<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 831 to 845.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-delhi-privacy-round-table.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-celebrates-5-years.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/table-2.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/table-1.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2013-bulletin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security">
    <title>Online privacy should not come at the cost of security: Sunil Abraham</title>
    <link>https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security</link>
    <description>
        &lt;b&gt;Sunil Abraham, Centre for Internet and Society’s executive director, on privacy laws and Internet penetration.&lt;/b&gt;
        &lt;p&gt;Anirban Sen's article was &lt;a class="external-link" href="http://www.livemint.com/Industry/xcmVySyl90ivZknOK9YIBI/Online-privacy-should-not-come-at-the-cost-of-security-Suni.html"&gt;published in LiveMint &lt;/a&gt;on May 19, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;div class="text" id="U191282072761AmC"&gt;
&lt;hr /&gt;
&lt;p class="text" style="text-align: justify; "&gt;The Centre for Internet and Society (CIS), a research thinktank that primarily focuses on issues of Internet governance, is pushing to revise the provisions of the Information Technology (IT) Act and make a stronger case for privacy laws and free speech in India, an issue that has caused widespread concern after the government tried to restrict access to more than a 100 websites last year with little justification.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We want to revise the IT Act...that’s the toughest one and that’s not going to happen very soon because the government is treating it like an ego battle now. They no longer listen to the others,” said &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Sunil Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of CIS.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The IT Act has been at the centre of debate, with some of its provisions such as Section 66A, which criminalizes “causing annoyance or inconvenience” online or electronically, coming under criticism from rights advocates for being too vague and subject to interpretation.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;CIS, which will complete five years on Monday and is organizing a four-day event focusing on issues such as cyber security, surveillance in India and privacy, said it also was working towards creating a privacy law for India within the next 3-4 years. India, which is estimated to have Internet penetration of just 10%, is the third-largest Internet market in the world.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re getting closer and closer to that (privacy law),” said Abraham, adding that privacy should not come at the cost of security.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;Over the past five years, Bangalore-based CIS has also been part of some government committees such as the Justice AP Shah Committee, which focused on privacy laws in India, and is also currently working on the country’s telecom policy. The non-government organization, which receives grants from international bodies such as the Wikimedia Foundation, has also worked on policies for the government of Iraq and is currently also doing policy work for the government of Burma.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“Five years ago we were making noise from outside the room, we were not inside any policy making space. That has also changed. From an organization that was mostly outside the room, we’re increasingly being trusted by our own government,” said Abraham, who was one of the most vocal critics of the government’s unique identification (UID) project when it was first launched. Abraham had raised concerns over its overtly broad scope and issues over privacy in the project.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;For CIS, one of the biggest achievements over the past five years was being part of the policy framework for the government of India’s draft national policy on open standards for e-governance, said Abraham, adding that the organization was working towards increasing Internet penetration in the country, especially in rural areas.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re hoping that every single mobile phone user in the country will become an Internet user. We’re planning for that future,” he said.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The CIS event starting on Monday will include speakers such as legal researcher and advocate &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Lawrence Liang"&gt;Lawrence Liang&lt;/a&gt;&lt;/span&gt; and &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Vibodh Parthasarathi"&gt;Vibodh Parthasarathi&lt;/a&gt;&lt;/span&gt;, an associate professor at the Centre for Culture, Media and Governance at the Jamia Millia Islamia university. Both Liang and Parthasarathi are members of the board at CIS.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security'&gt;https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-02T02:27:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-delhi-privacy-round-table.pdf">
    <title>Report on the 1st Privacy Round Table meeting - pdf</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-delhi-privacy-round-table.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-delhi-privacy-round-table.pdf'&gt;https://cis-india.org/internet-governance/blog/report-on-delhi-privacy-round-table.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-11-07T17:01:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian">
    <title>CIS Cybersecurity Series (Part 1) - Christopher Soghoian</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian</link>
    <description>
        &lt;b&gt;CIS interviews Christopher Soghoian, cybersecurity researcher and activist, as part of the Cybersecurity Series&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"We live in a surveillance state. The government can find out who we communicate with, who we talk to, who we are near, when we are at a protest, which stores we go to, where we travel to... they can find out all of these things. And it's unlikely it's going to get rolled back, but the best we can hope for is a system of law where the government gets to use its powers only in the right situation." – Christopher Soghoian, American Civil Liberties Union.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its first installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS interviews Christopher Soghoian, a privacy researcher and activist, working at the intersection of technology, law and policy. Christopher is the Principal Technologist and a Senior Policy Analyst with the Speech, Privacy and Technology Project at the American Civil Liberties Union (ACLU).&lt;/p&gt;
&lt;p&gt;Christopher is based in Washington, D.C. His website is http://www.dubfire.net/&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/SQo4b-jTAWM" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-07-12T10:26:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet">
    <title>CIS highlights changes ushered in by the Internet</title>
    <link>https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet</link>
    <description>
        &lt;b&gt;As part of its fifth anniversary celebrations, the Centre for Internet and Society (CIS) has organised an exhibition showcasing its accomplishments, besides a series of talks by experts on the changes ushered in by the Internet. The exhibition will remain open till Thursday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/cis-highlights-changes-ushered-in-by-the-internet/article4737997.ece"&gt;published in the Hindu&lt;/a&gt; on May 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, a talk will be held at 6 p.m. on “Cyber security, privacy  and surveillance”. Also, Laird Brown, strategic planner and writer, and  Purba Sarkar, associate producer with the cyber security film project,  will make presentations on cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The valedictory will have talks by Kannada writer Chandrashekar Kambar  on “Kannada in modern era”, while member of Kannada Software Committee  U.B. Pavanja will speak on “From palm leaf to tablet”. This will be  followed by a Carnatic music programme by Nirmita Narasimha. The CIS has  also invited the public to be its auditors by displaying its account  books and contracts, which shows how it has spent the Rs. 13.13 crore  received from donors. The exhibition is open from 10 a.m. to 8 p.m.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet'&gt;https://cis-india.org/news/the-hindu-may-22-2013-cis-highlights-changes-ushered-in-by-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-05-22T06:06:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting">
    <title>Report on the 3rd Privacy Round Table meeting</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting</link>
    <description>
        &lt;b&gt;This report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18th May 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In furtherance of Internet Governance multi-stakeholder Initiatives and Dialogue in 2013, the Centre for Internet and Society (CIS) in collaboration with the Federation of Indian Chambers of Commerce and Industry (FICCI), and the Data Security Council of India (DSCI), is holding a series of six multi-stakeholder round table meetings on “privacy” from April 2013 to August 2013. The CIS is undertaking this initiative as part of their work with Privacy International UK on the SAFEGUARD project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the CIS and DSCI were members of the Justice AP Shah Committee which created the “Report of Groups of Experts on Privacy”. The CIS has recently drafted a Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India. The CIS has also volunteered to champion the session/workshops on “privacy” in the meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy, DSCI´s paper on “Strengthening Privacy Protection through Co-regulation” and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;New Delhi Roundtable: 13 April 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: 20 April 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: 18 May 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: 15 June 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: 13 July 2013&lt;/li&gt;
