gt;However, electronic delivery of services should encompass all end-to-end steps necessary for delivering the service, points out Bhatnagar. “Receiving an application, receiving supporting documents, receiving payment of various fees, issue of licence/receipts/certificates/ documents such as ration cards and passports and payment of dues to citizens should be web enabled. Citizens who wish to carry out the transaction through a portal without having to visit a government office should be able to do so,” he says.&lt;/p&gt;
&lt;p&gt;Furthermore, says Bhatnagar, government agencies should ensure that every citizen has access to a public service delivery centre (government owned or private) from where he or she can access such services. And a person shouldn’t have to travel more than 10km to access these services.&lt;/p&gt;
&lt;p&gt;Experts say there are several hurdles to e-governance in India. “The domestic IT industry has not focussed on this important market and services have been decentralised without ensuring common standards. So different states may be using different software, which can make the whole system messy and lead to uneven and poor quality projects,” says Abraham of CIS. “We are still very far away from the sophistication of G2C and G2B systems currently deployed in many Western countries.”&lt;/p&gt;
&lt;p&gt;In sum, enacting a law to bring in complete e-governance may not be enough. Without the necessary investment in the country’s technology infrastructure, the initiative, however well-intended, may never truly get off the ground.&lt;/p&gt;
&lt;p&gt;Graphic by Mantashir Iqbal Shaikh&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article by Hemchhaya De was published in the Telegraph on 24 August 2011. The original can be read&lt;a class="external-link" href="http://www.telegraphindia.com/1110824/jsp/opinion/story_14416831.jsp"&gt; here&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/net-gain'&gt;https://cis-india.org/news/net-gain&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-29T11:52:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way">
    <title>Net Freedom Campaign Loses its Way</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way</link>
    <description>
        &lt;b&gt;A recent global meet was a victory for governments and the private sector over civil society interests.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindubusinessline.com/todays-paper/tp-opinion/net-freedom-campaign-loses-its-way/article5994906.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on May 10, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;One word to describe NetMundial: Disappointing! Why? Because despite the promise, human rights on the Internet are still insufficiently protected. Snowden’s revelations starting last June threw the global Internet governance processes into crisis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Things came to a head in October, when Brazil’s President Dilma Rousseff, horrified to learn that she was under NSA surveillance for economic reasons, called for the organisation of a global conference called NetMundial to accelerate Internet governance reform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NetMundial was held in São Paulo on April 23-24 this year. The result was a statement described as “the non-binding outcome of a bottom-up, open, and participatory process involving … governments, private sector, civil society, technical community, and academia from around the world.” In other words — it is international soft law with no enforcement mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement emerges from “broad consensus”, meaning governments such as India, Cuba and Russia and civil society representatives expressed deep dissatisfaction at the closing plenary. Unlike an international binding law, only time will tell whether each member of the different stakeholder groups will regulate itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, not easy, because the outcome document does not specifically prescribe what each stakeholder can or cannot do — it only says what internet governance (IG) should or should not be. And finally, there’s no global consensus yet on the scope of IG. The substantive consensus was disappointing in four important ways:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass surveillance&lt;/b&gt; : Civil society was hoping that the statement would make mass surveillance illegal. After all, global violation of the right to privacy by the US was the &lt;i&gt;raison d'être&lt;/i&gt; of the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the statement legitimised “mass surveillance, interception and collection” as long as it was done in compliance with international human rights law. This was clearly the most disastrous outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to knowledge:&lt;/b&gt; The conference was not supposed to expand intellectual property rights (IPR) or enforcement of these rights. After all, a multilateral forum, WIPO, was meant to address these concerns. But in the days before the conference the rights-holders lobby went into overdrive and civil society was caught unprepared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The end result — “freedom of information and access to information” or right to information in India was qualified “with rights of authors and creators”. The right to information laws across the world, including in India, contains almost a dozen exemptions, including IPR. The only thing to be grateful for is that this limitation did not find its way into the language for freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediary liability:&lt;/b&gt; The language that limits liability for intermediaries basically provides for a private censorship regime without judicial oversight, and without explicit language protecting the rights to freedom of expression and privacy. Even though the private sector chants Hillary Clinton's Internet freedom mantra — they only care for their own bottomlines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Net neutrality:&lt;/b&gt; Even though there was little global consensus, some optimistic sections of civil society were hoping that domestic best practice on network neutrality in Brazil’s Internet Bill of Right — also known as Marco Civil, that was signed into law during the inaugural ceremony of NetMundial — would make it to the statement. Unfortunately, this did not happen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For almost a decade since the debate between the multi-stakeholder and multilateral model started, the multi-stakeholder model had produced absolutely nothing outside ICANN (Internet Corporation for Assigned Names and Numbers, a non-profit body), its technical fraternity and the standard-setting bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The multi-stakeholder model is governance with the participation (and consent — depending on who you ask) of those stakeholders who are governed. In contrast, in the multilateral system, participation is limited to nation-states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil society divisions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inability of multi-stakeholderism to deliver also resulted in the fragmentation of global civil society regulars at Internet Governance Forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in the run-up to NetMundial more divisions began to appear. If we ignore nuances — we could divide them into three groups. One, the ‘outsiders’ who are best exemplified by Jérémie Zimmermann of the La Quadrature du Net. Jérémie ran an online campaign, organised a protest during the conference and did everything he could to prevent NetMundial from being sanctified by civil society consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the ‘process geeks’ — for these individuals and organisations process was more important than principles. Most of them were as deeply invested in the multi-stakeholder model as ICANN and the US government and some who have been riding the ICANN gravy train for years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even worse, some were suspected of being astroturfers bootstrapped by the private sector and the technical community. None of them were willing to rock the boat. For the ‘process geeks’, seeing politicians and bureaucrats queue up like civil society to speak at the mike was the crowning achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the ‘principles geeks’ perhaps best exemplified by the Just Net Coalition who privileged principles over process. Divisions were also beginning to sharpen within the private sector. For example, Neville Roy Singham, CEO of Thoughtworks, agreed more with civil society than he did with other members of the private sector in his interventions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, the ‘outsiders’ couldn't care less about the outcome and will do everything to discredit it, the ‘process geeks’ stood in ovation when the outcome document was read at the closing plenary and the ‘principles geeks’ returned devastated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the multi-stakeholder model to survive it must advance democratic values, not undermine them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This will only happen if there is greater transparency and accountability. Individuals, organisations and consortia that participate in Internet governance processes need to disclose lists of donors including those that sponsor travel to these meetings.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way'&gt;https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-27T11:07:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20WIPO%20Initiatives%20-%2005%20March-%202016.pdf">
    <title>Nehaa Chaudhari - WIPO Initiatives - 05 March, 2016.pdf</title>
    <link>https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20WIPO%20Initiatives%20-%2005%20March-%202016.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20WIPO%20Initiatives%20-%2005%20March-%202016.pdf'&gt;https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20WIPO%20Initiatives%20-%2005%20March-%202016.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-03-31T16:18:56Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20NLSIU%20-%2004%20March%202016.pdf">
    <title>Nehaa Chaudhari - NLSIU - 04 March 2016.pdf</title>
    <link>https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20NLSIU%20-%2004%20March%202016.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20NLSIU%20-%2004%20March%202016.pdf'&gt;https://cis-india.org/a2k/blogs/Nehaa%20Chaudhari%20-%20NLSIU%20-%2004%20March%202016.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-03-31T16:16:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/looking-closer-at-porn-with-x-ray-spectacles-savita-bhabhi-mms-video-and-others">
    <title>Negative of porn </title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/looking-closer-at-porn-with-x-ray-spectacles-savita-bhabhi-mms-video-and-others</link>
    <description>
        &lt;b&gt;The post deals with what has been written about Savita Bhabhi in an attempt to make sense of her peccadiloes and with the seeming futility of Porn studies located in America to our different reality. I take the liberty of exploring my own experiential account of pornography since I feel that in that account (mine and others) when done seriously, certain aspects of pornography emerge that address questions that are about cinema, images, sex, philosophy and how desire works. The title is mischeviously inspired from Dr. Pek Van Andel's recent video of MRI images of people having sex.&lt;/b&gt;
        



&lt;p&gt;Jonathan James McCreadie Lillie in his article “Cyberporn,
Sexuality and the Net Apparatus” while talking about academic engagement with
pornography (by Kipnis, Hunt, Waugh, Kendrick) points to how they share “a
common concern with analysing pornography within the various cultural
constructs and social spaces in which it appears, and in which people encounter
it”. He says that a new agenda for cyberporn research has to acknowledge that
“people have produced pornography in many different forms for many different
purposes, and the reasons why people use it or do not use it, and what meanings
they make of it, are equally diverse”. (1)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Lillie points towards cyberporn reception studies – the
home/office terminal as a site of cyberporn reception – as a possible starting
point of further work on cyberporn. My interest is located in how does one
understand your own consumption of internet porn, located as it is in the
context that is not the global North and more specifically not male and not heterosexual.
Attempting to do that through the readings in porn studies (Porn studies,
edited by Linda Williams) (2), or specifically net porn studies (C’lick me –
Net Porn Reader) (3), has not been entirely fruitful though what is talked
about is highly interesting. One of the problems perhaps lies in what Lillie
says about the need for analyzing pornography within the various cultural
constructs and social spaces in which it appears, rather than separate or
floating above them. The Internet does not entirely make protean beings
(cyborgs?) of us after all, and the relevance of porn studies elsewhere can
only be partially relevant to a study here.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;[Curiously though the debates within feminism and the
women’s movement around pornography in the global North – the familiar rhetoric
of the causal links between pornography and violence, do have a resonance in
similar debates in the women’s movement here. At a roundtable discussion on the
role of media at the recent Courts of Women organized by Vimochana (4), many of
the sentiments expressed by activists and organizations see a causal link
between explicit sexual material, violence and its direct negative impact on
morals, attitudes and behaviour of people.]&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Linda Williams begins the volume on Porn Studies by stating that
there has been a movement from the deadlock of pro-censorship and sex positive
feminist discourse on pornography, to a stage where there is a veritable
explosion of sexual material that is crying out for analysis, and that sexually
explicit imagery is a fixture in popular culture today (obviously referring to
America but to some extent true for other contexts as well). In some ways there
is an attempt amongst academics, intellectuals, journalists and other writers
here to make sense of the pornographic material that has crept into our media
saturated cities. Many recent articles spawned by the ban on Savita Bhabhi
attempt to understand the unleashing of desire around Savita Bhabhi (from a
rock song to unashamed fandom) and to analyse the reasons for the ban or rather
what makes Savita Bhabhi threatening.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Savita Bhabhi, the [porn] [toon] [star]&amp;nbsp; &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Itty Abraham undertakes a fairly detailed analysis of what
is happening in twelve episodes of Savita Bhabhi and perhaps unconvincingly
places the crux of the story of Savita Bhabhi on her cuckolded husband, Ashok
(5). He says “Their family life is relentless modern, nuclear, bourgeois, if
also gendered in familiar ways. The couple eats together (and at the same
time), they watch TV together in the evenings, and sleep in the same bed.” For
Abraham, the comic is about “these new sexual possibilities.. that begin from a
new kind of freedom to which the modern urban woman has access”. The article
suggests that we seem to be faced with a choice between the free untrammeled
Savita and her easy occupation of urban spaces protected by an aura of class
and her husband Ashok who is the hard worker earning enough to keep alive
her/our illusion of abundant urban neoliberal existence. Interestingly the
article is not attempting to make a point about pornography in relation to
ideas of culture, tradition, vulgarity or other familiar motifs in the debate
on obscenity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Shohini Ghosh’s article takes on the task to find out what
precisely is so transgressive about Savita Bhabhi (6). Savita Bhabhi is poised
between the family and husband and illegitimate desires (similar to themes in
Charulata, Hum aapke hain kaun). She points that the pleasure of the comic is
not just that there are hard core sexual scenes as much as that the husband or
a similar character cannot look at what you look at. The Indian erotica (or
pornographic text) scene too is replete with tales of incest and transgressions
with domestic workers or servants|maids as they are called in the stories.
