<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 751 to 765.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/foss-poster.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy">
    <title>CIS and International Coalition Calls upon Governments to Protect Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) along with the International Coalition has called upon governments across the globe to protect privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On September 20 in Geneva, CIS joined a huge international coalition in calling upon countries across the globe, including India to assess whether national surveillance laws and activities are in line with their international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has endorsed a set of international principles against unchecked surveillance. The 13 Principles set out for the first time an evaluative framework for assessing surveillance practices in the context of international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A group of civil society organizations officially presented the 13 Principles this past Friday in Geneva at a side event attended by Navi Pillay, the United Nations High Commissioner for Human Rights and the United Nations Special Rapporteur on Freedom of Expression and Opinion, Frank LaRue, during the 24th session of the Human Rights Council. The side event was hosted by the Permanent Missions of Austria, Germany, Liechtenstein, Norway, Switzerland and Hungary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok, Programme Manager at the Centre for Internet and Society has noted that "the 13 Principles are an important first step towards informing governments, corporates, and individuals across jurisdictions, including India, about needed safeguards for surveillance practices and related policies to ensure that they are necessary and proportionate."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the Human Rights Council stated in her opening statement on September 9:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"Laws and policies must be adopted to address the potential for dramatic intrusion on individuals’ privacy which have been made possible by modern communications technology."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the event, said that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"technological advancements have been powerful tools for democracy by giving access to all to participate in society, but increasing use of data mining by intelligence agencies blurs lines between legitimate surveillance and arbitrary mass surveillance."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Frank La Rue, the United Nations Special Rapporteur on Freedom of Expression and Opinion &lt;a href="http://www.google.com/url?q=http%3A%2F%2Fwww.ohchr.org%2FDocuments%2FHRBodies%2FHRCouncil%2FRegularSession%2FSession23%2FA.HRC.23.40_EN.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNEwtpzwnl_1_j_UoSnoE048kX-LYA"&gt;made clear &lt;/a&gt;the case for a direct relationship between state surveillance, privacy and freedom of expression in this latest report to the Human Rights Council:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"The right to privacy is often understood as an essential requirement for the realization of the right to freedom of expression. Undue interference with individuals’ privacy can both directly and indirectly limit the free development and exchange of ideas. … An infringement upon one right can be both the cause and consequence of an infringement upon the other."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Speaking at the event, the UN Special Rapporteur remarked that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"previously surveillance was carried out on targeted basis but the Internet has changed the context by providing the possibility for carrying out mass surveillance. This is the danger."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Representatives of the Centre for Internet and Society, &lt;a href="https://www.privacyinternational.org"&gt;Privacy International&lt;/a&gt;, the &lt;a href="https://eff.org"&gt;Electronic Frontier Foundation&lt;/a&gt;,&lt;a href="https://accessnow.org"&gt;Access&lt;/a&gt;,&lt;a href="http://www.hrw.org/"&gt;Human Rights Watch&lt;/a&gt;,&lt;a href="http://en.rsf.org/"&gt;Reporters Without Borders&lt;/a&gt;, &lt;a href="http://www.apc.org/"&gt;Association for Progressive Communications&lt;/a&gt;, and the&lt;a href="https://www.cdt.org/"&gt;Center&lt;/a&gt;&lt;a href="https://www.cdt.org/"&gt; for Democracy and Technology &lt;/a&gt;all are taking part in the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Find out more about the Principles at &lt;a href="https://necessaryandproportionate.org"&gt;https://NecessaryandProportionate.org&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Contacts&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NGOs currently in Geneva for the 24&lt;sup&gt;th&lt;/sup&gt; Human Rights Council:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Access&lt;/b&gt;&lt;br /&gt;Fabiola Carrion: &lt;a class="mail-link" href="mailto:fabiola@accessnow.org"&gt;fabiola@accessnow.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Association for Progressive Communication&lt;/b&gt;&lt;br /&gt;Shawna Finnegan: &lt;a href="mailto:shawna@apc.org"&gt;shawna@apc.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Center for Democracy and Technology&lt;/b&gt;&lt;br /&gt;Matthew Shears: &lt;a href="mailto:mshears@cdt.org"&gt;mshears@cdt.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Electronic Frontier Foundation&lt;/b&gt;&lt;br /&gt;Katitza Rodriguez:  &lt;a href="mailto:katitza@eff.org"&gt;katitza@eff.org&lt;/a&gt; - @txitua&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Human Rights Watch&lt;/b&gt;&lt;br /&gt;Cynthia Wong: &lt;a class="mail-link" href="mailto:wongc@hrw.org"&gt;wongc@hrw.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Privacy International&lt;/b&gt;&lt;br /&gt;Carly Nyst: &lt;a href="mailto:carly@privacy.org"&gt;carly@privacy.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporters Without Borders&lt;/b&gt;&lt;br /&gt;Lucie Morillon: &lt;a href="mailto:lucie.morillon@rsf.org"&gt;lucie.morillon@rsf.org&lt;/a&gt;&lt;br /&gt;Hélène Sackstein: &lt;a href="mailto:helsack@gmail.com"&gt;helsack@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Ramiro Alvarez: &lt;a href="mailto:rugarte@adc.org.ar"&gt;rugarte@adc.org.ar&lt;/a&gt;&lt;br /&gt;Asociación por los Derechos Civiles&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Beatriz Busaniche&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:bea@vialibre.org.ar"&gt;bea@vialibre.org.ar&lt;/a&gt;&lt;br /&gt;Fundación Via Libre&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Colombia&lt;/b&gt;&lt;br /&gt;Carolina Botero: &lt;a class="mail-link" href="mailto:carobotero@gmail.com"&gt;carobotero@gmail.com&lt;/a&gt;&lt;br /&gt;Fundación Karisma&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Egypt&lt;/b&gt;&lt;br /&gt;Ahmed Ezzat: &lt;a href="mailto:ahmed.ezzat@afteegypt.org"&gt;ahmed.ezzat@afteegypt.org&lt;/a&gt;&lt;br /&gt;Afteegypt&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Honduras&lt;/b&gt;&lt;br /&gt;Hedme Sierra-Castro: &lt;a href="mailto:hedme.sc@gmail.com"&gt;hedme.sc@gmail.com&lt;/a&gt;&lt;br /&gt;ACI-Participa&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;br /&gt;Elonnai Hickok: &lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;&lt;br /&gt;Center for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Korea&lt;/b&gt;&lt;br /&gt;Prof. Park:  &lt;a href="mailto:kyungsinpark@korea.ac.kr"&gt;kyungsinpark@korea.ac.kr&lt;/a&gt;&lt;br /&gt;Open Net Korea&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Macedonia&lt;/b&gt;&lt;br /&gt;Bardhyl Jashari: &lt;a href="mailto:info@metamorphosis.org.mk"&gt;info@metamorphosis.org.mk&lt;/a&gt;&lt;br /&gt;Metamorphosis Foundation for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mauritania, Senegal, Tanzania&lt;/b&gt;&lt;br /&gt;Abadacar Diop: &lt;a href="mailto:jonction_jonction@yahoo.fr"&gt;jonction_jonction@yahoo.fr&lt;/a&gt;&lt;br /&gt;Jonction&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Portugal&lt;/b&gt;&lt;br /&gt;Andreia Martins&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:andreia@coolpolitics.pt"&gt;andreia@coolpolitics.pt&lt;/a&gt;&lt;br /&gt;ASSOCIAÇÃO COOLPOLITICS&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Peru&lt;/b&gt;&lt;br /&gt;Miguel Morachimo: &lt;a href="mailto:morachimo@gmail.com"&gt;morachimo@gmail.com&lt;/a&gt;&lt;br /&gt;Hiperderecho&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Russia&lt;/b&gt;&lt;br /&gt;Andrei Soldatov: &lt;a href="mailto:soldatov@agentura.ru"&gt;soldatov@agentura.ru&lt;/a&gt;&lt;br /&gt;Agentura.ru&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Serbia&lt;/b&gt;&lt;br /&gt;Djordje Krivokapic: &lt;a href="mailto:krivokapic@gmail.com"&gt;krivokapic@gmail.com&lt;/a&gt;&lt;br /&gt;SHARE Foundation&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Western Balkans&lt;/b&gt;&lt;br /&gt;Valentina Pellizer: &lt;a href="mailto:valentina.pellizzer@oneworldsee.org"&gt;valentina.pellizzer@oneworldsee.org&lt;/a&gt;&lt;br /&gt;Oneworldsee&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Brasil&lt;/b&gt;&lt;br /&gt;Marcelo Saldanha: &lt;a href="mailto:instituto@bemestarbrasil.org.br"&gt;instituto@bemestarbrasil.org.br&lt;/a&gt;&lt;br /&gt;IBEBrasil&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy'&gt;https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T07:21:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/foss-poster.pdf">
    <title>FOSS Poster</title>
    <link>https://cis-india.org/openness/blog-old/foss-poster.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/foss-poster.pdf'&gt;https://cis-india.org/openness/blog-old/foss-poster.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-24T08:58:38Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament">
    <title>The Central Monitoring System: Some Questions to be Raised in Parliament</title>
    <link>https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament</link>
    <description>
        &lt;b&gt;The following are some model questions to be raised in the Parliament regarding the lack of transparency in the central monitoring system.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Central Monitoring System (CMS) is a Central Government project to intercept communications, both voice and data, that is transmitted via telephones and the internet to, from and within India. Owing to the vast nature of this enterprise, the CMS cannot be succinctly described and the many issues surrounding this project are diverse. This Issue Brief will outline preliminary constitutional, legal and technical concerns that are presented by the CMS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;At the outset, it must be clearly understood that no public documentation exists to explain the scope, functions and technical architecture of the CMS. This lack of transparency is the single-largest obstacle to understanding the Central Government’s motives in conceptualising and operationalizing the CMS. This lack of public documentation is also the chief reason for the brevity of this Issue Note. Without making public the policy, law and technical abilities of the CMS, there cannot be an informed national debate on the primary concerns posed by the CMS, i.e the extent of envisaged state surveillance upon Indian citizens and the safeguards, if any, to protect the individual right to privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Surveillance and Privacy&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Surveillance is necessary to secure political organisation. Modern nation-states, which are theoretically organised on the basis of shared national and societal characteristics, require surveillance to detect threats to these characteristics. In democratic societies, beyond the immediate requirements of national integrity and security, surveillance must be targeted at securing the safety and rights of individual citizens. This Issue Brief does not dispute the fact that democratic countries, such as India, should conduct surveillance to secure legitimate ends. Concerns, however, arise when surveillance is conducted in a manner unrestricted and unregulated by law; these concerns are compounded when a lack of law is accompanied by a lack of transparency.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technological advancement leads to more intrusive surveillance. The evolution of surveillance in the United States resulted, in 1967, in the first judicial recognition of the right to privacy. In &lt;i&gt;Katz&lt;/i&gt; v. &lt;i&gt;United States&lt;/i&gt; the US Supreme Court ruled that the privacy of communications had to be balanced with the need to conduct surveillance; and, therefore, wiretaps had to be warranted, judicially sanctioned and supported by probable cause. &lt;i&gt;Katz&lt;/i&gt; expanded the scope of the Fourth Amendment of the US Constitution, which protected against unreasonable searches and seizures. Most subsequent US legal developments relating to the privacy of communications from surveillance originate in the &lt;i&gt;Katz&lt;/i&gt; judgement. Other common law countries, such as the United Kingdom and Canada, have experienced similar judicial evolution to recognise that the right to privacy must be balanced with governance.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;Right to Privacy in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the &lt;i&gt;Kharak Singh&lt;/i&gt; (1964) and &lt;i&gt;Gobind&lt;/i&gt; (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around the homes of suspects. In the latter case, the Supreme Court found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This insipid inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011) that de-criminalised consensual homosexual acts; however, this judgment has been appealed to the Supreme Court.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Issues Pertaining to the CMS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;While judicial protection from physical surveillance was cursorily dealt with in the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases, the Supreme Court of India directly considered the issue of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. Wiretaps in India primarily occur on the strength of powers granted to certain authorities under section 5(2) of the Indian Telegraph Act, 1885. The Court found that the Telegraph Act, and Rules made thereunder, did not prescribe adequate procedural safeguards to create a “just and fair” mechanism to conduct wiretaps. Therefore, it laid down the following procedure to conduct wiretaps: &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(a) the order should be issued by the relevant Home Secretary (this power is delegable to a Joint Secretary),&lt;br /&gt; (b) the interception must be carried out exactly in terms of the order and not in excess of it,&lt;br /&gt; (c) a determination of whether the information could be reasonably secured by other means,&lt;br /&gt; (d) the interception shall cease after sixty (60) days.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Therefore, prima facie, any voice interception conducted through the CMS will be in violation of this Supreme Court judgement. The CMS will enforce blanket surveillance upon the entire country without regard for reasonable cause or necessity. This movement away from targeted surveillance to blanket surveillance without cause, conducted without statutory sanction and without transparency, is worrying.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accordingly, the following questions may be raised, in Parliament, to learn more about the CMS project: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Which statutes, Government Orders, notifications etc deal with the establishment and maintenance of the CMS?&lt;/li&gt;
&lt;li&gt;Which is the nodal agency in charge of implementing the CMS?&lt;/li&gt;
&lt;li&gt;What are the powers and functions of the nodal agency?&lt;/li&gt;
&lt;li&gt;What guarantees exist to protect ordinary Indian citizens from intrusive surveillance without cause?&lt;/li&gt;
&lt;li&gt;What are the technical parameters of the CMS?&lt;/li&gt;