&lt;li&gt;New Delhi Final Roundtable and National Meeting: 17 August 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Following the first two Privacy Round Tables in Delhi and Bangalore, this report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18&lt;/span&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;span&gt; May 2013.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Overview of DSCI´s paper on ´Strengthening Privacy Protection through Co-Regulation´&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table meeting began with an overview of the paper on “Strengthening Privacy Protection through Co-Regulation” by the Data Security Council of India (DSCI). In particular, the DSCI pointed out that although the IT (Amendment) Act 2008 lays down the data protection provisions in the country, it has its limitations in terms of applicability, which is why a comprehensive privacy law is required in India. The DSCI provided a brief overview of the Report of the Group of Experts on Privacy (drafted in the Justice AP Shah Committee) and argued that in light of the UID scheme, NATRGID, DNA profiling and the Central Monitoring System (CMS), privacy concerns have arisen and legislation which would provide safeguards in India is necessary. However, the DSCI emphasized that although they support the enactment of privacy legislation which would safeguard Indians from potential abuse, the economic value of data needs to be taken into account and bureaucratic structures which would hinder the work of businesses should be avoided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI supported the enactment of privacy legislation and highlighted its significance, but also emphasized that such a legal framework should support the economic value of data. The DSCI appeared to favour the enactment of privacy legislation as it would not only oblige the Indian government to protect individuals´ sensitive personal data, but it would also attract more international customers to Indian online companies. That being said, the DSCI argued that it is important to secure a context for privacy based on Indian standards, rather than on global privacy standards, since the applicability of global standards in India has proven to be weak. The privacy bill should cover all dimensions (including, but not limited to, interception and surveillance) and the misuse of data should be legally prevented and prohibited. Yet, strict regulations on the use of data could potentially have a negative effect on companies’ competitive advantage in the market, which is why the DSCI proposed a co-regulatory framework – if not self-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular, the DSCI argued that companies should be obliged to provide security assurances to their customers and that regulation should not restrict the way they handle customers´ data, especially since customers &lt;i&gt;choose &lt;/i&gt;to use a specific service in every case. This argument was countered by a participant who argued that in many cases, customers may not have alternative choices for services and that the issue of “choice” and consent is complicated. Thus it was argued that companies should comply with regulations which restrict the manner with which they handle customers´ data. Another participant argued that a significant amount of data is collected without users´ consent (such as through cookies) and that in most cases, companies are not accountable in regards to how they use the data, who they share it with or how long they retain it. Another participant who also countered the co-regulatory framework suggested by the DSCI argued that regulations are required for smartphones, especially since there is currently very low accountability as to how SMS data is being used or shared. Other participants also argued that, in every case, individual consent should be acquired prior to the collection, processing, retention, and disclosure of data and that that individual should have the right to access his/her data and make possible corrections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI firmly supported its position on co-regulation by arguing that not only would companies provide security assurances to customers, but that they would also be accountable to the Privacy Commissioner through the provision of a detailed report on how they handle their customers´ data. Furthermore, the DSCI pointed out that in the U.S. and in Europe, companies provide privacy policies and security assurances and that this is considered to be adequate. Given the immense economic value of data in the Digital Age and the severe effects regulation would have on the market, the DSCI argued that co-regulation is the best solution to ensure that both individuals´ right to privacy and the market are protected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on co-regulation proceeded with a debate on what type of sanctions should be applied to those who do not comply with privacy regulations. However, a participant argued that if a self-regulatory model was enforced and companies did not comply with privacy principles, the question of what would happen to individuals´ data would still remain. It was argued that neither self-regulation nor co-regulation provides any assurances to the individual in regards to how his/her data is protected and that once data is breached, there is very little that can be done to eliminate the damage. In particular, the participant argued that self-regulation and co-regulation provide very few assurances that data will not be illegally disclosed and breached. The DSCI responded to this argument by stating that in the case of a data breach, the both the Privacy Commissioner and the individual in question would have to be informed and that this issue would be further investigated. Other participants agreed that co-regulation should not be an option and argued that the way co-regulation would benefit the public has not been adequately proven.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI countered the above arguments by stating that the industry is in a better position to understand privacy issues than the government due to the various products that it produces. Industries also have better outreach than the Indian government and could enhance awareness to both other companies and individuals in terms of data protection, which is why the code of practice should be created by the industry and validated by the government. This argument was countered by a participant who stated that if the industry decides to participate in the enforcement process, this would potentially create a situation of conflict of interest and could be challenged by the courts in the future. The participant argued that an industry with a self-regulatory code of practice may be problematic, especially since there would be inadequate checks and balances on how data is being handled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant argued that the Indian government does not appear to take responsibility for the right to privacy, as it is not considered to be a fundamental human right; this being said, a co-regulatory framework could be more appropriate, especially since the industry has better insights on how data is being protected on an international level. Thus it was argued that the government could create high level principles and that the industry would comply. However, a participant argued that every company is susceptible to some type of violation and that in such a case, both self-regulation and co-regulation would be highly problematic. It was argued that, as any company could probably violate users´ data in some way down the line either way, self-regulation or co-regulation would probably not be the most beneficial option for the industry. This argument was supplemented by another participant who stated that co-regulation would mandate the industry and the Privacy Commissioner as the ultimate authorities to handle users´ data and that this could potentially lead to major violations, especially due to inadequate accountability towards users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Co-regulation was once again supported by the DSCI through the argument that customers &lt;i&gt;choose &lt;/i&gt;to use specific services and that by doing so, they should comply with the security measures and privacy policies provided. However, a participant asked whether other stakeholders should be involved, as well as what type of &lt;i&gt;incentives&lt;/i&gt; companies have in order to comply with regulations and to protect users´ data. Another participant argued that the very definition of privacy remains vague and that co-regulation should not be an option, since the industry could be violating individuals´ privacy without even realising it. Another issue which was raised is how data would be protected when many companies have servers based in other countries. The DSCI responded by arguing that checks and balances would be in place to deal with all the above concerns, yet a general consensus on co-regulation did not appear to have been reached.