<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 431 to 445.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/may-2016-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-draft-geospatial-information-regulation-bill-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/internet-l-w"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2016-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace">
    <title>FB &amp; Google have already monopolised Indian cyberspace</title>
    <link>https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace</link>
    <description>
        &lt;b&gt;In an interview with Catch, Sunil Abraham, executive director of Center for Internet &amp; Society, puts the recent US-India cyber relationship framework into perspective. Abraham also talks about how Indian surveillance policies are outdated and why the country has failed to check the hegemonic tendencies of companies like Facebook and Google.&lt;/b&gt;
        &lt;p&gt;The &lt;a class="external-link" href="http://www.catchnews.com/science-technology/fb-google-have-already-monopolised-indian-cyberspace-1467505123.html/fullview"&gt;interview was published by Catch News&lt;/a&gt; on July 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_Sunil.png/@@images/d7f757de-b4fc-46a2-a9b3-cca0e46e32e7.png" alt="Sunil Abraham" class="image-inline" title="Sunil Abraham" /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="quick_pill_news_description"&gt;US-India signed a cyber  relationship framework earlier this month.  Could you explain some of  the takeouts that may have important  implications in the near future?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the framework, both sides have made a "commitment to the multi-stakeholder model of Internet governance" - in immediate practical terms that means India will accept the Internet Assigned Numbers Authority (IANA) transition proposed for the Internet Corporation for Assigned Names and Numbers (ICANN). Unfortunately, as my colleague Pranesh Prakash points out "U.S. state control over the core of the internet's domain name system is not being removed by the transition that is currently underway."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India along with Brazil and other emerging powers should have insisted that the question of jurisdiction be addressed before the transition. We must remember, that the multi-stakeholder model is just a fancy name for open and participatory self-regulation by the private sector. While the multi-stakeholder model is useful as a complement to traditional state-led regulation, it cannot be used to protect human rights or ensure the security of a nation state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[That is precisely why - the very next sentence in the announcement for the the framework for the US-India Cyber Relationship says "a recognition of the leading role for governments in cyber security matters relating to national security". This is because ICANN-style multistakeholderism requires all stakeholders to be on "equal footing" without "distinct roles and responsibilities". In other words, the governments are saying that the multistakeholder model is fine for all Internet Governance areas with the exception of Cyber Security. Given the limits of the multistakeholder model this is indeed the wise thing to do. Since American corporations dominate the Internet, US foreign policy has historically pushed for the multistakeholder model as fig leaf for forbearance and reduced foreign regulatory burden American corporations operating in other jurisdictions. Therefore India must not drink the multistakeholder cool-aid whole sale. It cannot afford a laissez-faire approach where it waits for corporations to self-regulate - it must regulate whenever public interest or human rights are harmed. In other words, it must go beyond the multistakeholder model and produce appropriate regulation where necessary. Needless to add - it must also deregulate in areas where harms don't exist. Apart from this many of the details of the announcement are positive steps that will increase security in India and the USA, and indeed the also across the world.]&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="quick_pill_news_description"&gt;What are some aspects of Intellectual Property Rights that should be looked at, in the context of the framework?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There is some language around Intellectual Property Rights (IPR) that should be examined carefully too. The US corporations benefit from a maximalist IP regime. But Make in India, Digital India and Startup India all depend on flexibilities to the IP regime and therefore India should refuse signing. Trans-Pacific Partnership (TPP) obligations like the "Digital 2 Dozen" which the US is actively proselytizing across the Pacific. If we make that mistake, we will make zero progress in indigenous security research and product development and also many other areas of our economy, health sector and education sector will be severely compromised. Therefore it would be best to keep IP rights expansion and enforcement out of the framework for the US-India Cyber Relationship.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="quick_pill_news_description"&gt;The PIL seeking a ban on  WhatsApp was refused by the SC recently.  Encrypted messaging services  like Telegram however, have been used in  the past by terror groups.  What's your take on such end-to-end  encryption services?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy and security are two sides of the same coin. You cannot have one without the other. End-to-end encryption is the basis for online privacy. End-to-end encryption is a pre-requisite for many legitimate actions of law abiding citizens online such as commerce, banking, tele-medicine, protection of intellectual property, witness/source protection, client confidentiality etc. Therefore, banning end-to-end encryption would mean the death of individual privacy and national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the government wants to promote cyber security it should promote the use of end-to-end encryption amongst law abiding citizens.&lt;br /&gt;&lt;br /&gt;Terrorist have to be stopped through targeted profiling, surveillance and interception. Big data analytics may be useful to watch for patterns in the meta data but there is no replacement for good old fashioned police work.&lt;br /&gt;&lt;br /&gt;Once suspects have been identified the encrypted channels can be compromised by:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Placing trojans on the end-user devices&lt;/li&gt;
&lt;li&gt;Performing man-in-the-middle attacks and&lt;/li&gt;
&lt;li&gt;Using brute force attacks with super computers.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Snowden's revelations have made it very clear that blanket and mass surveillance does not help foil terror attacks or stop organised crime. So far, research and government reports from across the world indicate that only a minority of terrorists use encryption. However, this situation may change.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;We don't have any proper encryption policy under the IT Act yet. What's taking so long and what are the key points that any policy in this matter must include in future?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We need many different types of encryption policies. We need a policy that mandates encryption and digital signature for all government personnel and also for all government transactions. We need policies that promote research and development in cryptography and mathematics. We need to update our criminal procedure code so that encrypted communications and data can be targeted by law enforcement and used effectively in the criminal justice process.&lt;/p&gt;
&lt;p&gt;However, we should not have any broad encryption policy that tries to regulate encryption as a technology. That would be a highly regressive move and will be impossible to enforce. That would breed contempt for rule of law.&lt;/p&gt;
&lt;h3&gt;Surveillance and the  tech around it has been contentious for various  governments. Where do  we stand vis-a-vis regulating surveillance  measures by the state?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our   surveillance and interception laws are outdated. They need to be   modernized to deal with advancements in technology and also global   developments when it comes to data protection and privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In   fact, our organisation was part of a global effort called Necessary and   Proportionate which identified 13 principles to modernise surveillance   which are connected to various aspects such as Legality, Legitimate  aim,  Competent judicial authority, Integrity of communications and  systems  and more. Some of these principles may have to be customised  for the  Indian context. [For example, given the load on courts perhaps India should stay with executive authorization of interceptions and data access requests. However, getting the law correct is only half the job. For the law cannot fix what the technology has broken. Some surveillance projects are well designed. For ex. the NATGRID - from what I understand it is a standard and platform that which will allow 12 security, intelligence and law enforcement agencies to temporarily make unions of sub-sets of 21 data sources. These automated temporary databases will be created under existing data access provisions of the law. I also hope the NATGRID is also using cryptography to ensure the maintenance of a non-repudiable log that will identify all officers involved in authorizing the each request and accessing the resultant data. Unfortunately, other surveillance projects are unmitigated disasters. For example, UID or Aadhaar. Many Indians don't realize that Aadhaar is a surveillance project. Biometrics is just a fancy name for remote, covert and non-consensual identification technology. Using the UID database the government can identify every single Indian without their consent. The so called "consent layer" in the India Stack is being developed by volunteers outside the UIDAI to avoid transparency under the Right to Information Act. Nothing in the current layer of the "consent layer" allows citizens to revoke consent. There is no facility in the UID Act to delete yourself from the database. Identity information aka the UID number and authentication information aka your biometrics for about a billion Indians have been collected and stored in a centralized location. It is as if our parliamentarians have written an open letter to criminals and foreign governments says "here is the information you need to wreck whole sale damage - come and get it". Hopefully the Supreme Court will save us from this impending disaster.]&lt;/p&gt;
&lt;h3&gt;With a sluggish US market, India has  the biggest potential for  companies like FB &amp;amp; Google, next only to  China. Do you feel that in  the quest to take over the Indian market, FB  &amp;amp; Google are going to  monopolise cyberspace in India?&lt;/h3&gt;
&lt;p&gt;I   have news for you - they have already monopolised Indian cyberspace.   They have completely wiped out competition in certain domains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One   of the many reasons they have done this is because we don't have laws   and regulations to temper their hegemonic tendencies. For example, we   could use data portability and interoperability mandates for social   media to spark competition in markets where there are entrenched  monopolies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Competition  law can be used to protect other firms  from abuse of market power.  Consumer protection law and privacy law  could be used to ensure that  user's rights are not compromised in the  race for market share. In  addition, a modern privacy law compliant with  the best practices in the  European Data Protection Regulation 2016,  would allow emerging Indian  companies to compete with giants like  Facebook and Google on a level  playing field. [Speaking of level playing field - only recently has the government introduced the "equalization levy". This was long overdue. Imagine the amount of tax that could have been collected so far and damage that has been done to competition. Regardless the current NDA government deserves our kudos for ensuring that Facebook and Google contribute their fair share of taxes. The new IPR Policy was also an opportunity to address the monopoly of Google and Facebook. There should have been a concerted attempt to use free/open source software, open standard and open content to bolster Indic language technologies. A billion dollars from every spectrum auction should be used to create incentives for Indian private sector, research and academic organisation who can contribute openly to the Indic cyberspace. This is the market where we can still build a highly competitive market. Today, given government inaction - millions of Indians are training Google's language platforms every time they use machine translation or speech to text technologies. This corpus of information will not be available for public interest research. Ideally we should also have Indians contributing to commons-based peer production projects like Wikipedia for their Indic language needs. Unfortunately the government totally missed this opportunity.]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace'&gt;https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-08T15:59:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann">
    <title>Jurisdiction: The Taboo Topic at ICANN</title>
    <link>https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann</link>
    <description>
        &lt;b&gt;The "IANA Transition" that is currently underway is a sham since it doesn't address the most important question: that of jurisdiction.  This article explores why the issue of jurisdiction is the most important question, and why it remains unaddressed.&lt;/b&gt;
        &lt;br /&gt;
&lt;p&gt;In March 2014, the &lt;a href="https://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;US government announced&lt;/a&gt; that they were going to end the contract they have with ICANN to run the &lt;a href="https://www.iana.org/"&gt;Internet Assigned Numbers Authority&lt;/a&gt; (IANA), and hand over control to the “global multistakeholder community”. They insisted that the plan for transition had to come through a multistakeholder process and have stakeholders “across the global Internet community”.&lt;/p&gt;
&lt;h2 id="why-is-the-u.s.-government-removing-the-ntia-contract"&gt;Why is the U.S. government removing the NTIA contract?&lt;/h2&gt;
&lt;p&gt;The main reason for the U.S. government's action is that it will get rid of a political thorn in the U.S. government's side: keeping the contract allows them to be called out as having a special role in Internet governance (with the Affirmation of Commitments between the U.S. Department of Commerce and ICANN, the IANA contract, and the cooperative agreement with Verisign), and engaging in unilateralism with regard to the operation of the root servers of the Internet naming system, while repeatedly declaring that they support a multistakeholder model of Internet governance.&lt;/p&gt;
&lt;p&gt;This contradiction is what they are hoping to address. Doing away with the NTIA contract will also increase — ever so marginally — ICANN’s global legitimacy: this is something that world governments, civil society organizations, and some American academics have been asking for nearly since ICANN’s inception in 1998. For instance, here are some demands made &lt;a href="https://www.itu.int/net/wsis/docs2/pc3/contributions/sca/hbf-29.doc"&gt;in a declaration by the Civil Society Internet Governance Caucus at WSIS, in 2005&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“ICANN will negotiate an appropriate host country agreement to replace its California Incorporation, being careful to retain those aspects of its California Incorporation that enhance its accountability to the global Internet user community. &amp;quot;ICANN's decisions, and any host country agreement, must be required to comply with public policy requirements negotiated through international treaties in regard to, inter alia, human rights treaties, privacy rights, gender agreements and trade rules. … &amp;quot;It is also expected that the multi-stakeholder community will observe and comment on the progress made in this process through the proposed [Internet Governance] Forum.&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In short: the objective of the transition is political, &lt;a href="https://cis-india.org/internet-governance/blog/"&gt;not technical&lt;/a&gt;. In an ideal world, we &lt;em&gt;should&lt;/em&gt; aim at reducing U.S. state control over the core of the Internet's domain name system.&lt;a href="#fn1" class="footnoteRef" id="fnref1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;It is our contention that &lt;strong&gt;U.S. state control over the core of the Internet's domain name system is &lt;em&gt;not&lt;/em&gt; being removed&lt;/strong&gt; by the transition that is currently underway.&lt;/p&gt;
&lt;h2 id="why-is-the-transition-happening-now"&gt;Why is the Transition Happening Now?&lt;/h2&gt;
&lt;p&gt;Despite the U.S. government having given commitments in the past that were going to finish the IANA transition by &amp;quot;September 30, 2000&amp;quot;, (the &lt;a href="https://www.icann.org/resources/unthemed-pages/white-paper-2012-02-25-en"&gt;White Paper on Management of Internet Names and Addresses&lt;/a&gt; states: &amp;quot;The U.S. Government would prefer that this transition be complete before the year 2000. To the extent that the new corporation is established and operationally stable, September 30, 2000 is intended to be, and remains, an 'outside' date.&amp;quot;) and later by &amp;quot;fall of 2006&amp;quot;,&lt;a href="#fn2" class="footnoteRef" id="fnref2"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt; those turned out to be empty promises. However, this time, the transition seems to be going through, unless the U.S. Congress manages to halt it.&lt;/p&gt;
&lt;p&gt;However, in order to answer the question of &amp;quot;why now?&amp;quot; fully, one has to look a bit at the past.&lt;/p&gt;
&lt;p&gt;In 1998, through the &lt;a href="https://www.icann.org/resources/unthemed-pages/white-paper-2012-02-25-en"&gt;White Paper on Management of Internet Names and Addresses&lt;/a&gt; the U.S. government &lt;a href="http://www.icannwatch.org/archive/mueller_icann_and_internet_governance.pdf"&gt;asserted it’s control over the root&lt;/a&gt;, and asserted — some would say arrogated to itself — the power to put out contracts for both the IANA functions as well as the 'A' Root (i.e., the Root Zone Maintainer function that Network Solutions Inc. then performed, and continues to perform to date in its current avatar as Verisign). The IANA functions contract — a periodically renewable contract — was awarded to ICANN, a California-based non-profit corporation that was set up exclusively for this purpose, but which evolved around the existing IANA (to placate the Internet Society).&lt;/p&gt;
&lt;p&gt;Meanwhile, of course, there were criticisms of ICANN from multiple foreign governments and civil society organizations. Further, despite it being a California-based non-profit on contract with the government, domestically within the U.S., there was pushback from constituencies that felt that more direct U.S. control of the DNS was important.&lt;/p&gt;
&lt;p&gt;As Goldsmith and Wu summarize:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;Milton Mueller and others have shown that ICANN’s spirit of “self-regulation” was an appealing label for a process that could be more accurately described as the U.S. government brokering a behind-the-scenes deal that best suited its policy preferences ... the United States wanted to ensure the stability of the Internet, to fend off the regulatory efforts of foreign governments and international organizations, and to maintain ultimate control. The easiest way to do that was to maintain formal control while turning over day-to-day control of the root to ICANN and the Internet Society, which had close ties to the regulation-shy American technology industry.&amp;quot; [footnotes omitted]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;And that brings us to the first reason that the NTIA announced the transition in 2014, rather than earlier.&lt;/p&gt;
&lt;h3 id="icann-adjudged-mature-enough"&gt;ICANN Adjudged Mature Enough&lt;/h3&gt;
&lt;p&gt;The NTIA now sees ICANN as being mature enough: the final transition was announced 16 years after ICANN's creation, and complaints about ICANN and its legitimacy had largely died down in the international arena in that while. Nowadays, governments across the world send their representatives to ICANN, thus legitimizing ICANN. States have largely been satisfied by participating in the Government Advisory Council, which, as its name suggests, only has advisory powers. Further, unlike in the early days, there is &lt;a href="http://www.internetgovernance.org/2012/05/24/threat-analysis-of-itus-wcit-part-1-historical-context/"&gt;no serious push for states assuming control of ICANN&lt;/a&gt;. Of course they grumble about the ICANN Board not following their advice, but no government, as far as I am aware, has walked out or refused to participate.&lt;/p&gt;
&lt;h3 id="laffaire-snowden"&gt;L'affaire Snowden&lt;/h3&gt;
&lt;p&gt;Many within the United States, and some without, believe that the United States not only plays an exceptional role to play in the running of the Internet — by dint of historical development and dominance of American companies — but that &lt;em&gt;it ought to&lt;/em&gt; have an exceptional role because it is the best country to exercise 'oversight' over 'the Internet' (often coming from &lt;a href="http://www.wsj.com/articles/SB10001424052702303563304579447362610955656"&gt;clueless commentators&lt;/a&gt;), and from dinosaurs of the Internet era, like &lt;a href="http://www.circleid.com/posts/20140316_if_the_stakeholders_already_control_the_internet_netmundial_iana/"&gt;American IP lawyers&lt;/a&gt; and &lt;a href="http://www.lawfareblog.com/2014/03/who-controls-the-internet-address-book-icann-ntia-and-iana/"&gt;American 'homeland' security hawks&lt;/a&gt;, Jones Day, who are ICANN's lawyers, and other &lt;a href="http://homepages.wmich.edu/~cooneys/poems/cummings.nextto.html"&gt;jingoists&lt;/a&gt; and those policymakers who are controlled by these narrow-minded interests.&lt;/p&gt;
&lt;p&gt;The Snowden revelations were, in that way, a godsend for the NTIA, as it allowed them a fig-leaf of &lt;a href="http://www.ft.com/cms/s/0/4529516c-c713-11e3-889e-00144feabdc0.html"&gt;international&lt;/a&gt; &lt;a href="https://www.rt.com/usa/nsa-fallout-relinquish-internet-oversight-002/"&gt;criticism&lt;/a&gt; &lt;a href="https://twitter.com/carolinegreer/status/454253411576598528"&gt;with which&lt;/a&gt; to counter these domestic critics and carry on with a transition that they have been seeking to put into motion for a while. The Snowden revelations led Dilma Rousseff, President of Brazil, to state in September 2013, at the 68th U.N. General Assembly, that Brazil would &amp;quot;present proposals for the establishment of a &lt;a href="https://gadebate.un.org/sites/default/files/gastatements/68/BR_en.pdf"&gt;civilian multilateral framework for the governance and use of the Internet&lt;/a&gt;&amp;quot;, and as &lt;a href="https://icannwiki.com/Diego_Canabarro"&gt;Diego Canabarro&lt;/a&gt; points out this catalysed the U.S. government and the technical community into taking action.&lt;/p&gt;