Ghosh while acknowledging the harm-violence debate within feminism on
pornography, states that she is anti-censorship – that although it is obvious
that media, images have an impact (otherwise why would they be cause of study)
there is no neat causal link between porn and sexual violence. She ends by
saying that “pornography then is a phantasmatic arena. It does not reflect
people’s ‘real’ sex lives so much as it articulates the desires and aspirations
for imagined ones.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Both articles make important linkages to other and pre-existing
debates on neo-liberal agendas, occupation of urban spaces, feminism and
obscenity. Ghosh seems to also be referring to a broader category of Indian porn and the problems posed by it. She also gestures towards the problems that might be posed if Savita Bhabhi were a real person and not a comic, but by and large most journalistic writing/analysis of Savita Bhabhi flattens out the field – asking questions as if comic characters were real persons, and not taking into account aesthetics, technology (mode of delivery) or where and how it is viewed (reception) by people. There is a difference in the way I respond to a comic about sex than to an MMS or hidden camera porn where I am aware of
the ‘realness’ of atleast some aspects of the image I’m looking at.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The ‘realness’ raises certain dilemmas – the anxiety is not
as severe and troubled as in the case of Mysore Mallige which is haunted by
urban legends of the couples or only the woman committing suicide, forced
marriage at a police station etc. Nonetheless to encounter the MMS video, when
the woman is looking directly at the camera often so it does not seem like a
hidden camera or non-consensual video, is to acknowledge the taking of pleasure
at the expense of someone else which may or may not bother you, but does render
the activity far more illicit and scary. My feeling of
fear|anxiety|secrecy|aloneness when surfing pornography, whether in the office,
home or anywhere where I can be discovered, is an added layer to the experience
even if the various aspects of violation of privacy, vulnerability of the woman
in the video or the existence of a pornography industry are not uppermost in
the mind when actually viewing the clips. One of the few works done that do
address this complicated set of affects that circulate and attach themselves to
pornography is Bharath Murthy’s film on Mysore Mallige ( the next post will be
on this film and interview with Bharath Murthy). (7)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This is why I would insist that the comic is a different
space for a viewer – some things such as anxieties about who this person I’m
looking at is and what happened to her do disappear, while others such as a
comic is bright, colourful and highly visible on my computer screen (for
instance) become more important. It is harder to hide surfing Savita Bhabhi in
an office than reading erotica or even downloading and discreetly watching a
small video.&amp;nbsp; The aspect of how
Savita Bhabhi being a comic/drawn character changes how a viewer relates to the
material is an area of study that needs to be looked at more closely, perhaps
with the help of existing work that looks at the manga, anime, hentaii
phenomenon in Japan and parts of South East Asia.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The makers of Savita Bhabhi were anonymous till the ban and
after what seemed like a rather brief struggle with authority (SaveSavita
campaign on twitter and a blog) they vacated the public scene. As a consequence
of no real contest, the ban persists. But perhaps what is admirable is that
many people have learnt to use tools that allow them to still view Savita (and
to expose them here would be just foolhardy). In an interview online the makers
of Savita Bhabhi state .. “For one, it (comic) is a unique medium in the
context of Indian porn. We’ve had MMS’s, videos, stories, etc, but no porn
comics. Also a comic allows us to explore the fantasy in a much more vivid way
than any other medium.” This fantasy life however cannot be dismissed, as it is
indeed very real, or as they say – “based on real life fantasies of our authors
and fans. They are all something that a normal full blooded Indian male or
female would be fantasizing about on their commute to work or a lazy evening at
home.” In a short interview with the makers of the comic more recently and
subsequent to the ban they said that probably it was Savita Bhabhi’s popularity
that led to her downfall and that they set out to explore Indian sexuality,
which “obviously is a big No”.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To return to Lillie’s call for a cyberporn reception studies
perhaps it is time in relation to looking at such material that we step away,
even if briefly, from these debates on feminism, vulgarity and obscenity in
Indian culture and others. In an interview dated 5th September, 2009, Ratheesh
Radhakrishnan says that what needs to be looked at when studying pornography,
is not the questions of Indian culture, religion, roles of women and gender (as
for questions related to obscenity) but the aesthetics of pornography. In his
own work Radhakrishnan deals precisely with this question in relation to the
category of ‘soft porn’ and how Shakeela becomes a star through soft porn
cinema – a star not entirely governed by the narrative of the film but
seemingly existing beyond the limit of the film itself. (8) By doing this, his
work deals with the question of how desire works in such films, which perhaps
is one of the more important question to ask about pornography. In the same
interview, he states that there is “something that takes place between the text
and the person watching” and that is what he is interested in.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1&gt;Anti-porn&lt;/h1&gt;
&lt;p&gt;Radhakrishnan’s position is interesting in relation to this
project as it opens up questions that are beyond the feminist deadlock on
pornography and also goes beyond rhetoric of the liberating potential of the
explosion of the polymorphous perverse online. The latter is where a lot of
porn studies undertaken in the global North seems to get lost. The breathless
recounting of the pornographic in the everyday, does not help since it becomes
very obvious that any analysis would not be relevant to a vastly different
context in India. (9)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Walter Metz in his article on Open Water (10) challenges the
ethics of porn studies – though he acknowledges that pornography is more a
symptom rather than a cause of anti-social behaviours that it is often linked
to (violent rape, aggressive behaviour, sexism etc.), but still raises the
question as to whether there are significant reasons to put the brakes on a
rabid, radical celebration of the liberating potential of pornography. Metz
talks about the need, within porn studies, to look at the positive and negative
impact of pornography (possibly he would extend that to looking at violent
martial arts film and other strands of cinema/new media).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Metz’s paper as such deals with Open Water as an
anti-pornographic film (here referring to the generic practice of pornography
rather than political positions) and this might be an interesting productive
mode to understand the affect produced by pornography. Though Metz qualifies
that he’s not using pornography as a genre, but rather “as a reading frame. If
one keeps thinking about pornography while watching a non-pornographic film,
what is the resulting interpretation?” Since I haven’t seen the film Open Water
perhaps my interest in such an analysis is misfounded. Metz describes the
frustration depicted in the film Open Water between the audience expectations
for a reasonably good looking, tanned, blonde couple to get-it-on and what
happens to their bodies instead in the open water of the sea and prey to
sharks, is similar to the disjuncture that takes place in one of the films part
of the Destricted project. (11)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Destricted is an interesting artistic|intellectual|new
media|film experiments in the global North around pornography. It is a series
of short films that resulted from an invitation to seven well known artists and
filmmakers to try to respond to sex and especially the phenomenon of
pornography in the contemporary. One of the films Death Valley by Sam
Taylor-Wood borrows from the Biblical tale of Onan and places a man
masturbating in the heaving, throbbing landscape of the Death Valley (the
hottest place in the Western hemisphere where the earth’s crust is constantly
changing and shifting). For precisely 7 minutes and 58 seconds, the protagonist
of the film masturbates uncomfortably without reaching ejaculation and/or
release. The painful un-release of this film, perhaps is meant to be juxtaposed
with the assumed ease of pornography’s answer to desire. However peculiarly it actually
is probably an accurate description of the experiential account of pornography
– of looking, searching, finding, downloading on painfully low speeds, watching
short clips that are blurred, shot only from one angle, badly drawn comics or
looking at largely uninspiring material which is not acquired or found easily.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In some ways the experience of watching either of these
films sounds similar to watching certain kinds of MMS video porn. For instance,
one video was of a couple doing oral sex in a toilet cubicle. The angle of the
camera was from the top and perhaps the intention behind this was to obscure
the faces of the two persons, since only the top of their heads are visible. It
did not seem like the couple were unaware of the video camera, as much as
performing for it almost unwillingly and only if the anonymity was preserved.
The video was low quality and highly blurred, to the point of any features
being indistinct beyond blackness of hair (maybe) and generic skin tone which
could be Indian, Iranian or generic South Asian. The resemblance to the
Destricted video is because again of the time it takes to reach ejaculation –
there is a painfully long uninspiring blowjob sequence. The video remains scary
and leaves one with a feeling of claustrophobia, discomfort and peculiarly
boredom or distance from what is happening. Yet perhaps it is here that the
question of realness and the affect it produces enters again. The question that
intrigues me is whether the affect produced by the video is because
there are certain gestures of the woman that seem recognizable, because she
seems like you (ethnically, racially ofcourse but also in sexual spaces she
occupies and behaviour). After having accomplished the task of coaxing semen
out of the uninspiring penis she is faced with, she folds her legs and speaks
indistinctly. In that moment she seems uncomfortably familiar, like watching a
friend having sex or maybe an aspect of yourself.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;It is perhaps
interesting that it is amateur pornography these days that seems to inspire the
most complicated set of affects (unlike the schooled|disciplined and
predictable response to cinema) – shocked recognition of yourself and desire to
see it again, titillation, boredom but yet unwilling to look away, love for
celebrities, pleasure of viewing a body like yours and even sometimes a
recognition that this is what you look like during sex, fear about your own
privacy, disgust for what seems unacceptable and provokes the
moral|visual|auditory sensibilities and contempt for the material and the
people who possibly are genuinely engaged with it. The article on Pam and
Tommy’s video in Porn Studies infact displays these varied affects and
underlines William’s assertion that this bracket of material, behaviour and
practices that get termed pornography/pornographic does indeed deserve
analysis, otherwise a potentially unique and interesting way of understanding
the contemporary would be lost for squeamishness.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are many aspects of the Minette Hillyer’s
analysis (12) that are specifically relevant only to the American contexts –
the notoriety of both the stars, the pre-existence and glorification of home
videos in most families and the acknowledgement of amateur couple porn as even
a healthy practice, perhaps suggested for couples with dull sex lives. In
India, it was infact unknown people who were catapulted into the public eye with the circulation of their video, online and offline that was later titled Mysore Mallige ; not just
the private spaces, holidays and fucking habits of already-celebrities like Pam
and Tommy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;What might be relevant here from Hillyer’s analysis is the
pre occupation with the realness of amateur pornography. The article follows the travels of the Pam and Tommy home video
between different categories/genres, depending on different aspects of its
realness. The video as such, contains scenes from the normal domestic lives of
the stars and a eight minute sequence of sex in an almost fifty minute length
video. So the questions of realness are answered not by the sex in the video,
but the mundane recording of their lives, holidays, house and other details.