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;Discussion on the draft Privacy (Protection) Bill 2013&lt;/h1&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of definitions: Chapter II&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The sections of the draft Privacy (Protection) Bill 2013 were discussed during the second session of the third Privacy Round Table meeting. In particular, the session started with a discussion on whether the draft Privacy (Protection) Bill 2013 should be split into two separate Bills, where the one would focus on data protection and the other on surveillance and interception. The split of a Bill on data protection to two consecutive Bills was also proposed, where the one would focus on data protection binding the public sector and the other on data protection binding the private sector. As the draft Privacy (Protection) Bill 2013 is in line with global privacy standards, the possibility of splitting the Bill to focus separately on the sections mentioned above was seriously considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the definitions laid out in Chapter 2 of the draft Privacy (Protection) Bill 2013 started with a debate around the definitions of personal data and sensitive personal data and what exactly they should include. It was pointed out that the Data Protection Act of the UK has a much broader definition for the term ´sensitive personal data´ and it was recommended that the Indian draft Privacy (Protection) Bill complies with it. Other participants argued that a controversy lies in India on whether the government would conduct a caste census and if that were to be the case, such data (also including, but not limited to, religion and ethnic origin) should be included in the legal definition for ´sensitive personal data´ to safeguard individuals from potential abuse. Furthermore, the fact that the term ´sensitive personal data´ does not have a harmonious nature in the U.S. and in Europe was raised, especially since that would make it more difficult for India to comply to global privacy standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broadness of the definition for ´sensitive personal data´ was raised as a potential problematic issue, especially since it may not be realistic to expect companies in the long term to protect everything it may include. The participants debated on whether financial information should be included in the definition of ´sensitive personal data´, but a consensus was not reached. Other participants argued that the terms ´data subject´ and ´data controller´ should be carefully defined, as well as that a generic definition for the term ´genetic data´ should be included in the Bill. Furthermore, it was argued that the word ´monitor´ should be included in the definitions of the Bill and that the universal norms in regards to the definitions should apply to each and every state in India. It was also noted that organizational affiliation, such as a trade union membership, should also be included in the definitions of the Bill, since the lack of legal protection may potentially have social and political implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Discussion of “Protection of Personal Data”: Chapter III &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the data protection chapter of the draft Privacy (Protection) Bill began with the recommendation that data collected by companies should comply with a confidentiality agreement. Another participant argued that the UK looks at every financial mechanism to trace how information flows and that India should do the same to protect individuals´ personal data. It was also argued that when an individual is constantly under surveillance, that individual´s behaviour is more controlled and that extra accountability should be required for the use of CCTV cameras. In particular, it was argued that when entities outside the jurisdiction gain access to CCTV data, they should be accountable as to how they use it. Furthermore, it was argued that the Bill should provide provisions on how data is used abroad, especially when it is stored in foreign servers. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Issue of Consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded with a discussion of Section 6 and it was pointed out that consent needs to be a prerequisite to data collection. Furthermore, conditions laid out in section 3 would have to be met, through which the individual would have to be informed prior to any data collection, processing, disclosure and retention of data. Section 11 of the Bill entails an accuracy provision, through which individuals have the right to access the data withheld about them and make any necessary corrections. A participant argued that the transmission of data should also be included in the Bill and that the transmitter would have to be responsible for the accuracy of the data. Another participant argued that transmitters should be responsible for the integrity of the data, but that individuals should be responsible for its accuracy. However, such arguments were countered by a participant who argued that it is not practically possible to inform individuals every time there is a change in their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Outsourcing of Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was further recommended that outsourcing guidelines should be created and implemented, which would specify the agents responsible for outsourcing data. On this note, the fact that a large volume of Indian data is being outsourced to the U.S. under the Patriot Act was discussed. In particular, it was pointed out that most data retention servers are based in the U.S., which makes it difficult for Indians to be able to be informed about which data is being collected, whether it is being processed, shared, disclosed and/or retained. A participant argued that most companies have special provisions which guarantee that data will not cross borders and that it actually depends on the type of ISP handling the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue which was raised was that, although a consumer may have control over his/her data at the first stage, that individual ultimately loses control over his/her data in the next stages when data is being shared and/or disclosed without his/her knowledge or consent. Not only is this problematic because individuals lose control over their data, but also because the issue of accountability arises, as it is hard to determine who is responsible for the data once it has been shared and disclosed. Some participants suggested that such a problem could possibly be solved if the data subject is informed by the data processor that its data is being outsourced, as well as of the specific parties the data is being outsourced to. Another participant argued that it does not matter who the data is being outsourced to, but the manner of its use is what really matters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Retention&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Acting on the powers given by POTA, it was argued that 50,000 arrests have been made. Out of these arrests, only seven convictions have been made, yet the data of thousands of individuals can be stored for many years under POTA. Thus, it was pointed out that it is crucial that the individual is informed when his/her data is destroyed and that such data is not retained indefinitely. This was supplemented by a participant who argued that most countries in the West have data retention laws and that India should too. Other participants argued that data retention does not end with data destruction, but with the return of the data to the individual and the assurance that it is not stored elsewhere. However, several participants argued that the return of data is not always possible, especially since parties may lack the infrastructure to take back their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was pointed out that civil society groups have claimed that collected data should be destroyed within a specific time period, but the debate remains polarized. In particular, some participants argued that data should be retained indefinitely, as the purpose of data collection may change within time and that data may be valuable in dealing with crime and terrorism in the future. This was countered by participants who argued that the indefinite retention of data may potentially lead to human rights violations, especially if the government handling the data is non-democratic. Another participant argued that the fact that data may be collected for purpose A, processed for purpose B and retained or disclosed for purpose C can be very problematic in terms of human rights violations in the future. Furthermore, another participant stated that destruction should mean that data is no longer accessible and that is should not only apply to present data, but also to past data, such as archives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Processing&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The processing of personal data is regulated in section 8 of the draft Privacy (Protection) Bill 2013. A participant argued that the responsibility should lie with the person doing the outsourcing of the data (the data collector). Another participant raised the issue that although banks acquire consent prior to collection and use of data, they subsequently use that data for any form of data processing and disclosure. Credit information requires specific permission and it was argued that the same should apply to other types of personal data. Consent should be acquired for every new purpose other than the original purpose for data collection. It was strongly argued that general consent should not cover every possible disclosure, sharing and processing of data. Another issue which was raised in terms of data processing is that Indian data could be compromised through global cooperation or pre-existing cooperation