&lt;p&gt;Given this context, a few months after the Snowden revelations, the so-called &lt;a href="https://www.apnic.net/community/ecosystem/i*orgs"&gt;I* organizations&lt;/a&gt; met — seemingly with the blessing of the U.S. government&lt;a href="#fn3" class="footnoteRef" id="fnref3"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt; — in Montevideo, and put out a &lt;a href="https://www.apnic.net/publications/news/2013/montevideo-statement-on-future-of-internet-cooperation"&gt;'Statement on the Future of Internet Governance'&lt;/a&gt; that sought to link the Snowden revelations on pervasive surveillance with the need to urgently transition the IANA stewardship role away from the U.S. government. Of course, the signatories to that statement knew fully well, as did most of the readers of that statement, that there is no linkage between the Snowden revelations about pervasive surveillance and the operations of the DNS root, but still they, and others, linked them together. Specifically, the I* organizations called for &amp;quot;accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing.&amp;quot;&lt;/p&gt;
&lt;p&gt;One could posit the existence of two other contributing factors as well.&lt;/p&gt;
&lt;p&gt;Given political realities in the United States, a transition of this sort is probably best done before an ultra-jingoistic President steps into office.&lt;/p&gt;
&lt;p&gt;Lastly, the ten-yearly review of the World Summit on Information Society was currently underway. At the original WSIS (as seen from the civil society quoted above) the issue of US control over the root was a major issue of contention. At that point (and during where the 2006 date for globalization of ICANN was emphasized by the US government).&lt;/p&gt;
&lt;h2 id="why-jurisdiction-is-important"&gt;Why Jurisdiction is Important&lt;/h2&gt;
&lt;p&gt;Jurisdiction has a great many aspects. &lt;em&gt;Inter alia&lt;/em&gt;, these are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal sanctions applicable to changes in the root zone (for instance, what happens if a country under US sanctions requests a change to the root zone file?)&lt;/li&gt;
&lt;li&gt;Law applicable to resolution of contractual disputes with registries, registrars, etc.&lt;/li&gt;
&lt;li&gt;Law applicable to labour disputes.&lt;/li&gt;
&lt;li&gt;Law applicable to competition / antitrust law that applies to ICANN policies and regulations.&lt;/li&gt;
&lt;li&gt;Law applicable to disputes regarding ICANN decisions, such as allocation of gTLDs, or non-renewal of a contract.&lt;/li&gt;
&lt;li&gt;Law applicable to consumer protection concerns.&lt;/li&gt;
&lt;li&gt;Law applicable to financial transparency of the organization.&lt;/li&gt;
&lt;li&gt;Law applicable to corporate condition of the organization, including membership rights.&lt;/li&gt;
&lt;li&gt;Law applicable to data protection-related policies &amp;amp; regulations.&lt;/li&gt;
&lt;li&gt;Law applicable to trademark and other speech-related policies &amp;amp; regulations.&lt;/li&gt;
&lt;li&gt;Law applicable to legal sanctions imposed by a country against another.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Some of these, but not all, depend on where bodies like ICANN [the policy-making body], the IANA functions operator [the proposed &amp;quot;Post-Transition IANA&amp;quot;], and the root zone maintainer are incorporated or maintain their primary office, while others depend on the location of the office [for instance, Turkish labour law applies for the ICANN office in Istanbul], while yet others depend on what's decided by ICANN in contracts (for instance, the resolution of contractual disputes with ICANN, filing of suits with regard to disputes over new generic TLDs, etc.).&lt;/p&gt;
&lt;p&gt;However, an issue like sanctions, for instance, depends on where ICANN/PTI/RMZ are incorporated and maintain their primary office.&lt;/p&gt;
&lt;p&gt;As &lt;a href="http://content.netmundial.br/contribution/roadmap-for-globalizing-iana-four-principles-and-a-proposal-for-reform-a-submission-to-the-global-multistakeholder-meeting-on-the-future-of-internet-governance/96"&gt;Milton Mueller notes&lt;/a&gt;, the current IANA contract &amp;quot;requires ICANN to be incorporated in, maintain a physical address in, and perform the IANA functions in the U.S. This makes IANA subject to U.S. law and provides America with greater political influence over ICANN.&amp;quot;&lt;/p&gt;
&lt;p&gt;He further notes that:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;While it is common to assert that the U.S. has never abused its authority and has always taken the role of a neutral steward, this is not quite true. During the controversy over the .xxx domain, the Bush administration caved in to domestic political pressure and threatened to block entry of the domain into the root if ICANN approved it (Declaration of the Independent Review Panel, 2010). It took five years, an independent review challenge and the threat of litigation from a businessman willing to spend millions to get the .xxx domain into the root.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Thus it is clear that even if the NTIA's role in the IANA contract goes away, jurisdiction remains an important issue.&lt;/p&gt;
&lt;h2 id="u.s.-doublespeak-on-jurisdiction"&gt;U.S. Doublespeak on Jurisdiction&lt;/h2&gt;
&lt;p&gt;In March 2014, when NTIA finally announced that they would hand over the reins to “the global multistakeholder community”. They’ve laid down two procedural condition: that it be developed by stakeholders across the global Internet community and have broad community consensus, and they have proposed 5 substantive conditions that any proposal must meet:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Support and enhance the multistakeholder model;&lt;/li&gt;
&lt;li&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/li&gt;
&lt;li&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and,&lt;/li&gt;
&lt;li&gt;Maintain the openness of the Internet.&lt;/li&gt;
&lt;li&gt;Must not replace the NTIA role with a solution that is government-led or an inter-governmental organization.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In that announcement there is no explicit restriction on the jurisdiction of ICANN (whether it relate to its incorporation, the resolution of contractual disputes, resolution of labour disputes, antitrust/competition law, tort law, consumer protection law, privacy law, or speech law, and more, all of which impact ICANN and many, but not all, of which are predicated on the jurisdiction of ICANN’s incorporation), the jurisdiction(s) of the IANA Functions Operator(s) (i.e., which executive, court, or legislature’s orders would it need to obey), and the jurisdiction of the Root Zone Maintainer (i.e., which executive, court, or legislature’s orders would it need to obey).&lt;/p&gt;
&lt;p&gt;However, Mr. Larry Strickling, the head of the NTIA, in his &lt;a href="https://www.youtube.com/watch?v=8v-yWye5I0w&amp;amp;feature=youtu.be"&gt;testimony before the U.S. House Subcommittee on Communications and Technology&lt;/a&gt;, made it clear that,&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“Frankly, if [shifting ICANN or IANA jurisdiction] were being proposed, I don't think that such a proposal would satisfy our criteria, specifically the one that requires that security and stability be maintained.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Possibly, that argument made sense in 1998, due to the significant concentration of DNS expertise in the United States. However, in 2015, that argument is hardly convincing, and is frankly laughable.&lt;a href="#fn4" class="footnoteRef" id="fnref4"&gt;&lt;sup&gt;4&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Targetting that remark, in ICANN 54 at Dublin, we asked Mr. Strickling:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;So as we understand it, the technical stability of the DNS doesn't necessarily depend on ICANN's jurisdiction being in the United States. So I wanted to ask would the US Congress support a multistakeholder and continuing in the event that it's shifting jurisdiction.&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Mr. Strickling's response was:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;No. I think Congress has made it very clear and at every hearing they have extracted from Fadi a commitment that ICANN will remain incorporated in the United States. Now the jurisdictional question though, as I understand it having been raised from some other countries, is not so much jurisdiction in terms of where ICANN is located. It's much more jurisdiction over the resolution of disputes.&lt;/p&gt;
&lt;p&gt;&amp;quot;And that I think is an open issue, and that's an appropriate one to be discussed. And it's one I think where ICANN has made some movement over time anyway.&lt;/p&gt;
&lt;p&gt;&amp;quot;So I think you have to ... when people use the word jurisdiction, we need to be very precise about over what issues because where disputes are resolved and under what law they're resolved, those are separate questions from where the corporation may have a physical headquarters.&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As we have shown above, jurisdiction is not only about the jurisdiction of &amp;quot;resolution of disputes&amp;quot;, but also, as Mueller reminds us, about the requirement that ICANN (and now, the PTI) be &amp;quot;incorporated in, maintain a physical address in, and perform the IANA functions in the U.S. This makes IANA subject to U.S. law and provides America with greater political influence over ICANN.&amp;quot;&lt;/p&gt;
&lt;p&gt;In essence, the U.S. government has essentially said that they would veto the transition if the jurisdiction of ICANN or PTI's incorporation were to move out of the U.S., and they can prevent that from happening &lt;em&gt;after&lt;/em&gt; the transition, since as things stand ICANN and PTI will still come within the U.S. Congress's jurisdiction.&lt;/p&gt;
&lt;h2 id="why-has-the-icg-failed-to-consider-jurisdiction"&gt;Why Has the ICG Failed to Consider Jurisdiction?&lt;/h2&gt;
&lt;p&gt;Will the ICG proposal or the proposed new ICANN by-laws reduce existing U.S. control? No, they won't. (In fact, as we will argue below, the proposed new ICANN by-laws make this problem even worse.) The proposal by the names community (&amp;quot;the CWG proposal&amp;quot;) still has a requirement (in Annex S) that the Post-Transition IANA (PTI) be incorporated in the United States, and a similar suggestion hidden away as a footnote. Further, the proposed by-laws for ICANN include the requirement that PTI be a California corporation. There was no discussion specifically on this issue, nor any documented community agreement on the specific issue of jurisdiction of PTI's incorporation.&lt;/p&gt;
&lt;p&gt;Why wasn't there greater discussion and consideration of this issue? Because of two reasons: First, there were many that argued that the transition would be vetoed by the U.S. government and the U.S. Congress if ICANN and PTI were not to remain in the U.S. Secondly, the ICANN-formed ICG saw the US government’s actions very narrowly, as though the government were acting in isolation, ignoring the rich dialogue and debate that’s gone on earlier about the transition since the incorporation of ICANN itself.&lt;/p&gt;
&lt;p&gt;While it would be no one’s case that political considerations should be given greater weightage than technical considerations such as security, stability, and resilience of the domain name system, it is shocking that political considerations have been completely absent in the discussions in the number and protocol parameters communities, and have been extremely limited in the discussions in the names community. This is even more shocking considering that the main reason for this transition is, as has been argued above, political.&lt;/p&gt;
&lt;p&gt;It can be also argued that the certain IANA functions such as Root Zone Management function have a considerable political implication. It is imperative that the political nature of the function is duly acknowledged and dealt with, in accordance with the wishes of the global community. In the current process the political aspects of the IANA function has been completely overlooked and sidelined. It is important to note that this transition has not been a necessitated by any technical considerations. It is primarily motivated by political and legal considerations. However, the questions that the ICG asked the customer communities to consider were solely technical. Indeed, the communities could have chosen to overlook that, but they did not choose to do so. For instance, while the IANA customer community proposals reflected on existing jurisdictional arrangements, they did not reflect on how the jurisdictional arrangements should be post-transition , while this is one of the questions at the heart of the entire transition. There were no discussions and decisions as to the jurisdiction of the Post-Transition IANA: the Accountability CCWG's lawyers, Sidley Austin, recommended that the PTI ought to be a California non-profit corporation, and this finds mention in a footnote without even having been debated by the &amp;quot;global multistakeholder community&amp;quot;, and subsequently in the proposed new by-laws for ICANN.&lt;/p&gt;
&lt;h2 id="why-the-by-laws-make-things-worse-why-work-stream-2-cant-address-most-jurisdiction-issues"&gt;Why the By-Laws Make Things Worse &amp;amp; Why &amp;quot;Work Stream 2&amp;quot; Can't Address Most Jurisdiction Issues&lt;/h2&gt;
&lt;p&gt;The by-laws could have chosen to simply stayed silent on the matter of what law PTI would be incorporated under, but instead the by-law make the requirement of PTI being a California non-profit public benefit corporation part of the &lt;em&gt;fundamental by-laws&lt;/em&gt;, which are close to impossible to amend.&lt;/p&gt;
&lt;p&gt;While &amp;quot;Work Stream 2&amp;quot; (the post-transition work related to improving ICANN's accountability) has jurisdiction as a topic of consideration, the scope of that must necessarily discount any consideration of shifting the jurisdiction of incorporation of ICANN, since all of the work done as part of CCWG Accountability's &amp;quot;Work Stream 1&amp;quot;, which are now reflected in the proposed new by-laws, assume Californian jurisdiction (including the legal model of the &amp;quot;Empowered Community&amp;quot;). Is ICANN prepared to re-do all the work done in WS1 in WS2 as well? If the answer is yes, then the issue of jurisdiction can actually be addressed in WS2. If the answer is no ­— and realistically it is — then, the issue of jurisdiction can only be very partially addressed in WS2.&lt;/p&gt;
&lt;p&gt;Keeping this in mind, we recommended specific changes in the by-laws, all of which were rejected by CCWG's lawyers.&lt;/p&gt;
&lt;h2 id="the-transition-plan-fails-the-netmundial-statement"&gt;The Transition Plan Fails the NETmundial Statement&lt;/h2&gt;
&lt;p&gt;The &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial Multistakeholder Document&lt;/a&gt;, which was an outcome of the NETmundial process, states:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In the follow up to the recent and welcomed announcement of US Government with regard to its intent to transition the stewardship of IANA functions, the discussion about mechanisms for guaranteeing the transparency and accountability of those functions after the US Government role ends, has to take place through an open process with the participation of all stakeholders extending beyond the ICANN community&lt;/p&gt;
&lt;p&gt;[...]&lt;/p&gt;
&lt;p&gt;It is expected that the process of globalization of ICANN speeds up leading to a truly international and global organization serving the public interest with clearly implementable and verifiable accountability and transparency mechanisms that satisfy requirements from both internal stakeholders and the global community.&lt;/p&gt;
&lt;p&gt;The active representation from all stakeholders in the ICANN structure from all regions is a key issue in the process of a successful globalization.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As our past analysis has shown, the IANA transition process and the discussions on the mailing lists that shaped it &lt;a href="https://cis-india.org/internet-governance/blog/cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder"&gt;were neither global nor multistakeholder&lt;/a&gt;. The DNS industry represented in ICANN is largely US-based. 3 in 5 registrars are from the United States of America, whereas less than 1% of ICANN-registered registrars are from Africa. Two-thirds of the Business Constituency in ICANN is from the USA. While ICANN-the-corporation has sought to become more global, the ICANN community has remained insular, and this will not change until the commercial interests involved in ICANN can become more diverse, reflecting the diversity of users of the Internet, and a TLD like .COM can be owned by a non-American corporation and the PTI can be a non-American entity.&lt;/p&gt;
&lt;h2 id="what-we-need-jurisdictional-resilience"&gt;What We Need: Jurisdictional Resilience&lt;/h2&gt;
&lt;p&gt;It is no one's case that the United States is less fit than any other country as a base for ICANN, PTI, or the Root Zone Maintainer, or even as the headquarters for 9 of the world's 12 root zone operators (Verisign runs both the A and J root servers). However, just as having multiplicity of root servers is important for ensuring technical resilience of the DNS system (and this is shown in the uptake of Anycast by root server operators), it is equally important to have immunity of core DNS functioning from political pressures of the country or countries where core DNS infrastructure is legally situated and to ensure that we have diversity in terms of legal jurisdiction.&lt;/p&gt;
&lt;p&gt;Towards this end, we at CIS have pushed for the concept of &amp;quot;jurisdictional resilience&amp;quot;, encompassing three crucial points:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal immunity for core technical operators of Internet functions (as opposed to policymaking venues) from legal sanctions or orders from the state in which they are legally situated.&lt;/li&gt;
&lt;li&gt;Division of core Internet operators among multiple jurisdictions&lt;/li&gt;
&lt;li&gt;Jurisdictional division of policymaking functions from technical implementation functions&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Of these, the most important is the limited legal immunity (akin to a greatly limited form of the immunity that UN organizations get from the laws of their host countries). This kind of immunity could be provided through a variety of different means: a host-country agreement; a law passed by the legislature; a U.N. General Assembly Resolution; a U.N.-backed treaty; and other such options exist. We are currently investigating which of these options would be the best option.&lt;/p&gt;
&lt;p&gt;And apart from limited legal immunity, distribution of jurisdictional control is also valuable. As we noted in our submission to the ICG in September 2015:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Following the above precepts would, for instance, mean that the entity that performs the role of the Root Zone Maintainer should not be situated in the same legal jurisdiction as the entity that functions as the policymaking venue. This would in turn mean that either the Root Zone Maintainer function be taken up Netnod (Sweden-headquartered) or the WIDE Project (Japan-headquartered) [or RIPE-NCC, headquartered in the Netherlands], or that if the IANA Functions Operator(s) is to be merged with the RZM, then the IFO be relocated to a jurisdiction other than those of ISOC and ICANN. This, as has been stated earlier, has been a demand of the Civil Society Internet Governance Caucus. Further, it would also mean that root zone servers operators be spread across multiple jurisdictions (which the creation of mirror servers in multiple jurisdictions will not address).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;However, the issue of jurisdiction seems to be dead-on-arrival, having been killed by the United States government.&lt;/p&gt;
&lt;p&gt;Unfortunately, despite the primary motivation for demands for the IANA transition being those of removing the power the U.S. government exercises over the core of the Internet's operations in the form of the DNS, what has ended up happening through the IANA transition is that these powers have not only not been removed, but in some ways they have been entrenched further! While earlier, the U.S. had to specify that the IANA functions operator had to be located in the U.S., now ICANN's by-laws themselves will state that the post-transition IANA will be a California corporation. Notably, while the Montevideo Declaration speaks of &amp;quot;globalization&amp;quot; of ICANN and of the IANA functions, as does the NETmundial statement, the NTIA announcement on their acceptance of the transition proposals speaks of &amp;quot;privatization&amp;quot; of ICANN, and not &amp;quot;globalization&amp;quot;.&lt;/p&gt;
&lt;p&gt;All in all, the &amp;quot;independence&amp;quot; that IANA is gaining from the U.S. is akin to the &amp;quot;independence&amp;quot; that Brazil gained from Portugal in 1822. Dom Pedro of Brazil was then ruling Brazil as the Prince Regent since his father Dom João VI, the King of United Kingdom of Portugal, Brazil and the Algarves had returned to Portugal. In 1822, Brazil declared independence from Portugal (which was formally recognized through a treaty in 1825). Even after this &amp;quot;independence&amp;quot;, Dom Pedro continued to rule Portugal just as he had before indepedence, and Dom João VI was provided the title of &amp;quot;Emperor of Brazil&amp;quot;, aside from being King of the United Kingdom of Portugal and the Algarves. The &amp;quot;indepedence&amp;quot; didn't make a whit of a difference to the self-sufficiency of Brazil: Portugal continued to be its largest trading partner. The &amp;quot;independence&amp;quot; didn't change anything for the nearly 1 million slaves in Brazil, or to the lot of the indigenous peoples of Brazil, none of whom were recognized as &amp;quot;free&amp;quot;. It had very little consequence not just in terms of ground conditions of day-to-day living, but even in political terms.&lt;/p&gt;