&lt;li&gt;What are the consequences for misuse or abuse of powers by any person working in the CMS project?&lt;/li&gt;
&lt;li&gt;What recourse is available to Indian citizens against whom there is unnecessary surveillance or against whom there has been a misuse or abuse of power?&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament'&gt;https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T10:30:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings">
    <title>The National Privacy Roundtable Meetings</title>
    <link>https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society ("CIS"), the Federation of Indian Chambers of Commerce and Industry ("FICCI"), the Data Security Council of India ("DSCI") and Privacy International are, in partnership, conducting a series of national privacy roundtable meetings across India from April to October 2013. The roundtable meetings are designed to discuss possible frameworks to privacy in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Background: The Roundtable Meetings and Organisers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/"&gt;CIS&lt;/a&gt; is a Bangalore-based non-profit think-tank and research organisation with interests in, amongst other fields, the law, policy and practice of free speech and privacy in India. &lt;a href="http://www.ficci.com/"&gt;FICCI&lt;/a&gt; is a non-governmental, non-profit association of approximately 250,000 Indian bodies corporate. It is the oldest and largest organisation of businesses in India and represents a national corporate consensus on policy issues. &lt;a href="http://www.dsci.in/"&gt;DSCI&lt;/a&gt; is an initiative of the National Association of Software and Service Companies, a non-profit trade association of Indian information technology ("IT") and business process outsourcing ("BPO") concerns, which promotes data protection in India. &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt; is a London-based non-profit organisation that defends and promotes the right to privacy across the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy in the Common Law and in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Because privacy is a multi-faceted concept, it has rarely been singly regulated. A taxonomy of privacy yields many types of individual and social activity to be differently regulated based on the degree of harm that may be caused by intrusions into these activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature of the activity is significant; activities that are implicated by the state are attended by public law concerns and those conducted by private persons &lt;i&gt;inter se&lt;/i&gt; demand market-based regulation. Hence, because the principles underlying warranted police surveillance differ from those prompting consensual collections of personal data for commercial purposes, legal governance of these different fields must proceed differently. For this and other reasons, the legal conception of privacy — as opposed to its cultural construction – has historically been diverse and disparate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, specific legislations have dealt separately with individual aspects of privacy in tort law, constitutional law, criminal procedure and commercial data protection, amongst other fields. The common law does not admit an enforceable right to privacy.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; In the absence of a specific tort of privacy, various equitable remedies, administrative laws and lesser torts have been relied upon to protect the privacy of claimants.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of whether privacy is a constitutional right has been the subject of limited judicial debate in India. The early cases of &lt;i&gt;Kharak Singh&lt;/i&gt; (1964)&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and &lt;i&gt;Gobind&lt;/i&gt; (1975)&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; considered privacy in terms of physical surveillance by the police in and around the homes of suspects and, in the latter case, the Supreme Court of India found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; case (1994),&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty guaranteed by Article 21 of the Constitution of India. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with a book, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case (1996)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; and, while finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011)&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;that de-criminalised consensual homosexual acts; however, this judgment is now in appeal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Attempts to Create a Statutory Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The silence of the common law leaves the field of privacy in India open to occupation by statute. With the recent and rapid growth of the Indian IT and BPO industry, concerns regarding the protection of personal data to secure privacy have arisen. In May 2010, the European Union ("EU") commissioned an assessment of the adequacy of Indian data protection laws to evaluate the continued flow of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian data protection laws to safeguard personal data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Conducted amidst negotiations for a free trade agreement between India and the EU, the failed assessment potentially impeded the growth of India’s outsourcing industry that is heavily reliant on European and North American business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology, Government of India, issued subordinate legislation under the rule-making power of the Information Technology Act, 2000 ("IT Act"), to give effect to section 43A of that statute. These rules – the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 ("Personal Data Rules")&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; — were subsequently reviewed by the Committee on Subordinate Legislation of the 15&lt;sup&gt;th&lt;/sup&gt; Lok Sabha.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The Committee found that the Personal Data Rules contained clauses that were ambiguous, invasive of privacy and potentially illegal.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a draft privacy legislation called the ‘Right to Privacy Bill, 2011’, which was drafted within the Department of Personnel and Training ("DoPT") of the Ministry of Personnel, Public Grievances and Pensions, Government of India,  was made available on the internet along with several file notings ("First DoPT Bill"). The First DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. The First DoPT Bill was referred to a Committee of Secretaries chaired by the Cabinet Secretary which, on 27 May 2011, recommended several changes including re-drafts of the chapters relating to interception of communications and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aware of the need for personal data protection laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah, a retired Chief Justice of the Delhi High Court who delivered the judgment in the &lt;i&gt;Naz Foundation&lt;/i&gt; case, to study foreign privacy laws, analyse existing Indian legal provisions and make specific proposals for incorporation into future Indian law. The Justice Shah Group of Experts submitted its Report to the Planning Commission on 16 October 2012 wherein it proposed the adoption of nine National Privacy Principles.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in laws relating to interception of communications, video and audio recordings, use of personal identifiers, bodily and genetic material, and personal data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure and Special Laws Relating to Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases first brought the questions of permissibility and limits of police surveillance to the Supreme Court, the power to collect information and personal data of a person is firmly embedded in Indian criminal law and procedure. Surveillance is an essential condition of the nation-state; the inherent logic of its foundation requires the nation-state to perpetuate itself by interdicting threats to its peaceful existence. Surveillance is a method by which the nation-state’s agencies interdict those threats. The challenge for democratic countries such as India is to find the optimal balance between police powers of surveillance and the essential freedoms of its citizens, including the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regime governing the interception of communications is contained in section 5(2) of the Indian Telegraph Act, 1885 ("Telegraph Act") read with rule 419A of the Indian Telegraph Rules, 1951 ("Telegraph Rules"). The Telegraph Rules were amended in 2007&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; to give effect to, amongst other things, the procedural safeguards laid down by the Supreme Court in the &lt;i&gt;PUCL&lt;/i&gt; case. However, India’s federal scheme permits States to also legislate in this regard. Hence, in addition to the general law on interceptions contained in the Telegraph Act and Telegraph Rules, some States have also empowered their police forces with interception functions in certain cases.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Ironically, even though some of these State laws invoke heightened public order concerns to justify their invasions of privacy, they establish procedural safeguards based on the principle of probable cause that surpasses the Telegraph Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the IT Act permit the interception and monitoring of electronic communications — including emails — to collect traffic data and to intercept, monitor, and decrypt electronic communications.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The proposed Privacy (Protection) Bill, 2013 and Roundtable Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this background, the proposed Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous roundtable meetings to seek comments and opinion on the proposed Privacy (Protection) Bill, 2013 took place at:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: April 13, 2013 (&lt;a class="external-link" href="http://bit.ly/17REl0W"&gt;http://bit.ly/17REl0W&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bangalore: April 20, 2013 (&lt;a class="external-link" href="http://bit.ly/162t8rU"&gt;http://bit.ly/162t8rU&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chennai: May 18, 2013 (&lt;a class="external-link" href="http://bit.ly/12ICGYD"&gt;http://bit.ly/12ICGYD&lt;/a&gt;) with 25 participants.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mumbai, June 15, 2013 (&lt;a class="external-link" href="http://bit.ly/12fJSvZ"&gt;http://bit.ly/12fJSvZ&lt;/a&gt;) with 20 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kolkata: July 13, 2013 (&lt;a class="external-link" href="http://bit.ly/11dgINZ"&gt;http://bit.ly/11dgINZ&lt;/a&gt;) with 25 participants; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: August 24, 2013 (&lt;a class="external-link" href="http://bit.ly/195cWIf"&gt;http://bit.ly/195cWIf&lt;/a&gt;) with 40 participants.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The roundtable meetings were multi-stakeholder events with participation from industry representatives, lawyers, journalists, civil society organizations and Government representatives. On an average, 75 per cent of the participants represented industry concerns, 15 per cent represented civil society and 10 per cent represented regulatory authorities. The model followed at the roundtable meetings allowed for equal participation from all participants.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, Dan Solove, “A Taxonomy of Privacy” &lt;i&gt;University of Pennsylvania Law Review&lt;/i&gt; (Vol. 154, No. 3, January 2006).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt; [2003] UKHL 53.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B plc&lt;/i&gt; [2003] QB 195; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office &lt;/i&gt;[2001] EWCA Civ 2081; &lt;i&gt;R (Ellis)&lt;/i&gt; v. &lt;i&gt;Chief Constable of Essex Police&lt;/i&gt; [2003] EWHC 1321 (Admin).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; AIR 1963 SC 1295.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh&lt;/i&gt; AIR 1975 SC 1378.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;R. Rajagopal&lt;/i&gt; v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt; AIR 1995 SC 264.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; (1997) 1 SCC 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A Division Bench of the Supreme Court of India comprising Kuldip Singh and Saghir Ahmad, JJ, found that the procedure set out in section 5(2) of the Indian Telegraph Act, 1885 and rule 419 of the Indian Telegraph Rules, 1951 did not meet the “just, fair and reasonable” test laid down in &lt;i&gt;Maneka Gandhi&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; AIR 1978 SC 597 requisite for the deprivation of the right to personal liberty, from whence the Division Bench found a right to privacy emanated, guaranteed under Article 21 of the Constitution of India. Therefore, Kuldip Singh, J, imposed nine additional procedural safeguards that are listed in paragraph 35 of the judgment.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;i&gt;Naz Foundation&lt;/i&gt; v. &lt;i&gt;Government of NCT Delhi&lt;/i&gt; (2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. The 2010 data adequacy assessment of Indian data protection laws was conducted by Professor Graham Greenleaf. His account of the process and his summary of Indian law can found at Graham Greenleaf, "Promises and Illusions of Data Protection in Indian Law"&lt;i&gt; International Data Privacy Law&lt;/i&gt; (47-69, Vol. 1, No. 1, March 2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Rules were brought into effect vide Notification GSR 313(E) on 11 April 2011. CIS submitted comments on the Rules that can be found here – &lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"&gt;http://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The Committee on Subordinate Legislation, a parliamentary ‘watchdog’ committee, is mandated by rules 317-322 of the Rules of Procedure and Conduct of Business in the Lok Sabha (14&lt;sup&gt;th&lt;/sup&gt; edn., New Delhi: Lok Sabha Secretariat, 2010) to examine the validity of subordinate legislation.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. See the 31&lt;sup&gt;st&lt;/sup&gt; Report of the Committee on Subordinate Legislation that was presented on 21 March 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. See paragraphs 7.14-7.17 on pages 69-72 of the Report of the Group of Experts on Privacy, 16 October 2012, Planning Commission, Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. See, the Indian Telegraph (Amendment) Rules, 2007, which were brought into effect &lt;i&gt;vide&lt;/i&gt; Notification GSR 193(E) of the Department of Telecommunications of the Ministry of Communications and Information Technology, Government of India, dated 1 March 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. See, &lt;i&gt;inter alia&lt;/i&gt;, section 14 of the Maharashtra Control of Organised Crime Act, 1999; section 14 of the Andhra Pradesh Control of Organised Crime Act, 2001; and, section 14 of the Karnataka Control of Organised Crime Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. See, the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data and Information) Rules, 2009 vide GSR 782 (E) dated 27 October 2009; and, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 vide GSR 780 (E) dated 27 October 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings'&gt;https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-21T10:03:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government">
    <title>e - DIRAP Google+ Hangout: Open Government</title>
    <link>https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government</link>
    <description>
        &lt;b&gt;The e-DIRAP Hangout on Open Government was held on Thursday, 25 July 2013. It brought together nine professionals from Australia, India, Indonesia, Japan, Malaysia and the Philippines to discuss the wide spectrum of issues surrounding open government.