with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Disclosure&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disclosure of personal data was highlighted as one of the most important provisions within the draft Privacy (Protection) Bill 2013. In particular, three types of disclosure were pointed out: (1) disclosure with consent, (2) disclosure in outsourcing, (3) disclosure for law enforcement purposes. Within this discussion, principle liability issues were raised, as well as whether the data of a deceased person should be disclosed. Other participants raised the issue of data being disclosed by international third parties, who gain access to it through cooperation with Indian law enforcement agencies and cases of dual criminality in terms of the misuse of data abroad were raised. A participant highlighted three points: (1) the subject who has responsibility for the processing of data, (2) any obligation under law should be made applicable to the party receiving the information, (3) applicable laws for outsourcing Indian data to international third parties. It was emphasized that the failure to address these three points could potentially lead to a conflict of laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a participant, a non-disclosure agreement should be a prerequisite to outsourcing. This was preceded by a discussion on the conditions for data disclosure under the draft Privacy (Protection) Bill 2013 and it was recommended that if data is disclosed without the consent of the individual, the individual should be informed within one year. It was also pointed out that disclosure of data in furtherance of a court order should not be included in the Bill because courts in India tend to be inconsistent. This was followed by a discussion on whether power should be invested in the High Court in terms of data disclosure.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Interception of Communications”: Chapter IV&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table ended with a brief discussion on the fourth chapter of the draft Privacy (Protection) Bill 2013, which regulates the interception of communications. Following an overview of the sections and their content, a participant argued that interception does not necessarily need to be covered in the draft Privacy (Protection) Bill, as it is already covered in the Telegraph Act. This was countered by participants who argued that the interception of communications can potentially lead to a major violation of the right to privacy and other human rights, which is why it should be included in the draft Privacy (Protection) Bill. Other participants argued that a requirement that intercepted communication remains confidential is necessary, but that there is no need to include privacy officers in this. Some participants proposed that an exception for sting operations should be included in this chapter.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Meeting conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table entailed a discussion of the definitions used in the draft Privacy (Protection) Bill 2013, as well as of chapters II, III and IV on the right to privacy, the protection of personal data and the interception of communications. The majority of the participants agreed that India needs a privacy legislation and that individuals´ data should be legally protected. However, participants disagreed in regards to how data would be safeguarded and the extent to which data collection, processing, sharing, disclosure, destruction and retention should be regulated. This was supplemented by the debate on self-regulation and co-regulation; participants disagreed on whether the industry should regulate the use of customers´ data autonomously from government regulation or whether the industry should co-operate with the Privacy Commissioner for the regulation of the use of data. Though a consensus was not reached in regards to co-regulation and self-regulation, the majority of the participants agreed upon the establishment of a privacy legislation which would safeguard individuals´ personal data. The major issue, however, with the creation of a privacy legislation in India would probably be its adequate enforcement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting'&gt;https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:35:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-celebrates-5-years.pdf">
    <title>CIS Celebrates 5 Years</title>
    <link>https://cis-india.org/internet-governance/blog/cis-celebrates-5-years.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-celebrates-5-years.pdf'&gt;https://cis-india.org/internet-governance/blog/cis-celebrates-5-years.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-18T02:09:00Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother">
    <title>Is India's government becoming Big Brother? </title>
    <link>https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother</link>
    <description>
        &lt;b&gt;India's new Central Monitoring System will give officials unprecedented access to calls, texts, and online activity.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The blog post by Talia Ralph and Jason Overdorf was &lt;a class="external-link" href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt;published in Global Post&lt;/a&gt; on May 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government has quietly started putting into place its new Central  Monitoring System, a project that will give it access to its citizens'  telephone calls, texts, and online activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system, &lt;a href="http://www.pcworld.com/article/183229/article.html" target="_blank"&gt;in development since 2009&lt;/a&gt;, will enable state agencies to monitor all digital interactions, &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms" target="_blank"&gt;the Times of India reported&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Work on CMS has been kept quiet for the past few years, although the  newspaper reported that several government agencies ordered specialized  equipment and systems for monitoring telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's government has steadily been increasing its access to  telecommunications since the 2008 Mumbai bombings to help track  militants and illegal activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The country — one of the world's fastest-growing internet markets —  enacted its information technology law in 2000, and amended it twice, in  2008 and again in 2011.&lt;/p&gt;
&lt;p&gt;As PCWorld described the new system,&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify; "&gt;The CMS will have central and regional databases to help  central and state-level enforcement agencies intercept and monitor  communications, the government said. It will also have direct electronic  provisioning of target numbers by government agencies without any  intervention from telecom service providers, it added. It will also  feature analysis of call data records and data mining of these records  to identify call details, location details, and other information of the  target numbers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Internet freedom activists and privacy experts worry the project  offers far too much access to citizens' communications. They say  official agencies allegedly misused and leaked tapped phone  conversations, while the government has sought to quash dissent and  silence critics on the internet under the guise of preventing hate  speech.&lt;/p&gt;
&lt;p&gt;"In the absence of a strong privacy law that promotes transparency  about surveillance and thus allows us to judge the utility of the  surveillance, this kind of development is very worrisome," Pranesh  Prakash, the director of policy at the Center for Internet and Society,  told the Times of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Further, this has been done with neither public nor parliamentary  dialog, making the government unaccountable to its citizens," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government last year &lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/120824/india-china-censorship-internet"&gt;blocked mobile phones and shut down social media&lt;/a&gt; sites ostensibly to prevent communal riots, but in the process blocked  some 16 Twitter handles known to be critical of the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics of the CMS movement &lt;a href="http://stopicms.org/2013/05/the-what-why-and-how-for-stopicms/" target="_blank"&gt;wrote a blog post &lt;/a&gt;arguing that the Indian government wants to use the law to censor "hate speeches and government criticism."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We know the government today hates public criticizing it," the group  Stop ICMS wrote on their blog. "The recent arrests of people for  tweeting or posting on Facebook has proved that. Govt. does not like  criticism that can be seen by everyone on the Internet."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS program is in place in a "preliminary state" right now, with the full version expected to be in place by August 2014.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother'&gt;https://cis-india.org/news/global-post-talia-ralph-jason-overdorf-may-9-2013-is-indias-govt-becoming-big-brother&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:39:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/table-2.pdf">
    <title>Surveillance Technologies (Table 2)</title>
    <link>https://cis-india.org/internet-governance/blog/table-2.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/table-2.pdf'&gt;https://cis-india.org/internet-governance/blog/table-2.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-09T10:22:41Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/table-1.pdf">