This question of what exactly it is – home video or pornography (domestic/private
or pornographic/public) is relevant to questions of legality (for damages upto
90 million dollars), how it circulates (a pornographic video of Pam and Tommy
without the domestic padding perhaps would not be considered real and saleable)
and genre which relates to some aspects of how people respond to the work.&amp;nbsp; Ever since the advent of (cheap) video technology, pornography is rendered less
cinematic and more concerned with the presentational act (of sex) than its
representation (ibid). With MMS videos and hidden camera porn, though questions may no longer be about representation, they are still complicated questions about the aesthetics, reception of pornography and our relation to the technology that delivers it and for me viewing pornography today as only presentational does not help to understand the affects that surround and attach to it. Perhaps many strands of what is
explored in this article can be explored in relation to Mysore Mallige in the
next blog post.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Just as I finish this piece, after an interview with Nishant Shah at Center for Internet and Society, another question enters the frame in relation to pleasure, moving it beyond those raised above. Is pleasure now a question that
is less about finding the corporeal thrill through pornography online, as much as
pleasure that comes from simulation and the added rush of simulating cities,
lives, personalities online. And is that pleasure, pornographic?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;End notes:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;1. Jonathan James McCreadie
Lillie, “Cyberporn, Sexuality, and the Net Apparatus”, &lt;em&gt;Convergence&lt;/em&gt; 2004; 10; 43&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;2. Williams Linda (ed), &lt;strong&gt;Porn Studies,&lt;/strong&gt; Duke University Press, London and Durham, 2004.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;3. Katrien Jacobs, Marije Janssen, Matteo Pasquinelli (eds),
&lt;strong&gt;C’lick Me: A Netporn Studies Reader&lt;/strong&gt;,
Institute of Network Cultures, Amsterdam, 2007.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;4. Courts of Women, Vimochana Bangalore, 27-29 July, 2009.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;5. Itty Abraham, Sex in the Neo-liberal City: On Savita
Bhabhi, Available at The Fish Pond at &lt;a href="http://thefishpond.in/itty/2009/on-savita-bhabhi/#comments"&gt;http://thefishpond.in/itty/2009/on-savita-bhabhi/#comments&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;6. Shohini Ghosh, The politics of porn, Himal South Asian
Magazine, September 2009, Vol 22, No. 9.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;7. Bharath Murthy (director), Mysore Mallige, 2007.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;8. Ratheesh Radhakrishnan, “‘The
Mis-en-scene of desire’: Stardom and the case of soft porn cinema in Kerala!”
Unpublished work. Contact author for copy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;9. Bloomingdale's now sells Tom of Finland shirts and
trousers, housewives celebrate their birthdays by piercing their geni- tals,
college students dance naked instead of waiting tables to pay their tuition,
and middle-level managers schedule a session with a dominatrix in their
favorite dungeon after a game of racquetball at their regular health club. From
Joseph W. Slade, Pornography and Sexual Representation: A Reference Guide,
Greenwood Publishing Group, 2001.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;10. Walter Metz, “Shark
Porn: Film Genre, Reception Studies, and Chris Kentis' Open Water” Film
Criticism, March 22, 2007&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;11 Destricted: explicit films, Marina Abramovic, Matthew
Barney, Marco Brambilla, Larry Clark, Gaspar Noé, Richard Prince, Sam Taylor
Wood (directors), 2006.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;12 Minnette Hillyer, “Sex in the suburban: Porn, Home movies
and the Live Action Perofmance of Love in Pam and Tommy: Hardcore and
uncensored”, &lt;strong&gt;Porn Studies&lt;/strong&gt;, Duke
University Press, London and Durham, 2004, p.50.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/looking-closer-at-porn-with-x-ray-spectacles-savita-bhabhi-mms-video-and-others'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/law-video-technology/looking-closer-at-porn-with-x-ray-spectacles-savita-bhabhi-mms-video-and-others&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>namita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Art</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-08-02T08:35:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf">
    <title>NCAER Parallel Imports Report</title>
    <link>https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf'&gt;https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-04-01T10:39:46Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/navigating-the-digitalisation-of-finance">
    <title>Navigating the Digitalisation of Finance:  User experiences of risks and harms </title>
    <link>https://cis-india.org/raw/navigating-the-digitalisation-of-finance</link>
    <description>
        &lt;b&gt;Our study unpacks the experiences of marginalised users navigating the digitalisation of finance. Through a survey of 3,784 users, 18 interviews and 7 focus group discussions, our study’s findings highlight user experiences of risks and harms while accessing digital financial services, unpacking experiences specifically of persons with disabilities, transgender persons, gender and sexual minorities, elderly persons, women, regional language-first users, and persons facing digital and economic vulnerabilities.
&lt;/b&gt;
        
&lt;p&gt;Read the &lt;a href="https://cis-india.org/CIS_Navigating-the-digitalisation-of-finance" class="external-link"&gt;full report here&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The last couple of decades have seen significant changes in the financial ecosystem in India, both within the fintech sector and with respect to digital financial inclusion. The rapid growth in the reach of banking services to previously unbanked citizens through the Pradhan Mantri Jan Dhan Yojana has been followed by digitalisation in financial and public services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, a commensurate increase in digital and financial literacy has not followed, and rates of access to digital devices and the internet are still growing for many user groups, like rural women and regional language speakers. From the proliferation of fraudulent schemes and cybercrime to regulatory loopholes and inadequate consumer protections, the landscape of online financial services in India presents numerous risks. Factors such as weak cybersecurity measures, data breaches, lack of awareness among users, and the absence of comprehensive regulations create a fertile ground for financial scams. Simultaneously, rapid digitalisation of financial services, especially post demonetisation and the COVID-19 pandemic, has also brought to the fore concerns around omissions and exclusion of sections of users from databases, and a steep learning curve in adapting to this new digital ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These combined factors open up users to a range of potential financial risks and harms, with differential impact on specific marginalised and vulnerable groups. With this understanding, we use the term digital financial harms to refer to adverse financial outcomes and other related detrimental consequences in the use of digital financial services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Through this study, we aim to situate these experiences in a continuum of harms within a rapidly digitalising financial ecosystem. By exploring questions of access, accessibility and language we hope to bring aspects of cybersecurity, digital and financial literacy and design justice into conversation with each other. While some research has aimed to understand technology-facilitated gender based violence, financial fraud, misinformation, and other forms of digital risks in siloes, the correlations between these risks online remain severely understudied. In this report, we focus on the experiences of groups long marginalised within the financial system, to recommend that their needs are centred in shaping digital financial services.&lt;/p&gt;
&lt;p&gt;Key questions guiding our research were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;How were digital financial risks understood and experienced by users of digital financial services across groups? What factors have amplified risks for marginalised and at-risk user groups?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What potential vulnerabilities, risks and harms have emerged relating to digital financial services around device and internet access, accessibility, challenges with use, exclusions from digitalised social protection, and forms of social engineering and digital financial fraud?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How accessible were digital financial service providers’ and governments’ reporting and grievance redressal systems?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What role should fintech platforms, social media platforms, banking and financial institutions, government, and regulatory bodies play in reducing digital financial risks across the ecosystem?&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;This was a mixed methods study, consisting of a review of available literature in the field, followed by quantitative and qualitative data collection through surveys and in-depth interviews. The report highlights the experiences of persons with disabilities, gender minorities, the elderly, low income users, and regional language first users; to better understand how discrimination, exclusion or slow redressal processes may increase their risk or cause disproportionate harm when using digital financial services. It discusses users’ experiences of fraud in the context of an evolving regulatory ecosystem, as well as practical challenges users face with redressal systems.&lt;/p&gt;
&lt;p&gt;Key findings include:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Access to digital financial services, still requires improving      access and accessibility of physical and phygital banking services, and      good internet connectivity.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Even among mobile phone owners, many users still rely on shared      devices, particularly among women and persons with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;There is a high need for support in utilising net banking services,      with 60% of surveyed netbanking users mentioning that they sought help to      conduct online banking transactions. Migrating to digital financial      services is not a purely digital journey for users who are still building      comfort with digital interfaces, or those whose languages are      deprioritised in the development of digital financial platforms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Age, gender, and income were significant factors in the access to      the internet, and adoption of digital financial services. For instance,      women and transgender persons over 45 years were less likely to have a      Unified Payments Interface (UPI) account. Women, transgender persons, and      disabled users of UPI were also more likely to be infrequent users      compared to the rest of the sample.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Over reliance on digital platforms for the administration of direct      benefit transfer programmes results in challenges and risks of exclusions      for beneficiaries.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;While awareness of common forms of fraud is high, awareness of      security protocols, Know Your Customer (KYC) requirements and markers of      trustworthy banking and non-banking institutions is low.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Irrespective of the amount of money lost during frauds, it caused      significant financial and emotional burden, especially for low-income      persons.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In the absence of monitoring frameworks, bad actors within the      financial system are able to exploit vulnerabilities like the dependence      of account holders on banking correspondents.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Gender and sexual minorities, and women face disproportionate      impacts of harm in the event of financial loss, including the consequences      of image-based sexual abuse, victim blaming, domestic violence and limits      on financial independence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ineffective grievance redressal for cybercrimes is a major      deterrent to reporting.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Digitalisation and the use of assistive technology have allowed      some persons with visual impairments to gain relative levels of      independence in managing their own finances and conducting transactions.      However, implementation of accessibility policies and features remains      uneven, and is marred by the continued exclusion and discrimination within      traditional banking services.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;Based on these findings, this report offers a set of recommendations addressed to stakeholders within the financial ecosystem such as banking and other financial institutions, regulatory bodies, fintech companies, cybersecurity professionals, as well as social media platforms and civil society organisations working on digital inclusion, safety and literacy. The recommendations offer nuanced perspectives on how digital financial harms can be prevented and mitigated based on our interactions with various stakeholders during the research process.&lt;/p&gt;