&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;See the original &lt;a class="external-link" href="http://digitalreview.asia/resources/e-dirap-google-hangout-on-open-government/e-dirap-google-hangout-3-open-government/"&gt;published in Digital Review Asia here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The idea of open government has been around for hundreds of years but the contemporary use of the term is influenced by the rapid advancement of ICTs and by the open source movement. "Just as open source software allows users to change and contribute to the source code of their software, open government now means government where citizens not only have access to information, documents and proceedings, but can also become participants in a meaningful way."&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;There is now increasing pressure for governments to be more open with their digital documents and processes, and to interact with citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To assess whether your government is open, a good starting point is the Open Government Partnership minimum eligibility criteria that has four key areas:&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Fiscal transparency related to open budget system&lt;/li&gt;
&lt;li&gt;Access to information, e.g. an access to information law that guarantees the public’s right to information and access to government data.&lt;/li&gt;
&lt;li&gt;Disclosures related to elected or senior public officials, e.g. public disclosure of their income and assets.&lt;/li&gt;
&lt;li&gt;Citizen engagement.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The  panelists discussed open government initiatives in their respective   countries, the challenges they face, and open source tools for open   government.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Open Government Initiatives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;India&lt;br /&gt;&lt;/b&gt;The Government of India has decided to use royalty free open standards for all e-government data. The government has also shortlisted a number of open standards. India’s data portal, data.gov.in was recently launched and the number of datasets has been increasing. In January 2013 there were 89 datasets and in half a year,this has increased to over 3,000 datasets. Forty-five government departments are involved in this initiative and six apps have been created. The Planning Commission recently had a hackathon participated by about 1,900 people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indonesia&lt;/b&gt;&lt;br /&gt;Indonesia is one of the founding governments of the Open Government Partnership.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; along with the Philippines and six other countries. The emphasis of open government in Indonesia is not only the "supply side" (i.e. government providing access to data and information). It is also looking at generating demand for open government by empowering citizens to access and analyse data and information, voice their concerns and advocate for openness in government. To empower citizens, the Government of Indonesia has a number of projects such as "Satu Layanan"&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; or "One Service", a web portal where citizens can find government information and services; “One Map”, to promote collaboration between different government ministries and agencies, and also civil society in integrating datasets; and "Lapor"&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; that allow citizens to report wrongdoings in public services using SMS, Twitter or through the website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a research study conducted by the World Wide Web Foundation,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; the Government of Indonesia is working on making public data available. Public data includes social - economic data, development data and census data held by the National Statistic Bureau, as well as information on how the data is obtained and measured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The research report also found that that there is a low demand from civil society and citizens for open government and open data. Moreover, cooperation between civil society and government in the implementation of open government is not strong enough. Several donors in Indonesia have provided support to develop the capacity of civil society groups that are part of the Steering Committee of the Open Government Partnership. Hivos’ Southeast Asia Technology and Transparency Initiative&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; is working with both civil society and government in Indonesia and the Philippines to promote transparency and accountability in public institutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Japan&lt;/b&gt;&lt;br /&gt;In Japan, the major focus is in the creation and launch of the open data portal this year. How much impact it will make and how it can be measured is a concern, and this is a worldwide challenge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Malaysia&lt;/b&gt;&lt;br /&gt;The Sinar Project&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; in Malaysia promotes transparency, governance and citizen involvement, and uses open source technology to make information accessible to Malaysian citizens. The project has learned that for countries with poor democracy like Malaysia, basic information about government is available but not easily accessible to the public. The government is not familiar with interacting with citizens especially online. Unlike places with advanced statistics and open data, open government in Malaysia is at a nascent stage and is about having information about government representatives online and what bills are being passed in parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Philippines&lt;/b&gt;&lt;br /&gt;In the Philippines, President Aquino announced that the Freedom of Information Bill will be a priority bill for Congress this year, but citizens are cynical about the passing of this bill because it has been under consideration for three years. The Office of the President has received support from the World Bank last year for an Open Data Project using CKAN and the open data portal will be at http://data.gov.ph. The Philippine Government Interoperability Framework was convened last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;PhilHealth or the Philippine Health Insurance Corporation&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; attempted to open up data, however even though there was political will to open up data, this was insufficient. A clear policy framework and change management (particularly, removing the fear of openness among employees) was needed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, PhilHealth did not have the capacity and competency to ensure that the health data released, that includes diagnosis and treatment procedures, will not be reverse engineered to identify people. Health data is particularly sensitive due to the social stigma of certain health disorders, for example, those with tuberculosis may be assumed to have HIV/AIDS. When data is opened up, there are security and privacy implications. Developing countries need help and it is important to work together to come up with policies, protocols and algorithms to protect the health privacy of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Melbourne, Australia&lt;br /&gt;&lt;/b&gt;In Melbourne, Australia, local government efforts to engage with citizens more fully through online and offline platforms include experimenting with wiki-based policy development, smart cities initiatives and digital strategies. Through conversations with policymakers, some key themes were identified. First, openness is not the same as participation, and encouraging effective participation is a challenge. Public spaces need to be “programmed” to support participation, and opening up data is not sufficient. It is necessary to develop strategies for outreach to a diverse group and encourage substantive participation particularly from those who are not online and not as competent in data management.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, because many telecommunications platforms that make data available are privately owned, there is a tension between commercial interest for secrecy and public demand to make data open. It is also a challenge for government to engage with citizens over an infrastructure that is privately owned, e.g. Facebook, Twitter and Google that place constraints on how citizens can be engaged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Malaysia, Singapore and Thailand with high levels of digital broadband penetration and online users are not part of the Open Government Partnership despite the fact that most of the government departments and data are online. This is because these countries do not meet the minimum eligibility criteria for Open Government Partnership. For instance, they do not have freedom of the press and without it media and civil society cannot make use of the data for reporting for fear of prosecution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also a lack of political will to disclose assets of public officials and procurement decisions.&lt;br /&gt;&lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Challenges&lt;/span&gt;&lt;br /&gt;Open data is often associated with open government, but opening up data does not make a government open. Making data open has a set of challenges, but open government also has an important civil society component to create demand for open government and make meaningful use of the open data. There is also a private sector component that needs to be considered, particularly related to the mechanisms public participation over privately owned telecommunications infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Challenges are faced at both the supply and demand sides. From the government side, many countries do not have the capacity to interact effectively with citizens. From the citizens’ side, many countries face the low demand for open government. Yet, in the case of Malaysia, even if public demand for open government is high, the missing component is a strong and large enough civil society base that can handle and analyse data independently and question policy. Dealing with the demand when data is open is another challenge. The challenges of opening up data If the original data is not digitized, how do we ensure that it becomes part of open data as defined by the Open Knowledge Foundation.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; For countries such as Iraq that are simultaneously introducing e-government systems and open government, implementation is hampered by the lack of e-government data standards for specific domains such as human resources management or financial management.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy is one of the biggest concerns that the open data and open government movements faces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lack of exposure to privacy issues&lt;/b&gt;: Some open data activists are not aware that privacy should be an exception in disclosure requirement of government open data policies. If no public interest is served through disclosing personal information then there is no need to infringe upon the rights of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy only for the individual&lt;/b&gt;: There is often a western notion of what constitutes privacy in which people worry about privacy infringement only at the level of the individual. But in India, if the open dataset showed HIV/AIDS prevalence at the village level that could result in stigma and discrimination of particular villages. The privacy problem exists not only at the individual level, but also at the level of family, community and geographical unit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Underestimating re-identification research&lt;/b&gt;: Today we deal with the privacy challenge by using techniques like anonymization and obfuscation, but the problem is that re-identification research is getting more sophisticated and the more datasets that people have access to and are able to overlay upon one another, the more likely it is to re-identify anonymous or obfuscated data. This is an issue that the open data movement should take seriously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conflict with the transparency movement&lt;/b&gt;: The open data movement has not fully adopted principles from the transparency movement. This can be clearly seen in some countries where freedom of information activists are being killed or assaulted, but open data activists are usually safe because they are focused on analyzing the data that the governments have opened up. The provision of large quantities of data by government may be a distraction strategy that takes away what is important for civil society and democracy. Moreover, open data should not be the means to legitimize and increase the levels of surveillance occurring at the bottom of the pyramid. Instead, we need to encourage more eyes to watch the top of the pyramid because single actions there can have dramatic consequences for public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For public participation in local government, FixMyStreet&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; is an open source software first developed by MySociety in the UK that allows the public to report on issues on a map. MySociety has also developed a number of other tools to help with government’s engagement with citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OpenSpending&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; is used to visualize budget data and how tax money is being spent. This is a useful tool for transparency developed by the Open Knowledge Foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CKAN&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; is an open source data portal platform that many countries have used for their open data portal. This is also an Open Knowledge Foundation project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Sunlight Foundation&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; and Code for America&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; are organizations that develop a number of open source tools that can be re-used and adapted by countries in Asia and the Pacific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A free de-identification software for automated location and removal of protected health information in free text from medical records has been developed by PhysioNet.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Strategic Alliance Against Impoverishment (SAPA) provides poverty  data on their website and maps the location of their projects.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Final Words for the Way Forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Make open government an election issue and elect officials that are open.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demands for engagement may conflict with political goals of representatives in terms of the election cycle. Perhaps these open government issues need a third space to insulate them from political forces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For people interested in implementing technical solutions, it is important to also look into non-technical issues raised by the Open Government Partnership and the Declaration on Parliamentary Openness.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Make data available based on the needs of citizens and provide a platform for citizens’ feedback to inform the kinds of data to open up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Open government should be relevant to citizens and result in improving the welfare of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Improve citizens’ data literacy and use open data in decision-making.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Openness is only a means and in the end we need governments that are accountable, that protect the public interest, that protect the weakest members of society, and they are not automatically guaranteed through open government. We should not fetishize the means and forget the ends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the top we need political leadership with strong inclination and will, and on the ground we need close coordination between civil society and government so that government does understand what is needed and sense what impact they can make by opening themselves up to their society or to their own operations. In the long term the key is how much the government can transform itself in terms of its own operations, and how much data they can produce in a reusable format and how much data they can use from other agencies to improve their operations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The core of open government is about partnership between government, civil society and the private sector, and this is not easy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Danny Butt, Research Fellow in Participatory Public Space, University of Melbourne, Australia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Venkatesh Hariharan, Director, Knowledge Commons, India (previously, Head of Public Policy at Google India)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Maryati Abdullah, National Coordinator, Publish What You Pay, Indonesia (also Steering Committee Member of Open Government Partnership)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Yanuar Nugroho, Director and Expert Adviser to the Head of the President's Delivery Unit for Development Monitoring and Oversight (UKP4), Indonesia – to be confirmed&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tomoaki Watanabe, Executive Research Fellow, Centre for Global Communications, International University of Japan (also Executive Director of Common Sphere - the host of Creative Commons Japan, and Co-founder of Open Knowledge Foundation Japan)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shita Laksmi, Program Manager, Southeast Asia Technology and Transparency Initiative, Hivos Regional Office Southeast Asia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Alvin B. Marcelo, Co-chair, Asia eHealth Information Network &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Moderator: Khairil Yusof, Co-founder, Sinar Project, Malaysia (also e-DIRAP team member)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e-DIRAP Hangout Coordinator: Christine Apikul&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See 20 Basics of Open Government, http://basics.open4m.org/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. http://www.opengovpartnership.org/eligibility&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. http://www.opengovpartnership.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. http://satulayanan.net&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. http://lapor.ukp.go.id; See also http://www.techinasia.com/lapor-deeper-indonesias-newest-anticorruption-weapon/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. “Even though the Law on Freedom of Information has been in place for five years and while some ministries and agencies have made data available online, it is often difficult to obtain and make use of the data due to bureaucratic procedures, charging requirements, copyright restrictions or a general reluctance to provide access to government data to external users.” World Wide Web Foundation, Open Government Data: Readiness Assessment Indonesia, 28 June 2013, http://www.webfoundation.org/2013/06/new-research-open-data-in-indonesia/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. http://seatti.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. http://sinarproject.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. http://www.philhealth.gov.ph&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. http://okfn.org/opendata/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. http://www.fixmystreet.com&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. http://openspending.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. http://ckan.org&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. http://sunlightfoundation.com/tools&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. http://codeforamerica.org/apps/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. http://www.physionet.org/physiotools/deid/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. http://www.sapa.or.id/&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. http://www.openingparliament.org/declaration&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government'&gt;https://cis-india.org/openness/blog-old/digital-review-asia-pacific-christine-apikul-e-dirap-google-hangout-open-government&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Christine Apikul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-09-18T10:43:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india">