    <title>Surveillance Technologies (Table 1)</title>
    <link>https://cis-india.org/internet-governance/blog/table-1.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/table-1.pdf'&gt;https://cis-india.org/internet-governance/blog/table-1.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-09T10:02:56Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations">
    <title>Central Monitoring System to make government privy to phone calls, text messages and social media conversations</title>
    <link>https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations</link>
    <description>
        &lt;b&gt;The government last month quietly began rolling out a project that gives it access to everything that happens over India's telecommunications network—online activities, phone calls, text messages and even social media conversations. Called the Central Monitoring System, it will be the single window from where government arms such as the National Investigation Agency or the tax authorities will be able to monitor every byte of communication. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Indu Nandakumar was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/Business/India-Business/Central-Monitoring-System-to-make-government-privy-to-phone-calls-text-messages-and-social-media-conversations/articleshow/19927923.cms"&gt;published in the Times of India&lt;/a&gt; on May 7, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But privacy and Internet  freedom advocates are worried that in the name of security, the  government could end up snooping on people, possibly abusing a system  that does not have enough safeguards to protect ordinary citizens. &lt;br /&gt;&lt;br /&gt; "In the absence of a strong privacy law that promotes transparency  about surveillance and thus allows us to judge the utility of the  surveillance, this kind of development is very worrisome," warned  Pranesh Prakash, director of policy at the Centre for Internet and  Society. "Further, this has been done with neither public nor  parliamentary dialogue, making the government unaccountable to its  citizens." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;span id="advenueINTEXT"&gt;After the Mumbai blasts in  November 2008, the government has been arming itself with powers and  technology to help it eavesdrop on digital communications. The  information technology law, enacted in 2000 and amended twice in 2008  and 2011, gives designated government officials the authority to listen  in on phone calls, read SMSes, emails, and monitor websites. &lt;br /&gt;&lt;br /&gt; Such access is allowed for purposes of "reasonable security practices and procedures". &lt;br /&gt;&lt;br /&gt; However, Pavan Duggal, a Supreme Court advocate specialising in cyber  law, said the government has given itself unprecedented powers to  monitor private Internet records of citizens. "This system is capable of  tremendous abuse," he said. The Central Monitoring System, being set up  by the Centre for Development of Telematics, plugs into telecom gear  and gives central and state investigative agencies a single point of  access to call records, text messages and emails as well as the  geographical location of individuals. &lt;br /&gt;&lt;br /&gt; Duggal, who closely  follows New Delhi's battle with Internet firms, said there hasn't been  much details from the government on what exactly the system intends to  monitor and under what conditions. &lt;br /&gt;&lt;br /&gt; In December 2012, the then  information technology minister Milind Deora told Parliament that the  monitoring system, on which the government is spending Rs 400 crore,  will "lawfully intercept Internet and telephone services". &lt;br /&gt;&lt;br /&gt; Work  on the system has been kept under wraps for nearly two years. Several  government agencies have issued tenders seeking specialised equipment  and systems for such monitoring. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;span id="advenueINTEXT"&gt;As part of modernisation,  the home ministry is updating all its offices in state capitals with  such gear. C-DOT group head Shikha Srivastava declined comment.  Information technology ministry spokeswoman Mamta Verma redirected the  queries to Gulshan Rai, director of India's Cyber Emergency Response  Team, but Rai declined comment. &lt;br /&gt;&lt;br /&gt; With over 100 million users,  India is one of the fastest-growing Internet markets in the world. The  government has come under criticism from activists for increased  censorship and tracking of user records. Internet activist group  Anonymous has started raising the pitch against the monitoring system,  claiming that security is just a pretext for spying on citizens. &lt;br /&gt;&lt;br /&gt; Disclosures by Google show that the number of requests from the  government seeking personal information has been on the rise. In the  second half of 2012, the government made nearly 2,500 requests, Google  said. &lt;br /&gt;&lt;br /&gt; "Even legitimate conversations could end up being tracked," cautioned Duggal, the Supreme Court lawyer. &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations'&gt;https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:17:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator">
    <title>Messaging apps find another foe in India’s market regulator</title>
    <link>https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator</link>
    <description>
        &lt;b&gt;Paranoid governments and mobile operators aren’t the only one that dislike messaging apps. Regulatory bodies aren’t crazy about them either. The Securities and Exchange Board of India (SEBI) is worried that attempts to pass on confidential information or manipulate markets are originating from within services like WhatsApp and Blackberry Messenger.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This &lt;a class="external-link" href="http://qz.com/82488/messaging-apps-find-another-foe-in-indias-market-regulator/"&gt;blog post was published in Quartz&lt;/a&gt; on May 8, 2013. Elonnai Hickok is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The regulator already analyzes data from trades for irregularities  through its “integrated market surveillance system”. That gives it an  idea of what stocks are being manipulated. Now it wants to expand its  horizons. The &lt;a href="http://www.thehindu.com/business/Industry/sebi-mulls-steps-to-check-manipulation-through-bbm-whatsapp/article4686269.ece"&gt;Press Trust of India&lt;/a&gt; reports that SEBI has looked into tracking Twitter and Facebook and is  grappling with messaging apps—though as yet it has no systems in place  for doing either, according to Elonnai Hickok of the Center for Internet  Studies in Bangalore. A SEBI spokesperson could not be reached for  comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if SEBI did start following you on Twitter, it  cannot snoop on your WhatsApp messages. That sort of power is the  preserve of intelligence and police authorities. And there is good  reason for SEBI’s restricted powers. Keeping the markets clean may be an  honorable pursuit, but the regulator hasn’t always used honorable  means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s finance minister last year said that SEBI would be allowed to &lt;a href="http://articles.economictimes.indiatimes.com/2012-11-19/news/35203786_1_sebi-data-records-securities-and-exchange-board"&gt;request call records&lt;/a&gt;,  which are the data kept by operators about who called whom, for how  long and from where. Such information can help investigators discover  sources of leaked information. It can also be used to figure out whether  traders are trying to influence other investigators. But a  freedom-of-information request &lt;a href="http://www.cobrapost.com/index.php/news-detail?nid=359&amp;amp;cid=23"&gt;recently revealed&lt;/a&gt; that SEBI had been requesting—and receiving—such data from carriers at  least since 2009, well before it was supposedly allowed to do so.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator'&gt;https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-05T10:46:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis">
    <title>Celebrating 5 Years of CIS</title>
    <link>https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is celebrating 5 years of its existence with an exhibition showcasing its activities and accomplishments. The exhibition will be held at its offices in Bangalore and Delhi from May 20 to 23, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-5-years-all-posters.zip" class="internal-link"&gt;Download all the posters exhibited during the recent exhibition here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;As a move to promote transparency, CIS is inviting the general public to be its auditors by throwing open its account books and contracts which show how it has spent the Rs. 13.13 crores received from its donors. The four-day event will see renowned artists like Kiran Subbaiah, Tara Kelton, Navin Thomas and Abhishek Hazra featuring their work and also giving live demonstrations.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;h2 align="JUSTIFY"&gt;Agenda&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;&lt;i&gt;Open exhibition on all the 4 days from 10.00 a.m. to &lt;/i&gt;&lt;i&gt;8&lt;/i&gt;&lt;i&gt;.00 p.m., in Bangalore and Delhi. The evening  programmes will be held in Bangalore&lt;/i&gt;. &lt;i&gt;Dinner will be served right afterwards.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Evening Programmes&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 align="JUSTIFY"&gt;May&lt;i&gt; &lt;/i&gt;20&lt;i&gt;, &lt;/i&gt;2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;19.