&lt;p&gt;Key recommendations emerging from the study are:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Create meaningful connectivity and access to digital platforms by      improving public infrastructure and addressing the challenges associated      with shared devices and mediated use.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Improve platform design to engender trust; increase accessibility      and usability through assessment and better implementation of available      technologies, regular design audits and facilitate availability in Indian      languages.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Building awareness and capacity across user and stakeholder groups      through customised and inclusive programming, working in partnership with      communities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Centre consumer protection in regulatory interventions and      approaches to law enforcement, by implementing robust time-sensitive      reporting and redressal mechanisms, placing accountability on financial      institutions, and monitoring and curbing fraudulent activity.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Encourage transparent governance and public oversight by measuring      and evaluating digital public infrastructures to maximise their public      value.&lt;/li&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;h1&gt;Contributors&lt;/h1&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research design and/or report writing:&lt;/strong&gt; Amrita Sengupta, Chiara Furtado, Garima Agrawal, Nishkala Sekhar, Puthiya Purayil Sneha, and Vipul Kharbanda&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research advice and/or review:&lt;/strong&gt; Antara Rai Chowdhury, Janaki Srinivasan, Nayantara Sarma, Palak Gadhiya, Pallavi Bedi, Sameet Panda, Semanti Chakladar, Shashidhar K J, Shweta Mohandas, and Taranga Sriraman&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research and/or data analysis support:&lt;/strong&gt; Chetna V M, Pallavi Krishnappa, and Yesha Tshering Paul&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Data analysis:&lt;/strong&gt; Chiara Furtado, Garima Agrawal, and Nishkala Sekhar&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research tool translation:&lt;/strong&gt;&amp;nbsp;  Aravind R (Kannada), Balaji J (Tamil), Bhaskar Bhuyan (Assamese), Nettime Sujata (Bangla), and Suresh Khole (Marathi)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Research tool pilots:&lt;/strong&gt; Raveenaben (Megha Cooperative, SEWA), Sunaben (Megha Cooperative, SEWA), and Raja Mouli N&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Data collection (survey):&lt;/strong&gt; D-Cor Consulting&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Data collection (focus group discussions):&lt;/strong&gt; D-Cor Consulting; Jnana Prabodhini, Pune; Transgender Rights Association, Chennai; and Subodh Kulkarni&lt;/p&gt;
&lt;p&gt;This work is shared under the &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/"&gt;Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0)&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/navigating-the-digitalisation-of-finance'&gt;https://cis-india.org/raw/navigating-the-digitalisation-of-finance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amrita Sengupta, Chiara Furtado, Garima Agrawal, Nishkala Sekhar, Puthiya Purayil Sneha, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Financial Platforms</dc:subject>
    
    
        <dc:subject>Digital Financial Harms</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Financial Services</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2025-04-10T05:49:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion">
    <title>Navigating the 'Reconsideration' Quagmire (A Personal Journey of Acute Confusion)</title>
    <link>https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion</link>
    <description>
        &lt;b&gt;An ​earlier analysis of ICANN’s Documentary Information Disclosure Policy already brought to light our concerns about the lack of transparency in ICANN’s internal mechanisms. Carrying my research forward, I sought to arrive at an understanding of the mechanisms used to appeal a denial of DIDP requests. In this post, I aim to provide a brief account of my experiences with the Reconsideration Request process that ICANN provides for as a tool for appeal.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Backdrop: What is the Reconsideration Request Process?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Reconsideration Request process has been laid down in Article IV, Section 2 of the&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN Bylaws. Some of the key aspects of this provision have been outlined below&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;,&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;ICANN is obligated to institute a process by which a person ​&lt;i&gt;materially affected &lt;/i&gt;​by ICANN action/inaction can request review or reconsideration.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;To file this request, one must have been adversely affected by actions of the staff or the board that contradict ICANN’s policies, or actions of the Board taken up without the Board considering material information, or actions of the Board taken up by relying on false information.&lt;/li&gt;
&lt;li&gt;A separate Board Governance Committee was created with the specific mandate of reviewing Reconsideration requests, and conducting all the tasks related to the same.&lt;/li&gt;
&lt;li&gt;The Reconsideration Request must be made within 15 days of:  
&lt;ul&gt;
&lt;li&gt;FOR CHALLENGES TO BOARD ACTION: the date on which information about the challenged Board action is first published in a resolution, unless the posting of the resolution is not accompanied by a rationale, in which case the request must be submitted within 15 days from the initial posting of the rationale;&lt;/li&gt;
&lt;li&gt;FOR CHALLENGES TO STAFF ACTION: the date on which the party submitting the request became aware of, or reasonably should have become aware of, the challenged staff action, and&lt;/li&gt;
&lt;li&gt;FOR CHALLENGES TO BOARD OR STAFF INACTION: the date on which the affected person reasonably concluded, or reasonably should have concluded, that action would not be taken in a timely manner&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;.The Board Governance Committee is given the power to summarily dismiss a reconsideration request if:  
&lt;ul&gt;
&lt;li&gt;the requestor fails to meet the requirements for bringing a Reconsideration Request;&lt;/li&gt;
&lt;li&gt;it is frivolous, querulous or vexatious; or &lt;/li&gt;
&lt;li&gt;the requestor had notice and opportunity to, but did not, participate in the public comment period relating to the contested action, if applicable&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;If not summarily dismissed, the Board Governance Committee proceeds to review and reconsider.&lt;/li&gt;
&lt;li&gt;A requester may ask for an opportunity to be heard, and the decision of the Board Governance Committee in this regard is final.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The basis of the Board Governance Committee’s action is public written record ­ information submitted by the requester, by third parties, and so on.&lt;/li&gt;
&lt;li&gt;The Board Governance Committee is to take a decision on the matter and make a final determination or recommendation to the Board within 30 days of the receipt of the Reconsideration request, unless it is impractical to do so, and it is accountable to the Board to make an explanation of the circumstances that caused the delay.&lt;/li&gt;
&lt;li&gt;The determination is to be made public and posted on the ICANN website.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;ICANN has provided a neat infographic to explain this process in a simple fashion, and I am reproducing it here:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Reconsideration.jpg" alt="Reconsideration" class="image-inline" title="Reconsideration" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Image taken from &lt;span&gt;​&lt;/span&gt;&lt;span&gt;https://www.icann.org/resources/pages/accountability/reconsideration­en&lt;/span&gt;​)&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Our Tryst with the Reconsideration Process&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Grievance&lt;/b&gt;&lt;br /&gt;Our engagement with the Reconsideration process began with the rejection of two of our requests (made on September 1, 2015) under ICANN’s Documentary Information Disclosure Policy. The requests sought information about the registry and registrar compliance audit process that ICANN maintains, and asked for various documents pertaining to the same&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Copies of the registry/registrar contractual compliance audit reports for all the audits carried out as well as external audit reports from the last year (2014­2015).&lt;/li&gt;
&lt;li&gt;A generic template of the notice served by ICANN before conducting such an audit.&lt;/li&gt;
&lt;li&gt;A list of the registrars/registries to whom such notices were served in the last year.&lt;/li&gt;
&lt;li&gt;An account of the expenditure incurred by ICANN in carrying out the audit process.&lt;/li&gt;
&lt;li&gt;A list of the registrars/registries that did not respond to the notice within a reasonable period of time.&lt;/li&gt;
&lt;li&gt;Reports of the site visits conducted by ICANN to ascertain compliance.&lt;/li&gt;
&lt;li&gt;Documents which identify the registries/registrars who had committed material discrepancies in the terms of the contract.&lt;/li&gt;
&lt;li&gt;Documents pertaining to the actions taken in the event that there was found to be some form of contractual non­compliance.&lt;/li&gt;
&lt;li&gt;A copy of the registrar self­assessment form which is to be submitted to ICANN.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;ICANN integrated both the requests and addressed them via one response on 1 October, 2015 (which can be found &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​). In their response, ICANN inundated us with already available links on their website explaining the compliance audit process, and the processes ancillary to it, as well as the broad goals of the programme ­ none of which was sought for by us in our request. ICANN then went on to provide us with information on their Three­Year Audit programme, and gave us access to some of the documents that we had sought, such as the pre­audit notification template, list of registries/registrars that received an audit notification, the expenditure incurred to some extent, and so on .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Individual contracted party reports were denied to us on the basis of their grounds for non­disclosure. Further, and more disturbingly, ICANN refused to provide us with the names of the contracted parties who had been found under the audit process to have committed discrepancies. Therefore, a large part of our understanding of the way in which the compliance audit process works remains unfinished.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What we did&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Dissatisfied with this response, I went on to file a Reconsideration request (number 15­22) as per their standard format on November 2, 2015. (The request filed can be accessed &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​).As grounds for reconsideration, I stated that “​&lt;i&gt;As a part of my research I was tracking the ICANN compliance audit process, and therefore required access to audit reports in cases where discrepancies where formally found in their actions. This is in the public interest and therefore requires to be disclosed...While providing us with an array of detailed links explaining the compliance audit process, the ICANN staff has not been able to satisfy our actual requests with respect to gaining an understanding of how the compliance audits help in regulating actions of the registrars, and how they are effective in preventing breaches and discrepancies.&lt;/i&gt;​” Therefore, I requested them to make the records in question publicly available ­ “​&lt;i&gt;We request ICANN to make the records in question, namely the audit reports for individual contracted parties that reflect discrepancies in contractual compliance, which have been formally recognised as a part of your enforcement process. We further request access to all documents that relate to the expenditure incurred by ICANN in the process, as we believe financial transparency is absolutely integral to the values that ICANN stands by.