&lt;p&gt;Such is the case with the IANA Transition: U.S. power over the core functioning of the Domain Name System do not stand diminished after the transition, and they can even arguably be said to have become even more entrenched. Meet the new boss: same as the old boss.&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li id="fn1"&gt;&lt;p&gt;It is an allied but logically distinct issue that U.S. businesses — registries and registrars — dominate the global DNS industry, and as a result hold the reins at ICANN.&lt;a href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li id="fn2"&gt;&lt;p&gt;As Goldsmith &amp;amp; Wu note in their book &lt;em&gt;Who Controls the Internet&lt;/em&gt;: &amp;quot;Back in 1998 the U.S. Department of Commerce promised to relinquish root authority by the fall of 2006, but in June 2005, the United States reversed course. “The United States Government intends to preserve the security and stability of the Internet’s Domain Name and Addressing System (DNS),” announced Michael D. Gallagher, a Department of Commerce official. “The United States” he announced, will “maintain its historic role in authorizing changes or modifications to the authoritative root zone file.”&lt;a href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li id="fn3"&gt;&lt;p&gt;Mr. Fadi Chehadé revealed in an interaction with Indian participants at ICANN 54 that he had a meeting &amp;quot;at the White House&amp;quot; about the U.S. plans for transition of the IANA contract before he spoke about that when &lt;a href="http://articles.economictimes.indiatimes.com/2013-10-22/news/43288531_1_icann-internet-corporation-us-centric-internet"&gt;he visited India in October 2013&lt;/a&gt; making the timing of his White House visit around the time of the Montevideo Statement.&lt;a href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li id="fn4"&gt;&lt;p&gt;As an example, &lt;a href="https://www.nlnetlabs.nl/projects/nsd/"&gt;NSD&lt;/a&gt;, software that is used on multiple root servers, is funded by a Dutch foundation and a Dutch corporation, and written mostly by European coders.&lt;a href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann'&gt;https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    

   <dc:date>2016-06-29T07:51:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525">
    <title>Creativity, Politics, and Internet Censorship</title>
    <link>https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525</link>
    <description>
        &lt;b&gt;In collaboration with Karnataka for Kashmir, we organised a discussion on 'Creativity, Politics and Internet Censorship' on May 25, 2016. Mahum Shabir, a legal activist and artist, Mir Suhail, political cartoonist with Kashmir Reader and Rising Kashmir, and Habeel Iqbal, a lawyer who has worked with several justice groups in Kashmir, shared some of their work and experiences. This discussion was organised as part of Port of Kashmir 2016, a series of events bringing together a small collective of people using different modes of art and activism to address crucial challenges to free speech and democracy in the state. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/MahumShabirHandwara.jpg" alt="null" /&gt;
&lt;h6&gt;Mahum Shabir talking about the Handwara case. Source: Swar Thounaojam.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The discussion began with Mahum Shabir giving an overview of the work at the Jammu Kashmir Coalition of Civil Society, specifically on the Handwara case. She spoke of the role of the internet, and social media in particular, in perpetuating the gaze of the state, while also bringing up the larger question of how media propagates a certain way of looking at Kashmir, particularly women, marginalised groups and victims of violence. Internet blockades and media censorship pose several obstacles for the circulation of information, resulting in the need for surreptitious ways of communication as a necessary way to counter predominant narratives in the discourse around occupation. &amp;nbsp;The implications of these for the rights of women in particular, the curbs on freedom at different levels, and the undercurrent of violence that is prevalent in everyday life, came up as significant questions.&lt;/p&gt;
&lt;p&gt;Mir Suhail presented some of his cartoons, and shared some poignant personal experiences of growing up in a state under military occupation. His works reflect his concerns about a changing society, from understanding strife as an almost normalised state of existence, to now a phase of industrialization and control of resources. He spoke on the politics of exercising creative freedom in the present, and his attempt to encourage conversations on contemporary issues through his art. The role of technology in facilitating these conversations is as crucial as it is contentious, for it also brings up questions of surveillance and privacy;his art tries to navigate through some of these questions in different ways.&lt;/p&gt;
&lt;p&gt;Habeel Iqbal, a lawyer who has worked on the Shopian and Handwara cases, spoke on some of the legal aspects of censorship and surveillance related issues in Kashmir, particularly in instances involving social media. He discussed some of the challenges faced by activists, social workers and political groups in working on certain cases, particularly in gathering and circulating information or in writing about sensitive issues. Self-censorship is often the only option for people working on these issues, as he elaborated through some personal experiences.&lt;/p&gt;
&lt;p&gt;The discussion included questions on the possibilities opened up by privacy tools, such the use of encryption and to the extent to which they affect communication. Access to these technologies is a factor here; besides, transparency is also a goal for most human rights organisations working in the state. Social media, and social messaging apps in particular often function as an alternative to mainstream media as a means of communication, and it is interesting to see the questions it opens up for censorship. Examples of activism using not just the internet, but the network (through USBs and hard drives) were also discussed. The responses to such forms of activism, from across the world were interesting to engage with, as it tries to tackle predominant perceptions about the state. The economic aspects of different strategies of censorship and surveillance, through curfews and blockades and its broader implications for socio-economic development in the state were also discussed. The talk provided several insights into the problems and challenges to freedom of speech, the censorship of ideas, and its repercussions for creative freedom and politics in Kashmir.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://raw.githubusercontent.com/cis-india/website/master/img/MirSuhailPostcards.jpg" alt="null" /&gt;
&lt;h6&gt;Postcards of cartoons by Mir Suhail. Source: Swar Thounaojam.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525'&gt;https://cis-india.org/raw/creativity-politics-and-internet-censorship-20160525&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Practice</dc:subject>
    
    
        <dc:subject>Art</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-06-17T07:07:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608">
    <title>Kiran A B, Elonnai Hickok, and Vanya Rakesh - Policies and Standards across Five International Smart Cities </title>
    <link>https://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608'&gt;https://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-06-10T16:36:02Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward">
    <title>UN Special Rapporteur Report on Freedom of Expression and the Private Sector: A Significant Step Forward</title>
    <link>https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward</link>
    <description>
        &lt;b&gt;On 6 June 2016, the UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye, released a report on the Information and Communications Technology (“ICT”) sector and freedom of expression in the digital age. Vidushi Marda and Pranesh Prakash highlight the most important aspects of the report.&lt;/b&gt;
        
&lt;h2 dir="ltr"&gt;Background&lt;/h2&gt;
&lt;p dir="ltr"&gt;Today, the private sector is more closely linked to the freedom of expression than it has ever been before. The ability to speak to a mass audience was at one time a privilege restricted to those who had access to mass media. &amp;nbsp;However, with digital technologies, that privilege is available to far more people than was ever possible in the pre-digital era. As private content created on these digital networks is becoming increasingly subject to state regulation, it is crucial to examine the role of the private sector in respect of the freedom of speech and expression.&lt;/p&gt;
&lt;p dir="ltr"&gt;The first foray by the Special Rapporteur into this broad area has resulted in a sweeping report, that covers almost every aspect of freedom of expression within the ICT sector, except competition which we will elaborate on later in this post.&lt;/p&gt;
&lt;h2 dir="ltr"&gt;Introduction&lt;/h2&gt;
&lt;p dir="ltr"&gt;The report aims to “provide guidance on how private actors should protect and promote freedom of expression in a digital age”. It identifies the relevant international legal framework as Article 19 of the &lt;a href="https://treaties.un.org/doc/Publication/UNTS/Volume%20999/volume-999-I-14668-English.pdf"&gt;International Covenant on Civil and Political Rights&lt;/a&gt;, and Article 19 of the &lt;a href="http://www.un.org/en/udhrbook/pdf/udhr_booklet_en_web.pdf"&gt;Universal Declaration of Human Rights&lt;/a&gt;. &amp;nbsp;The UN “Protect, Respect and Remedy” Framework and Guiding Principles, also known as the &lt;a href="http://business-humanrights.org/sites/default/files/reports-and-materials/Ruggie-report-7-Apr-2008.pdf"&gt;Ruggie Principles&lt;/a&gt; provide the framework for private sector responsibilities on business and human rights.&lt;/p&gt;
&lt;p dir="ltr"&gt;The report categorises different roles of the private sector in organising, accessing, regulating and populating the internet. This is important because the manner in which the ICT sector affects the freedom of expression is far more complicated than traditional communication industries. The report identifies the distinct impact of internet service providers, hardware and software companies, domain name registries and registrars, search engines, platforms, web hosting services, platforms, data brokers and e-commerce facilities on the freedom of expression.&lt;/p&gt;
&lt;h2&gt;Legal and Policy Issues&lt;/h2&gt;
&lt;div&gt;The Special Rapporteur discusses four distinct legal and policy issues that find relevance in respect of this problem statement: Content Regulation, Surveillance and Digital Security, Transparency and Remedies.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Content Regulation&lt;/h3&gt;
&lt;p dir="ltr"&gt;The report identifies two main channels through which content regulation takes place: the state, and internal processes.&lt;/p&gt;
&lt;p&gt;Noting that digital content made on private networks is increasingly subject to State regulation, the report highlights the competing interests of intermediaries who manage platforms and States which demand for regulation of this content on grounds of defamation, blasphemy, protection of national security etc. This tension is demonstrated through vague laws that compel individuals and private corporations to over-comply and err on the side of caution “in order to avoid onerous penalties, filtering content of uncertain legal status and engaging in other modes of censorship and self-censorship.” Excessive intermediary liability forces intermediaries to over-comply with requests in order to ensure that local access to their platforms are not blocked. States attempt at regulating content outside the law through extra legal restrictions, and push private actors to take down content on their own initiative. Filtering content is another method, wherein States block and filter content through the private sector. Government blacklists, illegal content and suspended accounts are methods employed, and these have sometimes raised concerns of necessity and proportionality. &lt;a href="http://scroll.in/article/807277/whatsapp-in-kashmir-when-big-brother-wants-to-go-beyond-watching-you"&gt;Network or service shutdowns&lt;/a&gt; are classified as a “particularly pernicious” method of content regulation. Non neutral networks also are a method of content regulation with the possibilities of internet service providers throttling traffic. Zero rating is a potential issue, although the report acknowledges that “it remains a subject of debate whether they may be permissible in areas genuinely lacking Internet access”.&lt;/p&gt;
&lt;p&gt;The other node of content regulation has been identified as internal policies and practices of the private sector. &lt;a href="https://consentofthenetworked.com/author/rebeccamackinnon/"&gt;Terms of service&lt;/a&gt; restrictions are often tailored to the jurisdiction’s laws and policies and don’t always address the needs and interests of vulnerable groups. Further, the report notes, &lt;a href="http://www.catchnews.com/tech-news/facebook-free-basics-gatekeeping-powers-extend-to-manipulating-public-discourse-1452077063.html"&gt;design and engineering choices&lt;/a&gt; of how private players choose to curate content are algorithmically determined and increasingly control the information that we consume. &amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Transparency&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;The report notes that transparency enables those entities subject to internet regulation to take informed decisions about their responsibilities and liabilities in a digital sphere and points out, that there is a severe lack of transparency about government requests to restrict or remove content. Some states even prohibit the publication of such information, with India being one example. In respect of the private sector, content hosting platforms sometimes at least reveal the circumstances under which content is removed due to a government request, although this is rather erratic. The report recognises the need to balance transparency with competing concerns like security and trade secrecy, and this is a matter of continued debate.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3 dir="ltr"&gt;Surveillance and Digital Security&lt;/h3&gt;
&lt;p&gt;Freedom of expression concerns arise as data transmitted on private networks is gradually being subjected to surveillance and interference from the State and private actors. The report finds that several internet companies have reported an increase in government requests for customer data and user information. According to the Special Rapporteur, effective resistance strategies include inclusion of human rights guarantees, restrictively interpreting government requests negotiations. Private players also make surveillance and censorship equipment that enable States to intercept communications. Covert surveillance has been previously reported, with States tapping into communications as and when necessary. When private entities become aware of interception and covert surveillance, their human rights responsibilities arise. As private entities work towards enhancing encryption, anonymity and user security, states respond by &lt;a href="http://www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html"&gt;compelling companies&lt;/a&gt; to create loopholes for them to circumvent such privacy and security enhancing technology.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Remedies&lt;/h3&gt;
&lt;p&gt;Unlawful content removal, opaque suspensions, data security breaches are commonplace occurrences in the digital sphere. The ICCPR guarantees that all people whose rights have been violated must have an effective remedy, and similarly, the Ruggie principles require that remedial and grievance mechanisms must be provided by corporations. There is some ambiguity on how these complaint or appeal mechanisms should be designed and implemented, and the nature and structure of these mechanisms is also unclear. &amp;nbsp;The report states that it is necessary to investigate the role of the state in supplementing/regulating corporate mechanisms, its role in ensuring that there is a mechanism for remedies, and its responsibility to make sure that more easily and financially accessible alternatives exist for remedial measures.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Special Rapporteur’s priorities for future work and thematic developments&lt;/h2&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Investigating laws, policies and extralegal measures that equip governments to impose restrictions on the provision of telecommunications and internet services. Examining the responsibility of companies to respond in a way that respects human rights, mitigates harm, and provides avenues for redress.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Evaluating content restrictions under terms of service and community standards. Private actors face substantial pressure from governments and individuals to restrict expression, and a priority is to evaluate the interplay of private and state actions on freedom of expression in light of human rights obligations and responsibilities.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Focusing on the legitimacy of rationales for intermediary liability for content hosting, restrictions, conditions for removing third party content.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Exploring censorship and surveillance within the human rights framework, and encouraging greater scrutiny before using these technologies for purposes that undermine the freedom of expression.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Identifying ways to balance an increasing scope of freedom of expression with the need to address governmental interests in national security and public order.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Internet access - &amp;nbsp;Future work will explore issues around access and private sector engagement and investment in ensuring affordability and accessibility, particularly considering marginalized groups.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Internet governance - Internet governance frameworks and reform efforts are sensitive to the needs of women, sexual minorities and other vulnerable communities. Throughout this future work, the Special Rapporteur will pay particular attention to legal developments (legislative, regulatory, and judicial) at national and regional levels.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Conclusions and Recommendations&lt;/h2&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;States: The report recommends that states should not pressurise the private sector to interfere with the freedom of speech and expression in a manner that does not meet the condition of necessary and proportionate principles. Any request to take down content or access customer information must be based on validly enacted law, subject to oversight, and demonstrate necessary and proportionate means of achieving the aims laid down in Article 19(3) of the ICCPR.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Private Actors: The Special Rapporteur recommends that private actors develop and implement transparent human rights assessment procedures, and develop policies keeping in mind their human rights impact. Apart from this, private entities should integrate commitments to the freedom of expression into internal processes and ensure the “greatest possible transparency”.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;International Organisations: The report recommends that organisations make resources and educational material on internet governance publicly accessible. The Special Rapporteur also recommends encouraging meaningful civil society participation in multi-stakeholder policy making and standard setting processes, with an increased focus on sensitivity to human rights.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;CIS Comments&lt;/h2&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;CIS strongly agrees with the expansion of the Special Rapporteur’s scope that this report represents. &amp;nbsp;He is no longer looking solely at states but at the private sector too.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;CIS also notes that competition is an important aspect of the freedom of expression, but has not been discussed in this report. Viable alternatives to platforms, networks, internet service providers etc., will ensure a healthy, competitive marketplace, and will have a positive impact in resolving the issues identified above.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Our &lt;a href="http://cis-india.org/internet-governance/intermediary-liability-in-india.pdf/view"&gt;work&lt;/a&gt; has called for maintaining a balanced approach to liability of intermediaries for their users’ actions, since excessive liability or strict liability would lead to over-caution and removal of legitimate speech, while having no liability at all would make it difficult to act effectively against harmful speech, e.g., revenge porn.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"&gt;CIS’ work&lt;/a&gt; on network neutrality has highlighted the importance of neutrality for freedom of speech, and has advocated for an evidence-based approach that ensures there is neither under-regulation, nor over-regulation. &amp;nbsp;The Special Rapporteur suggests that ‘Zero-Rating’ practices always violate Net Neutrality, but the majority of the definitions of Net Neutrality proposed by academics and followed by regulators across the world often do not include Zero-Rating. &amp;nbsp;Similarly, he suggests that the main exception for Zero-Rating is for areas genuinely lacking access to the Internet, whereas the potential for some forms of Zero-Rating to further freedom of expression, especially of minorities, even in areas with access to the Internet, provides sufficient reason for the issue to merit greater debate.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;(Pranesh Prakash was invited by the Special Rapporteur to provide his views and took part in a meeting that contributed to this report)&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward'&gt;https://cis-india.org/internet-governance/un-special-rapporteur-report-on-freedom-of-expression-and-the-private-sector-a-significant-step-forward&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UNHRC</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-06-08T17:27:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/may-2016-newsletter">