    <title>Privacy and Surveillance in India</title>
    <link>https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india</link>
    <description>
        &lt;b&gt;Sunil Abraham, Executive Director from the Centre for Internet and Society will give a talk on privacy and surveillance in India at this event organised by the Centre for Culture, Media and Governance, Jamia Millia Islamia on September 18, 2013. The talk will be held at Network Governance Lab, CCMG, Jamia Millia Islamia in New Delhi at 11.30 a.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf" class="internal-link"&gt;Click to read the brochure&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Abstract&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The talk will cover the development of privacy policy in India over the last 3 years, particularly in relation to projects such as NATGRID, CMS and UID. Special attention will be paid to the Justice A.P. Shah committee report, the last leak of the privacy bill from the DoPT and also the citizen draft of the privacy bill developed by the Centre for Internet and Society. International experiences such as Snowden's disclosures and the development of communication surveillance principles developed by EFF and others will be compared and contrasted with the Indian context.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About the Speaker&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil is the executive director of the Centre for Internet and Society (CIS), Bangalore. CIS is a 4 year old policy and academic research organisation that focuses on accessibility by the disabled, intellectual property rights policy reform, openness [Free/Open Source Software, Open Standards, Open Content, Open Access and Open Educational Resources], internet governance, telecom, digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He is also the founder of Mahiti, a social enterprise aiming to reduce the cost and complexity of information and communication technology for the voluntary sector by using free software. Sunil continues to serve on the board of Mahiti. He is an Ashoka fellow and was elected for a Sarai FLOSS Fellowship. For three years, Sunil also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme, serving 42 countries in the Asia-Pacific region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil currently serves on the advisory boards of Open Society Foundations - Information Programme, Mahiti, Samvada and International Centre for Free/Open Source Software.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india'&gt;https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-13T09:49:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf">
    <title>Privacy and Surveillance Talk by Sunil Abraham</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf'&gt;https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-13T09:47:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests">
    <title>Transparency Reports — A Glance on What Google and Facebook Tell about Government Data Requests</title>
    <link>https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests</link>
    <description>
        &lt;b&gt;Transparency Reports are a step towards greater accountability but how efficacious are they really?  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Prachi Arya examines the transparency reports released by tech giants with a special focus on user data requests made to &lt;a class="external-link" href="https://www.google.co.in/"&gt;Google&lt;/a&gt; and &lt;a class="external-link" href="https://www.facebook.com/"&gt;Facebook&lt;/a&gt; by Indian law enforcement agencies. &lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The research was conducted as part of the 'SAFEGUARDS' project that CIS is doing with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;According to a recent &lt;a class="external-link" href="http://www.comscore.com/Insights/Press_Releases/2013/8/comScore_Releases_the_2013_India_Digital_Future_in_Focus_Report"&gt;comScore Report&lt;/a&gt; India has now become the third largest internet user with nearly 74 million citizens on the Internet, falling just behind China and the United States. The report also reveals that Google is the preferred search engine for Indians and Facebook is the most popular social media website followed by &lt;a class="external-link" href="http://www.linkedin.com/"&gt;LinkedIn&lt;/a&gt; and &lt;a class="external-link" href="https://twitter.com/"&gt;Twitter&lt;/a&gt;. While users posting their photos on Facebook can limit viewership through privacy settings, there isn’t much they can do against government seeking information on their profiles. All that can be said for sure in the post-Snowden world is that large-scale surveillance is a reality and the government wants it on their citizen’s online existence. In this Orwellian scenario, transparency reports provide a trickle of information on how much our government finds out about us.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first transparency report was released by Google three years ago to provide an insight into &lt;a class="external-link" href="http://googleblog.blogspot.in/2013/04/transparency-report-more-government.html"&gt;‘the scale and scope of government requests for censorship and data around the globe’&lt;/a&gt;. Since then the issuance of such reports is increasingly becoming a standard practice for tech giants. An &lt;a class="external-link" href="https://www.eff.org/who-has-your-back-2013"&gt;Electronic Frontier Foundation Report&lt;/a&gt; reveals that major companies that have followed Google’s lead include Dropbox, LinkedIn, Microsoft and Twitter&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt; with Facebook and Yahoo! being the latest additions&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. Requests to &lt;a class="external-link" href="https://transparency.twitter.com/"&gt;Twitter&lt;/a&gt; and &lt;a class="external-link" href="https://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;Microsoft&lt;/a&gt; from Indian law enforcement agencies were significantly less than requests to Facebook and Google. Twitter revealed that Indian law enforcement agencies made less than 10 requests, none of which resulted in sharing of user information. Out of the 418 requests made to Microsoft by India (excluding Skype), 88.5 per cent were complied with for non-content user data. The &lt;a class="external-link" href="http://info.yahoo.com/transparency-report/"&gt;Yahoo! Transparency Report&lt;/a&gt; revealed that 6 countries surpassed India in terms of the number of user data requests. Indian agencies requested user data 1490 times from 2704 accounts for both content and non-content data and over 50 per cent of these requests were complied with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following is a compilation of what the latest transparency reports issued by Facebook and Google.&lt;/p&gt;
&lt;h3 class="external-link"&gt;&lt;a class="external-link" href="http://www.google.com/transparencyreport/"&gt;Google&lt;/a&gt;&lt;/h3&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"The information we share on the Transparency Report is just a sliver of what happens on the internet"&lt;br /&gt;&lt;b&gt;Susan Infantino&lt;/b&gt;, &lt;i&gt;Legal Director for Google&lt;/i&gt;&lt;/blockquote&gt;
&lt;p class="MsoListParagraph"&gt;Beginning from December 2009, Google has published several biannual transparency reports:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;It discloses traffic data of Google services globally  and  statistics on  removal requests received from copyright owners or   governments as well  as user data requests received from government   agencies and courts. It  also lays down the legal process required to be   followed by government  agencies seeking data.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;There was a 90 per cent increment in the number of &lt;a class="external-link" href="http://www.google.com/transparencyreport/removals/government/"&gt;content removal requests&lt;/a&gt; received by Google from India. The requests complied with included:       
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Restricting videos containing clips from the controversial movie “Innocence of Muslims” from view. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Many YouTube videos and comments as well as some Blogger blog posts   being  restricted from local view for disrupting public order in   relation to  instability in North East India.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For &lt;a class="external-link" href="http://www.google.com/transparencyreport/userdatarequests/IN/"&gt;User Data requests&lt;/a&gt;,    the Google report details the number of user data requests and    users/accounts as well as percentage of requests which were partially or    completely complied with. In India the user data requests more than    doubled from 1,061 in the July-December 2009 period to 2,431 in the    July-December 2012 period. The compliance rate decreased from 79 per   cent in the  July-December 2010 period to 66 per cent in the last   report.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jurisdictions outside the United States can seek disclosure using   Mutual  Legal Assistance Treaties or any ‘other diplomatic and   cooperative  arrangement’. Google also provides information on a   voluntary basis if  requested following a valid legal process if the   requests are in  consonance with international norms, U.S. and the   requesting countries'  laws and Google’s policies.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a class="external-link" href="https://www.facebook.com/about/government_requests"&gt;Facebook&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"We hope this report will be useful to our users in   the ongoing debate  about the proper standards for government requests   for user information  in official investigations." &lt;br /&gt;&lt;b&gt;Colin Stretch&lt;/b&gt;, &lt;i&gt; Facebook General Counsel&lt;/i&gt;&lt;/blockquote&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Facebook inaugurated its first ever transparency report last Tuesday with a promise to continue releasing these reports.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The ‘Global Government Requests Report’ provides information on the     number of requests received by the social media giant for  user/account    information by country and the percentage of requests it  complied  with.   It also includes operational guidelines for law  enforcement   authorities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The report covers the first six months of 2013, specifically till     June 30. In this period India made 3,245 requests from 4,144     users/accounts and half of these requests were complied with. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Jurisdictions outside the United States can seek disclosure by way     of mutual legal assistance treaties requests or letter rogatory. Legal     requests can be in the form of search warrants, court orders or     subpoena. The requests are usually made in furtherance of criminal     investigations but no details about the nature of such investigations     are provided.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Broad or vague requests are not processed. The requests are expected     to include details of the law enforcement authority issuing the    request  and the identity of the user whose details are sought. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;The Indian Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 69 and 69 B of the &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/it_amendment_act2008.pdf"&gt;Information Technology (Amended) Act, 2008&lt;/a&gt; prescribes the procedure and sets safeguards for the Indian   Government   to request user data from corporates. According to section   69,  authorized  officers can issue directions to intercept, monitor or    decrypt  information for the following reasons:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sovereignty      or integrity of India,&lt;/li&gt;
&lt;li&gt;Defence      of India,&lt;/li&gt;
&lt;li&gt;Security      of the state,&lt;/li&gt;
&lt;li&gt;Friendly      relations with foreign states, &lt;/li&gt;
&lt;li&gt;Maintenance of public      order,&lt;/li&gt;
&lt;li&gt;Preventing      incitement to the commission  of any cognizable offence relating to      the above, or&lt;/li&gt;
&lt;li&gt;For      investigation of any offence.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Section 69 B empowers authorized agencies to monitor and collect     information for cyber security purposes, including ‘for identification,     analysis and prevention of intrusion and spread of computer     contaminants’. Additionally, there are rules under section 69 and 69 B     that regulate interception under these provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information can also be requested through the Controller of     Certifying Authority under section 28 of the IT Act which circumvents     the stipulated procedure. If the request is not complied with then the     intermediary may be penalized under section 44.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Government has been increasingly leaning towards greater control over online communications. In 2011, &lt;a class="external-link" href="http://in.news.yahoo.com/court-stays-rs-11-lakh-fine-imposed-yahoo-163503671.html"&gt;Yahoo! was slapped with a penalty of Rs. 11 lakh&lt;/a&gt; for not complying with a section 28 request, which called for email     information of a person on the grounds of national security although     the court subsequently stayed the Controller of Certifying  Authorities'    order.&lt;a href="#_ftn7"&gt; &lt;/a&gt; In the same year the government called for &lt;a href="https://cis-india.org/internet-governance/unkindest-cut-mr-sibal" class="external-link"&gt;pre-screening user content&lt;/a&gt; by internet companies and social media sites to ensure deletion of ‘objectionable content’ before it was published.&lt;a href="#_ftn8"&gt; &lt;/a&gt; Similarly, the government has increasingly sought &lt;a class="external-link" href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights"&gt;greater online censorship&lt;/a&gt;,     using the Information Technology Act to arrest citizens for social     media posts and comments and even emails criticizing the government.&lt;a href="#_ftn9"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What does this mean for Privacy?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Google Transparency Report has thrown light on an increasing     trend of governmental data requests on a yearly basis. The reports     published by Google and Facebook reveal that the number of government     requests from India is second only to the United States. Further, more  than    50 per cent of the requests from India have led to disclosure by nearly all  the    companies surveyed in this post, with Twitter being the single     exception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Undeniably, transparency reports are important  accountability    mechanisms which reaffirm the company’s dedication  towards protecting    its user’s privacy. However, basic statistics and  vague information    cannot lift the veil on the full scope of  surveillance. Even though    Google’s report has steadily moved towards a  more nuanced disclosure, it    would only be meaningful if, &lt;i&gt;inter alia&lt;/i&gt;,  it included a break-up of  the   purpose behind the requests.  Similarly, although Google has also    included a general understanding  of the legal process, more specifics    need to be disclosed. For  example, the report could provide statistics    for notifications to  indicate how often user’s under scrutiny are not    notified. Such  disclosures are important to enhance user understanding    of when their  data may be accessed and for what purposes,  particularly   without  prior or retrospective intimation of the same.  Till such time   the  report can provide comprehensive details about the  kind of    surveillance websites and internet services are subjected to,  it will  be   of very limited use. Its greatest limitation, however, may  lie  beyond   its scope.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The monitoring regime envisioned under the   Information   Technology Act effectively lays down an overly broad   system which may   easily lead to abuse of power. Further, the Indian   Government has become   infamous for their need to control websites and   social media sites.   Now, with the Indian Government’s plan for   establishing the Central   Monitoring System the need for intermediaries   to conduct the   interception may be done away with, giving the government unfettered   access to user data, potentially rendering   corporate transparency of   data requests obsolete.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests'&gt;https://cis-india.org/internet-governance/blog/what-google-and-facebook-tell-about-govt-data-requests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>prachi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-13T09:44:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill">
    <title>Privacy Law Must Fit the Bill </title>
    <link>https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill</link>
    <description>
        &lt;b&gt;The process of updating Indian privacy policy has gained momentum ever since the launch of the UID project and also the leak of the Radia tapes. The Department of Personnel and Training has lead the drafting of privacy bill for the last three years. This bill will ideally articulate privacy principles and establish the office of the privacy commissioner and most importantly have an over-riding effect over 50 odd existing laws, rules and policies with privacy implications.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dc-epaper.com/PUBLICATIONS/DC/DCB/2013/09/09/ArticleHtmls/Privacy-law-must-fit-the-bill-09092013013016.shtml?Mode=1"&gt;published in the Deccan Chronicle&lt;/a&gt; on September 9, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Given the harmonizing impact of the proposed privacy bill, we must ensure that rigorous debate and discussion happens before the bill is finalized otherwise there may be terrible consequences.&lt;/p&gt;