&lt;/i&gt;​”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Board Governance Committee’s response&lt;/b&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The determination of the Board Governance Committee was that our claims did not merit reconsideration, as I was unable to identify any “​&lt;i&gt;misapplication of policy or procedure by the ICANN Staff&lt;/i&gt;​”, and my only issue was with the substance of the DIDP Response itself, and &lt;i&gt;substantial disagreements with a DIDP response are not proper bases for reconsideration &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(emphasis supplied).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The response of the Board Governance Committee was educative of the ways in which they determine Reconsideration Requests. Analysing the DIDP process, it held that ICANN was well within its powers to deny information under its defined Conditions for Non­Disclosure, and denial of substantive information did not amount to a procedural violation. Therefore, since the staff adhered to established procedure under the DIDP, there was no basis for our grievance, and our request was dismissed..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, as a post­script, it is interesting to note that the Board Governance Committee delayed its response time by over a month, by its own admission ­ “​&lt;i&gt;In terms of the timing of the BGC’s recommendation, it notes that Section 2.16 of Article IV of the Bylaws provides that the BGC shall make a final determination or recommendation with respect to a reconsideration request within thirty days, unless impractical. To satisfy the thirty­day deadline, the BGC would have to have acted by 2 December 2015. However, due to the timing of the BGC’s meetings in November and December, the first practical opportunity for the BGC to consider Request 15­22 was 13 January 2016.&lt;/i&gt;​”&lt;sup&gt;4&lt;/sup&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Whither do I wander now?&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To me, this entire process reflected the absurdity of the Reconsideration request structure as an appeal mechanism under the Documentary Information Disclosure Policy. As our experience indicated, there does not seem to be any way out if there is an issue with the substance of ICANN’s response. ICANN, commendably, is particular about following procedure with respect to the DIDP. However, what is the way forward for a party aggrieved by the flaws in the existing policy? As I had &lt;span&gt;​&lt;/span&gt;&lt;span&gt;analysed&lt;/span&gt; &lt;span&gt;earlier&lt;/span&gt;​, the grounds for ICANN to not disclose information are vast, and used to deny a large chunk of the  information requests that they receive. How is the hapless requester to  file a meaningful appeal against the outcome of a bad policy, if the  only ground for appeal is non­compliance with the procedure of said bad  policy? This is a serious challenge to transparency as there is no other  way for a requester to acquire information that ICANN may choose to  withold under one of its myriad clauses. It cannot be denied that a good  information disclosure law ought to balance the free  disclosure of  information with the holding back of information that truly needs to be  kept private.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, it is this writer’s firm opinion that even instances where  information is witheld, there has to be a stronger explanation for the  same, and moreover, an appeals process that does not take into account  substantive issues which might adversely affect the appellant falls  short of the desirable levels of transparency. Global standards dictate  that grounds for appeal need to be broad, so that all failures to apply  the information disclosure law/policy may be remedied.&lt;sup&gt;6&lt;/sup&gt; Various laws across the world relating to information disclosure often  have the following as grounds for appeal: an inability to lodge a  request, failure to respond to a request within the set time frame, a  refusal to disclose information, in whole or in part, excessive fees and  not providing information in the form sought, as well as a catch­all  clause for other failures.&lt;sup&gt;7&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, independent oversight is the heart of a proper appeal mechanism in such situations&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;;  the power to decide the appeal must not rest with those who also have  the discretion to disclose the information, as is clearly the case with  ICANN, where the Board Governance Committee is constituted and appointed  by the ICANN Board itself [one of the bodies against whom a grievance  may be raised].&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Suggestions&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We believe ICANN, in keeping with its global, multistakeholder, accountable spirit, should adopt these standards as well, especially now that the transition looms around the corner. Only then will the standards of open, transparent and accountable governance of the Internet ­ upheld by ICANN itself as the ideal ­ be truly, meaningfully realised. Accordingly, the following standards ought to be met with:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Establishment of an independent appeals authority for information disclosure cases&lt;/li&gt;
&lt;li&gt;Broader grounds for appeal of DIDP requests&lt;/li&gt;
&lt;li&gt;Inclusion of disagreement with the substantive content of a DIDP response as a ground for appeal.&lt;/li&gt;
&lt;li&gt;Provision of proper reasoning for any justification of the witholding of information that is necessary in the public interest.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr style="text-align: justify; " /&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Article IV, Section 2, ICANN Bylaws, 2014 ​&lt;i&gt;available at &lt;/i&gt;https://www.icann.org/resources/pages/governance/bylaws­en/#IV&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Copies of the request can be found ​ &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​ and &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Katherine Chekouras, ​&lt;i&gt;Balancing National Security with a Community's Right­to­Know: Maintaining &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Public Access to Environmental Information Through EPCRA 's Non­Preemption Clause&lt;/i&gt;​, 34 B.C. Envtl. Aff. L. Rev 107, (2007).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Toby Mendel, &lt;i&gt;Freedom of Information: A Comparative Legal Study&lt;/i&gt;​ ​ 151 (2nd edn, 2008).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;​&lt;i&gt;Id&lt;/i&gt;​, at 152&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;sup&gt;3&lt;/sup&gt;4 Available &lt;span&gt;​&lt;/span&gt;&lt;span&gt;here&lt;/span&gt;​. https://www.icann.org/en/system/files/files/reconsideration­15­22­cis­final­determination­13jan16­en.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Mendel, ​&lt;i&gt;supra &lt;/i&gt;​note 6.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion'&gt;https://cis-india.org/internet-governance/blog/navigating-reconsideration-quagmire-a-personal-journey-of-acute-confusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padmini Baruah and Geetha Hariharan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-30T13:48:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report">
    <title>National workshop on Web Accessibility - Thiruvananthapuram (Report)</title>
    <link>https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report</link>
    <description>
        &lt;b&gt;The third National Workshop on Web Accessibility for Web developers was organised by CIS at Thiruvananthapuram in collaboration with SPACE. 
&lt;/b&gt;
        
&lt;p&gt;(CIS) and &lt;em&gt;&lt;a href="http://www.space-kerala.org/"&gt;Society for
Promotion of Alternative Computing and Employment&lt;/a&gt;&lt;/em&gt;  (SPACE)
organized a workshop on web accessibility for web developers from the
public and private sector on September 25 to 26, 2009. The workshop
took place at &lt;strong&gt;Christ Nagar International School&lt;/strong&gt;,
Kowdiar, Thiruvananthapuram.&lt;/p&gt;
&lt;h3&gt;About the
Host Organizations&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="https://cis-india.org/"&gt;The Centre for Internet
and Society&lt;/a&gt;&lt;/em&gt; &lt;br /&gt;The Centre for Internet and Society (CIS) is
a Bangalore based non-profit, bringing together a team of
practitioners, theoreticians, researchers and artists to work on the
emerging field of Internet and Society in order to critically engage
with concerns of digital pluralism, public accountability and
pedagogic practices, with particular emphasis on South-South
dialogues and exchange. We focus on areas such as Anonymity/Privacy,
Censorship, Surveillance, Free and Open Source Software, Open
Standards, Open Access, Family, Sexual practices, Addiction,
Intellectual Property Rights and Trade, Piracy, ICT4D, Digital and
Participation Divide and Digital Communities and Movements.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="http://www.space-kerala.org/"&gt;Society For Promotion
of Alternative Computing and Employment&lt;/a&gt;&lt;/em&gt; &lt;br /&gt;Society For
Promotion of Alternative Computing and Employment (SPACE) is a
registered society that has members from academia, the IT industry,
professional societies such as IEEE and Computer Society of India,
and the IT Administration of the Government of Kerala. The vision of
SPACE is to promote the use of Free and Open Source Software (FOSS)
in academics, governance, corporate and individual use, and to
support the use FOSS for employment generation in Kerala. The primary
thrust are of the intervention are:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Promote the use of FOSS in the
	public, private, and governmental sectors as well as for
	personal/home use&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Develop a model for FOSS- based
	employment generation that is appropriate to Kerala's context, by
	identifying appropriate business opportunities and providing support
	services including training and micro business incubation&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Carry out R &amp;amp; D activities for
	the development of essential prototypes that bridge existing gaps in
	software, so as to enable widespread use of FLOSS&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Ensure that Kerala is able to develop sufficient numbers of
	high-quality human resources in the FLOSS domain&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.itmission.kerala.gov.in/"&gt;Kerala
State IT Mission&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Kerala State Information Technology Mission (KSITM) is a Society
registered under the Travancore Cochin Literary Scientific &amp;amp;
Charitable Societies Registration Act. It is an autonomous nodal IT
implementation agency for Department of Information Technology,
Government of Kerala which provides managerial support to various
initiatives of the Department.&lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;About the
Resource Persons&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Rahul Gonsalves&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;Rahul has
been building accessible websites since 2005 (sample work at
&lt;a href="http://rahulgonsalves.com/projects/"&gt;http://rahulgonsalves.com/projects/&lt;/a&gt;
[1] ). He has been activiely involved in promoting web and
accessibility standards. He spoke at the first international
accessibility and technology conference in India, Techshare 2008,
where he made out a case for accessibility and conducted a workshop
on retrofitting accessibility to existing websites, a concern for
most large institutions with an existing online presence (slides
available at
&lt;a href="http://www.barrierbreak.com/events-conference/techshare_presentations2008.php#track3"&gt;http://www.barrierbreak.com/events-conference/techshare_presentations200...&lt;/a&gt;
[2])&lt;/p&gt;
&lt;p&gt;In September 2008, he presented a paper examining ways in
which People with various impairments - both physical and mental -
engage with online content, and demonstrated practical ways in which
authors can make online content accessible at the National Conference
on ICT for Differently Abled People. He is a supporter of the push
for having a national policy for governing electronic accessibility
in India.&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;Srinivasu
Chakravartula&lt;/strong&gt;&lt;br /&gt;Srinivasu Chakravarthula - graduated in
Computer Science and is certified in 'assistive technologies'. He
started his career as Head of the Braille Production Unit at National
Association for the Blind, Bangalore. He then moved on and taught
Computer Science at the Manik Public School, Bidar and also set up
the Computer Training Centre at Hyderabad and Maniknagar, Bidar.&lt;/p&gt;
&lt;p&gt;In the year 2005, he began to specialize in accessibility and
started working for Net Systems Informatics and its subsidiary -
BarrierBreak Technologies, Mumbai. During his stint at Net Systems,
he was instrumental in setting up an accessibility process, imparting
accessibility training to Corporates, creating awareness about
accessibility and assistive technologies. Srinivasu played an
innovative role in organizing Techshare India 2008 - India's 1st
Accessibility and Assistive Technologies Conference and Exhibition.