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Why did I buy a set-top box?: What we know, don't know and need to know about Digitalisation &lt;/b&gt;&lt;b&gt;— A Talk by Vibodh Parthasarathi&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Why are we being asked to install set-top boxes? How will this change what we want, and pay for, on TV? Grappling with these questions, the talk will evaluate the rationale of the digital migration in cable currently underway, and the less talked about digital migration being planned for the public broadcaster. These scarcely debated and often contentious issues form the core of a recent &lt;a href="http://www.opensocietyfoundations.org/reports/mapping-digital-media-india"&gt;Country Report on the Media in India&lt;/a&gt;, anchored by the speaker. The India Country Report, the first inter-sectoral and policy oriented study of our electronic media landscape, finds the ongoing digitalisation of cable, the infusion of digital tools in the press and the proposed digital switchover of the public broadcaster, posing varied challenges not only to journalism but to public interest at large. This report is part of a global initiative, &lt;a href="http://www.opensocietyfoundations.org/projects/mapping-digital-media" target="_blank"&gt;Mapping Digital Media&lt;/a&gt;, examining opportunities and risks amidst the transitions to a digital media ecology across 50 countries.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/N8gCYiYS9VY" width="250"&gt;&lt;/iframe&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.00&lt;br /&gt;19.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Film Screening on Cyber Cafes of Rural India by Video Volunteers&lt;/b&gt;&lt;br /&gt;Video Volunteers in partnership with CIS have been documenting the cyber cafes of rural India. Kamini Menon and Christy Raj will do the screening of seven 2-minute films:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafe Trends Slowly Changing in Imphal&lt;/b&gt; by Achungmei Kamei (Manipur)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Transgender Interaction with Cyber Cafes &lt;/b&gt; by Christy Raj (Karnataka)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafes Prevail Over Mobile Phones in Nagaland&lt;/b&gt; by Meribeni Kikon (Nagaland)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Mobile Technology Threatens Cyber Cafes in HP&lt;/b&gt; by Avdhesh Negi (Himachal Pradesh)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafe Visit - A Day's Journey&lt;/b&gt; by Saroj Paraste (Madhya Pradesh)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Challenges of Establishing Cyber Cafes&lt;/b&gt; by Rohini Pawar (Maharashtra)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Community Service Centre - Myth or Reality?&lt;/b&gt; by Neeru Rathod (Gujarat)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Video&lt;/b&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2OxWtwIWNdc" width="250"&gt;&lt;/iframe&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.30&lt;br /&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Hindustani Classical Performance by Aditya Dipankar &lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 align="JUSTIFY"&gt;May 21, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;18.00&lt;br /&gt;19.00&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Screening of Sabaka &lt;br /&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;A young elephant trainer in India vows revenge against the cult that killed his family. He seeks help from the local Maharajah who refuses, and he sets out alone to battle the enemy... &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sabaka"&gt;Sabaka&lt;/a&gt; is a 1954 film produced and directed by Frank Ferrin starring Boris  Karloff, Reginald Denny, June Foray, et.al.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.00&lt;br /&gt;20.00&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Slouching towards Tlön: An Encyclopedia for the 2nd century of Indian cinema — A Talk by Lawrence Liang &lt;/b&gt;&lt;br /&gt;Ashish Rajadhyaksha and Paul Willemen’s Encyclopedia of Indian cinema (1994) marked an important moment for the study of Indian film history. In the two decades since its publication we have seen a rise in the academic community working on Indian film history along with the rise of various new archival initiatives online. Materials that were hitherto unavailable have also made their way into the public domain via the efforts of film historians, cinephiles and other enthusiasts. It is perhaps fitting to think about what a collaborative encyclopedia of Indian cinema for the 21st century may look like. Using Rajadhayksha and Willemen’s Encyclopedia as a base, Lawrence has been working on an online version that incorporates moving images, photographs and archival materials and his presentation will open up questions of how one thinks of an online encyclopedia as well as larger conceptual questions of the relationship between the encyclopedias, the internet and moving image archives.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2n5ZON8M_0E" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;May 22, 2013&lt;/h3&gt;
&lt;p&gt;Cybersecurity, Privacy and Surveillance&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;18.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;“&lt;b&gt;The Indian Surveillance State”&lt;/b&gt;&lt;b&gt;—&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;A Talk by Maria Xynou &lt;/b&gt;&lt;br /&gt;The Central Monitoring System confirms that, starting from last month ‘Big Brother’ is a reality in India. But how do authorities get the tech to spy on us? Maria has started investigating surveillance technology companies operating in India. So far, 76 companies have been detected which are producing and selling different types of surveillance gear to Indian law enforcement agencies. Join us to see India´s first investigation of who is aiding our watchers!&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/fshPBINoACs" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.30&lt;br /&gt;19.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Why Privacy and How?&lt;/b&gt; &lt;b&gt;A Talk &lt;/b&gt;&lt;b&gt;by Bernadette Langle &lt;/b&gt;&lt;br /&gt;"But I have nothing to hide!" That's what most people think. Are you sure? What about all the services you use for free, don't you think the service provider has to spend money on that, and that he needs to earn it somehow? Bernadette will show some alternatives and also how easy it can be, to put your messages in a virtual private envelope as you use to do with messages on paper.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/DVa8dkda1D0" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.00&lt;br /&gt;19.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Cyber Security Preview &lt;/b&gt;&lt;b&gt;—&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Presentation&lt;/b&gt;&lt;b&gt; by Laird Brown&lt;/b&gt; and&lt;b&gt; Purba Sarkar &lt;/b&gt;&lt;br /&gt;CIS in cooperation with Citizen Lab, Munk School of Global Affairs at the University of Toronto, is developing a film project on cyber security in India from a civil society perspective. Laird will show the preview of the project. The preview will include an overview of the project along with a video footage from the first series of interviews.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/moqgZ6tDl4g" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.45&lt;br /&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Faking of Fingerprints: &lt;/b&gt;&lt;b&gt;A Presentation by &lt;/b&gt;&lt;b&gt;Bernadette Langle &lt;/b&gt;&lt;br /&gt;Bernadette will give a brief presentation on how easy it is to fake a fingerprint. Afterwards you can get hands-on. Fake a fingerprint yourself and take it with you to your home.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/3q6UBK6lLRI" width="250"&gt;&lt;/iframe&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;May 23, 2013&lt;/h3&gt;
&lt;p&gt;Kannada Language and IT&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;18.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Kannada in Modern Era: A Guest Talk&lt;/b&gt;&lt;b&gt; by Dr. Chandrashekhara Kambara &lt;/b&gt;&lt;br /&gt;Dr. Chandrashekhara will be the chief guest for this session and will give a guest lecture.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/9bMUu08f_JU" width="250"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.15&lt;br /&gt;19.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;From Palm Leaf to Tablet – Journey of Kannada: A Talk by Dr. U.B. Pavanaja &lt;/b&gt;&lt;br /&gt;Kannada language which has a history of 2000 years and quite rich in literature started on palm leaves. Kannada advanced with modern times adopting the marvels of Information Technology. This is accomplished by successfully implementing Kannada in various facets of IT. It is being used everywhere from data driven applications to websites to hand held devices like tablets. These aspects will be brought out during the talk.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Summary in Kannada:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ತಾಳೆಗರಿಯಿಂದ ಟ್ಯಾಬ್ಲೆಟ್ ತನಕ ಕನ್ನಡದ ಪಯಣ&lt;br /&gt;ಸುಮಾರು ಎರಡು ಸಾವಿರ ವರ್ಷಗಳ ಭವ್ಯ ಇತಿಹಾಸವಿರುವ ಕನ್ನಡ ಸಾಹಿತ್ಯದ ಉಗಮ ತಾಳೆಗರಿಗಳ ಮೇಲೆ ಆಯಿತು. ಕನ್ನಡ ಭಾಷೆಯು ಆಧುನಿಕ ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಅದ್ಭುತ ಕೊಡುಗೆಗಳನ್ನು ತನ್ನದಾಗಿಸಿಕೊಂಡು ಬೆಳೆಯಿತು. ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಎಲ್ಲ ಅಂಗಗಳಲ್ಲಿ ಕನ್ನಡವನ್ನು ಅಳವಡಿಸಿ ಬಳಸಿಕೊಳ್ಳುವುದರ ಮೂಲಕ ಇದು ಸಾಧ್ಯವಾಯಿತು. ಆನ್ವಯಿಕ ತಂತ್ರಾಂಶವಿರಲಿ, ಪ್ರತಿಸ್ಪಂದನಾತ್ಮಕ ಜಾಲತಾಣವಿರಲಿ, ಕೈಯಲ್ಲಿ ಹಿಡಿದು ಕೆಲಸ ಮಾಡುವ ಟ್ಯಾಬ್ಲೆಟ್ ಇರಲಿ –ಎಲ್ಲ ಕಡೆ ಕನ್ನಡದ ಬಳಕೆ ಆಗುತ್ತಿದೆ. ಈ ಎಲ್ಲ ವಿಷಯಗಳ ಕಡೆ ಒಂದು ಪಕ್ಷಿನೋಟವನ್ನು ಈ ಭಾಷಣದಲ್ಲಿ ನೀಡಲಾಗುವುದು.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/w4CiHwpX9X0" width="250"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.30&lt;br /&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Carnatic Music Performance by Nirmita Narasimhan&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Video&lt;br /&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="255" src="http://www.youtube.com/embed/-P4v5u_Q34M" width="250"&gt;&lt;/iframe&gt; &lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Speakers&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/VPforblurb.jpg" alt="Vibodh" class="image-inline" title="Vibodh" /&gt;&lt;br /&gt;Vibodh Parthasarathi&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Vibodh Parthasarathi &lt;/b&gt;works with the Centre for Culture and Media Governance, Jamia Millia Islamia, New  Delhi. He is also a Board Member at the Centre for Internet and Society, Bangalore. He maintains a multidisciplinary interest in media and development policy, business history of creative industries, and governance of media infrastructure. At the Centre for Culture, Media &amp;amp; Governance, Jamia Millia Islamia, New Delhi, his ongoing research addresses media policy literacy, the TV news industry and the digital switchover in India. He is the co-editor of the critically acclaimed tri-series on Communication Process (Sage).&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Lawrence.png" alt="Lawrence" class="image-inline" title="Lawrence" /&gt;&lt;/p&gt;