    <title>May 2016 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/may-2016-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the May 2016 newsletter of the Centre for Internet and Society (CIS). &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Early last year, thanks to the fund raising efforts of a friend of CIS - Suhail Kazi, we received Rs. 1.9 lakhs as donations from 19 individuals. In January this year, we set up an online giving feature on our website which would ease the donation process, but we haven’t got a single donation so far! &amp;nbsp;Today, we are unable to find a single donor who is interested in our Accessibility, Telecom, or RAW programmes. In other words, we need your support. Would you to consider making a small donation to CIS? &lt;strong&gt;Click &lt;a href="http://imojo.in/CISDonations"&gt;here&lt;/a&gt; to donate.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;CIS along with 20 other organisations &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/accessible-ict-procurement"&gt;petitioned the Ministry of Social Justice &amp;amp; Empowerment, Ministry of Finance and the Ministry of Information Technology&lt;/a&gt; to bring in accessibility considerations within the draft Procurement Bill.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Pavishka Mittal&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending-legality-and-implications"&gt;wrote a blog post&lt;/a&gt; on the legality and implications of the Reserve Bank of India's proposed classification of Peer-to-Peer lending companies as non-banking financial institutions.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The sixth section of our extended survey of digital initiatives in the practice of arts and humanities in India is&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/raw/new-modes-and-sites-of-humanities-practice"&gt;now online&lt;/a&gt;. The final report will be published serially, and will comprise seven sections in total.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS &lt;a class="external-link" href="http://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016"&gt;invites abstracts for essays that explore how we study the Internet in India today&lt;/a&gt;.&amp;nbsp;Please send the abstracts (no more than 200 words) to &lt;a&gt;raw@cis-india.org&lt;/a&gt; by &lt;strong&gt;Sunday, June 12, 2016&lt;/strong&gt;. CIS will select up to 10 abstracts and announce them on &lt;strong&gt;Monday, June 20, 2016&lt;/strong&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS filed RTI applications seeking information from institutes such as &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-iim-bangalore"&gt;IIM Bangalore&lt;/a&gt;; &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-nlu-jodhpur"&gt;NLU Jodhpur&lt;/a&gt;; &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-nlsiu"&gt;NLSIU&lt;/a&gt;; &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-iit-kanpur"&gt;IIT Kanpur&lt;/a&gt;; &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-iit-kharagpur"&gt;IIT Kharagpur&lt;/a&gt;; &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-nalsar"&gt;NALSAR&lt;/a&gt;; &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-nujs"&gt;NUJS&lt;/a&gt;; &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university"&gt;Delhi University&lt;/a&gt;; and&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-iim-ahmedabad"&gt;
&lt;div&gt;IIM Ahmedabad.&lt;/div&gt;
&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Sumandro Chattapadhyay and Adya Garg&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/openness/protecting-the-territory-killing-the-map"&gt;wrote an article&amp;nbsp;for the Wire&lt;/a&gt; in which they analyzed the draft Geospatial Information Regulation Bill, 2016. They argue that the Bill seems to be undoing various economic and humanitarian efforts, and hindering other opportunities offered by maps.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws"&gt;sent its comments on the Draft New ICANN By-Laws&lt;/a&gt; in which it observed that the draft by-laws are overwrought and that rather than producing a broad constitutional document for ICANN the by-laws read like the worst of governmental regulations and create more problems than they solve.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/news"&gt;CIS in the News&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;CIS gave inputs to the following media coverage:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/exercise-to-correct-articles-in-tulu-wikipedia-begins"&gt;Exercise to correct articles in Tulu Wikipedia begins&lt;/a&gt; (The Hindu; April 28, 2016). This was mirrored on CIS website on May 1, 2016.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/mathrubhumi-may-1-2016-thiruvananthapuram-to-host-wikipedia-workshop-on-may-4-5"&gt;T’puram to host Wikipedia workshop on May 4, 5&lt;/a&gt; (Mathrubhumi; May 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/the-times-of-india-may-5-2016-spread-awareness-through-malayalam-wikipedia"&gt;Spread awareness through Malayalam Wikipedia: Gadgil&lt;/a&gt; (The Times of India; May 5, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/new-indian-express-may-6-2016-promoting-online-content-through-wiki-malayalam"&gt;Promoting Online Content Through 'Wiki Malayalam'&lt;/a&gt; (New Indian Express; May 6, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-newsminute-may-6-2016-why-indias-attempt-to-polic-digital-maps-and-satellite-images-is-a-dumb-idea"&gt;Why India’s attempt to police digital maps and satellite images is a ‘dumb’ idea &lt;/a&gt;(News Minute; May 6, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/economic-times-aman-sharma-neha-alawadhi-may-9-2016-google-apple-and-microsoft-may-need-licence-for-satellite-mapping-in-india"&gt;Google, Apple and Microsoft may need licence for satellite mapping in India&lt;/a&gt; (Aman Sharma and Neha Alawadhi; Economic Times; May 9, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindu-businessline-may-10-2016-varun-aggarwal-geospatial-info-regulation-bill-will-hurt-start-ups-small-firms"&gt;Geospatial Info Regulation Bill will hurt start-ups, small firms&lt;/a&gt; (Varun Aggarwal; Hindu BusinessLine; May 10, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women"&gt;Why The New Government Policy Mandating Panic Buttons On Phones Isn’t Going To Protect Women&lt;/a&gt; (The Ladies Finger; May 14, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/voice-of-america-may-17-2016-anjana-pasricha-india-proposed-map-law-prompts-outcry"&gt;India's Proposed Map Law Prompts Outcry&lt;/a&gt; (Anjana Pasricha; Voice of America; May 17, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-quint-rohit-pathak-may-21-2016-suckly-attacks-national-stock-exchange-tech-vendor-among-others"&gt;Suckfly Attacks National Stock Exchange Tech Vendor, Among Others&lt;/a&gt; (Rohit Pathak; The Quint; May 21, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/voice-of-america-may-27-2016-india-seeks-to-limit-use-of-maps-and-satellite-images"&gt;India Seeks to Limit Use of Maps and Satellite Images&lt;/a&gt; (Anjana Pasricha; Voice of America; May 27, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/news/the-times-of-india-may-29-2016-how-tech-brings-self-reliance-to-students-with-disabilities"&gt;How tech brings self-reliance to students with disabilities&lt;/a&gt; (The Times of India; May 29, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;CIS members wrote the following pieces:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/huffington-post-subhashish-panigrahi-january-25-2016-why-its-essential-to-grow-indian-language-wikipedias"&gt;Why It's Essential To Grow Indian-Language Wikipedias&lt;/a&gt; (Subhashish Panigrahi; Huffington Post; February 2016). The post was mirrored in &lt;a href="https://globalvoices.org/2016/02/26/why-its-essential-to-grow-indian-language-wikipedias/"&gt;Global Voices&lt;/a&gt;. The post was translated &lt;a href="https://el.globalvoices.org/2016/05/33834"&gt;into Greek&lt;/a&gt; by Maria Souli. It was translated &lt;a href="https://es.globalvoices.org/2016/03/26/la-importancia-de-cultivar-las-wikipedias-sobre-los-idiomas-de-la-india/"&gt;into Spanish&lt;/a&gt; by Daniela Diaz and &lt;a href="https://ru.globalvoices.org/2016/04/20/47945/"&gt;into Russian&lt;/a&gt; by GV Russian.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life"&gt;A Large Byte of Your Life&lt;/a&gt; (Nishant Shah; Indian Express; April 3, 2016). This was mirrored on the website recently.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/open-source-april-15-2016-a-four-year-action-packed-experience-with-wikipedia"&gt;A four year, action-packed experience with Wikipedia&lt;/a&gt; (Sailesh Patnaik; Opensource.com; April 15, 2016). This was mirrored on CIS website recently.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/indian-express-nishant-shah-april-17-2016-online-censorship-on-the-rise"&gt;Online Censorship on the Rise: Why I Prefer to Save Things Offline&lt;/a&gt; (Nishant Shah; Indian Express; April 17, 2016). This was mirrored on the website recently.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/indian-express-nishant-shah-may-8-2016-facebook-a-platform-with-little-less-sharing-of-personal-information"&gt;Facebook: A Platform with Little Less Sharing of Personal Information&lt;/a&gt; (Nishant Shah; Indian Express; May 8, 2016). &lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/wikimedia-blog-may-9-2016-bangla-translations-odia-womens-history"&gt;Wikipedia’s 15th birthday inspires Bangla translators; Odia-language Women’s History Month edit-a-thons&lt;/a&gt; (Nahid Sultan and Shailesh Patnaik; Wikimedia Blog; May 9, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/identity-of-the-aadhaar-act-supreme-court-and-the-money-bill-question"&gt;Identity of the Aadhaar Act: Supreme Court and the Money Bill Question&lt;/a&gt; (Sumandro Chattapadhyay and Vanya Rakesh; The Wire;&amp;nbsp;May 9, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/criminal-defamation-and-the-supreme-court2019s-loss-of-reputation"&gt;Criminal Defamation and the Supreme Court’s Loss of Reputation&lt;/a&gt; (Bhairav Acharya; The Wire; May 14, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-wire-may-16-2016-sumandro-chattapadhyay-and-aditya-garg-before-geospatial-bill-a-long-history-of-killing-the-map-in-order-to-protect-the-territory"&gt;Before Geospatial Bill: A Long History of Killing the Map in Order to Protect the Territory&lt;/a&gt; (Sumandro Chattapadhyay and Adya Garg; The Wire;&amp;nbsp;May 16, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/openness/protecting-the-territory-killing-the-map"&gt;Protecting the Territory, Killing the Map&lt;/a&gt; (Sumandro Chattapadhyay; The Wire; May 17, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that"&gt;Women's Safety? There is an App for That&lt;/a&gt; (Rohini Lakshané; Gender IT.org; May 19, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/b07b23b4db1fb30b28b47b1fb30b47-b13b21b3cb3fb06-b0fb28b38b3eb07b15b4db32b2ab3fb21b3cb3fb06-b09b07b15b3fb2ab3fb21b3cb3fb06-b2cb3fb15b3eb36-b2ab3eb07b01-b0fb15b3eb20b3f-b39b47b32b47-b2ab41b30b40b30-b1bb3eb24b4db30b1bb3eb24b4db30b40"&gt;ଇଣ୍ଟରନେଟରେ ଓଡ଼ିଆ ଏନସାଇକ୍ଲୋପିଡ଼ିଆ "ଉଇକିପିଡ଼ିଆ" ବିକାଶ ପାଇଁ ଏକାଠି ହେଲେ ପୁରୀର ଛାତ୍ରଛାତ୍ରୀ&lt;/a&gt; (Subhashish Panigrahi; YourStory Odia, May 20, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/a2k/blogs/dna-may-22-2016-subhashish-panigrahi-celebrating-13-years-of-kannada-language-wikipedia"&gt;Celebrating 13 Years of the Kannada-language Wikipedia&lt;/a&gt; (Subhashish Panigrahi; DNA; May 22, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/modi2019s-new-intellectual-property-rights-policy-will-only-benefit-players-with-deep-pockets"&gt;Modi’s New Intellectual Property Rights Policy Will Only Benefit Players with Deep Pockets&lt;/a&gt; (Anubha Sinha; May 28, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't have access to read printed materials due to some form of physical, sensory, 	cognitive or other disability. As part of our endeavour to make available accessible content for persons with disabilities, we are developing a text-to-speech software in 15 languages with support from the Hans Foundation. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a href="https://cis-india.org/accessibility/blog/May%20Report%202016.pdf" class="external-link"&gt;May 2016 Report&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;►Other&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/accessible-ict-procurement"&gt;Accessible ICT Procurement&lt;/a&gt; (Pranesh Prakash; May 9, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a 	grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS&amp;nbsp;gathered information from various educational institutions in response to several RTI applications. All of these have been published as different blog posts:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-jnu"&gt;MHRD IPR Chair Series: Information Received from JNU&lt;/a&gt; (Nehaa Chaudhari; May 15, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-iit-kharagpur"&gt;MHRD IPR Chair Series: Information Received from IIT, Kharagpur&lt;/a&gt; (Nehaa Chaudhari; May 15, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-nalsar"&gt;MHRD IPR Chair Series: Information Received from NALSAR&lt;/a&gt; (Nehaa Chaudhari; May 15, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-nujs"&gt;MHRD IPR Chair Series: Information Received from NUJS&lt;/a&gt; (Nehaa Chaudhari; May 15, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-delhi-university"&gt;MHRD IPR Chair Series: Information Received from Delhi University&lt;/a&gt; (Nehaa Chaudhari; May 15, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-iim-ahmedabad"&gt;MHRD IPR Chair Series: Information Received from IIM, Ahmedabad&lt;/a&gt; (Nehaa Chaudhari; May 17, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-iim-bangalore"&gt;MHRD IPR Chair Series: Information Received from IIM, Bangalore&lt;/a&gt; (Nehaa Chaudhari; May 21, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-nlu-jodhpur"&gt;MHRD IPR Chair Series: Information Received from NLU, Jodhpur&lt;/a&gt; (Nehaa Chaudhari; May 26, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-nlsiu"&gt;MHRD IPR Chair Series: Information Received from NLSIU&lt;/a&gt; (Nehaa Chaudhari; May 27, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-iit-kanpur"&gt;MHRD IPR Chair Series: Information Received from IIT, Kanpur&lt;/a&gt; (Nehaa Chaudhari; May 31, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Nisha S. Kumar assisted in the preparation of all these documents.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Participation in Event&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/national-conference-on-competition-ipr-in-ict-telecom-mobile-sets"&gt;National Confererence on Competition &amp;amp; IPR in ICT, Telecom and Mobile Sets&lt;/a&gt; (Organized by CMAI; May 18, 2016; Vigyan Bhawan, New Delhi). Rohini Lakshané and Anubha Sinha attended this conference.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Other Blog Entry&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/sectoral-innovation-councils-intellectual-property-rights-2013-rti-requests-dipp-responses"&gt;Sectoral Innovation Councils on Intellectual Property Rights – RTI Requests + DIPP Responses&lt;/a&gt; (Nehaa Chaudhari and Saahil Dama; May 21, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/images-and-links-matter-quality"&gt;Images and Links Matter Quality&lt;/a&gt; (Rahmanuddin Shaik; May 4, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/nvvchar-1500-dyk"&gt;Indian English Wikipedian Nvvchar completes 1500 Did You Know articles&lt;/a&gt; (Tito Dutta; May 9, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/blog-old/kannada-wikipedias-13-year-old-journey-of-knowledge-sharing"&gt;Celebrating the 13th anniversary of Kannada Wikipedia&lt;/a&gt; (Subhashish Panigrahi; May 19, 2016). Ananth Subray contributed to this blog.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;p&gt;►Freedom of Expression&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Submission and Comment&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards"&gt;Comments on Draft Electronic Health Records Standards&lt;/a&gt; (Amber Sinha; May 28, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/comments-on-the-draft-new-icann-bylaws"&gt;Submission by the Centre for Internet and Society on Draft New ICANN By-laws&lt;/a&gt; (Pranesh Prakash, Vidushi Marda, Udbhav Tiwari and Swati Muthukumar with inputs from Sunil Abraham; May 30, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/criminal-defamation-remains-and-so-does-the-debate"&gt;Criminal Defamation Remains and so does the Debate&lt;/a&gt; (Japreet Grewal; May 19, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/privacy-issues-with-drm"&gt;Privacy Issues with DRM&lt;/a&gt; (Jalaj Pandey; May 3, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Event Organized&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016"&gt;Understanding Aadhaar and its New Challenges&lt;/a&gt; (Organized by Centre for Studies in Science Policy, JNU and CIS; May 26 - 27, 2016; New Delhi). The event was supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science &amp;amp; Technology.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Announcement&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016"&gt;Call for Essays: Studying Internet in India&lt;/a&gt; (Sumandro Chattapadhyay; May 20, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/raw/new-modes-and-sites-of-humanities-practice"&gt;New Modes and Sites of Humanities Practice&lt;/a&gt; (P.P. Sneha; May 19, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending-summary"&gt;RBI Consultation Paper on P2P Lending: Summary&lt;/a&gt; (Pavishka Mittal; May 18, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending-legality-and-implications"&gt;RBI Consultation Paper on P2P Lending: Legality and Implications&lt;/a&gt; (Pavishka Mittal; May 23, 2016).&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/raw/rbi-consultation-paper-on-p2p-lending"&gt;RBI Consultation Paper on P2P Lending: Data Security and Privacy Concerns&lt;/a&gt; (Vipul Kharbanda; May 31, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from 	policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual 	property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), 	internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations 	of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify;"&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet 	and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at 	sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an 	indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, 	write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and 	support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 	Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/may-2016-newsletter'&gt;https://cis-india.org/about/newsletters/may-2016-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Newsletter</dc:subject>
    

   <dc:date>2016-06-10T19:34:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-draft-geospatial-information-regulation-bill-2016">
    <title>CIS's Comments on the Draft Geospatial Information Regulation Bill, 2016</title>
    <link>https://cis-india.org/internet-governance/blog/comments-draft-geospatial-information-regulation-bill-2016</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is alarmed by the Draft Geospatial Information Regulation Bill, 2016, and has recommended that the proposed law be withdrawn in its entirety.  It offered the following detailed comments as its submission.&lt;/b&gt;
        &lt;h1&gt;Comments on the Draft Geospatial Information Regulation Bill, 2016&lt;/h1&gt;
&lt;p&gt;by
&lt;em&gt;the Centre for Internet and Society&lt;/em&gt;&lt;/p&gt;
&lt;h2&gt;1. Preliminary&lt;/h2&gt;
&lt;p&gt;1.1. This submission presents comments and recommendations by the Centre for Internet and Society (“CIS”) on the &lt;a href="http://mha.nic.in/sites/upload_files/mha/files/GeospatialBill_05052016_eve.pdf"&gt;draft Geospatial Information Regulation Bill, 2016&lt;/a&gt; (“the draft bill” / “the proposed bill” / “the bill”).&lt;/p&gt;
&lt;h2&gt;2. Centre for Internet and Society&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from the perspectives of policy and academic research. The areas of focus include accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; This submission is consistent with CIS’ commitment to safeguarding the public interest, and particularly the representing the interests of ordinary citizens and consumers. The comments in this submission aim to further the principles of people’s &lt;em&gt;right to information&lt;/em&gt; regarding their own country, &lt;em&gt;openness-by-default&lt;/em&gt; in governmental activities, &lt;em&gt;freedom of speech and expression&lt;/em&gt;, and the various forms of &lt;em&gt;public good&lt;/em&gt; that can emerge from greater availability of &lt;em&gt;open (geospatial) data&lt;/em&gt; created by both public and private agencies, and the &lt;em&gt;innovations&lt;/em&gt; made possible as a result.&lt;/p&gt;
&lt;h2&gt;3. Comments&lt;/h2&gt;
&lt;h3&gt;3.1. General Remarks&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; While CIS welcomes the intentions of the government to prevent use of geospatial information to undermine national security, the proposed bill completely fails to do so, infringes upon Constitutional rights, harms innovation, undermines the national initiatives of Digital India and Startup India, is completely impractical and unworkable, and it will lead to a range of substantial harms if the government actually seeks to enforce it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; There are already laws in place that prevent the use of geospatial information to undermine national security.  For instance, the &lt;a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf"&gt;Official Secrets Act, 1923&lt;/a&gt; (“OSA”) already contains provisions — sections 3(2)(a), (b), and (c) — all of which would prevent a person from creating maps that undermine national security and would penalise their doing so. Section 5 of the OSA contains multiple provisions that penalise the possession and communication of maps that undermine “national security.” The penalties under the OSA range from imprisonment of up to 3 years all the way to imprisonment up to 14 years. Given this, there is absolutely no need to create yet another law to deal with maps that undermine “national security.” Indeed, it is the government’s stated policy to reduce the number of laws in India, whereas the proposed bill introduces a redundant new law that adds multiple layers of bureaucracy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.3.&lt;/strong&gt; The &lt;a href="http://surveyofindia.gov.in/files/nmp/National%20Map%20Policy.pdf"&gt;National Mapping Policy, 2005&lt;/a&gt;, already puts in place restrictions on wrongful depictions of India’s international boundaries, and as we explain below in section 3.4 of this document, even the National Mapping Policy is over-broad. Even if the government wishes to provide statutory backing to the policy, it should be a very different law that is far more limited in scope, and restricts itself to criminalising those who misrepresent India’s international boundary with an intention to mislead people into thinking that that is the official boundary of India as recognised by the Survey of India. CIS would support a law of such limited scope and mandate, provided it has an appropriate penalty.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.4.&lt;/strong&gt; There would be much utility in a law that creates a duty on the Survey of India to make available, in the form of an open standard, an official electronic version of the maps that it creates, and expressly allows and encourages citizens and startups to reuse such official maps, however the Ministry of Home Affairs would not be the nodal ministry for such a law.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.5.&lt;/strong&gt; &lt;strong&gt;We recommend that the proposed law be scrapped in its entirety.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.6.&lt;/strong&gt; We additionally provide an alternative manner of reducing the harms caused by this bill, in our comments below.  By no means should these further comments be seen as a repudiation of our above position, since we do not feel the proposed bill, even with the inclusion of all of our recommendations, would truly further its stated aims.  All our below recommendations would do is to reduce the bill’s harmful, and often unintended, consequences.&lt;/p&gt;