&lt;p&gt;Here is a short list of what can possibly go wrong:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One, the privacy bill ignores the massive power asymmetry in Indian societies undermining the right to information – in other jurisdictions referred to as freedom of information and access to information. The power asymmetry is addressed via a public interest test. The right to privacy would be the same for everyone except when public interest is at stake. This enables protection of the right to privacy to be inversely proportionate to power and almost conversely the requirement of transparency to be directly proportionate to power. In other words, the poor would have greater privacy than a middle-class citizens who in turn would have greater privacy than political and economic elites. And transparency requirements would be greatest for economic and political elites and lower for middle-class citizens and lowest for the poor.  If this is not properly addressed in the language of the bill – privacy activists would have undone the significant accomplishments of the right to information or transparency movement in India over the last decade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the privacy bill has chilling effect on free speech. This can happen either by denying the speaker privacy, or by affording those who are spoken about too much privacy. For the speaker - Know Your Customer (KYC) and data retention requirements for telecom and internet infrastructure necessary to participate in the networked public sphere can result in the death of anonymous and pseudonymous speech. Anonymous and pseudonymous speech must be protected as it is a necessary for good governance, free media, robust civil society, and vibrant art and culture in a democracy.  For those spoken about - privacy is clearly required in certain cases to protect the victims of certain categories of crimes. However, the right to privacy could be abused by those occupying public office and those in public life to censor speech that is in the public interest. If for example a sport person does not publicly drink the aerated drink that he or she endorses in advertisements then the public has a right to know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the privacy bill has a limited scope. Jurisprudence in India derives the right to privacy from the right to life and liberty through several key judgments including &lt;i&gt;Naz Foundation v. Govt. of NCT of Delhi&lt;/i&gt; decided by the Delhi High Court. The right to life and liberty or Article 21 unlike other constitutionally guaranteed fundamental rights does not distinguish between citizens and non-citizens. As a consequence the privacy bill must also protect residents, visitors and other persons who may never visit India, but whose personal information may travel to India as part of the global outsourcing phenomena. Also the obligations and safeguards under the privacy bill must equally apply to both the state and the private sector entities that could potentially infringe upon the individual's right to privacy. Different levels of protection may be afforded to citizens, residents, visitors and everybody else. Government and private sector data controllers may be subject to different regulations – for ex. an intelligence agency may not require 'consent' of the data subject to collect personal information and may only provide 'notice' after the investigation has cleared the suspect of all charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Four, the privacy bill is expected to fix poorly designed technology. There are two diametrically opposite definitions of projects like NATGRID, CMS and UID. The government definition is that all these systems will allow only for targeted interception and surveillance, however the majority of civil society believes that these system will be used for blanket surveillance. If these systems are indeed built in a manner that supports blanket surveillance then legal band-aid in the form of a new law or provision that prohibits blanket surveillance will be a complete failure. The principle of 'privacy by design' is the only way to address this. For ex. shutters of digital cameras are silent and this allows for a particular form of voyeurism called upskirt. Almost a decade ago, the Korean government enacted a law that requires camera and mobile phone manufacturers to ensure that audio recording of a mechanical shutter is played every time the camera function is used. It is also illegal for the user to circumvent or disable this feature. In this example, the principle of notice is hardwired within the technology itself. To remix Spiderman's motto – with great power comes great temptation. We know that a rogue NTRO official installed a spy camera in the office toilet to make recording female colleagues and most recently that NSA officers confessed to spying on their love interests. If the technology can be abused it will be abused. Therefore legal safeguards are a poor substitute for technological safeguards. We need both simultaneously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five, the bill does not require compliance with internationally accepted privacy principles including the ones discussed so far 'consent', 'notice' and 'privacy by design'. Apart from human rights considerations – the most important imperative to modernize India privacy laws is trade. We have a vibrant ITES, BPO and KPO sector which handles personal information of foreigners mostly from the North American and European continents.  The Justice AP Shah committee in October 2012 identified privacy principle that required for India - notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability. A privacy bill that does include all these principles will increase the regulatory compliance overhead for Indian enterprise with foreign clients and for multinationals operating in India. There is also the risk that privacy regulators in these jurisdictions will ban outsourcing to Indian firms because our privacy laws are not adequate by their standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, it is not sufficient for India to enact a privacy law it is essential that we get it right so that there are no unintended consequences on other equally important rights and dimensions of our democracy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill'&gt;https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-12T06:25:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian">
    <title>An Interview with Suresh Ramasubramanian </title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian</link>
    <description>
        &lt;b&gt;Suresh Ramasubramanian is the ICS Quality Representative - IBM SmartCloud at IBM. We from the Centre for Internet and Society conducted an interview on cybersecurity and issues in the Cloud. &lt;/b&gt;
        &lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;You have done a lot of work around cybersecurity and issues in the Cloud. Could you please tell us of your experience in these areas and the challenges facing them?&lt;/b&gt;&lt;br /&gt;a. I have been involved in antispam activism from the late 1990s and have worked in ISP / messaging provider antispam teams since 2001. Since 2005, I expanded my focus to include general cyber security and privacy, having written white papers on spam and botnets for the OECD, ITU and UNDP/APDIP. More recently, have become a M3AAWG special advisor for capacity building and outreach in India.&lt;br /&gt;&lt;br /&gt;In fact capacity building and outreach has been the focus of my career for a long time now. I have been putting relevant stakeholders from ISPs, government and civil society in India in touch with their counterparts around the world, and, at a small level, enabling an international exchange of ideas and information around antispam and security.&lt;br /&gt;&lt;br /&gt;This was a challenge over a decade back when I was a newbie to antispam and it still is. People in India and other emerging economies, with some notable exceptions, are not part of the international communities that have grown in the area of cyber security and privacy.&lt;br /&gt;&lt;br /&gt;There is a prevalent lack of knowledge in this area, which combined with gaps in local law and its enforcement. There is a tendency on the part of online criminals to target emerging and fast growing economies as a rich source of potential victims for various forms of online crime, and sometimes as a safe haven against prosecution.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;In a recent public statement Google said "Cloud users have no legitimate expectation of privacy. Do you agree with this statement?&lt;/b&gt;&lt;br /&gt;a. Let us put it this way. All email received by a cloud or other Internet service provider for its customers is automatically processed and data mined in one form or the other. At one level, this can be done for spam filtering and other security measures that are essential to maintain the security and stability of the service, and to protect users from being targeted by spam, malware and potential account compromises.&lt;br /&gt;&lt;br /&gt;The actual intent of automated data mining and processing should be transparently provided to customers of a service, with a clearly defined privacy policy, and the deployment of such processing, and the “end use” to which data mined from this processing is put, are key to agreeing or disagreeing with such a statement.&lt;br /&gt;&lt;br /&gt;It goes without saying that such processing must stay within the letter, scope and spirit of a company’s privacy policy, and must actually be structured to be respectful of user privacy.&lt;br /&gt;&lt;br /&gt;Especially where mined data is used to provide user advertising or for any other commercial purpose (such as being aggregated and resold), strict adherence to a well written privacy policy and periodic review of this policy and its implementation to examine its compliance to laws in all countries that the company operates in are essential.&lt;br /&gt;&lt;br /&gt;There is way too much noise in the media for me to usefully add any more to this issue and so I will restrict myself to the purely general comments above.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;What ways can be privacy of an individual be compromised on the cloud? What can be done to prevent such instances of compromise?&lt;/b&gt;&lt;br /&gt;a. All the recent headlines about companies mining their own users’ data, and yet more headlines about different countries deploying nationwide or even international lawful intercept and wiretap programs, aside, the single largest threat to individual privacy on the cloud is, and has been for years before the word “cloud” came into general use, the constant targeting of online users by online criminals with a variety of threats including scams, phish campaigns and data / account credential stealing malware.&lt;br /&gt;&lt;br /&gt;Poor device security is another threat – one that becomes even more of a serious problem when the long talked about “internet of things” seems set to become reality, with cars, baby monitors, even Bluetooth enabled toilets, and more dangerously, critical national infrastructure such as power plants and water utilities becoming accessible over the Internet but still running software that is basically insecure and architected with assumptions that date back to an era when there was no conception or need to connect these to the Internet.&lt;br /&gt;&lt;br /&gt;Someone in Bluetooth range with the appropriate android application being able to automatically flush your toilet and even download a list of the dates and times when you last used it is personally embarrassing. Having your bank account broken into because your computer got infected with a virus is even more damaging. Someone able to access a dam’s control panel over the internet and remotely trigger the dam’s gates to open can cause far more catastrophic damage.&lt;br /&gt;&lt;br /&gt;The line between security and privacy, between normal business practice and unacceptable, even illegal behaviour, is sometimes quite thin and in a grey area that may be leveraged to the hilt for commercial and/or national security interests. However, scams, malware, exploits of insecure systems and similar threats are well on the wrong side of the “criminal” spectrum, and are a clear and present danger that cause far more than an embarrassing or personally damaging loss of privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;How is the jurisdiction of the data on the cloud determined?&lt;/b&gt;&lt;br /&gt;This is a surprisingly thorny question. Normally, a company is based in a particular country and has an end user agreement / terms of service that makes its customers / users accept that country’s jurisdiction.&lt;br /&gt;&lt;br /&gt;However, a cloud based provider that does business around the world may, in practice, have to comply to some extent at least, with that country’s local laws – at any rate, in respect to its users who are citizens of that country. And any cloud product sold to a local business or individual by a salesman from the vendor’s branch in the country would possibly fall under a contract executed in the country and therefore, subject to local law.&lt;br /&gt;&lt;br /&gt;The level of compliance for data retention and disclosure in response to legal processes will possibly vary from country to country – ranging from flat refusals to cooperate (especially where any law enforcement request for data are for something that is quite legal in the country the cloud provider is based in) to actual compliance.&lt;br /&gt;&lt;br /&gt;In practice this may also depend on what is at stake for the cloud vendor in complying or refusing to comply with local laws – regardless of what the terms of use policies or contract assert about jurisdiction. The number of users the cloud vendor has in the country, the extent of its local presence in the country, how vulnerable its resident employees and executives are to legal sanctions or punishment.&lt;br /&gt;&lt;br /&gt;In the past, it has been observed that a practical balance [which may be based on business economics as much as it is based on a privacy assessment] may be struck by certain cloud vendors with a global presence, based on the critical mass of users it stands to gain or lose by complying with local law, and the risks it faces if it complies, or conversely, does not comply with local laws – so the decision may be to fight lawsuits or prosecutions on charges of breaking local data privacy laws or not complying with local law enforcement requests for handover of user data in court, or worst case, pulling out of the country altogether.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Currently, big cloud owners are US corps, yet US courts do not extend the same privacy rights to non US citizens. Is it possible for countries to use the cloud and still protect citizen data from being accessed by foreign governments? Do you think a "National Cloud" is a practical solution?&lt;/b&gt;&lt;br /&gt;a. The “cloud” in this context is just “the internet”, and keeping local data local and within local jurisdiction is possible in theory at any rate. Peering can be used to keep local traffic local instead of having it do a roundtrip through a foreign country and back [where it might or might not be subject to another country’s intercept activities, no comment on that].&lt;br /&gt;&lt;br /&gt;A national cloud demands local infrastructure including bandwidth, datacenters etc. that meet the international standards of most global cloud providers. It then requires cloud based sites that provide an equivalent level of service, functionality and quality to that provided by an international cloud vendor. And then after that, it has to have usable privacy policies and the country needs to have a privacy law and a sizeable amount of practical regulation to bolster the law, a well-defined path for reporting and redress of data breaches. There are a whole lot of other technical and process issues before having a national cloud becomes a reality, and even more before such a reality makes a palpable positive difference to user privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;What audit mechanisms of security and standards exist for Cloud Service Providers and Cloud Data Providers?&lt;/b&gt;&lt;br /&gt;a. Plenty – some specific to the country and the industry sector / kind of data the cloud handles. The Cloud Security Alliance has been working for quite a while on CloudAudit, a framework developed as part of a cross industry effort to unify and automate Assertion, Assessment and Assurance of their infrastructure and service.&lt;br /&gt;&lt;br /&gt;Different standards bodies and government agencies have all come out with their own sets of standards and best practices in this area (this article has a reasonable list - &lt;a class="external-link" href="http://www.esecurityplanet.com/network-security/cloud-security-standards-what-youshould-know.html"&gt;http://www.esecurityplanet.com/network-security/cloud-security-standards-what-youshould-know.html&lt;/a&gt;). Some standards you absolutely have to comply with for legal reasons.&lt;br /&gt;&lt;br /&gt;Compliance reasons aside, a judicious mix of standards, and considerable amounts of adaptation in your process to make those standards work for you and play well together.&lt;br /&gt;&lt;br /&gt;The standards all exist – what varies considerably, and is a major cause of data privacy breaches, are incomplete or ham handed implementations of existing standards, any attempt at “checkbox compliance” to simply implement a set of steps that lead to a required certification, and a lack of continuing initiative to keep the data privacy and securitymomentum going once these standards have been “achieved”, till it is time for the next audit at any rate.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;What do you see as the big challenges for privacy in the cloud in the coming years?&lt;/b&gt;&lt;br /&gt;a. Not very much more than the exact same challenges for privacy in the cloud over the past decade or more. The only difference is that any threat that existed before has always amplified itself because the complexity of systems and the level of technology and computing power available to implement security, and to attempt to breach security, is exponentially higher than ever before – and set to increase as we go further down the line.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Do you think encryption the answer to the private and public institutions snooping?&lt;/b&gt;&lt;br /&gt;a. Encryption of data at rest and in transit is a key recommendation of any data privacy standard and cloud / enterprise security policy. Companies and users are strongly encouraged to deploy and use strong cryptography for personal protection. But to call it “the answer” is sort of like the tale of the blind men and the elephant.&lt;br /&gt;&lt;br /&gt;There are multiple ways to circumvent encryption – social engineering to trick people into revealing data (which can be mitigated to some extent, or detected if it is tried on a large cross section of your userbase – it is something that security teams do have to watch for), or just plain coercion, which is much tougher to defend against.