&lt;p&gt;Lawrence Liang&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Lawrence Liang&lt;/b&gt; is the Chairman of the Board at the Centre for Internet and Society. He is a  graduate of the National Law School. He subsequently pursued his Masters degree in Law and Development at Warwick, on a Chevening Scholarship. His key areas of interest are law, technology and culture, the politics of copyright and he has been working closely with Sarai, New Delhi on a joint research project Intellectual Property and the Knowledge/Culture Commons. A keen follower of the open source movement in software, Lawrence has been working on ways of translating the open source ideas into the cultural domain. He has written extensively on these issues and is the author of &lt;i&gt;The Public is Watching: Sex, Laws and Videotape&lt;/i&gt; and &lt;i&gt;A Guide to Open Content Licenses&lt;/i&gt;. Lawrence has taught at NLS, the Asian College of Journalism, NALSAR, etc., and is currently working on a Ph.D. on the idea of cinematic justice at Jawaharlal Nehru University.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_maria.jpg" alt="Maria" class="image-inline" title="Maria" /&gt;&lt;br /&gt;Maria Xynou&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Maria Xynou&lt;/b&gt; is a Policy Associate on the Privacy Project at the CIS. She has previously interned with Privacy International and with the Parliament of Greece. Maria holds a Master of Science in Security Studies from the University College London (UCL). &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Bernadette.jpg" alt="Bernadette" class="image-inline" title="Bernadette" /&gt;
&lt;p&gt;Bernadette Langle&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Bernadette Längle &lt;/b&gt;recently graduated in social and cultural anthropology, philosophy and computer science. She is also a so-called hacktivist together with one of the oldest hacker associations of the world, the Chaos Computer Club, having a lot of influence in German politics. As one of the core-team organizer of Chaos Communication Congress in Germany she also has a lot of experience in organizing events.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Laird.png" alt="Laird Brown" class="image-inline" title="Laird Brown" /&gt;&lt;br /&gt;Laird Brown&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Laird Brown&lt;/b&gt; is a strategic planner and writer. His core competencies are brand analysis, public relations, and resource management. Laird has worked at the United Nations in New York; high-tech ventures in North America, Europe, and India; and, is a guest speaker at ICT conferences internationally. He is currently working on a film project for CIS on cyber security in India with Purba Sarkar.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/purba.jpg" alt="Purba" class="image-inline" title="Purba" /&gt;&lt;br /&gt;Purba Sarkar&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Purba Sarkar&lt;/b&gt; is an associate producer with the cyber security film project. She holds a Bachelor in Technology degree from West Bengal University of Technology. Purba worked as a strategic advisor in the field of SAP Retail for 4 years before joining CIS in January, 2013.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Kambara.png" alt="Kambara" class="image-inline" title="Kambara" /&gt;Dr.Chandrashekhara Kambara&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Chandrashekhara Kambara&lt;/b&gt; is a prominent poet, playwriter, folklorist, film director in Kannada language. He is also the founder-vice-chancellor of Kannada University in Hampi. He is known for his effective usage of North Karnataka dialect of Kannada language in his plays and poems and is often compared with D.R. Bendre. He has been conferred with many prestigious awards including the Jnanpith Award (the highest literary honour conferred in India) in 2011 for the year 2010, the Sahitya Akademi Award, the Padma Shri by Government of India, Kabir Samman, Kalidas Samman and Pampa Award. After his retirement, Kambara was nominated Member of Karnataka Legislative Council, to which he made significant contributions through his interventions. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_Pavanaja.png" alt="Pavanaja" class="image-inline" title="Pavanaja" /&gt;&lt;br /&gt;Dr. U.B. Pavanaja&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr U B Pavanaja&lt;/b&gt; holds a Master’s degree from Mysore University and Ph.D. from Mumbai University. He was a scientist at the Bhabha Atomic Research Centre, Mumbai, for about 15 years. He has done advanced research in Taiwan. He resigned from BARC in 1997 and dedicated himself fully for the cause of Computer and Indian languages. He has to his credit many firsts, viz., first Kannada website, first Kannada online magazine, first Indian language (Kannada) website to receive Golden Web Award, first Indian language (Kannada) editor for Palm OS, first Indian language (Kannada) editor for WinCE device (HP Jornado 720), first Indian language version (Kannada) of universally popular Logo (programming language for children) software, etc. His Kannada logo won the Manthan Award for the year 2006. He was a member of the technical advisory committee setup by the Govt. of Karnataka for Standardization of Kannada on Computers (2000). He is also a member of the Kannada Software Committee of Govt. of Karnataka (2008-current). &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;The Artists&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Kiran.png" alt="Kiran Subbaiah" class="image-inline" title="Kiran Subbaiah" /&gt;&lt;br /&gt;Kiran Subbaiah&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Kiran Subbaiah&lt;/b&gt; studied sculpture at Santiniketan, MSU Baroda and the RCA London. He was an artist in residence at the Rijksakademie Amsterdam where he worked on art that incorporated informatics and electro-mechanics. He is also known for making videos using custom-built tools that enable him to perform multi-person film-making tasks single-handed. His art is shown extensively in India and abroad. Subbaiah is based in Bangalore and is represented by the Chatterjee and Lal gallery in Mumbai. Kiran will present the Spectator, a robot that can sense the presence of human beings around it. It tries to appreciate them as works of art.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Tara.png" alt="Tara Kelton" class="image-inline" title="Tara Kelton" /&gt;&lt;br /&gt;Tara Kelton&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Tara Kelton&lt;/b&gt; is an artist and designer. She has been living in Brooklyn, USA and Bangalore, India for the last three years. She received her MFA from the Yale School of Art in 2009. Kelton’s video, print, and web-based works investigate moments in which technology alters our perception of the physical world. Kelton has taught at the Srishti School of Art, Design, and Technology and has recently exhibited her work at Vox Populi (USA), Franklin Street Works (USA), GALLERYSKE (Bangalore) and the India Design Forum (Mumbai). Tara will present &lt;i&gt;Trace&lt;/i&gt;, a surveillance camera feed drawn in real-time by anonymous online workers.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Navin.png" alt="Navin Thomas" class="image-inline" title="Navin Thomas" /&gt;&lt;br /&gt;Navin Thomas&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Navin Thomas&lt;/b&gt; is a multimedia artist and a professional scrap market junkie, he spends a good quality of his precious time looking for obscure cultural misfits... after destroying most of himself in the 90's, he now spends his time restoring your mother's brother’s tin space toys and other unusual situations.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Abhishek.png" alt="Abhishek Hazra" class="image-inline" title="Abhishek Hazra" /&gt;Abhishek Hazra&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Abhishek Hazra&lt;/b&gt; approaches his art with a particular emphasis on the study of the historiography of science. He uses videos and prints that often integrate textual fragments drawn from real and fictional scenarios. He has previously exhibited and performed at Science Gallery, Dublin, HEART Herning Museum of Contemporary Art, Denmark, Astrup Fearnley Museum of Modern Art, Oslo, Casino Luxembourg Forum d’art Contemporain, Experiment Marathon Reykjavik, Reykjavik Art Museum and Kunstmuseum Bern. Abhishek was most recently an artist in residence at SymbioticA, the Centre for Excellence in Biological Arts, University of Western Australia, Perth. It was first  performed as part of Beam Me Up, curated by Reinhard Storz and Gitanjali Dang, which was acknowledged by Pro Helvetia, New Delhi and German Book Office, New Delhi. Abhishek will be presenting #cloudrumble56 (attempted to re-animate sections of the Indian parliamentary archives — specifically, the transcripts of the scientist M.N. Saha's (1893-1956) interventions — through a performance that was transmitted only through live tweets on Twitter).