&lt;h3&gt;3.2. Definition of “Geospatial Information” is over-broad, all- encompassing&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; The second part of the definition of “geospatial information” refers to all “graphic or digital data depicting natural or man-made physical features, phenomenon or boundaries of the earth or any information related thereto” that are “referenced to a co-ordinate system and having attributes.” (Section 2(1)(e)) As per the definition, this will include all geo-referenced information, and data, that is produced by everyday users as an integral part of various everyday uses of digital technologies. This will also include geo-referenced tweets and messages, location of public and private vehicles shared in the real-time with agencies tracking their location (from public transport authorities, to insurance agencies, etc.), location data of mobile phones collected and used by telecommunication service providers, location of mobile phones shared by the user with various kinds of service providers (from taxi companies to delivery agencies), etc.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.2.&lt;/strong&gt; We recommend that instead of regulating all kinds of geospatial information, and giving rise to a range of possible harms, the draft bill be revised to specifically address “sensitive geospatial information,” defined as geospatial information related to the “Prohibited Places” as defined in the Official Secrets Act 1923 (section 2(8)) which will allow the bill to effectively respond to its key stated concerns of ensuring “security, sovereignty and integrity of India.” Since the National Map Policy defines “Vulnerable Points” and “Vulnerable Areas” (para 3(b)) as the two main types of geospatial units associated with “Prohibited Places”, these terms should also be referred to in the revised version of the draft bill.&lt;/p&gt;
&lt;h3&gt;3.3. Unreasonable regulation of acquiring and end-use of geospatial information&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; Section 3 of the draft bill states that “[s]ave as otherwise provided in this Act, rules or regulations made thereunder, or with the general or special permission of the Security Vetting Authority, no person shall acquire geospatial imagery or data including value addition” and “[e]very person who has already acquired any geospatial imagery or data ... including value addition prior to coming of this Act into effect, shall within one year from the commencement of this Act, make an application alongwith requisite fees to the Security Vetting Authority.” This effectively makes it illegal to acquire and maintain ownership of geospatial information that has not been subjected to security vetting.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; This draft bill doesn’t apply just to geospatial information that may undermine national security but covers all manners of geospatial information and modern geospatial technologies embedded in everyday digital devices and intimately connected to various electronic products and services, from cars to mobile phones, result in the creation and acquiring of various kinds of geo-referenced information, ranging from the geo-referenced photographs to locations shared with friends. Even ordinary users who are unknowingly looking at maps that contain sensitive geospatial information, which are illegal under the Official Secrets Act, are committing an illegal act under the draft bill, because the users temporarily acquires such sensitive geospatial information in her/his digital device, as part of the very act of browsing the map concerned. This clearly cannot be the intention of the bill. Thus we recommend deletion of the word “acquire.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.3.&lt;/strong&gt; Further, the insertion of the phrase “including value addition” in both Section 3(1) and 3(2) appears to suggest that all users who have created derivative products using geospatial information that includes sensitive data (that is data related to Prohibited Places) may be held liable under this draft bill, even if these users have not themselves collected or created such sensitive geospatial information, which was part of the original geospatial information published by the source map agency. This too cannot be the intention of the bill. Thus, we recommend deletion of the phrase “including value addition.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.4.&lt;/strong&gt; In the definition of the “Security Vetting of Geospatial Information” itself, it is mentioned that the process will include “screening of the credentials of the end-users and end-use applications, with the sole objective of protecting national security, sovereignty, safety and integrity.” (Section 2(1)(o)) This appears to indicate that all end-users of all electronic and analog services and products using geospatial information will have to be individually vetted before such services and products are used, which would cover a large proportion of the Indian population. This imposes an enormous and impractical burden on the Indian digital economy in particular, and the entire national economy in general, without improving national security. This too cannot be the intention of the draft bill. Thus, we recommend deletion of this phrase, and ensure that end users are not covered by the law.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.5.&lt;/strong&gt; Given these specific characteristics of how modern geospatial technologies work, and how they provide a basis for various kinds of everyday use of electronic products and services, we would like to submit that the regulatory focus should be on large-scale and/or commercial dissemination, publication, or distribution of geospatial information, and not on the acts of acquiring, possessing, sharing, and using geospatial information. Further, the regulation in general should be aimed at the party owning the geospatial information in question, and not at the parties involved in its dissemination (say, Internet Service Providers) or in its generation or use (say, end-users).&lt;/p&gt;
&lt;h3&gt;3.4. Removal of journalistic, political, artistic, creative, and speculative depictions of India from the scope of Section 6&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; Section 6 of the draft bill states that “[n]o person shall depict, disseminate, publish or distribute any wrong or false topographic information of India including international boundaries through internet platforms or online services or in any electronic or physical form.” Section 15 imposes a penalty for such wrong depiction of maps of India.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; Depictions of India, which do not purport to accurately represent the international boundaries as recognised by the Indian government should not be penalised.  For instance, a map published in a newspaper article about India’s border disputes that shows the incorrect claims that the Chinese government has made over Indian territory would also be penalised as “wrong or false topographic information of India”, since there is a clear intention to depict the boundary as claimed by China.  Criminalising such journalism cannot be the legitimate intent of such a provision.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; There are numerous instances which have been willfully depicting inaccurate and inauthentic maps of India with international borders for political ends. For instance, there are often depictions of India which show territories within present day Pakistan, Bangladesh, Bhutan, Nepal and Sri Lanka as part of an “Akhand Bharat.” Depictions of this sort should not be penalised. In doing so, would contradict the freedom of expression guaranteed under Article 19(1)(a) without being a reasonable restriction under Article 19(2).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.4.&lt;/strong&gt; Even depictions of India for purposes of speculative fiction would be penalised under this proposed bill unless they depict the official borders. This is clearly undesirable and would not be allowed as a reasonable restriction under Article 19(2).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;*3.4.5.&lt;/em&gt;&lt;/strong&gt;* Even geography students in schools and colleges who mis-draw the official map of India would be liable to penalties under the draft bill. This plainly, cannot be the intention of the drafters of this bill. The creator of a rough and inaccurate tourist map of an Indian city can also be identified as committing a criminal act under the proposed bill as she would be depicting “… wrong or false topographic information of India …”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.6.&lt;/strong&gt; In brief: Merely depicting, disseminating, publishing or distributing any “wrong or false topographic information of India” should not be penalised. unless a person publishes and widely circulates an incorrect map of India while claiming that that represents the official international boundaries of India, such should not be penalised.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.7.&lt;/strong&gt; CIS recommends that the bill should instead state: “No person shall depict, disseminate, publish, or distribute any topographic information purporting to accurately depict the international boundaries of India as recognised by the Survey of India unless he is authorised to do so by the Surveyor General of India; provided that usage by any person of the international boundaries as is electronically and in print made available by the Survey of India shall deemed to be usage that is authorised by the Surveyor General of India.”&lt;/p&gt;
&lt;h3&gt;3.5. Absence of Publicly Available and Openly Reusable Standardised National Boundary of India&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.5.1.&lt;/strong&gt; Given the lack of an reusable versions of maps of India, including of India’s official boundary as recognised by the Survey of India, it becomes impossible for people to accurately depict the boundary of India. We recommend that the bill requires the Survey of India to publish all  “Open Series Maps,”as defined in the National Mapping Policy, 2005, including maps depicting the official international and subnational political and administrative boundaries of India, using open geospatial standards and under an open licence allowing such geospatial data to be used by citizens and all companies.&lt;/p&gt;
&lt;h3&gt;3.6. Remove Requirement for Prior License for Acquire, Dissemination, Publication, or Distribution of Geospatial Information&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.6.1.&lt;/strong&gt; Section 9 of the draft bill refers to “any person who wants to acquire, disseminate, publish, or distribute any geospatial information of India” (emphasis added), which can be interpreted as the need for a prior license before any person decides to acquire (including creation, collection, generation, and buying) geospatial information. This creates at least two problems:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;modern digital geospatial technologies have enabled everyday digital devices (like smartphones) to instantaneously acquire, disseminate, publish, and distribute geospatial information all the time when the person holding that device is looking at online digital maps, say Google Maps, or sharing location with their friends, online platforms and services and service providers (both local and foreign); and&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;the requirement of prior license involves payment of a “requisite fees” to the Security Vetting Authority, which may act as an arbitrary (since the fee might be based upon the volume of geospatial information to be acquired that one may not know fully determine before acquiring) and effective barrier to acquiring, dissemination, publication, or distribution of geospatial information even if it does not violate the concerns of “security, sovereignty, and integrity” in any manner. This requirement also impedes competition in the market, because new entrants to the geospatial industry may not have enough upfront capital to procure licenses.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;3.6.2.&lt;/strong&gt; Further, the requirement of necessary prior license for acquiring geospatial information does not seem to be a crucial component of the security vetting process, since the geospatial information, once acquired by the agency concerned, is in any case directed to be shared with the Security Vetting Authority for undertaking necessary expunging of sensitive or incorrect information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.3.&lt;/strong&gt; We recommend revision of this section so that no prior license and/or permission is required for collection, acquiring, distribution, and/or use of geospatial information; instead, a framework may be established for monitoring of published geospatial information for purposes of ensuring geospatial information pertaining to “Prohibited Places,” as defined under the Official Secrets Act, is not made available to the general public by any person or entity under Indian jurisdiction, including, for instance, Indian subsidiaries and branches of foreign corporations.. Such a framework must not address the end-user of such geospatial information, but its publishers.&lt;/p&gt;
&lt;h3&gt;3.7. Unenforceable jurisdictional scope&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.7.1.&lt;/strong&gt; Section 5 of the draft bill states “[s]ave as otherwise provided in any international convention, treaty or agreement of which India is signatory or as provided in this Act, rules or regulations made thereunder, or with the general or special permission of the Security Vetting Authority, no person shall, in any manner, make use of, disseminate, publish or distribute any geospatial information of India, outside India, without prior permission from the Security Vetting Authority.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.7.2.&lt;/strong&gt; In compliance with this section, domestic and foreign companies and platforms will be required to obtain permission from the Security Vetting Authority of India prior to publishing, distributing etc. geospatial information. Similarly in the preliminary, the draft bill holds in person who commits an offence beyond India under the scope of the bill. The bill is thus proposing extraterritorial applicability of its provisions, yet the extent and method of enforcement of the same on other jurisdictions are kept unclear.&lt;/p&gt;
&lt;h3&gt;3.8. Negative implications for rights of citizens&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.8.1.&lt;/strong&gt; There are a number of sections in the draft bill which have negative implications for the rights of all users and potentially impinge on the constitutional rights of Indian citizens. These include:&lt;/p&gt;
&lt;p&gt;a. Section 18(2) which empowers the Enforcement Authority to conduct a search without a judicial search order;&lt;/p&gt;
&lt;p&gt;b. Section 17(3) which empowers the Enforcement Authority to conduct undefined surveillance and monitoring to enforce the Act;&lt;/p&gt;
&lt;p&gt;c. Chapter (V) which penalises individuals with Rs. 1-100 Crores and/or seven years in prison for an offence under the act;&lt;/p&gt;
&lt;p&gt;d. Section 22 which allows the government to take ownership of a person’s  land if a financial penalty has not been paid;&lt;/p&gt;
&lt;p&gt;e. Section 30(1) which holds, in the case of the offense being committed by a company, every person in charge of and responsible for the conduct of business of the company, guilty and liable.&lt;/p&gt;
&lt;h3&gt;3.9. Overly broad powers and responsibilities of the Apex Committee and Enforcement  Authority, and lack of adequate oversight&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.9.1.&lt;/strong&gt; Section 7(2) states that “[t]he Apex Committee shall do all such acts and deeds that may be necessary or otherwise desirable to achieve the objectives of the Act, including the following functions:...” The wording in this section is broad and open ended, and allows for the responsibilities of the Apex Committee to be expanded without clear oversight of such expansion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.2.&lt;/strong&gt; Similarly, section 17 established an “Enforcement Authority” for the purpose of carrying out surveillance and monitoring for enforcement of the draft bill. The Authority has been given a number of powers including the power of inquiry, the power to adjudicate, and the power to give directions. These powers have direct implications on the rights of individuals, yet the Authority is not subject to oversight or accountability requirements.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.3.&lt;/strong&gt; We recommend that the powers and responsibilities of the Apex Committee and Enforcement Authority are narrowly defined in the draft bill itself, limited by the principle of necessity, and subject to independent oversight and accountability requirements.&lt;/p&gt;
&lt;h3&gt;3.10. Remove the Security Vetting Authority’s power of delegation&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.10.1.&lt;/strong&gt; Section 8(3) allows the Security Vetting Authority to delegate to any constituent member of the Authority, other subordinate committee, or officer powers and functions as it may deem necessary except the power to grant a licence. In practice, this will allow security vetting to be done by another institution and risks potential involvement of private agencies and/or quasi-governmental bodies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.10.2.&lt;/strong&gt; We recommend that the power of delegation should not be granted to the Security Vetting Authority.&lt;/p&gt;
&lt;h3&gt;3.11. Negative implications for innovation and India’s digital economy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.11.1.&lt;/strong&gt; Section 3 of the draft bill states “[s]ave as otherwise provided in this Act, rules or regulations made thereunder, or with the general or special permission of the Security Vetting Authority, no person shall acquire geospatial imagery or data including value addition of any part of India either through any space or aerial platforms such as satellite, aircrafts, airships, balloons, unmanned aerial vehicles or terrestrial vehicles, or any other means whatsoever”. This effectively ensures that each and every user of geospatial data, products, services, and solutions — since all of these either include or are derivatives of geospatial information — would require prior permission from the Security Vetting Authority. This will substantially affect the existing and emerging digital economy in particular, and the entire economy in general.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.2.&lt;/strong&gt; Further, Section 9 of the draft bill mandates that any person submitting an application for geospatial information to be vetted must pay a fee. As the provisions of the bill mandate that users approach the Security Vetting Authority for license to use geospatial information, this will impose an immense burden on all users of digital devices in and outside of India. CIS submits that imposition of this fee for security vetting be removed.&lt;/p&gt;
&lt;h3&gt;3.12. Disproportionate penalty for acquisition of geospatial information&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.12.1.&lt;/strong&gt; Section 12 states that “&lt;em&gt;[p]enalty for illegal acquisition of geospatial information of India.- Whoever acquires any geospatial information of India in contravention of section 3, shall be punished with a fine ranging from Rupees one crore to Rupees one hundred crore and/or imprisonment for a period upto seven years&lt;/em&gt;.” Seven years in prison is disproportionate to the offense of acquiring geospatial information without vetting by the authority concerned. This is particularly true given the broad and all-encompassing definition of “geospatial information” in the draft bill, and the fact that the bill applies to individuals and companies both within and outside of India.&lt;/p&gt;
&lt;h3&gt;3.13. Improper and inconsistent usage of terms in the draft bill&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.13.1.&lt;/strong&gt; Section 4 of the draft bill regulates the visualization, publication, dissemination and distribution of geospatial information of India, while section 5 regulates use, dissemination, publication, and distribution of geospatial information outside of India. The definition of “visualization” remains unclear, and the act is only regulated in section 4. The section 6 of the draft bill uses the term ‘depict’, which is undefined as well. We submit that in this context terms are interchangeable, and the draft bill should either define them expressly to avoid ambiguity in interpretations, or consistently use only one throughout the draft bill.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.2.&lt;/strong&gt; Section 11 (3) of the draft bill requires licensees to “[d]isplay the insignia of the clearance of the Security Vetting Authority on the security-vetted geospatial information by appropriate means such as water-marking or licence as relevant, while disseminating or distributing of such geospatial information.” We observe that geospatial information includes graphical representation, location coordinates, inter alia. While the former may be represented visually on an “as is” basis after the completion of the vetting, the latter may be used to perform other complex functions at the “back-end” (i.e., vendor-facing side) in various technologies. Water-marking and/or displaying of insignia would place undue burden on the licensee, depending on the kind of platform, service, or individual.&lt;/p&gt;
&lt;h3&gt;3.14. Lack of reference to technical implementation guidance&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.14.1.&lt;/strong&gt; The regulation, harmonisation, and standardisation of the collection, generation, dissemination etc. of geospatial information is a complex process that goes beyond a process of security vetting and that will require extensive technical implementation guidance from the government. At a minimum this could include quality assurance considerations and standard operating procedures, yet the draft bill makes no reference to the need for technical standards or guidance.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comments prepared by Sumandro Chattapadhyay, Adya Garg, Pranesh Prakash, Anubha Sinha, and Elonnai Hickok.&lt;/em&gt;
&lt;em&gt;Submitted by the Centre for Internet and Society, on June 3, 2016.&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-draft-geospatial-information-regulation-bill-2016'&gt;https://cis-india.org/internet-governance/blog/comments-draft-geospatial-information-regulation-bill-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Geospatial Information Regulation Bill</dc:subject>
    
    