&lt;br /&gt;&lt;br /&gt;As a very popular &lt;a class="external-link" href="http://xkcd.com/538/"&gt;XKCD&lt;/a&gt; cartoon that has been shared around social media and has been cited in multiple security papers says -&lt;br /&gt;&lt;br /&gt;“A crypto nerd’s imagination”&lt;br /&gt;&lt;br /&gt;“His laptop’s encrypted. Let us build a million dollar cluster to crack it”&lt;br /&gt;“No good! It is 4096 bit RSA”&lt;br /&gt;“Blast, our evil plan is foiled”&lt;br /&gt;&lt;br /&gt;“What would actually happen”&lt;br /&gt;“His laptop’s encrypted. Drug him and hit him with this $5 wrench till he tells us the password”&lt;br /&gt;“Got it”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Spam is now consistently used to get people to divulge their personal data or otherwise compromise a persons financial information and perpetuate illegal activity. Can spam be regulated? If so, how?&lt;/b&gt;&lt;br /&gt;a. Spam has been regulated in several countries around the world. The USA has had laws against spam since 2003. So has Australia. Several other countries have laws that specifically target spam or use other statutes in their books to deal with crime (fraud, the sale of counterfeit goods, theft..) that happens to be carried out through the medium of spam.&lt;br /&gt;&lt;br /&gt;The problems here are the usual problems that plague international enforcement of any law at all. Spammers (and worse online criminals including those that actively employ malware) tend to pick jurisdictions to operate in where there are no existing laws on their activities, and generally take the precaution not to target residents of the country that they live in. Others send spam but attempt to, in several cases successfully, skate around loopholes in their country’s antispam laws.&lt;br /&gt;&lt;br /&gt;Still others fully exploit the anonymity that the Internet provides, with privately registered domain names, anonymizing proxy servers (when they are not using botnets of compromised machines), as well as a string of shell companies and complex international routing of revenue from their spam campaigns, to quickly take money offshore to a more permissible jurisdiction.&lt;br /&gt;&lt;br /&gt;Their other advantage is that law enforcement and regulatory bodies are generally short staffed and heavily tasked, so that even a spammer who operates in the open may continue his activities for a very long time before someone manages to prosecute him.&lt;br /&gt;&lt;br /&gt;Some antispam laws allow recipients of spam to sue the spammer in small claims courts – which, like regulatory action, has also previously led to judgements being handed out against spammers and their being fined or possibly imprisoned in case their spam has criminal aspects to it, attracting local computer crime laws rather than being mere violations of civil antispam laws.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;There has been a lot of talk about the use of malware like FinFisher and its ability to compromise national security and individual security. Do you think regulation is needed for this type of malware - and if so what type - export  controls? privacy regulation? Use control?&lt;/b&gt;&lt;br /&gt;a. Malware used by nation states as a part of their surveillance activities is a problem. It is further a problem if such malware is used by nation states that are not even nominally democratic and that have long standing records of human rights violations.&lt;br /&gt;&lt;br /&gt;Regulating or embargoing their sale is not going to help in such cases. One problem is that export controls on such software are not going to be particularly easy and countries that are on software export blacklists routinely manage to find newer and more creative ways to attempt to get around these and try to purchase embargoed software and computing equipment of all kinds.&lt;br /&gt;&lt;br /&gt;Another problem is that such software is not produced just by legitimate vendors of lawful intercept gear. Criminals who write malware that is capable of, say, stealing personal data such as bank account credentials are perfectly capable of writing such software, and there is a thriving underground economy in the sale of malware and of “take” from malware such as personal data, credit cards and bank accounts where any rogue nation state can easily acquire products with an equivalent functionality.&lt;br /&gt;&lt;br /&gt;This is going to apply even if legitimate vendors of such products are subject to strict regulations governing their sale and national laws exist regulating the use of such products. So while there is no reason not to regulate / provide judicial and regulatory oversight of their sale and intended use, it should not be seen as any kind of a solution to this problem.&lt;br /&gt;&lt;br /&gt;User education in privacy and access to secure computing resources is probably going to be the bedrock of any initiative that looks to protect user privacy – a final backstop to any technical / legal or other measure that is taken to protect them.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian'&gt;https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-06T09:37:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar">
    <title>Syllabus: “Policy and regulation conducive to rapid ICT sector growth in Myanmar: An introductory course”</title>
    <link>https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar</link>
    <description>
        &lt;b&gt;A five-day course is being offered by LIRNEasia in collaboration with Myanmar ICT Development Organization, with support from the Open Society Foundation and the International Development Research Centre of Canada in Myanmar from September 28 to October 5, 2013.&lt;/b&gt;
        &lt;p&gt;Sunil Abraham will be supporting Prof. Samarajiva on the last optional day of this course in Yangon. Read about the &lt;a class="external-link" href="http://lirneasia.net/capacity-building/introductory-course-on-policy-and-regulation-conducive-to-rapid-ict-sector-growth-in-myanmar/"&gt;Introductory course on “Policy and regulation conducive to rapid ICT sector growth in Myanmar”&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Goal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To enable members of Myanmar civil-society groups (including academics and those from the media) to marshal available research and evidence for effective participation in policy and regulatory processes, thereby improving policy processes and helping achieve the government’s objective of providing ICT access to all.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Outcomes&lt;/h3&gt;
&lt;p&gt;The objective of the course is to produce discerning and knowledgeable consumers of research who are able to engage in an informed manner  in ICT policy and regulatory processes in Myanmar.  The course will benefit those working in government and operators as well.&lt;/p&gt;
&lt;p&gt;At the end of the course attendees will:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Have an understanding of telecom policy and regulatory processes&lt;/li&gt;
&lt;li&gt;Be able to find and assess relevant research &amp;amp; evidence&lt;/li&gt;
&lt;li&gt;Be able to summarize the research in a coherent and comprehensive manner&lt;/li&gt;
&lt;li&gt;Have the necessary tools to improve their communication skills &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;-        Have some understanding of how media functions and how to effectively interact with media&lt;/p&gt;
&lt;h3&gt;Assignments&lt;/h3&gt;
&lt;p&gt;Participants will be formed into teams on Day1.  Each group will work on an assignment that addresses both substantive and procedural aspects of law, policy and regulation. Teams will be assigned topic areas that are being developed into regulations under the new Act.   They will have to make presentations on what the desirable provisions should be.   We will emphasize the procedural aspects as well as the substantive.  Disciplined and focused team presentations, preferably using slides, are required.&lt;/p&gt;
&lt;p&gt;It is necessary to use the Internet for the assignments.  All who have laptops are encouraged to bring them.  Arrangements will be made for Internet connectivity at the hotel.&lt;/p&gt;
&lt;p&gt;Tentative topic areas&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Licensing and authorization regulations&lt;/li&gt;
&lt;li&gt;Essential facilities and anti-competitive practices&lt;/li&gt;
&lt;li&gt;Universal service policy&lt;/li&gt;
&lt;li&gt;Price and quality regulation&lt;/li&gt;
&lt;li&gt;Independence of regulatory agency&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Course schedule&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;Day 1 &lt;br /&gt;(September 28)&lt;/th&gt;&lt;th&gt;Day 2 &lt;br /&gt;(September 29)&lt;/th&gt;&lt;th&gt;Day 3 &lt;br /&gt;(September 30)&lt;/th&gt;&lt;th&gt;Day4 &lt;br /&gt;(October 1)&lt;/th&gt;&lt;th&gt;Day 5 &lt;br /&gt;(October 2) (optional)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:00-10:30&lt;/td&gt;
&lt;td&gt;S1  Introduction to course: What have been the results of reform &amp;amp; rationale for regulation. Rohan Samarajiva (RS)&lt;/td&gt;
&lt;td&gt;S5   Regulatory legitimacy, including procedural legitimacy (RS)&lt;/td&gt;
&lt;td&gt;S10   Challenges of monitoring complex license commitments (HG)&lt;/td&gt;
&lt;td&gt;S14 How does the Internet work? (TBA)&lt;/td&gt;
&lt;td&gt;S16 Internet governance The big picture. Sunil Abraham (SA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30-11:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00-12:00&lt;/td&gt;
&lt;td&gt;S2   Interrogating supply-side indicators &amp;amp; research based on them.  Helani Galpaya (HG)&lt;/td&gt;
&lt;td&gt;S6   Current status of telecom law and policy in Myanmar (RS)&lt;/td&gt;
&lt;td&gt;S11 How evidence is used in policy &amp;amp; regulation (panel discussion, KS, RS&lt;/td&gt;
&lt;td&gt;S15 The art of media interaction (RS)&lt;/td&gt;
&lt;td&gt;S17 Economic &amp;amp; technical interface with telecom industry (RS)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00-13:00&lt;/td&gt;
&lt;td&gt;S3 Finding information on the web.  Roshanthi Lucas Gunaratne (RLG)&lt;/td&gt;
&lt;td&gt;S7 Presenting evidence in slides &amp;amp; written submissions (HG)&lt;/td&gt;
&lt;td&gt;S12 Essential facilities and anti-competitive practices (RS)&lt;/td&gt;
&lt;td&gt;A3 Mock public hearing (RS &amp;amp; panel)&lt;/td&gt;
&lt;td&gt;S18 How Internet is governed within India (SA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00-14:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00-15:00&lt;/td&gt;
&lt;td&gt;A1 Group formation; Assignment explained (HG and RLG)&lt;/td&gt;
&lt;td&gt;S8   Licensing and authorization (RS) &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;A2  Midpoint check on assignment/group work (HG and RLG)&lt;/td&gt;
&lt;td&gt;A4 Mock public hearing &amp;amp; critique (RS &amp;amp; panel)&lt;/td&gt;
&lt;td&gt;S19 Content regulation (TBA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00-15:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-17:00&lt;/td&gt;
&lt;td&gt;S4 Demand-side research (RS)&lt;/td&gt;
&lt;td&gt;S9 Price and quality regulation (RS &amp;amp; HG)&lt;/td&gt;
&lt;td&gt;S13 Universal service subsidies: Theory &amp;amp; practice (RS &amp;amp; KS)&lt;/td&gt;
&lt;td&gt;Reflection on the course&lt;/td&gt;
&lt;td&gt;S20 Surveillance &amp;amp; privacy (SA &amp;amp; RS)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:00&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19:00&lt;/td&gt;
&lt;td&gt;Welcome dinner &lt;br /&gt;Speaker: TBA&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Faculty&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt; is the Executive Director of CIS. He is also a social   entrepreneur and  Free Software advocate. He founded Mahiti in 1998 which   aims to  reduce the cost and complexity of Information and  Communication   Technology for the Voluntary Sector by using Free  Software. Today, &lt;a class="external-link" href="http://www.mahiti.org/"&gt;Mahiti &lt;/a&gt;employs more than 50 engineers and Sunil continues to serve on the board as a board member. Sunil was elected an &lt;a class="external-link" href="http://www.ashoka.org/"&gt;Ashoka&lt;/a&gt; fellow in 1999 to 'explore the democratic potential of the Internet' and was granted a &lt;a class="external-link" href="http://www.sarai.net/"&gt;Sarai&lt;/a&gt; FLOSS fellowship in 2003. Between June 2004 and June 2007, he managed the &lt;a class="external-link" href="http://www.iosn.net/"&gt;International Open Source Network&lt;/a&gt;, a project of the &lt;a class="external-link" href="http://www.beta.undp.org/undp/en/home.html"&gt;UNDP's Asia-Pacific Development Information Programme&lt;/a&gt; serving 42 countries in the Asia-Pacific region. Between September 2007 and June 2008, he also managed &lt;a class="external-link" href="http://www.enrap.org/"&gt;ENRAP&lt;/a&gt;, an electronic network of &lt;a class="external-link" href="http://www.ifad.org/"&gt;International Fund for Agricultural Development&lt;/a&gt; projects in the Asia-Pacific facilitated and co-funded by&lt;a class="external-link" href="http://www.idrc.ca/"&gt; International Development Research Centre&lt;/a&gt;, Canada.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Helani Galpaya&lt;/b&gt; is LIRNEasia’s Chief Executive Officer. Helani leads LIRNEasia’s 2012-2014 IDRC funded research on improving customer life cycle management practices in the delivery of electricity and e-government services using ICTs.    She recently completed an assessment of how the poor in Bangladesh and Sri Lanka use telecenters to access government services.   For UNCTAD and GTZ she authored a report on how government procurement practices can be used to promote a country’s ICT sector and for the World Bank/InfoDev Broadband Toolkit, a report on broadband strategies in Sri Lanka. She has been an invited speaker at various international forums on topics ranging from m-Government to ICT indicators to communicating research to policy makers. Prior to LIRNEasia, Helani worked at the ICT Agency of Sri Lanka, implementing the World-Bank funded e-Sri Lanka initiative.  Prior to her return to Sri Lanka, she worked in the United States at Booz &amp;amp; Co., Marengo Research, Citibank, and Merrill Lynch. Helani holds a Masters in Technology and Policy from the Massachusetts Institute of Technology, and a Bachelor’s in Computer Science from Mount Holyoke College, USA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Roshanthi Lucas Gunaratne&lt;/b&gt; is a Research Manager at LIRNEasia and is currently managing the Ford Foundation Funded project on Giving Broadband Access to the Poor in India.   She is also contributing to the IDRC Customer Lifecycle Management Practices Project by conducting research on customer lifecycle management practices in telecommunication sector in Bangladesh.  Before joining LIRNE&lt;i&gt;asia&lt;/i&gt;, Roshanthi worked at the Global Fund to fight AIDS, Tuberculosis and Malaria, Geneva, Switzerland as a Strategic Information Officer. She contributed to the process of defining the Global Fund Key Performance Indicators, and also worked on improving the performance measurements of their grants. Prior to that, she worked as a telecom project manager at Dialog Telecom, and Suntel Ltd in Sri Lanka. As Suntel she managed the design and implementation of corporate customer projects.  She holds a MBA from the Judge Business School, University of Cambridge, UK and a BSc. Eng (Hons) specializing in Electronics and Telecommunication from the University of Moratuwa, Sri Lanka.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajat Kathuria, PhD&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rohan Samarajiva, PhD,&lt;/b&gt; is founding Chair of LIRNEasia, an ICT policy and regulation think tank active across emerging Asian and Pacific economies.  He was Team Leader at the Sri Lanka Ministry for Economic Reform, Science and Technology (2002-04) responsible for infrastructure reforms, including participation in the design of the USD 83 million e-Sri Lanka Initiative.  He was Director General of Telecommunications in Sri Lanka (1998-99), a founder director of the ICT Agency of Sri Lanka (2003-05), Honorary Professor at the University of Moratuwa in Sri Lanka (2003-04), Visiting Professor of Economics of Infrastructures at the Delft University of Technology in the Netherlands (2000-03) and Associate Professor of Communication and Public Policy at the Ohio State University in the US (1987-2000).  Dr. Samarajiva was also Policy Advisor to the Ministry of Post and Telecom in Bangladesh (2007-09).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Koesmarihati Sugondo&lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Resource Material&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;infodev, &lt;i&gt;ICT regulation toolkit&lt;/i&gt;.  &lt;a href="http://www.ictregulationtoolkit.org/en/Index.html"&gt;http://www.ictregulationtoolkit.org/en/Index.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;infoDev.  &lt;i&gt;Broadband strategies toolkit&lt;/i&gt;.  &lt;a href="http://broadbandtoolkit.org/en/toolkit/contents"&gt;http://broadbandtoolkit.org/en/toolkit/contents&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;infoDev (2011). &lt;i&gt;Tenth anniversary telecom regulation handbook&lt;/i&gt;.  &lt;a href="http://www.infodev.org/En/Publication.1057.html"&gt;http://www.infodev.org/En/Publication.1057.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITU (2011).  &lt;i&gt;The role of ICT in advancing growth in least developed countries: Trends, challenges and opportunities&lt;/i&gt;.  Geneva:  ITU.  &lt;a href="http://www.itu.int/ITU-D/ldc/turkey/docs/The_Role_of_ICT_in_Advancing_Growth_in_LDCs_Trends_Challenges_and_Opportunities.pdf"&gt;http://www.itu.int/ITU-D/ldc/turkey/docs/The_Role_of_ICT_in_Advancing_Growth_in_LDCs_Trends_Challenges_and_Opportunities.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan (2000).  The role of competition in institutional reform of telecommunications: Lessons from Sri Lanka, &lt;i&gt;Telecommunications Policy&lt;/i&gt;, 24(8/9): 699-717.  &lt;a href="http://www.comunica.org/samarajiva.html"&gt;http://www.comunica.org/samarajiva.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan (2002).  Why regulate?, chapter 2 of &lt;i&gt;Effective regulation:  Trends in Telecommunication Reform 2002&lt;/i&gt;.  Geneva:  International Telecommunication Union.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan (2006).  Preconditions for effective deployment of wireless technologies for development in the Asia-Pacific, &lt;i&gt;Information Technology and International Development&lt;/i&gt;, 3(2): 57-71. &lt;a href="http://itidjournal.org/itid/article/view/224/94"&gt;http://itidjournal.org/itid/article/view/224/94&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan &amp;amp; Zainudeen, Ayesha (2008).&lt;i&gt; ICT infrastructure in emerging Asia:  Policy and regulatory roadblocks&lt;/i&gt;,  New Delhi &amp;amp; Ottawa:  Sage &amp;amp; IDRC  &lt;a href="http://www.idrc.ca/en/ev-117916-201-1-DO_TOPIC.html"&gt;http://www.idrc.ca/en/ev-117916-201-1-DO_TOPIC.html&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar'&gt;https://cis-india.org/news/policy-and-regulation-conducive-to-rapid-ict-growth-in-myanmar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2013-10-24T03:56:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication">
    <title>Cyberspying: Government may ban Gmail for official communication</title>
    <link>https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication</link>
    <description>
        &lt;b&gt;The government will soon ask all its employees to stop using Google's Gmail for official communication, a move intended to increase security of confidential government information after revelations of widespread cyberspying by the US.
&lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Cyberspying-Government-employees-may-face-Gmail-ban/articleshow/22156529.cms"&gt;published in the Times of India &lt;/a&gt;on August 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A senior official in the ministry of communications and information technology said the government plans to send a formal notification to nearly 5 lakh employees barring them from email service providers such as Gmail that have their servers in the US, and instead asking them to stick to the official email service provided by India's National Informatics Centre.&lt;br /&gt;&lt;br /&gt;"Gmail data of Indian users resides in other countries as the servers are located outside. Currently, we are looking to address this in the government domain, where there are large amounts of critical data," said J Satyanarayana, secretary in the department of electronics and information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="float:left; "&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Snowden fallout&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT" style="float:left; "&gt;The move comes in the wake of revelations by former US  &lt;a href="http://timesofindia.indiatimes.com/topic/National-Security-Agency"&gt;National Security Agency&lt;/a&gt; contractor Edward  &lt;a href="http://timesofindia.indiatimes.com/topic/Snowden-%28musician%29"&gt;Snowden&lt;/a&gt; that the  &lt;a href="http://timesofindia.indiatimes.com/topic/US-Government"&gt;US government&lt;/a&gt; had direct access to large amounts of personal data on the internet  such as emails and chat messages from companies like Google, Facebook  and Apple through a programme called  &lt;a href="http://timesofindia.indiatimes.com/topic/PRISM"&gt;PRISM&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt; Documents leaked by Snowden showed that NSA may have accessed network  infrastructure in many countries, causing concerns of potential security  threats and data breaches. Even as the new policy is being formulated,  there has been no mention yet of how compliance will be ensured. &lt;br /&gt;&lt;br /&gt; Several senior government officials in India, including ministers of  state for communications &amp;amp; IT Milind Deora and Kruparani Killi, have  their Gmail IDs listed in government portals as their official email. &lt;br /&gt;&lt;br /&gt; A  &lt;a href="http://timesofindia.indiatimes.com/topic/Google-India"&gt;Google India&lt;/a&gt; spokeswoman said the company has not been informed about the ban, and  hence it cannot comment on speculation. "Nothing is documented so far,  so for us, it is still speculation," Google said in an email response. &lt;br /&gt;&lt;br /&gt; A senior official in the IT department admitted on condition of  anonymity that employees turn to service providers such as Gmail because  of the ease of use compared with official email services, as well as  the bureaucratic processes that govern creation of new accounts. &lt;br /&gt;&lt;br /&gt; "You can just go and create an account in Gmail easily, whereas for a  government account, you have to go through a process because we have to  ensure that he is a genuine government user." &lt;br /&gt;&lt;br /&gt; Last week, IT  Minister Kapil Sibal said the new policy would require all government  officials living abroad to use NIC servers that are directly linked to a  server in India while accessing government email services. Sibal said  there has been no evidence of the US accessing Internet data from India.  &lt;br /&gt;&lt;br /&gt; Sunil Abraham, executive director of Bangalore-based research  firm Centre for Internet and Society, said he agrees with the  government's decision to ban Gmail for official communication and that  any official violating this needs to be punished. &lt;br /&gt;&lt;br /&gt; "After  Snowden's revelations, we can never be sure to what extent foreign  governments are intercepting government emails," he said. Abraham,  however, called the government's decision a "late reaction", as the use  of Gmail and other free email services by bureaucrats has increased in  the past. &lt;br /&gt;&lt;br /&gt; "Use of official government email would also make it  easier to achieve greater transparency and anti-corruption initiatives.  Ministers, intelligence and law enforcement officials should not be  allowed to use alternate email providers under any circumstance." &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication'&gt;https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2013-09-02T04:19:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business">
    <title>Indian government to bar politicians from using Gmail for official business</title>
    <link>https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business</link>
    <description>
        &lt;b&gt;US-based email services seen as too risky.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This article by Neil McAllister was &lt;a class="external-link" href="http://www.theregister.co.uk/2013/08/30/india_government_gmail_ban/"&gt;published in the Register on August 30, 2013&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government of India is reportedly planning to bar its employees  from using Gmail and other foreign-based email services, amid concerns  over surveillance by US spy agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Gmail data of Indian users  resides in other countries as the servers are located outside," J  Satyanarayana, India's secretary of electronics and information  technology, &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Cyberspying-Government-may-ban-Gmail-for-official-communication/articleshow/22156529.cms" target="_blank"&gt;told&lt;/a&gt; the &lt;i&gt;Times of India&lt;/i&gt;. "Currently, we are looking to address this in the government domain, where there are large amounts of critical data."&lt;/p&gt;
&lt;div class="not_moved article_side_content" style="text-align: justify; "&gt;
&lt;div id="article-mpu-container"&gt;
&lt;div class="adu" id="ad-mu1-spot"&gt;
&lt;div id="ad-mu1-spot_ad_container"&gt;&lt;ins&gt;&lt;ins&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The Indian government currently employs some 500,000 people, many  of whom use Gmail for their primary email addresses. A quick glance at  the &lt;a href="http://deity.gov.in/content/people-and-offices" target="_blank"&gt;contact page&lt;/a&gt; for the country's Department of Electronics and Information Technology  reveals at least eight senior officials using Gmail, and still others  with Yahoo! addresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the new directive, government  employees will be asked to stick to official email addresses provided by  India's National Informatics Centre (NIC). But an unnamed senior  government IT official told the &lt;i&gt;Times of India&lt;/i&gt; that many  government workers choose Gmail and other foreign services because they  are easier to use, and setting up accounts is much faster than working  within the bureaucratic process of the NIC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move toward  locally run email for Indian government workers comes in the wake of a  string of revelations from documents leaked by Edward Snowden. Among the  recent disclosures has been details of US electronic surveillance of  foreign governments on US soil, where the National Security Agency even  went as far as to snoop encrypted communications from &lt;a href="http://www.theregister.co.uk/2013/08/27/un_to_question_us_on_nsa/"&gt;United Nations headquarters&lt;/a&gt; in New York City.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No  doubt equally concerning was a motion filed by Google in a US district  court earlier this month, in which the Chocolate Factory &lt;a href="http://www.theregister.co.uk/2013/08/14/google_cloud_users_have_no_legitimate_expectation_of_privacy/"&gt;asserted&lt;/a&gt; that "a person has no legitimate expectation of privacy in information  he voluntarily turns over to third parties" such as Gmail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  Sunil Abraham of the Bangalore-based think tank the Centre for Internet  and Society said that foreign spying wasn't the only reason why  government officials should be required to use a homegrown email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Use  of official government email would also make it easier to achieve  greater transparency and anti-corruption initiatives," Abraham told the  paper. "Ministers, intelligence and law enforcement officials should not  be allowed to use alternate email providers under any circumstance."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  contacted for comment, a spokeswoman for Google India said the company  had not been informed of the proposed ban, adding, "Nothing is  documented so far, so for us, it is still speculation." ®&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business'&gt;https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2013-09-05T09:52:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2013-bulletin">
    <title>August 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/august-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of August 2013 can be accessed below. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) welcomes you to the eighth issue of its newsletter for the year 2013.  In this issue we are glad to bring you the final report on &lt;a href="https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report"&gt;banking and accessibility&lt;/a&gt; submitted to the Ministry of Finance, Government of India, a &lt;a href="https://cis-india.org/a2k/blog/bilateral-inhibiting-treaty-investigating-challenges-that-bilateral-investment-treaties-pose-to-compulsory-licensing-of-pervasive-technology-patent-pools"&gt;research paper&lt;/a&gt; on India’s obligations under bilateral investment treaties, a &lt;a href="https://cis-india.org/openness/blog/konkani-wikipedia-advances-in-four-days"&gt;report from a Wikipedia workshop&lt;/a&gt; held at the Konkani Department in Goa University, a &lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-sixth-privacy-roundtable-meeting-new-delhi"&gt;report on the sixth privacy roundtable&lt;/a&gt; held in New Delhi,  recent &lt;a href="https://cis-india.org/news"&gt;news coverage&lt;/a&gt;, and updates on our upcoming events.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Archives of our newsletters are &lt;a href="https://cis-india.org/about/newsletters/"&gt;here&lt;/a&gt;. Our policies on Ethical Research Guidelines, Non-Discrimination and Equal Opportunities, Privacy, Terms of Website Use and Travel can be&lt;a href="https://cis-india.org/about/policies"&gt; accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt; CIS is inviting applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project). To apply for this post, send in your resume to Nirmita Narasimhan (&lt;a href="mailto:nirmita@cis-india.org"&gt;nirmita@cis-india.org&lt;/a&gt;). CIS is also seeking applications for the post of &lt;a href="https://cis-india.org/jobs/policy-associate-internet-governance"&gt;Policy Associate&lt;/a&gt; (Internet Governance). To apply send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;) and Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility" class="external-link"&gt;Accessibility&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of its project on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India with the Hans Foundation, we bring you three new draft chapters on Assam, Manipur and Puducherry. With this we have completed compilation of draft chapters for 21 states and 3 union territories. Feedback and comments are invited from readers for the below chapters:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-assam-chapter-call-for-comments"&gt;The Assam Chapter&lt;/a&gt; (by CLPR, August 28, 2013)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-manipur-chapter-call-for-comments"&gt;The Manipur Chapter&lt;/a&gt; (by CLPR, August 29, 2013)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/ational-resource-kit-puducherry-chapter-call-for-comments"&gt;The Puducherry Chapter&lt;/a&gt; (by Anandhi Viswanathan, August 31, 2013)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: &lt;i&gt;All the chapters published on the website are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report"&gt;Banking and Accessibility in India: A Report by CIS&lt;/a&gt; (by Vrinda Maheshwari, August 12, 2013). This is the final report submitted to the Ministry of Finance, Government of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/opening-new-avenues-for-empowerment"&gt;Opening New Avenues for Empowerment&lt;/a&gt; (by UNESCO, August 31, 2013). UNESCO has published a global report on higher education titled “Opening New Avenues for Empowerment”. Nirmita Narasimhan was the coordinating author for the Asia Pacific region.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of its &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project on developing the growth of Indic language communities&lt;/a&gt; with Wikimedia Foundation, &lt;a href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan"&gt;CIS-A2K&lt;/a&gt; held six Wikipedia workshops. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/a&gt;&lt;b&gt;&lt;br /&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/bilateral-inhibiting-treaty-investigating-challenges-that-bilateral-investment-treaties-pose-to-compulsory-licensing-of-pervasive-technology-patent-pools"&gt;India's Obligations under Bilateral Investment Treaties (Part A): “Bilateral Inhibiting Treaty?” — Investigating the Challenges that Bilateral Investment Treaties pose to the Compulsory Licensing of Pervasive Technology Patent Pools&lt;/a&gt; (by Gavin Pereira, August 31, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Column&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/yojana-august-2013-pranesh-prakash-copyrights-and-copywrongs-why-the-govt-should-embrace-the-public-domain"&gt;Copyrights and Copywrongs Why the Government Should Embrace the Public Domain&lt;/a&gt; (by Pranesh Prakash, Yojana, Issue: August 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/livemint-august-26-2013-ch-unnikrishnan-dictionary-words-in-software-patent-guidelines-puzzle-industry"&gt;Dictionary words in software patent guidelines puzzle industry&lt;/a&gt; (by C.H. Unnikrishnan, Livemint, August 26, 2013). CIS work on Access to Knowledge is mentioned.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/are-indian-consumers-laws-ready-for-digital-age"&gt;Are Indian Consumer Laws Ready for the Digital Age?&lt;/a&gt; (by Vipul Kharbanda, August 8, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/do-you-have-right-to-unlock-your-smart-phone"&gt;Do You Have the Right to Unlock Your Smart Phone?&lt;/a&gt; (by Puneeth Nagaraj, August 7, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Access to Knowledge (Wikipedia)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of four members based in Bangalore: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="https://cis-india.org/about/people/our-team"&gt;Syed Muzammiluddin&lt;/a&gt;, and one team member &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt; who works from Delhi.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/a-kannada-wikipedia-workshop-at-krishnarajapet"&gt;A Kannada Wikipedia Workshop at Krishnarajapet&lt;/a&gt; (by Dr. U.B. Pavanaja, August 14, 2013). The workshop was co-organized by the CIS-A2K team along with Kannada Sahitya Parishat of KR Pet.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-workshop-sambalpur"&gt;An Odia Wikipedia Workshop at Sambalpur&lt;/a&gt; (by Gorvachove Pothal, August 27, 2013). This workshop was held at Veer Surendra Sai University of Technology, Burla, Sambalpur on July 26 and 27, 2013. Odia Wikipedian Gorvachove Pothal organized this workshop with financial support from the CIS-A2K programme.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blog/konkani-wikipedia-climbing-up-the-indian-language-ladder"&gt;Konkani Wikipedia — Climbing up the Indian Language Ladder?&lt;/a&gt; (by Subhashish Panigrahi, August 31, 2013). CIS-A2K team organized this event at the Konkani Department, Goa University from August 21 to 24, 2013.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/konkani-wikipedia-advances-in-four-days"&gt;Konkani Wikipedia Advances in 4 Days — From 90 Articles to 130 Articles!&lt;/a&gt; (by Nitika Tandon, August 31, 2013). CIS-A2K team organized this event at the Konkani Department, Goa University from August 21 to 24, 2013. Thirty-eight students took part in the wiki editing workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/digitization-of-books-for-indic-language-wikisource"&gt;Digitization of Books for Indic Language WikiSource&lt;/a&gt; (organised by Wikimedia India and CIS-A2K, CIS, Bangalore, August 18, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/workshop-on-editing-wikipedia-in-mumbai"&gt;A Workshop on Editing Wikipedia in Mumbai&lt;/a&gt; (organised by the Centre for Indian Languages in Higher Education and CIS-A2K, Tata Institute of Social Sciences, Mumbai, August 24, 2013). The workshop was aimed at assisting students to take part in the Indian Languages Mela at the Tata Institute of Social Sciences (September 20-21, 2013) which is hosting a competition for best Indian language entries on Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Hosted&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/events/mobile-training-workshop"&gt;Mobile Training Workshop @ CIS&lt;/a&gt; (CIS, Bangalore, August 29, 2013). Rachita and Keerthana Chandrashekar gave a talk on mobile campaigns.