He was also Program Coordinator for Magazine, a3 that talked about
Ability, Accessibility and Adaptability.&lt;/p&gt;
&lt;p&gt;Srinivasu is currently working for Yahoo! India as Accessibility
Manager and is responsible to lead and evangelize accessibility and
its initiatives across Yahoo! India and South East Asia. He is also a
member of the core committee for Yahoo! Employee Foundation India
(YEFI). Srinivasu is associated with the social sector through the
National Association for the Blind, India; Enable India, Shri Manik
Prabhu Sikshan Samiti and Success World. His hobbies include
blogging, tweeting, listening to classical music, playing chess and
swimming.&lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;Schedule of
the Workshop&lt;/h3&gt;
&lt;h3&gt;Day I&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Introductory Session&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Disability - 5 major types&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;The W3C and the WCAG&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;How people with disabilities use computers&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Group Exercise/Discussion&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Split participants into small
	groups and give them questions/problems to talk about and solve&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Example: If your friend is deaf, how do you make sure that
	she/he understands what a video is about? OR How does someone who
	can't see or hear answer/check their email? OR X lost his hands in a
	car accident. How does he do a Google search?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Session 1 - &lt;/strong&gt;&lt;strong&gt;Building an Accessible
Website&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Laying Accessible Foundations&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Table-less layouts&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Well-structured markup&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Valid Code&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Lecture/Demonstration of Accessibility Features under
GNU/Linux by Arky&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Lecture/Demonstration of NVDA Screen Reader&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session 2 -&lt;/strong&gt;&lt;strong&gt; Building an Accessible
Website&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Removing Barriers&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Guideline 1 - Perception&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Non-text content&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Audio/Visual content&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Adaptability&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Contrast&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Group Exercise: Guideline 1 - Translate a offline newspaper
into an online one, and ensure that structure and information are
retained when the content is adapted.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Wrap Session - Feedback and Clarifications&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;&lt;em&gt;&lt;/em&gt;Day II&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Lecture/Demonstration of ARIA features on selected websites&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session 3 - &lt;/strong&gt;&lt;strong&gt;Guideline 2&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Operable&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Keyboard Access&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Enough Time&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Seizures&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Navigable&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;LUNCH&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session 4 - &lt;/strong&gt;&lt;strong&gt;Guideline 3 and 4&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Understandable&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Natural Language&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Predictable&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Input Assistance&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Robust&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Compatible&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Session 5 - &lt;/strong&gt;&lt;strong&gt;Accessibility Testing&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Automated Testing + Tools&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Manual Testing&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Wrap Session - Feedback and Clarifications&lt;/em&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;Participants
List&lt;/h3&gt;
&lt;p&gt;1. Mr. Vibeesh P - Team Leader, Rainconcert&lt;/p&gt;
&lt;p&gt;2. Mr. Sunil S - Computer Programmer, ANERT&lt;/p&gt;
&lt;p&gt;3. Mr. Vineet
Pratap - Parallel Programmer, NIIST&lt;/p&gt;
&lt;p&gt;4. Mr. Binsun N
T - Software
Engineer, Keltron&lt;/p&gt;
&lt;p&gt;5. Mr. M.L.
Antony - Manager (Software/Web Services),
Keltron&lt;/p&gt;
&lt;p&gt;6. Mr. Rojilal M.
L - Programmer, KSEB&lt;/p&gt;
&lt;p&gt;7. Ms. Dhanya
Balakrishnan - Graduate Apprentice, Kerala State
IT Mission&lt;/p&gt;
&lt;p&gt;8. Ms. Indu
Reghunath - Developer, SPACE&lt;/p&gt;
&lt;p&gt;9.
Mr. Jithin Babu B - Web Programmer, Freelance&lt;/p&gt;
&lt;p&gt;10. Mr.
Hareesh Mohan - Developer, SPACE&lt;/p&gt;
&lt;p&gt;11. Mr.
Sujith Sureshan - Developer, SPACE&lt;/p&gt;
&lt;p&gt;12. Mr. Vinu C R - Web
Programmer, IT@School&lt;/p&gt;
&lt;p&gt;13. Mr. Cherian P
Thomas - Programmer, KSEB&lt;/p&gt;
&lt;p&gt;14. Mr. B
Vijayakumar - Programmer, KSEB&lt;/p&gt;
&lt;p&gt;15. Mr. Sunil
Kumar - Governement Employee, Kerala Khadi and
Village Industries Board&lt;/p&gt;
&lt;p&gt;16. Mr. Anil
Kumar - Akshaya, PA-MIS&lt;/p&gt;
&lt;p&gt;17. Mr. Shanavas
Khan - Programmer, Freelance&lt;/p&gt;
&lt;p&gt;18. Ms. Shatti
Raj - Scientist 'C', National Informatics Center&lt;/p&gt;
&lt;p&gt;19. Ms. Rameena
M - Developer, SPACE&lt;/p&gt;
&lt;p&gt;20. Ms.
Gita Brajesh - PSA, National Informatics Center&lt;/p&gt;
&lt;p&gt;21. Ms. Indusekhar M
S - System Analyst, National Informatics Center&lt;/p&gt;
&lt;p&gt;22. Ms. Somi P
Thomas - Scientist 'B', National Informatics
Center&lt;/p&gt;
&lt;p&gt;23. Ms.
Nissy George - System Analyst, National
Informatics Center&lt;/p&gt;
&lt;p&gt;24. Ms. Susy
M - Software Development, National Informatics
Center&lt;/p&gt;
&lt;p&gt;25. Ms. Jisy V
K - Technical Apprentice, Kerala State IT
Mission&lt;/p&gt;
&lt;p&gt;26. Ms. Sandhya Devi
T - Project Associate, IT@School&lt;/p&gt;
&lt;p&gt;27. Ms. Saritha D
R - Project Associate Executive, IT@School&lt;/p&gt;
&lt;p&gt;28. Mr.
Shaik Mohamed - System Analyst, National
Informatics Center&lt;/p&gt;
&lt;p&gt;29. Mr. Shibin Shah K
J - Student, RSCS&lt;/p&gt;
&lt;p&gt;30. Mr. Aneesh
Bhadran - Student. RIT&lt;/p&gt;
&lt;p&gt;31. Mr.
Thomas K S - Assistant Manager, Camputec&lt;/p&gt;
&lt;p&gt;32. Mr. Anil
S - Member, SDS&lt;/p&gt;
&lt;p&gt;33. Mr. John
Panicker - Website Designer&lt;/p&gt;
&lt;p&gt;34. Ms. Teenamol
L - Information Kerala Mission&lt;/p&gt;
&lt;p&gt;35. Mr. Shine A
R - Information Kerala Mission&lt;/p&gt;
&lt;p&gt;36. Mr. Jayahari K V&lt;/p&gt;
&lt;p&gt;37. Mr.
Naveen P L&lt;/p&gt;
&lt;p&gt;38. Mr. Jijo Mathew&lt;/p&gt;
&lt;p&gt;39. Mr. Antony
Rodrugues&lt;/p&gt;
&lt;p&gt;40. Mr. Satheeh S&lt;/p&gt;
&lt;p align="left"&gt;41. Mr. Sajeevan
C - Student, INSIGHT&lt;/p&gt;
&lt;h3 style="text-align: left;"&gt;&lt;strong&gt;Feedback&lt;/strong&gt;&lt;/h3&gt;
&lt;h3&gt;Session I&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt;&lt;em&gt;
&lt;/em&gt;&lt;strong&gt;Building an Accessible Website&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Topics
Covered&lt;em&gt;: Laying
Accessible Foundations, Table-less layouts, Well-structured markup,
Valid Code&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;20&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;16&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;18&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Title&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;:
&lt;/em&gt;&lt;em&gt;&lt;em&gt;&lt;strong&gt;Lecture/Demonstration of Accessibility Features
under GNU/Linux by Arky&lt;/strong&gt;&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Title&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
: &lt;/em&gt;&lt;em&gt;&lt;strong&gt;Lecture/Demonstration of NVDA Screen Reader&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;
&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Session II&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Title
: &lt;/strong&gt;&lt;strong&gt;Building an Accessible Website&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Topics
Covered : &lt;/strong&gt;&lt;strong&gt;&lt;em&gt;Removing
Barriers, Guideline 1 - Perception, Non-text content, Audio/Visual
content, Adaptability, Contrast&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;
&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Session III&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Title&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
:&lt;/em&gt;&lt;strong&gt;Guideline 2&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Topics
Covered&lt;/em&gt;&lt;em&gt;&lt;strong&gt;: &lt;/strong&gt;&lt;/em&gt;&lt;em&gt;&lt;em&gt;Operable,
Keyboard Access, Enough Time, Seizures, Navigable&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;
&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Session IV&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Title
: &lt;/strong&gt;&lt;strong&gt;Guideline 3 and 4&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Topics
Covered : &lt;/strong&gt;&lt;strong&gt;&lt;em&gt;Understandable,
Natural Language, Predictable, Input Assistance, Robust, Compatible &lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;
Session V&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Title&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
:&lt;/em&gt;&lt;strong&gt;&lt;em&gt;Accessibility Testing&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Topics
Covered&lt;/em&gt;&lt;em&gt;&lt;strong&gt;: &lt;/strong&gt;&lt;/em&gt;&lt;em&gt;&lt;em&gt;Automated
Testing + Tools, Manual Testing&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;17&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;16&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;
&lt;strong&gt;Workshop Organizers&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;
Ms Nirmita Narsimhan (Programme Manager)&lt;br /&gt;The Centre for Internet and Society&lt;br /&gt;No. D2, 3rd Floor, Sheriff Chambers&lt;br /&gt;14, Cunningham Road, Bangalore,&lt;br /&gt;Karnataka 560052,&lt;br /&gt;India&lt;/p&gt;
&lt;p&gt;
Phone: (+91)-080-4092-6283‎&lt;br /&gt;Fax: (+91)-080-4114-8130&lt;br /&gt;Email: nirmita@cis-india.org&lt;/p&gt;
&lt;p&gt;
Mr. Thomas Abraham (Training Coordinator)&lt;br /&gt;Society for Promotion of Alternative Computing and Employment&lt;br /&gt;C-11, Elankom Gardens,&lt;br /&gt;Vellayambalam, Thiruvananthapuram&lt;br /&gt;Kerala, India&lt;/p&gt;
&lt;p&gt;
Mobile: +91 94964 13317 Office Phone: +91 47123 18997&lt;br /&gt;Email: tomuhs@gmail.com,  contact@space-kerala.org&lt;/p&gt;
&lt;p&gt;
&lt;strong&gt;Consolidated Expenses of Web Accessibility Workshop, Trivandrum&lt;/strong&gt;&lt;/p&gt;
&lt;dl&gt;&lt;dd&gt;
&lt;table class="[object Object]"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Budget Head&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Amount (Rs.)&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Rent of lab and set up&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;15200&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Accomodation&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;4963&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Stationery&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;10285&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Communication&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;507&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Food&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;7535&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Travel&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;6235&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Coordination&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;10000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Total&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;54725&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/dd&gt;&lt;/dl&gt;
&lt;p&gt;
&lt;a href="https://cis-india.org/accessibility/Report%20-%20Space.pdf" class="internal-link" title="Workshop on Web Accessibility - Thiruvananthapuram"&gt;Please click here for the complete report.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report'&gt;https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-17T08:45:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/resources/national-telecom-policy-2012">
    <title>National Telecom Policy, 2012</title>
    <link>https://cis-india.org/telecom/resources/national-telecom-policy-2012</link>
    <description>
        &lt;b&gt;The National Telecom Policy, 2012 was approved by the Union Cabinet on May 31, 2012. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The vision of the policy is, “to provide secure, reliable, affordable and high quality converged telecommunication services anytime, anywhere for an accelerated inclusive socio-economic development”. The policy also aims at recognizing telecom as infrastructure in order to realize the potential of ICT for development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main components of the policy are:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Broadband Rural Telephony and Universal Service Obligation Fund&lt;/li&gt;
&lt;li&gt;R&amp;amp;D, Manufacturing and Standardization of Telecommunication Equipment&lt;/li&gt;