        <dc:subject>Geospatial Data</dc:subject>
    
    
        <dc:subject>National Geospatial Policy</dc:subject>
    

   <dc:date>2016-06-05T15:06:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/internet-l-w">
    <title>Internet L@w</title>
    <link>https://cis-india.org/internet-governance/news/internet-l-w</link>
    <description>
        &lt;b&gt;Vanya Rakesh will attend the Internet law course organized by the University of Geneva from 20 June 2016 to 1 July 2016 as part of the Geneva Summer School. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Study Internet Law in Geneva, where the World Wide Web was born!&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Topics that will be covered include cybersecurity, digital privacy and online surveillance, free speech, consumer protection, legal issues of social media, dangers of cloud computing, Internet and telecom infrastructure, intellectual property, antitrust, and much more...&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a unique opportunity to gain hands-on experience in the framework of an Internet law clinic and to discuss cutting edge Internet law and policy issues with academics, practitioners, representatives of global policy makers, international organizations and leading institutions, including the &lt;a href="https://cyber.law.harvard.edu/" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Berkman Center for Internet and Society at Harvard University&lt;/span&gt;&lt;/a&gt;, the &lt;a href="http://www.itu.int/en/Pages/default.aspx" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;International Telecommunication Union&lt;/span&gt;&lt;/a&gt; (ITU) and the &lt;a href="http://www.wipo.int/portal/en/" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;World Intellectual Property Organization&lt;/span&gt;&lt;/a&gt; (WIPO).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For its first and second sessions (in June 2014 and 2015), the Internet l@w summer school welcomed participants from very diverse background and countries including Argentina, China, Egypt, Germany, India, Italy, Lithuania, Ukraine and the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discover an international city in the heart of Europe. Participate in an exciting social programme, including excursions and social gatherings, and build a global network of new friends as well as of Internet law and policy experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A video testimony of participants to the 2014 edition &lt;a href="https://www.youtube.com/watch?v=wtXY7p6GEvg" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;is available here&lt;/span&gt;&lt;/a&gt;!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Equivalence of 6 ECTS credits.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;Please note: Changes to the draft program may be made at any time prior to the start of the course.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More Info, &lt;a class="external-link" href="https://www.genevasummerschools.ch/courses/courses-2016/internet-law"&gt;click here&lt;/a&gt;.&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/internet-l-w'&gt;https://cis-india.org/internet-governance/news/internet-l-w&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-30T02:07:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme">
    <title>CPRsouth 2016 – Young Scholars Programme</title>
    <link>https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme</link>
    <description>
        &lt;b&gt;Rohini Lakshané, Amber Sinha and Vidushi Marda have been selected to attend the two-day Young Scholars' Programme to be held in Zanzibar, Tanzania in early September this year. The programme is a part of the CPRSouth conference.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original announcement published by CPRSouth &lt;a class="external-link" href="http://www.cprsouth.org/cprsouth-2016-young-scholars-programme/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following highly successful joint Afro-Asian CPR conferences in Mauritius in 2012, and India in 2013, CPRafrica and CPRsouth formally merged under the banner of CPRsouth in 2014. Since then, CPRsouth has hosted conferences in the Cradle of Humankind in South Africa (2014), and at the Innovation Center for Big Data and Digital Convergence at Yuan Ze University, Taiwan (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s conference is co-hosted by&lt;em&gt; COSTECH &lt;/em&gt;and&lt;em&gt; TCRA &lt;/em&gt;in Zanzibar, and will include sessions on cutting-edge developments on ICT policy and regulation in the South and discussion of the research-policy interface.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30 Young Scholars from Africa and the Asia-Pacific region will be selected to participate in a tutorial programme taught by recognised scholars and practitioners from Africa and Asia, and they will attend the main conference thereafter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Tutorials are scheduled to be held on the 6&lt;sup&gt;th&lt;/sup&gt; and 7&lt;sup&gt;th&lt;/sup&gt; of September 2016, prior to the main CPR&lt;em&gt;south&lt;/em&gt; conference.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; Who will qualify?&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Masters/PhD students in Economics, Public policy, Communications and Journalism&lt;/li&gt;
&lt;li&gt;Officers of government/regulatory agencies undertaking ICT policy research, developing/gathering indicators (monitoring and evaluation)&lt;/li&gt;
&lt;li&gt;Staff of private companies in the communication industries working in regulatory affairs&lt;/li&gt;
&lt;li&gt;Officers in NGOs/INGOs working in policy and regulation&lt;/li&gt;
&lt;li&gt;Researchers from think tanks, university research centres&lt;/li&gt;
&lt;li&gt;Journalists covering communication public policy and regulation&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Seminar&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seminar will cover a number of topics of the two days, such as:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;policy analysis using supply-side or demand-side data;&lt;/li&gt;
&lt;li&gt;ICT impact analysis;&lt;/li&gt;
&lt;li&gt;convergence, net neutrality;&lt;/li&gt;
&lt;li&gt;funding broadband network extension, open access networks, spectrum;&lt;/li&gt;
&lt;li&gt;sector and competition regulation;&lt;/li&gt;
&lt;li&gt;research to policy interventions;&lt;/li&gt;
&lt;li&gt;Internet governance – privacy, surveillance, human rights online; and&lt;/li&gt;
&lt;li&gt;introduction to big data, open data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;(2016 tutorial programme still to be confirmed)&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous tutorial presentations can be accessed at &lt;a href="http://www.cprsouth.org/"&gt;&lt;span style="text-decoration: underline;"&gt;http://www.cprsouth.org/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application deadline: 22 April 2016&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Application guidelines&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://form.myjotform.com/60813291616555" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Applications should be submitted via this link&lt;/span&gt;&lt;/a&gt; by 22 April 2016, and must contain the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;one-page curriculum vitae; and&lt;/li&gt;
&lt;li&gt;one-page write-up outlining why you wish to become an African or Asia-Pacific based expert capable of contributing to ICT related policy and regulatory reform in the region&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Applicants’ &lt;strong&gt;write-ups and biographies should be in a single word document&lt;/strong&gt;, and named: CPRsouth2016_YoungScholar_ApplicantLastName.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;em&gt;Kindly note:&lt;/em&gt;&lt;/strong&gt;&lt;strong&gt; Late applications and applications that do not conform to the prescribed format above will automatically be disqualified.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Review Criteria&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Applications will be reviewed according to the following criteria:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;content of application;&lt;/li&gt;
&lt;li&gt;evidence of interest in, and commitment to, policy-relevant research for Africa or the Asia-Pacific region;&lt;/li&gt;
&lt;li&gt;quality of writing; and&lt;/li&gt;
&lt;li&gt;gender and country representation&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The selection committee may contact your supervisor or mentor before making the final selections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Candidates selected to participate in the tutorial programme must:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;provide a one-page research proposal &lt;em&gt;upon acceptance onto the tutorial programme&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;participate in all tutorial sessions&lt;/li&gt;
&lt;li&gt;participate in the entire CPR&lt;em&gt;south&lt;/em&gt; 2016 conference&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Funding&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Selected young scholars who are passport holders of, and travelling from, low and middle income countries within the Asia Pacific and Africa (as classified by the World Bank http://data.worldbank.org/about/country-classifications/country-and-lending-groups#Low_income) will be provided with:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;lowest-cost economy airfare to conference destination (less USD 150 registration fee);&lt;/li&gt;
&lt;li&gt;ground transfers between the conference venue and airport; and&lt;/li&gt;
&lt;li&gt;twin sharing accommodation on bed and breakfast basis, 5 lunches and 1 dinner for the duration of the conference and tutorials (6 – 10 September 2016). &lt;em&gt;Not all meals are covered.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The registration fee for young scholars to attend the conference and tutorials is USD150, and airfares will be reimbursed less this registration fee.  Participants will be required to cover:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;transport to and from airports in their home countries;&lt;/li&gt;
&lt;li&gt;visa fees (if any);&lt;/li&gt;
&lt;li&gt;meals not provided; and&lt;/li&gt;
&lt;li&gt;any other incidental costs&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;As the registration fee is so low and should be met personally even if there is no institutional support for attendance of the course and conference, please note that only under exceptional circumstances of extreme financial hardship may the organisers consider a waiver of the conference registration fee. Such waivers will be considered on a case-by-case basis and only where a scholar would otherwise be prevented from attending the YS programme and conference.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Visas&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Letters of invitation will be provided for purposes of visa applications after participant selections have been made. Participants are responsible for securing their own visas to enter Tanzania, and are strongly advised to initiate visa approval procedures immediately on receipt of confirmation of their participation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kindly direct all enquiries to Ondine Bello: admin@researchictafrica.net  orinfo@CPRsouth.org&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme'&gt;https://cis-india.org/internet-governance/news/cprsouth-2016-2013-young-scholars-programme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2016-05-30T02:01:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016">
    <title>Understanding Aadhaar and its New Challenges, May 26-27, 2016</title>
    <link>https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016</link>
    <description>
        &lt;b&gt;A workshop on “Understanding Aadhaar and its New Challenges” is being organised by the Centre for Studies in Science Policy, Jawaharlal Nehru University, and the Centre for Internet and Society, during May 26-27. It is also supported by the Centre for Communication Governance at NLU Delhi, Free Software Movement of India, Knowledge Commons, PEACE, and Center for Advancement of Public Understanding of Science &amp; Technology. This is a legal and technical workshop to be attended by various key researchers and practitioners to discuss the current status of the implementation of the project, in the context of the passing of the Act and the various ongoing cases.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h1&gt;Workshop Programme&lt;/h1&gt;
&lt;h3&gt;First Day, May 26&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00-9:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-10:00&lt;/td&gt;
&lt;td&gt;Prof. Dinesh Abrol - &lt;em&gt;Welcome&lt;/em&gt;&lt;br /&gt;Self-introduction and expectations of participants&lt;br /&gt;Dr. Usha Ramanathan - &lt;em&gt;Overview of the Workshop&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Current Status of Aadhaar&lt;/strong&gt;&lt;br /&gt;Dr. Usha Ramanathan, Legal Researcher, New Delhi - &lt;em&gt;What the 2016 Law Says, and How it Came into Being&lt;/em&gt;&lt;br /&gt;S. Prasanna, Advocate, New Delhi - &lt;em&gt;Status and Force of Supreme Court Orders on Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Direct Benefits Transfers&lt;/strong&gt;&lt;br /&gt;Prof. Reetika Khera, Indian Institute of Technology, Delhi - &lt;em&gt;Welfare Needs Aadhaar like a Fish Needs a Bicycle&lt;/em&gt;&lt;br /&gt;Prof. Ram Kumar, Tata Institute of Social Sciences, Mumbai - &lt;em&gt;Aadhaar and the Social Sector: A critical analysis of the claims of benefits and inclusion&lt;/em&gt;&lt;br /&gt;Ashok Rao, Delhi Science Forum - &lt;em&gt;Cash Transfers Study&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Science, Technology, and Security&lt;/strong&gt;&lt;br /&gt;Prof. Subashis Banerjee, Deptt of Computer Science &amp;amp; Engineering, IIT, Delhi - &lt;em&gt;Privacy and Security Issues Related to the Aadhaar Act&lt;/em&gt;&lt;br /&gt;Pukhraj Singh, former National Cyber Security Manager, Aadhaar, New Delhi - &lt;em&gt;Aadhaar: Security and Surveillance Dimensions&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00-16:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar - International Dimensions&lt;/strong&gt;&lt;br /&gt;Prof. Chinmayi Arun, Center for Communication Governance, National Law University, Delhi - &lt;em&gt;Biometrics and Mandatory IDs in other parts of the world&lt;/em&gt;&lt;br /&gt;Dr. Gopal Krishna, Citizens Forum for Civil Liberties - &lt;em&gt;International Dimensions of Aadhaar
&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;High Tea&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00-19:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Second Day, May 27&lt;/h3&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30-11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy, Surveillance, and Ethical Dimensions of Aadhaar&lt;/strong&gt;&lt;br /&gt;Prabir Purkayastha, Free Software Movement of India, New Delhi - &lt;em&gt;Surveillance Capitalism and the Commodification of Personal Data&lt;/em&gt;&lt;br /&gt;Arjun Jayakumar, SFLC - &lt;em&gt;Surveillance Projects Amalgamated&lt;/em&gt;&lt;br /&gt;Col Mathew Thomas, Bengaluru
 - &lt;em&gt;The Deceit of Aadhaar&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30-10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - I&lt;/strong&gt;&lt;br /&gt;Prof. G Nagarjuna, Homi Bhabha Center for Science Education, Tata Institute of Fundamental Research, Mumbai - &lt;em&gt;How to prevent linked data in the context of Aadhaar&lt;/em&gt;&lt;br /&gt;Dr. Anupam Saraph, Pune - &lt;em&gt;Aadhaar and Moneylaundering&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Video Presentations&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30-14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30-15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Aadhaar: Broad Issues - II&lt;/strong&gt;&lt;br /&gt;Prof. MS Sriram, Visiting Faculty, Indian Institute of Management, Bangalore - &lt;em&gt;Financial lnclusion&lt;/em&gt;&lt;br /&gt;Nikhil Dey, MKSS, Rajasthan (TBC) - &lt;em&gt;Field witness: Technology on the Ground&lt;/em&gt;&lt;br /&gt;Prof. Himanshu, Centre for Economic Studies &amp;amp; Planning, JNU - &lt;em&gt;UID Process and Financial Inclusion&lt;/em&gt;&lt;br /&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-16:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016'&gt;https://cis-india.org/internet-governance/events/understanding-aadhaar-and-its-new-challenges-may-26-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-05-26T10:29:43Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that">
    <title>Women's Safety? There is an App for That</title>
    <link>https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that</link>
    <description>
        &lt;b&gt;“After locking ourselves in a room for more than 6 days, this is what we came out [sic] with. Join us in helping make WOMEN feel SAFE,” read a gloating press release about a smartphone app for women to notify their near ones that they were in distress. It was one among many such PRs frequently landing in my mailbox after the rape and murder of a young student on board a private bus in Delhi in 2012. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rohini Lakshané was &lt;a class="external-link" href="http://www.genderit.org/node/4744/"&gt;published in Gender IT.org&lt;/a&gt; on May 19, 2016. This was also mirrored by &lt;a class="external-link" href="http://feminisminindia.com/2017/01/09/womens-safety-mobile-apps/"&gt;Feminism in India&lt;/a&gt; on January 9, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The incident had spurred protests across the country and made international headlines. Along with all this came a slew of new “women’s safety” apps. Existing ones, many of which had fizzled out, were conveniently relaunched. My own experience of user-testing such apps in India back then was that they were unreliable at best and dangerously counterproductive at worst. Some of them were endorsed by governments and celebrities and ended up being glorified despite their flaws, their technical and systemic handicaps never acknowledged at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are myriad mobile phone apps meant to be deployed for personal safety, but their basic functioning is more or less the same: the user activates the app (by pressing a button, shaking the device or similar cue), which sends a distress message containing the users’ location to pre-defined contacts. Some apps include additional artefacts such as a short audio or video recording of the situation. Some others augment this mechanism by alerting the police and other agencies best placed to respond to the emergency. For example, the Companion app for students living on campus notifies the university along with police. The &lt;a href="https://newsroom.uber.com/india/introducing-an-integrated-sos-alert-solution-for-law-enforcement/"&gt;&lt;span style="text-decoration: underline;"&gt;SOS buttons in taxi-hailing apps such as Uber&lt;/span&gt;&lt;/a&gt; enable the user’s contacts to follow the cab’s GPS trail and notify them and the cab company’s “incident response team” of emergencies. Apps such as Kitestring would treat the lack of the user’s response within a time-window as the trigger for a distress message. All their technical wizardry perhaps makes it easy to lose sight of the fact that technology is not a saviour but a tool or an enabler, that technology alone cannot be the panacea of a problem that is deeply complex and, in reality, rooted in society and governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government announced last month that every phone sold in the country from January 2017 should be equipped with a &lt;a href="http://www.bbc.com/news/technology-36139985"&gt;&lt;span style="text-decoration: underline;"&gt;panic button that sends distress flares to the police and a trusted set of contacts&lt;/span&gt;&lt;/a&gt;. Nearly half the phones sold in India &lt;a href="http://www.idc.com/getdoc.jsp?containerId=prSG25827215"&gt;&lt;span style="text-decoration: underline;"&gt;cost USD 100 or less&lt;/span&gt;&lt;/a&gt;. Prices are kept so low by sacrificing features and the quality of the hardware; there are a lot of phones with substandard GPS modules, poor touchscreens, slow processors, bad cameras, tiny memory, and dismal battery life. They run on different versions of different operating systems, some of them outdated. All of these factors would determine if someone is able to use the app at all and how quickly they and their phone would be able to respond to an emergency. Additionally, mobile phone signals become thin or shaky in areas with a high number of users and buildings located cheek-by-jowl. Even when the mobile hardware is good and the mobile signal usable, GPS accuracy can be spotty and constant location tracking would hog battery. These issues would affect the efficacy of any app. Besides, there is too much uncertainty for an app developer to factor in. (Two years ago, I learnt about an app called Pukar, then operational in collaboration with police departments in four cities in India. Pukar solved the problem of potential inaccuracy of the GPS location by getting the user’s contacts to tell the police where the person in distress might be.) Designing a one-size-fits-all safety app is almost impossible. The app that rings a loud alarm when triggered may save someone’s life or spoil the chances of someone who is trying to get help while hiding. Different people may be vulnerable to different kinds of distress situations and an app can at best be optimised for some target user groups.&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;An app that does not work in tandem with existing machinery for law enforcement and public safety is a bad idea.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In the end, the “technical” problems may actually be problems of economic disparity. Making it mandatory for people to own phones equipped with certain hardware or requiring them to upgrade to more reliable devices would drive the phones out of the financial reach of many. Indian manufacturers have expressed concerns that the proposed &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Panic-button-GPS-feasible-within-the-deadline-but-will-raise-costs/articleshow/51998103.cms"&gt;&lt;span style="text-decoration: underline;"&gt;panic button would raise costs for them as well the end buyers&lt;/span&gt;&lt;/a&gt;. Popularising a downloadable app and informing its target users how to install and work it correctly needs a marketing blitzkrieg, which is something only the state or well-funded developers can afford. The New Delhi police department runs a dedicated control room for reports arriving from its safety app, Himmat (the word for courage in many Indian languages). It’s an expensive affair.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An app that does not work in tandem with existing machinery for law enforcement and public safety is a bad idea. It puts the onus of “keeping women safe” on members of their social circles or on intermediaries and private parties such as cab companies, while absolving law enforcement agencies of their failing to provide security. It opens doors to victim blaming in case someone is unable to use the app at the right time in the right way, or if the app fails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the contrary, an app that does loop in the police raises concerns about surveillance and protection of data available to the police, which is especially problematic in places such as India where there is no law for privacy or data protection. Alwar, one of the cities where Pukar was implemented, is super-populated with a large geographical area and a high crime rate. Police departments in such places tend to be overworked and understaffed. Without significant policing reforms, it is questionable whether they will be able to respond in time. A sting operation done by two media outlets on 30 senior officials of the New Delhi police department in 2012 showed the &lt;a href="http://www.ndtv.com/india-news/in-and-around-delhi-cops-blame-rapes-on-women-tehelka-investigation-with-ndtv-475442"&gt;&lt;span style="text-decoration: underline;"&gt;cops blaming victims of sexual violence with gay abandon&lt;/span&gt;&lt;/a&gt;. “If girls don't stay within their boundaries, if they don't wear appropriate clothes, then naturally there is attraction. This attraction makes men aggressive, prompting them to just do it [sexual assault]," reads one of their nuggets. “It's never easy for the victim [to complain to the police]. Everyone is scared of humiliation. Everyone's wary of media and society. In reality, the ones who complain are only those who have turned rape into a business," goes another. An app that lets known people monitor someone’s location also poses the risk of abuse, coercion and surveillance by intimate partners or members of the family.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, there is no app for reforming a morass in law enforcement or dismantling patriarchy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that'&gt;https://cis-india.org/internet-governance/blog/gender-it-rohini-lakshane-may-19-2016-womens-safety-there-is-an-app-for-that&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-10T02:48:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women">