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://wikimania2013.wikimedia.org/wiki/Main_page"&gt;Wikimania 2013: The International Wikimedia Conference&lt;/a&gt; (organised by Wikimedia Foundation, Hong Kong Polytechnic University, August 7 – 11, 2013). T. Vishnu Vardhan and Subhashish Panigrahi participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikimedia-asia-meeting"&gt;Wikimedia Asia Meeting&lt;/a&gt; (organised by Wikimedia community, Hong Kong, August 10, 2013). T. Vishnu Vardhan and Subhashish Panigrahi participated in the meeting. &lt;a href="https://cis-india.org/openness/blog/wikimedia-asia-meeting.txt"&gt;Unedited transcript&lt;/a&gt; of the entire conversation is posted online.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/telugu-wiki-meet-up-hyderabad-august-2013"&gt;వికీపీడియా:సమావేశం/హైదరాబాద్/ఆగష్టు&lt;/a&gt; (Hyderabad, August 25, 2013). T.Vishnu Vardhan participated for the meeting through Skype.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/beforeitnews-august-1-2013-wikipedia-gains-massive-traffic-thanks-to-vernacular-languages"&gt;Wikipedia Gains Massive Traffic Thanks To Vernacular Languages&lt;/a&gt; (Before It’s News, August 1, 2013). T. Vishnu Vardhan is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-august-1-2013-sandhya-soman-wikipedia-boom-in-marathi-malayalam-other-desi-languages"&gt;Wikipedia boom in Marathi, Malayalam and other desi languages&lt;/a&gt; (by Sandhya Soman, The Times of India, August 1, 2013). T. Vishnu Vardhan is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dna-august-1-2013-divya-saboo-wikipedia-boom-in-vernacular-languages"&gt;Wikipedia boom in vernacular languages&lt;/a&gt; (by Divya Saboo, August 1, 2013). The Centre for Internet and Society is mentioned.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hindu-r-krishna-kumar-august-2-2013-stress-on-posting-articles-on-kannada-wikipedia"&gt;Stress on posting articles on Kannada Wikipedia&lt;/a&gt; (by R. Krishna Kumar, Hindu, August 2, 2013). Dr. U.B.Pavanaja is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/techcrunch-august-6-2013-mahesh-sharma-indias-indigenous-languages-drive-wikipedias-growth"&gt;India’s Indigenous Languages Drive Wikipedia’s Growth&lt;/a&gt; (by Mahesh Sharma, TechCrunch, August 6, 2013). T. Vishnu Vardhan is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/prajavani-august-12-2013-krishnarajapet-workshop"&gt;Krishnarajapet Wikipedia Workshop Coverage&lt;/a&gt; (Prajavani, August 12, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/vijaya-vani-august-12-2013-krishnarajapet-wikipedia-workshop"&gt;Krishnarajapet Wikipedia Workshop Coverage&lt;/a&gt; (Vijaya Vani, August 12, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/suvarna-times-of-karnataka-august-12-2013-krishnarajapet-workshop"&gt;Krishnarajapet Wikipedia Workshop Coverage&lt;/a&gt; (Suvarna Times of Karnataka, August 12, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/thegoan-joyce-dias-august-24-2013-wikipedia-writes-a-new-script"&gt;Wikipedia writes a new script&lt;/a&gt; (by Joyce Dias, August 24, 2013, The Goan). CIS-A2K workshop held in Goa is mentioned extensively. Nitika Tandon and Subhashish Panigrahi are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/epaperoheraldo-august-24-2013-diana-fernandes-konkani-wikipedia-makes-headway-"&gt;Konkani Wikipedia makes headway&lt;/a&gt; (by Diana Fernandes, OHeraldO, August 24, 2013). Nitika Tandon is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.goanvoice.org.uk/?ref=Guzels.TV"&gt;Konkani Wikipedians Speak&lt;/a&gt; (Goan Voice Daily Newsletter, September 4, 2013). Konkani Wikipedia workshop organized in Goa from August 21 – 24, 2013 is mentioned in this newsletter.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Ongoing / Upcoming Events&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-training-in-telugu-for-b-r-ambedkar-open-university"&gt;Wikipedia Training in Telugu for Dr. B.R. Ambedkar Open University, Hyderabad&lt;/a&gt; (Dr. B.R. Ambedkar Open University, Hyderabad, September 5-6, 2013). T. Vishnu Vardhan is teaching a module on "Knowledge and Openness in the Digital Era".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/you-too-can-write-on-wikipedia"&gt;You too can write on Wikipedia&lt;/a&gt;! — Orientation Workshop (co-organised by CIS-A2K and the Centre for Contemporary Studies, Indian Institute of Science, Bangalore, September 15, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/train-the-trainer"&gt;Train the Trainer — Four-day long Residential Training Workshop in Bangalore&lt;/a&gt; (organised by CIS-A2K, Bangalore, October 1 – 5, 2013). &lt;i&gt;The programme will be held in the first week of October&lt;/i&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/voices-from-goa"&gt;Voices from Goa: Frania Pereira tells Why She Writes Articles on Konkani Wikipedia&lt;/a&gt; (by Subhashish Panigrahi, August 27, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/voices-from-goa-wikipedia-editor-rusita-paryekar"&gt;Voices from Goa: Wikipedia Editor Rusita Paryekar&lt;/a&gt; (by Subhashish Panigrahi, August 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Event Hosted &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/open-hardware-lab"&gt;Open Hardware Lab: Play &amp;amp; Invent + Bonus Film Screening&lt;/a&gt; (CIS, Bangalore, August 4, 2013). A hangout was done with CIS Lab Community and with members of the Computer Club of India and Arduino enthusiasts.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/e-dirap-google-hangout-on-open-government"&gt;e-DIRAP Google+ Hangout on Open Government&lt;/a&gt; (organised by Google, July 25, 2013). Sunil Abraham was a panelist. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/tech-president-august-6-2013-david-eaves-beyond-property-rights-thinking-about-moral-definitions-openness"&gt;Beyond Property Rights: Thinking About Moral Definitions of Openness&lt;/a&gt; (by David Eaves, Tech President, August 6, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/techdirt-august-14-2013-glyn-moody-extending-spectrum-openness-to-include-moral-right-to-share"&gt;Extending The Spectrum Of Openness To Include The Moral Right To Share&lt;/a&gt; (by Glyn Moody, Techdirt, August 19, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS began two projects earlier this year. The first one on facilitating research and events on surveillance and freedom of expression is with Privacy International and support from the International Development Research Centre, Canada. The second one on mapping cyber security actors in South Asia and South East Asia is with the Citizen Lab, Munk School of Global Affairs, University of Toronto and support from the International Development Research Centre, Canada:&lt;/p&gt;
&lt;h3&gt;SAFEGUARDS Project&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-sixth-privacy-roundtable-meeting-new-delhi"&gt;Sixth Privacy Roundtable&lt;/a&gt; (co-organised by CIS, FICCI and DSCI, New Delhi, August 24, 2013). Bhairav Acharya and Prachi Arya participated in this event. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Newspaper / Magazine Columns&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"&gt;Freedom from Monitoring: India Inc Should Push For Privacy Laws&lt;/a&gt; (by Sunil Abraham, Forbes India Magazine, August 21, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-august-25-2013-nishant-shah-out-of-the-bedroom"&gt;Out of the Bedroom&lt;/a&gt; (by Nishant Shah, Indian Express, August 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions"&gt;'Ethical Hacker' Saket Modi Calls for Stronger Cyber Security Discussions&lt;/a&gt; (by Kovey Coles, August 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/ethical-issues-in-open-data"&gt;Ethical Issues in Open Data&lt;/a&gt; (by Kovey Coles, August 7, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"&gt;FinFisher in India and the Myth of Harmless Metadata&lt;/a&gt; (by Maria Xynou, August 13, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/the-hackers-way-of-reshaping-policies"&gt;The Hackers Way of Reshaping Policies&lt;/a&gt; (CIS, Bangalore, August 2, 2013). Bernadette Langle gave a talk on different ways to reshape policies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-chennai"&gt;Chennai: Learn to Protect your Online Activities!&lt;/a&gt; (Asian College of Journalism, Taramani, Chennai, August 7, 2013). A Crypto Party was organised.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/the-phishing-society-a-talk-by-maria-xynou"&gt;The Phishing Society: Why 'Facebook' is more dangerous than the Government Spying on You - A Talk by Maria Xynou&lt;/a&gt; (CIS, Bangalore, August 7, 2013). Maria Xynou gave a talk on phishing society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-chennai"&gt;Learn to Protect your Online Activities!&lt;/a&gt; (ACJ - Asian College of Journalism, Second Main Road (Behind M.S. Swaminathan Research Foundation), Taramani, Chennai, August 7, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-meeting-brussels-bangalore"&gt;Privacy Meeting: Brussels – Bangalore&lt;/a&gt; (CIS, Bangalore, August 14, 2013). Gertjan Boulet and Dariusz Kloza gave a talk on privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cryptoparty-bangalore"&gt;Learn to Protect your Online Activities!&lt;/a&gt; (CIS, Bangalore, August 17, 2013). A Crypto Party was held at CIS.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/repeat-remix-remediate-summer-school-2013"&gt;Summer School 2013&lt;/a&gt; (organized by the Research Center of Media and Communication at the University of Hamburg, Germany, July 29 – August 2, 2013). Dr. Nishant Shah was a panelist in the session on "Guilty until Proven Innocent: Pirates, Pornographers, Terrorists and the IT Act in India".&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/meeting-of-sub-committee-on-dna-profiling-bill"&gt;Meeting of a Sub-committee on DNA Profiling Bill&lt;/a&gt; (Hyderabad, August 6, 2013). Sunil Abraham participated in this meeting for discussing the draft bill.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/foundation-for-media-professionals-august-17-2013-surveillance-privacy-v-security"&gt;Surveillance: Privacy Vs Security&lt;/a&gt; (organized by the Foundation for Media Professionals, India International Centre, New Delhi, August 17, 2013). Pranesh Prakash was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/caravan-magazine-august-1-2013-rahul-m-crypto-night"&gt;Crypto Night&lt;/a&gt; (by Rahul M., Caravan, August 1, 2013). Pranesh Prakash and Bernadette Langle are quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-times-of-india-aug-1-2013-kim-arora-facebook-limiting-access-to-social-media-can-restrict-freedom-of-speech"&gt;Facebook: Limiting access to social media can restrict freedom of speech&lt;/a&gt; (by Kim Arora, The Times of India, August 1, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-august-4-2013-deepa-kurup-token-disclosures"&gt;Token disclosures?&lt;/a&gt; (by Deepa Kurup, The Hindu, August 4, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-times-of-india-august-4-2013-padmaparna-ghosh-memea-s-the-word-now"&gt;Memeâ€™s the word now&lt;/a&gt; (by Padmaparna Ghosh, The Times of India, August 4, 2013). Nishant Shah is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-august-9-2013-moulishree-srivastava-anirban-sen-chinese-hackers-baiting-indian-govt-corporate-employees"&gt;Chinese hackers baiting Indian govt, corporate employees: report&lt;/a&gt; (by Moulishree Srivastava and Anirban Sen, Livemint, August 9, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests"&gt;Mixed signals? Supreme Court notices to states on Facebook arrests&lt;/a&gt; (NDTV, August 16, 2013). Pranesh Prakash, Shreya Singhal and Faizal Farooqui discussed the grey areas of the IT Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-august-19-2013-prashant-jha-balancing-vigilance-and-privacy"&gt;Balancing vigilance and privacy&lt;/a&gt; (by Prashant Jha, The Hindu, August 18, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/forbesindia-august-13-2013-rohin-dharmakumar-how-nextgen-smartphone-users-are-being-bought-and-sold"&gt;How Next-Gen Smartphone Users are Being Bought and Sold&lt;/a&gt; (by Rohin Dharmakumar, &lt;a href="http://forbesindia.com/article/checkin/how-nextgen-smartphone-users-are-being-bought-and-sold/35859/1"&gt;Forbes India Magazine&lt;/a&gt;, August 13, 2013, and &lt;a href="http://ibnlive.in.com/news/how-nextgen-smartphone-users-are-being-bought-and-sold/415719-11.html"&gt;IBN Live&lt;/a&gt;, August 19, 2013). Sunil Abraham is quoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/forbesindia-august-22-2013-rohin-dharmakumar-dear-milind-deora-prakash-javadekar-deserved-the-truth"&gt;Dear Milind Deora, Prakash Javadekar Deserved The Truth&lt;/a&gt; (by Rohin Dharmakumar, Forbes India, August 22, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-august-26-2013-venkatesh-upadhyay-election-campaign"&gt;Election campaign: parties draw battle lines on media platforms&lt;/a&gt; (by Venkatesh Upadhyay, Livemint, August 26, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/forbesindia-august-26-2013-india-internet-privacy-woes"&gt;India's Internet Privacy Woes&lt;/a&gt; (by Rohin Dharmakumar, Forbes India Magazine, August 26, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-august-30-2013-cyberspying-govt-may-ban-gmail-for-official-communication"&gt;Cyberspying: Government may ban Gmail for official communication&lt;/a&gt; (The Times of India, August 30, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/news/the-register-neil-mc-allister-august-30-2013-indian-govt-to-bar-politicians-from-using-gmail-for-official-business"&gt;Indian government to bar politicians from using Gmail for official business&lt;/a&gt; (by Neil McAllister, The Register, August 30, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cyber Stewards Project&lt;/b&gt;&lt;br /&gt;Laird Brown, a strategic planner and writer with core competencies on brand analysis, public relations and resource management and Purba Sarkar who in the past worked as a strategic advisor in the field of SAP Retail are working in this project.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Video Interview&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;Part 9: &lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-9-saikat-datta"&gt;Interview with Saikat Datta&lt;/a&gt; (August 5, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS has published one newspaper column in the Business Standard and also made a submission to TRAI:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-august-1-2013-domestic-high-tech-manufacturing-needs-access-to-markets"&gt;Breaking into the Closed Circle: Domestic High-Tech Manufacturing Needs Access To Markets&lt;/a&gt; (by Shyam Ponappa, originally published in the Business Standard, July 31, 2013 and also mirrored in Organizing India Blogspot, August 1, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/trai-consultation-paper-on-spectrum"&gt;TRAI Consultation Paper on Spectrum&lt;/a&gt; (by Shyam Ponappa and A.B. Beliappa, August 31, 2013). The submission was made to the Telecom Regulatory Authority of India on August 21, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/digital-humanities-talk-at-cis"&gt;Digital Humanities Talk&lt;/a&gt; (by Sara Morais, August 1, 2013). Sara wrote about her talk in this blog entry.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/theorizing-the-digital-subaltern"&gt;Theorizing the Digital Subaltern&lt;/a&gt; (by Sara Morais, August 2, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/digital-humanities-for-indian-higher-education"&gt;Digital Humanities for Indian Higher Education&lt;/a&gt; (co-organised by CIS-A2K, HEIRA, CSCS, Tumkur University, Tata Institute of Social Sciences, Mumbai and CCS-Indian Institute of Science, Bangalore, July 13, 2013). &lt;i&gt;Errata&lt;/i&gt;: &lt;i&gt;We had got the name of one of the co-organisers wrong in our previous newsletter. We have corrected this now.&lt;/i&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/south-asia-conference-on-higher-education"&gt;South Asia Conference on Higher Education&lt;/a&gt; (organised by the Centre for Study of Culture and Society, Ford Foundation Office, New Delhi, August 5 – 7, 2013). Sunil Abraham participated in this conference.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;br /&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;*Support Us*&lt;/p&gt;
&lt;p&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2013-bulletin'&gt;https://cis-india.org/about/newsletters/august-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-09-13T06:26:30Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013">
    <title>The Personal Data (Protection) Bill, 2013</title>
    <link>https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013</link>
    <description>
        &lt;b&gt;Below is the text of the Personal Data (Protection) Bill, 2013 as discussed at the 6th Privacy Roundtable, New Delhi held on 24 August 2013. 


Note: This version of the Bill caters only to the Personal Data regime. The surveillance and privacy of communications regime was not discussed at the 6th Privacy Roundtable. 
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013'&gt;https://cis-india.org/internet-governance/blog/the-personal-data-protection-bill-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>prachi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-30T14:53:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