&lt;li&gt;Licensing, Convergence and Value Added Services&lt;/li&gt;
&lt;li&gt;Spectrum Management&lt;/li&gt;
&lt;li&gt;Quality of Service and Protection of Consumer Interest&lt;/li&gt;
&lt;li&gt;Security&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Vision of the National Telecom Policy, 2012&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The vision of the Policy is, “to provide secure, reliable, affordable and high quality converged telecommunication services anytime, anywhere for an accelerated inclusive socio-economic development”. The vision is to transform the country into an empowered and inclusive knowledge based society through telecommunication as the platform. Information and access to information is a major part of any development scheme, better communication systems can help in increasing awareness and knowledge about various issues in the society.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The growth of telecommunication in rural areas has been slow, with only 34 per cent of the total connections. There is an urgent need to bridge this digital divide and communication gap by providing better and advanced telecommunication services in the rural and remote areas. The current National Telecom Policy, 2012 also aims at an investor friendly policy. It also seeks to generate employment in various telecom sectors through this policy. One of the salient features of the policy is to make available broadband on demand and use of telecom infrastructure which in turn would enable businesses in urban as well as rural areas to engage in the web-economy and e-commerce for inclusive development.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mobile Devices as an Instrument of Social Empowerment (e-Governance, m-Governance)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Policy endeavours at making mobile devices as tools for social empowerment. This will be achieved through enabling participation of citizens in e-governance and m-governance projects in key sectors such as health, education, skill development, employment, governance and banking on mobile devices. Cloud-computing will be also used to enable social networking and participative e-governance. One Nation-Full Mobile Number Portability to be implemented and work towards One Nation Free Roaming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile devices are not only to be used for communication but also to be used as devices to authenticate proof of identity and facilitate secure financial transactions, multilingual services and other capabilities which will assist in increasing the literacy rate in the country.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Strategies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Broadband Rural Telephony and Universal Service Obligation Fund&lt;/b&gt;&lt;br /&gt;The Policy dictates for a robust and secure telecommunication service in the rural and remote areas. In order to bridge the digital divide the Policy also mandates affordable and high quality broadband connectivity and telecom service throughout the nation. This will be achieved through combination of technologies viz., optical fibre, wireless, VSAT and others. Optical fibre networks to be laid down to the village panchayats, using USOF funding.  It also aims at high speed broadband access to all the village panchayats by 2014 and access to all villages and habitation by 2020. It also aims at increasing the rural tele-density from 29 to 70 by 2012 and 100 by 2020. With high quality voice, data and multimedia and broadcasting services on converged networks,&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; it is expected to render better service to the user.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policies formulated with respect to access to broadband are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Develop an “eco-system for broadband” and also work towards a “right to broadband”. It also endeavours to recognize telecom and broadband service a basic necessity in the field of education and health. &lt;/li&gt;
&lt;li&gt;Provide  affordable and reliable broadband on demand by 2015, 175 million  broadband connections by 2017; 600 million by 2020 at a minimum speed of  2 Mbps download speed and also to make available higher speeds of at  least 100 Mbps on demand.&lt;/li&gt;
&lt;li&gt;Revise  the existing broadband download speed from 256 Kbps to 512 Kbps and 2  Mbps by 2015 and speed up to at least 100 Mbps thereafter. The policy  also encourages use of FTTH (fibre to the home) to create a “always  connected” society.&lt;/li&gt;
&lt;li&gt;Set  up an agency, to co-ordinate with different government departments in  order to efficiently lay optical fibre cables across the nation and help  in rapid expansion of broadband services in the country.&lt;/li&gt;
&lt;li&gt;Use  broadband along with other government agencies for the implementation  of e-governance, e-panchayats MNREGA, NKN, AADHAR, AAKASH tablet. It  will also help in facilitating secure financial transactions online.&lt;/li&gt;
&lt;li&gt;Stimulate  interest with respect to utility of broadband by promoting regional and  local content with the help of the Department of Information  Technology. This will help in generating investment for All-Internet  Protocol (IP) Networks including Next Generation Networks (NGN)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;R&amp;amp;D, Manufacturing and Standardization of Telecommunication Equipment&lt;/h3&gt;
&lt;p dir="ltr"&gt;The Policy directives for encouraging R&amp;amp;D are:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Encourage  indigenous manufacturing and R&amp;amp;D,  entrepreneurship and IPR creation  in the field of telecom products and  service under the 12th 5 year plan.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Preference  to be given to domestically produced telecom products in case of those  telecom products which have security implication for the country or  which will be put to government use. Moreover, the policy in order to  promote indigenous R&amp;amp;D in telecommunication technology will provide  for fiscal and financial incentive will be granted for indigenous  R&amp;amp;D.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Focus  on production and R&amp;amp;D of telecom equipment as well as address the  issues of security and strategic concerns. It also aims to focus on a  green policy and use of renewable sources of energy in the telecom  sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Set  up a council with experts from sectors of the telecom industry  including telecom service providers, telecom manufacturing industry,  government, academia and R&amp;amp;D institutions. The functions of the  Council would be to (a) forecast on technology change and product  development; (b) update the national programme for technology/product  development; (c) to act as a nodal group to ensure implementation of the  recommendations made for R&amp;amp;D and IPR creation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Promote  collaboration between telecom service providers, manufacturers, R&amp;amp;D  centres, academia and other stakeholders for development and  introduction of new products in the market which are more suitable for  Indian environment and security needs.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Assist entrepreneurs by creating funds and promoting indigenous manufacturing, R&amp;amp;D and intellectual property creation.&lt;/li&gt;
&lt;/ul&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The  Policy also addresses issues with regards to standards in the telecom  sector. The main policy directives for standardization of telecom in  India are:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Set  up new standards to meet national requirements and participate in the  standard making process carried out by international standardization  organizations and also contribute in formulation of global standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Implement  platform neutral services in e-governance and m-governance in the  sector of health, education and agriculture. The Policy objective is  also to encourage development of mobile phone based on open platform  standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mandate to use common platform for interconnection of various networks for non-discriminatory and non-exclusive access.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Create  a road-map for aligning technology, demand, standards and regulations  for the purpose of promoting competition in the market.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Set  up a Telecommunication Standard Development Organisation (TSDO) as an  autonomous body to build consensus about standards to meet national  requirements including security requirements. The Organisation will also  oversee participation of government, industry, R&amp;amp;D centres, service  providers and academia in such setting of standards. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In  order to promote domestic manufacture of telecom equipments, the Policy  seeks to support electronic design and manufacturing clusters for  design, development and manufacture of telecommunication equipment. The  Policy aims to provide incentive for export of telecom equipment and  also give fiscal incentives for domestic manufacturing of telecom  equipments under the Modified Special Incentive Package Scheme (M-SIPS).  It will also lay down mechanism for testing and certification with  respect to conformance, performance, interoperability, health, safety,  security, EMF/EMI/EMC (electromagnetic compatibility).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Licensing, Convergence and Value Added Services&lt;/h3&gt;
&lt;p dir="ltr"&gt;The policy regarding licensing:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Simplify the licensing framework in order to facilitate converged high quality services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Strengthen  institutional and legal and regulatory framework and to bring more  transparency and efficiency in decision making process and also  implement web-based e-governance solution for online application,  processing and issuance of licence by Department of Telecommunication.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Convergence  of technology, for the purpose of enabling a single network for voice  data and video, internet telephony (VoIP), value added services and  broadcasting services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Move  towards convergence between telecom, broadcast, IT service, networks,  platforms, technologies. It is also imperative to overcome hurdles such  as “existing segregation of licensing, registration and regulatory  mechanisms in these areas to enhance affordability, increase access,  delivery of multiple services and reduce cost.”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Use  of fixed mobile convergence in order to optimize the delivery of  services to the consumers irrespective of the device or the location.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Support  from USOF for telecom services, including converged communication  services for providing services in commercially unviable rural and  remote areas.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 dir="ltr"&gt;Spectrum Management&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Policy aims at creating a framework for increasing the availability of spectrum for the purpose of telecom services. It also seeks to implement a transparent process for allocation of spectrum as well as ensure availability of spectrum. The Policy wishes to make available additional 300 MHz for IMT (4G) services by 2013 and another 200 MHz by 2020.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government will also promote efficient use of spectrum and will conduct periodical spectrum usage audit. It will also de-licence un-used and additional frequency bands for public use. It will also conduct periodic audit of spectrum use, to ensure optimum use of spectrum.&lt;/p&gt;
&lt;p dir="ltr"&gt;The policy directives for spectrum management are:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Liberalise  spectrum for the purpose of enabling use of spectrum for providing any  service through any technological medium. Such liberalisation policy  will also allow spectrum pooling, sharing, and later trading to effect  optimum use of spectrum. This will be done through appropriate  regulatory framework.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Re-farm  spectrum to allot alternate frequency bands to service providers and  also to make available spectrum for the introduction of new technologies  in the telecom market.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Devise  a roadmap for the purpose of making available additional spectrum in  the next five years. It also seeks to make available globally harmonised  IMT spectrum in 450 MHz, 700 MHz, 1800 MHz, 1910 MHz, 2.1 GHz, 2.3 GHz,  2.5 GHz, 3.5 GHz bands and other bands to be identified by ITU for  commercial mobile services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provide small chunks of frequency bands for the purpose of research and development indigenous technologies and products.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Optimize spectrum allocation by reviewing the existing geographical unit of allocation of spectrum.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Promote use of white spaces with  low power devices, without causing harmful interference to the licensed  applications in specific frequency bands by deployment of Software  Defined Radios (SDRs), Cognitive Radios (CRs), etc.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish  Institute of Advanced Radio Spectrum Engineering and Management Studies  (IARSEMS) which will carry out policy research in radio spectrum  engineering, management/radio monitoring and related aspects.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h3&gt;Quality of Service and Protection of Consumer Interest&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The main policy mandate is to further empower TRAI (independent regulator) for the purpose of ensuring that the prescribed performance standards and quality of service parameters are complied with, by the service provides and also provide support to the sector regulator in creating awareness about services, tariff and quality of service. It also seeks to balance the interests of the consumer and the service provider.&lt;/p&gt;