    <title>Why The New Government Policy Mandating Panic Buttons On Phones Isn’t Going To Protect Women</title>
    <link>https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women</link>
    <description>
        &lt;b&gt;Recently, the Union Minister for Communications and Information Technology Mr Ravi Shankar Prasad tweeted about new rules mandating a panic button in every cell phone sold in the country from January 2017. To keep ladies safe, of course.&lt;/b&gt;
        &lt;p&gt;The story by Madhura Kadaba was published in the &lt;a class="external-link" href="http://theladiesfinger.com/panic-buttons/"&gt;Ladies Finger&lt;/a&gt; on May 14, 2016. Rohini Lakshané was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/RaviShankarPrasad.png" alt="Ravi Shankar Prasad" class="image-inline" title="Ravi Shankar Prasad" /&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=142272"&gt;According to a statement released by the Telecommunications Ministry&lt;/a&gt;, the panic button will be activated by pressing a designated button on a smartphone or by holding down both ‘5’ and ‘9’ keys on a basic phone. Pressing the panic button is expected to alert police and designated friends or relatives, similar to apps launched previously by police departments like &lt;a href="https://play.google.com/store/apps/details?id=com.smartcloud.delhi&amp;amp;hl=en"&gt;Himmat&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It followed remarks from the Union Minister for Women and Child Development, Ms Maneka Gandhi, in the Lok Sabha in December 2015. “Every cell phone will have an in-built panic button. Now, all new cell phones will be made with panic buttons. But in case of all old cell phones, you can go to the person who owns the company or the dealer and they will adjust it for you. If a woman is in trouble, she can just press the button on the cell phone and she will immediately get help.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two days later, reacting to concerns that the mandate could increase mobile phone costs, Mr Ravi Shankar Prasad said, “&lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Panic-button-Ravi-Shankar-Prasad-to-discuss-mobile-price-hike/articleshow/52028900.cms"&gt;Manufacturers… have given their support. My expectation is that they will render their support in social justice and women security&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a point, it almost becomes a farce — the government’s continuous search for grand, one-stop solutions to dealing with sexual violence. We had the &lt;a href="https://in.news.yahoo.com/what-they-are-planning-to-do-with-the-rs-1-000-crore-nirbhaya-fund-050843333.html"&gt;vast coffers of the Nirbhaya fund&lt;/a&gt;, which went nowhere. It had tech solutions coming out of its 1000-crore ears. It included plans for setting up control rooms in 114 cities within 9 months back in 2014 and surveillance cameras in all public transport vehicles including autos! Who was going to be watching the feed of these cameras, if ever by some vast change in the face of humanity such a thing happened, you may wonder? Or as journalist Revati Laul wrote, “Given that police stations across the country are short staffed, given how many of them cannot even afford paper to file a first information report (FIR) or fuel for the police personnel’s motorbike, just how will the appearance of these control rooms change that? How will switchboards help if police stations in even big cities like Varanasi have too few vehicles to cater to the existing load of emergencies they have to deal with?” But hush, don’t interrupt when Daddy is talking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, we published an investigation into the &lt;a href="http://theladiesfinger.com/investigation-where-are-the-one-stop-centers-for-rape-victims-under-the-nirbhaya-fund/"&gt;one-stop centres&lt;/a&gt; promised by the Nirbhaya fund. These centres are supposed to provide services like assistance in lodging FIRs, medical assistance for medical examinations, and therapy. On paper, Delhi is supposed to have 6. Good luck locating them because they don’t exist. Most of the staff of the hospitals where the centers were to be located were clueless about the program.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But perhaps we should forget the tiresome past and move to the shiny button-filled future. We asked Rohini Lakshane, a technology expert and Program Officer at the Centre for Internet and Society what she thought of panic buttons. Recently she reviewed a &lt;a href="http://tech.firstpost.com/news-analysis/mobile-apps-for-personal-safety-64274.html"&gt;bunch&lt;/a&gt; of personal safety apps geared toward women and was very unimpressed. About the government’s new plan, she said, “GPS accuracy in India can sometimes be patchy and not very accurate, and continuous location tracking drains the battery, something that could be problematic for people with phones that do not have good GPS hardware or a long battery life.” Lakshane added, “The app would also enable tracking by family members, which can increase the chance of intimate partner abuse and violence. There have been instances in which apps that provide real-time location or periodic updates of the location of a person to a contact have enabled abuse by intimate partners or by members of the family.” In short, you are unlikely to get the help you need in case of stranger danger and continue to face whatever oppression you maybe facing from your ‘loved ones’.&lt;/p&gt;
&lt;p&gt;Which brings us to the biggest problem with panic buttons, the idea that what Indian women should live in fear of scary strangers outside the house.&lt;/p&gt;
The story by Madhura Kadaba was published in The Ladies Finger on May 14, 2016. Rohini Lakshane was quoted.  The story by Madhura Kadaba was published in the Ladies Finger on May 14, 2016. Rohini Lakshane was quoted.   
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In fact, carefully conducted research shows over and over again that Indian women are most likely to face violence from their families, within their homes. The Mumbai programme RAHAT’s report &lt;a href="http://theladiesfinger.com/whats-the-ratio-of-known-vs-stranger-rapists-take-a-wild-guess-that-and-other-highlights-from-the-2015-rahat-report-on-sexual-violence/"&gt;shows&lt;/a&gt; that 91 percent of the accused in reported cases of rape were by known persons. Add on the fact if you have even a fleeting acquaintance with a man who attacks you the police are additionally reluctant to &lt;span&gt;do anything&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;Not that the police like to file complaints if you have been raped by a &lt;a href="http://theladiesfinger.com/tag/ready-to-report/"&gt;stranger&lt;/a&gt;. That way they are quite equal opportunity about ignoring complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps we should have a panic button in our phones after all. A daily reminder that you should fear rape, in case for a moment you had decided to stop worrying. A daily reminder that if you do get raped you must remember to press a button that goes nowhere. A great metaphor for how we deal with victims of sexual violence in India.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women'&gt;https://cis-india.org/internet-governance/news/why-the-new-government-policy-mandating-panic-buttons-on-phones-isn2019t-going-to-protect-women&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-05-15T09:45:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm">
    <title>Privacy Issues with DRM</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-issues-with-drm</link>
    <description>
        &lt;b&gt;This post has been written by Jalaj Pandey interning at CIS. It elaborates upon the various privacy issues with the Digital Rights Management. The author talks about the various ways in which content producers use DRM as a tool to infringe the privacy of the end users. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nehaa Chaudhari provided inputs and also edited the blog post. &lt;a href="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm.docx" class="internal-link"&gt;Click to download the File&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;span&gt;The ubiquity of internet in today's world has made content and information sharing an easy task. &lt;/span&gt;&lt;a name="_ftnref1"&gt;&lt;/a&gt;&lt;span&gt; A certain media file can be shared and made public with hardly any technical obstacles. &lt;/span&gt;&lt;a name="_ftnref2"&gt;&lt;/a&gt;&lt;span&gt; Issues 	like hacking, unauthorized copying and publication, unlicensed usage have become concerns for content producers, who have employed Digital Rights 	Management (hereafter DRM) measures to address some of them.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Several instances of the online privacy intrusion by the content producers have been recorded.	&lt;a name="_ftnref3"&gt;&lt;/a&gt; In 	such a scenario the balancing the rights of the content producers and the end users becomes an important one. It is imperative to find a common ground to safeguard the interests of both the parties involved. In the recent past DRM has been receiving a lot of flak	&lt;a name="_ftnref4"&gt;&lt;/a&gt; because of the privacy issues contented by the users.	&lt;a name="_ftnref5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the most rudimentary form privacy can be explained as any information about an individual which he/she does not want to be made public. It is important 	to mention that this information is seen from the perspective of an ordinary reasonable person. The UN Declaration of Human Rights, 1948, defines privacy as a fundamental right of every human.	&lt;a name="_ftnref6"&gt;&lt;/a&gt; The functioning of the DRM 	is based on restricting the usage or distribution of the content. Since this restriction is only possible after there is a formal identification of the end 	user,&lt;a name="_ftnref7"&gt;&lt;/a&gt; the content producers 	end up collecting information about the users. For example: a DRM for a music file might work in a manner where it can only be accessed by one computer from which the user accesses and registers for the first time.	&lt;a name="_ftnref8"&gt;&lt;/a&gt; DRMs initially identify the IP addresses of the system and make the file functioning on only that IP address.	&lt;a name="_ftnref9"&gt;&lt;/a&gt; In this way the producer ends up collecting information about the end user. Different DRM models take different ways to collect information of their user.	&lt;a name="_ftnref10"&gt;&lt;/a&gt; While collecting IP 	addresses&lt;a name="_ftnref11"&gt;&lt;/a&gt; in one of them the other way is tracking the user information via download,	&lt;a name="_ftnref12"&gt;&lt;/a&gt; browsing activities, 	subscription service,&lt;a name="_ftnref13"&gt;&lt;/a&gt; etc. 	The usage log of the users is generated and becomes a valuable asset to assess and predict the preferences of the users&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two contentions of privacy have been raised on the privacy issues of DRM -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) What is the accountability of this process and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Whether it puts the content producers in a position where they can control the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information collected is under the control of content producers, who mostly store this information in the form database. BEUC (European Consumer 	Organization) claimed that the DRM systems technologically enable content providers to monitor private consumption of content, create reports of consumption, and profile users.	&lt;a name="_ftnref14"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information is at the disposal of the content producers. An assessment of DRM applications under Canadian Privacy showed that the firms did not even recognise privacy issues of the customers as a priority.	&lt;a name="_ftnref15"&gt;&lt;/a&gt; In fact the firms failed to provide the information that was stored in their databases.	&lt;a name="_ftnref16"&gt;&lt;/a&gt; This gives an idea about 	the lack of transparency that exists in collecting the information about users. The question whether users are aware of what information is being collected 	and to what extent they are being tracked online remains unanswered. The CEN/ISSS (European Committee for Standardization/ Information Society Standardisation System) pointed out that DRMs have a large potential to transmit, generate personal information about users.	&lt;a name="_ftnref17"&gt;&lt;/a&gt; It has also been characterized by unprecedented levels of monitoring by various content producers.	&lt;a name="_ftnref18"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further the principled level argumentation to this is on lines of collection of information without any authentication from the user herself/himself. It is essential that if any information is collected or saved by the producers it should only be after taking consent of the user.	&lt;a name="_ftnref19"&gt;&lt;/a&gt; Surveillance and compelled disclosure of information about intellectual consumption threaten rights to personal integrity.	&lt;a name="_ftnref20"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DRMs take away the anonymity of the consumption.	&lt;a name="_ftnref21"&gt;&lt;/a&gt; Since the producers can practically monitor the content usage of the user, this has led to wide scale of price discrimination.	&lt;a name="_ftnref22"&gt;&lt;/a&gt; This means that producers would monitor and assess the preferences	&lt;a name="_ftnref23"&gt;&lt;/a&gt; of the user and subsequently raise the prices of that particular class of products.	&lt;a name="_ftnref24"&gt;&lt;/a&gt; In the report of FIPR 	(Foundation of Information Policy and Research) it was found that Microsoft had been trying to implement their DRM systems in their products using a similar approach to gain a monopoly position as in their strategy of browser implementation.	&lt;a name="_ftnref25"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 	&lt;strong&gt; Sony BMG copy protection rootkit scandal		&lt;a name="_ftnref26"&gt;&lt;/a&gt; &lt;/strong&gt; in 2005 brought much criticism to DRM. It was found out that Sony BMG had introduced illegal and harmful copy protection measure in its CDs. The rootkit 	element of the software is used to hide virtually all traces of the copy protection software's presence on a PC, so that an ordinary computer user would 	have no way to find it. Further more than just the DRM part of it the software also made the user's system open to a number of malwares and created 	vulnerabilities in the system. Sony was eventually made to compensate consumer costs, etc on the same. However the question of whether the database in the hands of companies can be used in arbitrary manner was intensely discussed after this.	&lt;a name="_ftnref27"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is essential that an effective framework is brought into effect which caters to privacy interests of the users. Privacy is the basic human right and it 	is the onus of the State to protect and safeguard this right. It is essential that the State does not compromise and support mechanisms which promote the 	welfare of the content producers over the users. The balance of users and producers becomes all the more important in a developing country like ours. The 	lack the awareness and the knowledge coupled with increasing usage of internet can lead to the exploitation of many. It is essential that the States see 	through these problems and collectively find an all encompassing solution to it.&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; K. G. Coffman and A. M. Odlyzko, Growth of the Internet, AT&amp;amp;T Labs - Research, July 6, 2001, available at, (			&lt;a href="http://www.dtc.umn.edu/~odlyzko/doc/oft.internet.growth.pdf"&gt;www.dtc.umn.edu/~odlyzko//doc/oft.internet.growth.pdf&lt;/a&gt;) (hereinafter 			Growth).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; The Daily Source, The Growing Impact of the Internet, April 4, 2016, available at (https://www.dailysource.org/about/impact).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Corryne Mcsherry, Adobe Spyware Reveals (Again) The Price Of DRM: Your Privacy And Security, Electronic Frontier Foundation, October 17, 2014, 			available at,&lt;/p&gt;
&lt;p&gt;(https://www.eff.org/deeplinks/2014/10/adobe-spyware-reveals-again-price-drm-your-privacy-and-security).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Digital Rights Management: A failure in the developed world, a danger to the developing world, Electronic Frontier Foundation, March 23, 2005, 			available at,&lt;/p&gt;
&lt;p&gt;(https://www.eff.org/wp/digital-rights-management-failure-developed-world-danger-developing-world).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; R. Subramanya and Byung k. Yi, Digital Rights Management, available at, (			&lt;a href="https://www.academia.edu/8054608/Digital_Rights_Management"&gt;https://www.academia.edu/8054608/Digital_Rights_Management&lt;/a&gt;) (hereinafter 			Digital Rights Management).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; Global internet liberty campaign, privacy and human rights, An International Survey of Privacy Laws and Practice, available at, 			(http://gilc.org/privacy/survey/intro.html).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Ann Cavoukian, Privacy and Digital Rights Management (DRM): An Oxymoron, Information and Privacy Commissioner Ontario, available at, (			&lt;cite&gt;https://www.ipc.on.ca/images/Resources/up-1&lt;/cite&gt;&lt;strong&gt;drm&lt;/strong&gt;&lt;cite&gt;.pdf&lt;/cite&gt; ) (hereinafter Oxymoron)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Varian, H.R. (1985) 'Price discrimination and social welfare', American Economic Review, Vol. 75, available at, 			(http://www.economics-ejournal.org/economics/journalarticles/2007-1/references/Varian1985).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; Privacy and Digital Rights Management,A position paper for the W3C workshop on Digital Rights Management, January 2001, available at, (			&lt;cite&gt;www.w3.org/2000/12/drm-ws/pp/hp-poorvi.html&lt;/cite&gt;&lt;cite&gt;)&lt;/cite&gt;&lt;cite&gt;.&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; Growth supra note, 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Digital Rights Management supra note, 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Thierry Rayna, Privacy or piracy, why choose? Two solutions to the issues of digital rights management and the protection of personal information, 			Intellectual Property Management, Vol. X, No. Y, available at,&lt;/p&gt;
&lt;p&gt;(www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; Oxymoron supra note, 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; BEUC, Consumentenbond, and CLCV at DRM Working Group 1 (2002), available at, (&lt;cite&gt;https://privacy.org.nz/assets/Files/4558510.pdf).&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Natali Helberger and Kristo´f Ker´enyi and Bettina Krings, Digital Rights Management and Consumer Acceptability: A Multi-Disciplinary 			Discussion of Consumer Concerns and Expectations, available at (citeseerx.ist.psu.edu/showciting?cid=733532).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Knud Bohle, Indicare, Research into unfriendly DRM : A Review, December, 2004,available at, (citeseerx.ist.psu.edu/showciting?cid=733532) 			(hereinafter Indicare).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; European Committee for Standardization/Information Society Standardisation System (CEN/ISSS) DRM Report, 2003.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Indicare supra note, 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; News Release, "Forrester Technographics Finds Online Consumers Fearful of Privacy Violations" (October 27, 1999 available at, 			(www.forrester.com/ER/Press/Release/0,1769,177,FF.html).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Julia E. Cohen, Georgetown Law Faculty Publications, DRM and Privacy, January 2010, available at,&lt;/p&gt;
&lt;p&gt;(https://www.academia.edu/2164013/DRM_and_Privacy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Thierry Rayna, Privacy or piracy, why choose? Two solutions to the issues of digital rights management and the protection of personal information, Intellectual Property Management, available at, (			&lt;a href="http://www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138"&gt;www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138&lt;/a&gt;) 			(hereinafter Privacy or piracy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; Moe, W. and Fader, P. (2004) 'Dynamic conversion behavior at e-commerce sites', Management Science, Vol. 50, available at,&lt;/p&gt;
&lt;p&gt;(https://www.researchgate.net/publication/227447618_Dynamic_Conversion_Behavior_at_E-Commerce_Sites).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; Privacy or piracy supra note, 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Sismeiro, C. and Bucklin, R. (2004) 'Modeling purchase behavior at an e-commerce web site: a task completion approach', Journal of Marketing 			Research, available at, (&lt;cite&gt;citeseerx.ist.psu.edu/showciting?cid=906878&lt;/cite&gt;&lt;cite&gt;).&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; Ross Anderson, Foundation of Information Policy and Research Consultation Response to DRM (2004), available at, (&lt;cite&gt;www.&lt;/cite&gt; &lt;strong&gt;fipr&lt;/strong&gt;&lt;cite&gt;.org/APIG_&lt;/cite&gt;&lt;strong&gt;DRM&lt;/strong&gt;&lt;cite&gt;_submission&lt;/cite&gt;&lt;cite&gt;.pdf&lt;/cite&gt;).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Otto Helweg, Sony, Rootkits and Digital Rights Management Gone Too Far, Oct, Oct. 31, 2014, available at 			(https://blogs.technet.microsoft.com/markrussinovich/2005/10/31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; Sony BMG Litigation Info, Electronic Frontier Foundation, available at, (https://www.eff.org/cases/sony-bmg-litigation-info).&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-issues-with-drm'&gt;https://cis-india.org/internet-governance/blog/privacy-issues-with-drm&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Jalaj Pandey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-05-03T02:41:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2016-newsletter">
    <title>April 2016 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/april-2016-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the CIS newsletter for April 2016. The key issues we worked on this month included the Aadhaar Act 2016, Standard Essential Patents, cyber security of smart grids, and involvement of international agencies in the smart cities project in India.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Early last year, thanks to the fund raising efforts of a friend of CIS - Suhail Kazi, we received Rs. 1.9 lakhs as donations from 19 individuals. In January this year, we set up an online giving feature on our website which would ease the donation process, but we haven’t got a single donation so far! This could be because many of you may be under a false impression that CIS is very wealthy and does not need more support. Unfortunately, this is no longer true. Today, we are unable to find a single donor who is interested in our Accessibility, Telecom, or RAW programmes. In other words, we need your support. Would you to consider making a small donation to CIS? &lt;strong&gt;Click &lt;a href="http://imojo.in/CISDonations"&gt;here&lt;/a&gt; to donate.&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be accessed here: &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;CIS prepared an &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"&gt;FAQ on the Aadhaar / UIDAI project&lt;/a&gt; and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. Further, two infographics were produced to highlight on the questions of "&lt;a href="http://cis-india.org/internet-governance/blog/can-the-aadhaar-act-2016-be-classified-as-a-money-bill"&gt;Can the Aadhaar Act 2016 be Classified as a Money Bill?&lt;/a&gt;" and "&lt;a href="http://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"&gt;Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?&lt;/a&gt;".&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;NVDA team &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/april-2016-report/view"&gt;prepared a report&lt;/a&gt; on the progress of the project for the month of&amp;nbsp;April 2016.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS submitted its &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;comments to the Department of Industrial Policy and Promotion's Discussion Paper&lt;/a&gt; on Standard Essential Patents and their Availability on FRAND Terms. CIS has offered its assistance on other matters aimed at developing a suitable policy framework for SEPs and FRAND in India, and, working towards the sustained innovation, manufacture and availability of mobile technologies in India. A summary of the comments can be &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/summary-of-cis-comments-to-dipp2019s-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;accessed here&lt;/a&gt;. Responses to the Discussion Paper is &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;available here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rohini Lakshané's paper titled &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/patents-and-mobile-devices-in-india-an-empirical-survey"&gt;Patents and Mobile Devices in India: An Empirical Survey&lt;/a&gt; has been accepted for publication by the Vanderbilt Journal of Transnational Law.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Kiran A.B. in a &lt;a class="external-link" href="http://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02"&gt;blog post has documented the availability and openness of data sets in India&lt;/a&gt; that are relevant for monitoring the targets under the SDGs.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Low-cost Aakash tablet and its previous iterations in India have gone through several phases of technological changes and ideological experiments wrote Sumandro Chattapadhyay and Jahnavi Phalkey &lt;a class="external-link" href="http://cis-india.org/raw/buying-into-the-aakash-dream"&gt;in an article published in the Economic and Political Weekly&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/news"&gt;CIS in the News&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS gave inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/daily-mail-april-4-2016-afp-india-biometric-database-crosses-billion-member-mark"&gt;India's biometric database crosses billion-member mark&lt;/a&gt;&amp;nbsp;(AFP and Daily Mail, UK; April 4, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/big-news-network-april-6-2016-claire-lauterbach-panama-papers-and-question-of-privacy"&gt;The Panama Papers and the question of privacy&lt;/a&gt;&amp;nbsp;(Big News Network; April 6, 2016). This was originally published by Privacyinternational.org.&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/economic-times-april-8-2016-neha-alawadhi-daunting-task-ahead-for-investigative-agencies-with-whatsapp-end-to-end-encryption"&gt;Daunting task ahead for investigative agencies with WhatsApp's end-to-end encryption&lt;/a&gt;&amp;nbsp;(Neha Alawadhi; Economic Times; April 8, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-hindu-april-10-2016-somesh-jha-pmo-no-to-smart-cards-insists-aadhaar"&gt;PMO’s no to smart cards, insists on Aadhaar&lt;/a&gt;&amp;nbsp;(Somesh Jha; Hindu; April 10, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-telegraph-april-10-2016-2014-showed-the-power-of-twitter"&gt;2014 showed the power of Twitter, now every Indian politician wants a handle&lt;/a&gt;&amp;nbsp;(T.V. Jayan, Smitha Verma,Sonia Sarkar and V. Kumara Swamy; Telegraph; April 10, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-april-13-2016-why-is-uidai-cracking-down-on-individuals-that-hoard-aadhaar-data"&gt;Why is the UIDAI cracking down on individuals that hoard Aadhaar data?&lt;/a&gt;&amp;nbsp;(Alnoor Peermohamed; Business Standard; April 13, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/governance-now-april-19-2016-you-will-need-a-license-to-create-whatsapp-group-in-kashmir"&gt;You will need a license to create a WhatsApp group in Kashmir&lt;/a&gt;&amp;nbsp;(Governance Now; April 19, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/governance-now-april-23-2016-taru-bhatia-will-facebook-twitter-relocate-servers-to-india"&gt;Will Facebook, Twitter relocate servers to India?&lt;/a&gt;&amp;nbsp;(Taru Bhatia; Governance Now; April 23, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/dna-amrita-madhukalya-april-23-2016-government-keeps-experts-out-of-cyber-security-discussions"&gt;Government keeps experts out of cyber security discussions&lt;/a&gt;&amp;nbsp;(Amrita Madhukalya; DNA; April 23, 2016).&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-times-of-india-raj-shekhar-arun-dev-v-narayan-a-selvaraj-cctv-plays-sherlock"&gt;CCTV plays Sherlock&lt;/a&gt;&amp;nbsp;(Raj Shekhar, Arun Dev, V Narayan &amp;amp; A Selvaraj with inputs from Sindhu Kannan and Somreet Bhattacharya; The Times of India; April 24, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;CIS members wrote the following pieces:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li style="text-align: justify;"&gt;Sunil Abraham wrote an&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/frontline-april-15-2016-sunil-abraham-surveillance-project"&gt;article in the July 15 edition of Frontline&lt;/a&gt;&amp;nbsp;arguing that the Aadhaar project’s technological design and architecture is an unmitigated disaster and no amount of legal fixes in the Act will make it any better.&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Amber Sinha wrote an article in The Wire arguing that&amp;nbsp;&lt;a href="http://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"&gt;the Aaddhaar Act is not a money bill&lt;/a&gt;, and the Supreme Court may very well question the decision by the Lok Sabha speaker to classify it as such.&amp;nbsp;&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Sumandro Chattapadhyay also wrote on The Wire arguing that "&lt;a href="http://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"&gt;the last chance for a welfare state doesn’t rest in the Aadhaar system&lt;/a&gt;."&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Subhashish Panigrahi's article on the&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/global-voices-april-27-2016-subhashish-panigrahi-eight-challenges-indian-language-wikipedias-need-to-overcome"&gt;8 challenges that Indian language Wikipedias have to overcome was published by Global Voices&lt;/a&gt;. The article had&amp;nbsp;earlier been&amp;nbsp;published in the Wire.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Elonnai Hickok and Vanya Rakesh co-authored an article on&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"&gt;Cyber Security of Smart Grids in India&lt;/a&gt;&amp;nbsp;that was published by Dataquest.&lt;/li&gt;&lt;li style="text-align: justify;"&gt;Shyam Ponappa&amp;nbsp;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-april-6-2016-shyam-ponappa-breakthroughs-needed-for-digital-india"&gt;in his monthly column&lt;/a&gt;&amp;nbsp;published in the Business Standard tell us that it's time the government accepts that current policies are not enough to bring about Digital India.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't have access to read printed materials due to some form of physical, sensory, 	cognitive or other disability. As part of our endeavour to make available accessible content for persons with disabilities, we are developing a text-to-speech software in 15 languages with support from the Hans Foundation. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/march-2016-report.pdf/view"&gt;March 2016 Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/april-2016-report" class="internal-link"&gt;April 2016 Report&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a 	grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"&gt;Comments on Department of Industrial Policy and Promotion Discussion Paper on Standard Essential Patents and their Availability on Frand Terms&lt;/a&gt; (Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané; April 23, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;Responses to the DIPP's Discussion Paper on SEPs and their Availability on FRAND Terms&lt;/a&gt; (Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané; April 23, 2016).&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/summary-of-cis-comments-to-dipp2019s-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;Summary of CIS Comments to DIPP’s Discussion Paper on SEPs and their availability on FRAND terms&lt;/a&gt; (Anubha Sinha; April 26, 2016).&lt;/div&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/global-congress-2015"&gt;Global Congress 2015 - A Collection of Resources&lt;/a&gt; (Pervasive Technologies Team; April 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt;Compilation of Mobile Phone Patent Litigation Cases in India&lt;/a&gt; (Rohini Lakshané; updated on April 15, 2016). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation"&gt;Joining the Dots in India's Big-Ticket Mobile Phone Patent Litigation&lt;/a&gt; (Rohini Lakshané; updated on April 29, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/mhrd-ipr-chair-series-information-received-from-tezpur-university"&gt;MHRD IPR Chair Series: Information Received from Tezpur University&lt;/a&gt; (Karan Tripathi; April 26, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/sectoral-innovation-councils-on-intellectual-property-rights-2013-rti-requests-dipp-responses"&gt;National IPR Policy Series : Sectoral Innovation Councils on Intellectual Property Rights – RTI Requests + DIPP Responses&lt;/a&gt; (Nehaa Chaudhari and Saahil Dama; April 30, 2016). Nisha S. Kumar assisted in compilation of the document.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/fifth-annual-ip-teaching-workshop"&gt;Fifth Annual IP Teaching Workshop&lt;/a&gt; (Organised by the Centre for Innovation, Intellectual Property and Competition at National Law University Delhi in association with National Academy of Law Teaching, NLU-D; Delhi; March 31 and April 1, 2016). Nehaa Chaudhari was a speaker.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/first-round-table-on-innovation-ip-and-competition"&gt;First Round-table on Innovation, IP and Competition&lt;/a&gt; (Organized by the Centre for Innovation, Intellectual Property &amp;amp; Competition (CIIPC) at the National Law University, Delhi; India Habitat Centre; New Delhi; April 1-2, 2016). Nehaa Chaudhari and Anubha Sinha attended the round-table.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/brainstorming-workshop-on-pg-programme-on-media-studies-for-ugc-e-pathshala-programme"&gt;Brainstorming Workshop on PG Programme on Media Studies for UGC E-Pathshala Programme&lt;/a&gt; (Organized by Jamia Milla Islamia; New Delhi; April 5, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/sensitization-seminar-on-ipr-for-electronics-ict-sectors"&gt;Sensitization Seminar on IPR for Electronics &amp;amp; ICT Sectors&lt;/a&gt; (Organized by&amp;nbsp;Andhra Pradesh Technology Development &amp;amp; Promotion Centre (APTDC) of Confederation of Indian Industry (CII), in association with Department of Electronics and Information Technology (DeitY); Vishakhapatnam; April 21, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Work Plan&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/cis-a2k-work-plan-july-2016-june-2017"&gt;CIS - A2K Work Plan: July 2016 - June 2017&lt;/a&gt; (CIS-A2K Team; April 2, 2016): We have revised the work plan template taking into account the changed proposal plan sent out by WMF and in light of the feedback that we have received from FDC assessment during last proposal application. The FDC feedback is taken into account at the level of design, RoI and ensuring quality for all our activities.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/global-voices-april-27-2016-subhashish-panigrahi-eight-challenges-indian-language-wikipedias-need-to-overcome"&gt;Eight Challenges Indian-Language Wikipedias Need to Overcome&lt;/a&gt; (Subhashish Panigrahi; Global Voices; April 21, 2016). &lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;&lt;a href="http://thewire.in/2016/03/17/eight-challenges-that-indian-language-wikipedias-need-to-overcome-25062/" target="_blank"&gt;&lt;strong&gt;A version of this post&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt; was previously published on &lt;/strong&gt;&lt;strong&gt;&lt;a href="http://thewire.in/" target="_blank"&gt;&lt;strong&gt;The Wire&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Media Coverage&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/the-telegraph-april-7-2016-anwesha-ambaly-odia-gets-more-space-in-e-world"&gt;Odia gets more space in e-world&lt;/a&gt; (Anwesha Ambaly; The Telegraph; April 7, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/exercise-to-correct-articles-in-tulu-wikipedia-begins"&gt;Exercise to Correct articles in Tulu Wikipedia begins&lt;/a&gt; (Raviprasad Kamila; The Hindu; April 28, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/events/tulu-wikipedia-editathon-to-improve-quality-of-articles-in-tulu-wikipedia"&gt;Tulu Wikipedia Editathon to Improve Quality of Articles in Tulu Wikipedia&lt;/a&gt; (Shri Ramakrishna PU College; Mangaluru; April 26 - 30, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;a style="text-align: justify;" href="http://cis-india.org/openness"&gt;Openness&lt;br /&gt;&lt;/a&gt;&lt;span style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/monitoring-sustainable-development-goals-in-india-availability-and-openness-02"&gt;Monitoring Sustainable Development Goals in India: Availability and Openness of Data&lt;/a&gt; (Part II) (Kiran A.B.; April 12, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Cyber Security&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/dataquest-april-25-2016-vanya-rakesh-and-elonnai-hickok-cyber-security-of-smart-grids-in-india"&gt;Cyber Security of Smart Grids in India&lt;/a&gt; (Elonnai Hickok and Vanya Rakesh; April 25, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Big Data&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;Blog Entry&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/rti-on-smart-cities-mission-in-india"&gt;RTI regarding Smart Cities Mission in India&lt;/a&gt; (Paul Thottan; April 21, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;►Privacy&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"&gt;FAQ on the Aadhaar Project and the Bill&lt;/a&gt; (Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda; April 13, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india"&gt;Aadhaar Act and its Non-compliance with Data Protection Law in India&lt;/a&gt; (Vanya Rakesh; April 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/can-matters-dealt-with-in-aadhaar-act-be-objects-of-money-bill"&gt;Can the Matters Dealt with in the Aadhaar Act be the Objects of a Money Bill?&lt;/a&gt; (Pooja Saxena; April 24, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Articles&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-quint-march-31-2016-nehaa-chaudhari-will-aadhaar-act-address-indias-dire-need-for-a-privacy-law"&gt;Will Aadhaar Act Address India’s Dire Need For a Privacy Law?&lt;/a&gt; (Nehaa Chaudhari; Quint; March 31, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"&gt;The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System&lt;/a&gt; (Sumandro Chattapadhyay; April 19, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/the-aadhaar-act-is-not-a-money-bill"&gt;The Aadhaar Act is Not a Money Bill&lt;/a&gt; (Amber Sinha; April 25, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/rightscon-silicon-valley-2016"&gt;RightsCon Silicon Valley 2016&lt;/a&gt; (Organized by RightsCon; March 31 and April 1, 2016). Elonnai Hickok attended the event.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security"&gt;Panel Discussion on UID/ Aadhar act 2016 and its impact on Social, Security&lt;/a&gt; (Organized by Students Christian Movement of India at SCM House; Bangalore; April 25, 2016). Sunil Abraham was a panelist.&lt;/li&gt;
&lt;li&gt;The Centre for the Study of Law and Governance (CSLG), Jawaharlal Nehru University (JNU), organised a &lt;a href="http://cis-india.org/internet-governance/news/will-the-magic-number-deliver-aadhaar-cslg-26042016"&gt;roundtable discussion on Tuesday, April 26&lt;/a&gt;, to discuss the Aadhaar project and Act. Along with Prasanna S, Apar Gupta, and Dr. Chirashree Dasgupta, Sumandro Chattapadhyay was one of the discussants.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/aadhaar-by-numbers"&gt;Aadhaar by Numbers&lt;/a&gt; (Organized by National Institute of Public Finance and Policy; New Delhi; April 29, 2016). Sunil Abraham was a speaker.&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;Article&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-april-6-2016-shyam-ponappa-breakthroughs-needed-for-digital-india"&gt;Breakthroughs Needed For Digital India&lt;/a&gt; (Shyam Ponappa; Business Standard; April 6, 2016 and Organizing India BlogSpot; April 7, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/buying-into-the-aakash-dream"&gt;Buying into the Aakash Dream - A Tablet’s Tale of Mass Education&lt;/a&gt; (Sumandro Chattapadhyay and Jahnavi Phalkey; Economic &amp;amp; Political Weekly; April 23, 2016). &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;Announcement&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/jobs/call-for-proposal-big-data-for-development-field-studies"&gt;Call for Proposal: Big Data for Development – Initial Field Studies&lt;/a&gt; (Sumandro Chattapadhyay; April 29, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;----------------------------------- 	&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from 	policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual 	property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), 	internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations 	of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet 	and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at 	sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an 	indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, 	write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and 	support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 	Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2016-newsletter'&gt;https://cis-india.org/about/newsletters/april-2016-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-05-10T06:26:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security">
    <title>Panel Discussion on UID/ Aadhar act 2016 and its impact on Social, Security </title>
    <link>https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at this event organized by Students Christian Movement of India at SCM House in Bangalore on April 25, 2016. Mathew Thomas and Usha Ramanathan also gave talks.&lt;/b&gt;
        &lt;p&gt;With the passage of the Aadhaar act 2016 is UID / Aadhar mandatory now? How do we understand the issue of Social Security in the context of the new law? What does it mean for those who need to access their senior citizen pension, rations, school and college scholarships, etc.&lt;/p&gt;
&lt;p&gt;How does one understand the money bill route for introducing the bill in Parliament? What are implications of this for the validity of the law?&lt;/p&gt;
&lt;p&gt;What will happen to the court cases challenging the UID now?&lt;/p&gt;
&lt;p&gt;Where are we now on the thorny issues of surveillance, tracking, profiling, biometrics, private and foreign companies and subsidy? What does the law say?&lt;/p&gt;
&lt;p&gt;This discussion will revisit the debates around the UID and examine the implications of the new law.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security'&gt;https://cis-india.org/internet-governance/news/panel-discussion-on-uid-aadhar-act-2016-and-its-impact-on-social-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-28T17:02:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