&lt;p dir="ltr"&gt;The Policy objectives with respect to protection of consumer interests:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Informed consent;&lt;/li&gt;
&lt;li&gt;Transparency;&lt;/li&gt;
&lt;li&gt;Accountability in quality of service, tariff, usage and;&lt;/li&gt;
&lt;li&gt;Strengthen grievance redressal mechanisms&lt;/li&gt;
&lt;/ol&gt;
&lt;p dir="ltr"&gt;The strategies adopted for ensuring quality of service and protections of consumer interest are:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Formulate code of practices of sales and marketing communication.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Mandate web-based disclosure of area coverage by the telecom service providers.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Establish  National Mobile Property Registry to deal with issues of security,  theft and other concerns such a reprogramming of mobile handsets.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Undertake  legislative measure to include dispute between telecom consumers and  service providers within the jurisdiction of consumer forums.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 dir="ltr"&gt;Security&lt;/h3&gt;
&lt;p dir="ltr"&gt;The  objective of the policy is to formulate a strategy to address the  concerns related to communication security and network security. AADHAR  based authentication framework would be crucial in providing service  such as m-payment.&lt;/p&gt;
&lt;p dir="ltr"&gt;The strategy adopted to implement security measures are:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Telecom  service providers must take adequate measures; to ensure security of  the communication send and received through their networks. The service  provider will adopt contemporary network security standards &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Telecom  service providers must provide communication assistance to law  enforcement agencies. Telecom service providers must assist law  enforcement agencies within legal framework and also keeping in view the  individual privacy and also following international practices to the  extent possible for fulfilling national security needs. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Regulatory measures to ensure that safe to connect devices  are inducted on to the network. To build national capacity around  security standards, security testing, and interception and monitoring  capabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Multiple communication service on a single network; See, &lt;a class="external-link" href="http://bit.ly/zEA4wa"&gt;http://bit.ly/zEA4wa&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/resources/national-telecom-policy-2012'&gt;https://cis-india.org/telecom/resources/national-telecom-policy-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2013-03-15T06:00:26Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/national-telecom-policy-2012">
    <title>National Telecom Policy 2012 — Issues and Concerns</title>
    <link>https://cis-india.org/telecom/national-telecom-policy-2012</link>
    <description>
        &lt;b&gt;Snehashish Ghosh throws light on some of the issues and concerns surrounding the recently passed National Telecom Policy 2012. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The National Telecom Policy, 2012 (NTP’ 12) was approved by the Cabinet on May 31, 2012.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; The primary objective of the Policy is to provide reliable and affordable converged telecommunication services, across the whole nation. It aims at transforming mobile devices into instruments of social empowerment by implementing e-governance and m-governance, and has emphasized on security of networks and secure services to consumers.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;The Positives&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;The Policy has exempted additional frequency bands from licensing for public use. It aims to provide small chunks of frequency bands for the purpose of research and development of indigenous technologies and products. NTP’12 further seeks to promote use of white spaces with low power devices, without causing harmful interference to the licensed applications in specific frequency bands by deployment of software defined radios, cognitive radios, etc.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;On the issue of transforming mobile devices into instruments of social empowerment, the Policy aims to encourage development of mobile phones based on open platform standards.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Policy also wishes to implement measures to include disputes between consumers and telecom service providers within the jurisdiction of Consumer Forums.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;The NTP '12 will allow spectrum pooling, sharing and later trading of spectrum under the supervision of appropriate regulatory authority. The Policy also dictates regular spectrum audit to ensure efficient and optimum use of spectrum.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;Despite the above mentioned positives, the NTP’ 12 has certain issues.&lt;/p&gt;
&lt;h3&gt;Access to Telecom Services including Broadband&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Policy has ambitious goals with respect to telecommunication coverage throughout India. It aims to increase the teledensity in rural and remote areas from 39 to 70 in the next five years and 100 by the year 2020. In case of broadband, it wishes to provide affordable and reliable broadband-on-demand by 2015 and 175 million broadband connections in the next two years at a minimum speed of 2 Mbps and 600 million by 2020. However, the policy fails to mention any framework for implementation of such policy mandate. Formerly, the National Broadband Plan, 2004 &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; aimed at providing broadband (minimum speed of 256 Kbps) to 20 million households by 2010 but only 13 million households have broadband connectivity as on May, 2012. The target which the policy wishes to achieve is commendable. But the previous experience with such policy implementation could have been taken into consideration before setting such targets.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Research and Development (R&amp;amp;D), Manufacture and Standards&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The World Trade Organization (WTO) mandates national treatment wherein a member country cannot discriminate between domestic and foreign products.&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; The Draft Policy ran into conflicts with this particular WTO obligation with regards to giving preference to domestically manufactured telecom products and equipments.&amp;nbsp; However, this has been revised and now the policy only seeks to prefer indigenous telecom equipment in case of government and place where national security is involved. This is a good move as it provides better security in case of confidential government communication. However, it fails to give any directive as to production of such secure telecom equipment as well as security standards of such equipment. Moreover, we don’t have any uniform security standards in place.&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The NTP’12 aims at transforming India into a ‘global manufacturing hub’. However, it neither mentions deadlines for achieving such goals nor it lays down any framework to achieve such goals.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Unified Licensing Regime &lt;br /&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The NTP’12 aims at moving towards unified licensing regime. Under unified licence, the licensee has the right to provide converged services. But if a service provider wishes to render any specific service only (for example internet service providers), then such service provider does not have any option but to procure licence for converged services i.e. a unified licence. In order to implement such unified licensing regime, the Policy needs to further clarify the terms and conditions of such licence.&lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; A better approach would be to provide unified licence as well as licence for specific independent services, so that a service provider has the 
option to provide converged services or selected services&lt;/p&gt;
&lt;h3&gt;Concerns regarding Security and Privacy of the Consumers&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Implementation of voice over protocol (VoIP) is one of the policy directives of NTP ’12. VoIP can be used for anonymous communication which poses a threat to security of the State. The Policy has been criticised by the Home Ministry on this ground and the Ministry asked the Department of Telecom to consult with them before implementing such policy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Policy wants to mandate and enforce telecom service providers to take adequate measures to ensure security of the communication sent or received through the networks. The Policy dictates that this will be achieved through ‘contemporary security standards’. The term ‘contemporary security standards’ has not been defined in the Policy. The Policy might have referred to any of the&lt;a class="external-link" href="http://www.itu.int/ITU-T/security/main_table.aspx"&gt; International Telecommunication Union (ITU) approved standards&lt;/a&gt; to define 'contemporary security standards'.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another concern with security and privacy is that the Policy mentions that Unique Identification (UID) will become an integral part of electronic authentication framework. UID has been &lt;a class="external-link" href="http://www.cis-india.org/internet-governance/unique-id-system-pros-and-cons"&gt;&lt;span class="visualHighlight"&gt;widely criticised on various grounds&lt;/span&gt;&lt;/a&gt; including privacy.&lt;a class="external-link" href="http://http//cis-india.org/internet-governance/unique-id-system-pros-and-cons"&gt;&lt;span class="visualHighlight"&gt;&lt;/span&gt;&lt;/a&gt; It is important to note that &lt;a href="https://cis-india.org/internet-governance/blog/privacy/biometrics" class="external-link"&gt;&lt;span class="visualHighlight"&gt;UID can be easily misused&lt;/span&gt;&lt;/a&gt;, and therefore it&amp;nbsp; should be avoided for authentication purposes.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Missed Opportunities&lt;/h3&gt;
&lt;p&gt;NTP’12 does not include any policy mandate for providing accessibility for person with disabilities. The Policy should mandate implementation of systems that would enable&amp;nbsp; better accessibility for persons with disabilities. This could have included formulation of a Code of good practice for manufactures and service providers, conduct surveys and gather statistics on use of telecommunication services by persons with disabilities, etc.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The NTP’12 is an ambitious policy, it would be a daunting task for the Government of India to fulfill the objectives within the deadline prescribed by it.&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Notes&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;].See New Telecom Policy, Department of Telecom, Ministry of Communications &amp;amp; IT available at&amp;nbsp; &lt;a class="external-link" href="http://tinyurl.com/cwqf3br"&gt;&lt;span class="visualHighlight"&gt;http://tinyurl.com/cwqf3br&lt;/span&gt;&lt;/a&gt;, last accessed on June 30, 2012.&lt;br /&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;].See the Broadband Policy, 2004, Ministry of Communications &amp;amp; IT, Department of Telecommunications &lt;a class="external-link" href="http://tinyurl.com/7e52tbq"&gt;&lt;span class="visualHighlight"&gt;http://tinyurl.com/7e52tbq&lt;/span&gt;&lt;/a&gt;, last accessed on June 29, 2012.&lt;br /&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]See generally, National Treatment available at &lt;a class="external-link" href="http://tinyurl.com/yg2kkc5"&gt;&lt;span class="visualHighlight"&gt;http://tinyurl.com/yg2kkc5&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;].See Elonnai Hickok, Encryption Standards and Practices at &lt;a class="external-link" href="http://tinyurl.com/6prhl4q"&gt;&lt;span class="visualHighlight"&gt;http://tinyurl.com/6prhl4q&lt;/span&gt;&lt;/a&gt;, last accessed on June 30, 2012.&lt;br /&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;].Shalini Singh, Policy promises broadband for all with minimum download speed of 2 megabits, The Hindu, June 1, 2012 available at &lt;a class="external-link" href="http://tinyurl.com/bqc6sgr"&gt;&lt;span class="visualHighlight"&gt;http://tinyurl.com/bqc6sgr&lt;/span&gt;&lt;/a&gt;, last accessed on June 30, 2012.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/national-telecom-policy-2012'&gt;https://cis-india.org/telecom/national-telecom-policy-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Snehashish Ghosh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2013-03-25T10:22:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