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Aditya.png" alt="Aditya Dipankar" class="image-inline" title="Aditya Dipankar" /&gt;Aditya Dipankar&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Aditya Dipankar &lt;/b&gt;started fiddling with music at the age of 4 when he started learning the &lt;i&gt;tabla&lt;/i&gt; and then went on to play it for a long time. Years later, he discovered his strong inclination towards singing. Now, under the noble guidance of Pandit Vijay Sardeshmukh (Senior disciple of Pandit Kumar Gandharva), he is trying to understand the simplicity and spontaneity in the rich tradition of Hindustani classical music.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Nirmita.png" alt="Nirmita Narasimhan" class="image-inline" title="Nirmita Narasimhan" /&gt;Nirmita Narasimhan&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Nirmita Narasimhan&lt;/b&gt; is a Policy Director at CIS and works on accessibility for persons with disabilities. She was awarded the national award for empowerment of persons with disabilities by the President of India and also received the NIVH Excellence Award. Nirmita Narasimhan is a disciple of Dr. Radha Venkatachalam and renowned maestro Prof. T.R. Subramanyam. She began learning music at the age of 5 and went on to complete her Ph.D. in this subject from the Delhi University. Nirmita has been performing since 1995 and received several accolades such as the Sahitya Kala Parishad Scholarship and prizes in several competitions. She received the Gold medal in MA for standing first in the University and also stood first in MPhil. She has released a CD on Ponnayya Pillai compositions and also sung in an album of &lt;i&gt;varnams&lt;/i&gt;. Nirmita has performed in different places in India such as Delhi, Chennai, Tirupathi and Bangalore as well as in Singapore and has also given several thematic concerts such as &lt;i&gt;Eka Raga Sandhya&lt;/i&gt; and &lt;i&gt;Pallavi&lt;/i&gt; concerts. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/sharathcopy.jpg" alt="Sharath Chandra Ram" class="image-inline" title="Sharath Chandra Ram" /&gt;&lt;/p&gt;
&lt;p&gt;Sharath Chandra Ram&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Sharath Chandra Ram (Sharathchandra Ramakrishnan) has interests in multimodal art, cognitive science, accessibility, digital humanities and network cultures. He is a faculty at the Centre for Experimental Media Arts at the Srishti School of Art Design and Technology. At the Centre for Internet and Society he helped set up and manage activities at the Metaculture Media Lab : an open hackerspace and alternative platform for research and exchange. His writings and musings at CIS maybe found here: &lt;a href="https://cis-india.org/author/sharath"&gt;http://cis-india.org/author/sharath&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He graduated from the University of Edinburgh with a degree in Artificial Intelligence specializing in interactive virtual environments. Previously as a Research Associate at the National Institute of Mental Health and Neurosciences he received a special mention award at the International Conference on Consciousness (2012) held at the National Institute of Advanced Studies for his work on ‘Cross modal Integration’. As an amateur radio broadcaster, he is a proponent of the free use of airwaves for relief work, education and transmission art. He has also been a development related radio journalist (PANOS @ Nepal, Voices UNDP@Bangalore), speaker at the International Ham Radio Convention (Port Blair, 2006) and as a film enthusiast has been a Press Reviewer for the Edinburgh International Film Festival.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;span class="author-g-ecflmmhkz122zm34g8fj"&gt;Locations&lt;/span&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;span class="author-g-ecflmmhkz122zm34g8fj"&gt;Bangalore&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society&lt;br /&gt;No. 194, Second 'C' Cross, Domlur,&lt;br /&gt;2nd Stage, Bangalore - 560071,&lt;br /&gt;Karnataka, India &lt;br /&gt;Ph: +91 80 4092 6283                 &lt;br /&gt; Fax: +91 80 2535 0955&lt;/p&gt;
&lt;h3&gt;Delhi&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society&lt;br /&gt;G 15, Top floor&lt;br /&gt;Behind Hauz Khas, G Block Market&lt;br /&gt;Hauz Khas,&lt;br /&gt;New Delhi 110016&lt;br /&gt;Ph: + 91 011 40503285&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Event Brochure&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-celebrates-5-years.pdf" class="internal-link"&gt;Event Flier&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Event Posters/Banners and Videos&lt;/h2&gt;
&lt;hr /&gt;
&lt;h3&gt;Accessibility&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;National Resource Kit (&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;NVDA E-Speak (&lt;a href="https://cis-india.org/accessibility/blog/nvda-espeak.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/nvda-espeak" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;International Collaborations (&lt;a href="https://cis-india.org/accessibility/blog/international-collaborations.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/international-collaborations" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Partners (&lt;a href="https://cis-india.org/accessibility/blog/partners.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/partners" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Publications (&lt;a href="https://cis-india.org/accessibility/blog/publications.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/publications" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Timeline (&lt;a href="https://cis-india.org/accessibility/blog/timeline.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/timeline" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Inclusive Planet (PDF, &lt;a href="https://cis-india.org/accessibility/blog/inclusive-planet" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;In the below video Anandhi Viswanathan gives a demo of the National Resource Kit project  and Rameshwar Nagar gives a demo of the NVDA and ESpeak (Text-to-Speech)  project during the exhibition.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2Z1xfwvkFoQ" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;Access to Knowledge&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Broadcast Treaty (&lt;a href="https://cis-india.org/a2k/blogs/broadcast-treaty.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/broadcast-treaty" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Copyright (&lt;a href="https://cis-india.org/a2k/blogs/copyright-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/copyright" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software Patent 1 (&lt;a href="https://cis-india.org/a2k/blogs/software-patent-1.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/software-patent-1" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software Patent 2 (&lt;a href="https://cis-india.org/a2k/blogs/software-patent-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/software-patent-2" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Pervasive Technologies (&lt;a href="https://cis-india.org/a2k/blogs/pervasive-technologies-exhibition-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/pervasive-technologies-poster.pdf" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Access to Knowledge (Wikipedia)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Factsheet (&lt;a href="https://cis-india.org/openness/blog-old/indian-language-factsheet.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/indian-language-wikipedia-factsheet" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Reaching Out (&lt;a href="https://cis-india.org/openness/blog-old/reaching-out.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/reaching-out-to-participants" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Outreach (&lt;a href="https://cis-india.org/openness/blog-old/outreach.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/outreach" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Bridging Gender Gap (&lt;a href="https://cis-india.org/openness/blog-old/bridging-gender-gap.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/bridging-the-gender-gap" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Press Coverage (&lt;a href="https://cis-india.org/openness/blog-old/press-coverage.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/wikipedia-press-coverage" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Education Programmes (&lt;a href="https://cis-india.org/openness/blog-old/education-programmes.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/wiki-education-programs" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Team Achievements (&lt;a href="https://cis-india.org/openness/blog-old/achievements.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/access-to-knowledge-team-achievements" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Visualization (&lt;a href="https://cis-india.org/openness/blog-old/visualization.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/indic-wikipedia-project-visualization" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Open Access to Scholarly Literature (&lt;a href="https://cis-india.org/openness/blog-old/open-access-to-scholarly-literature.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-access-2-scholarly-literature" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Open Access to Law (&lt;a href="https://cis-india.org/openness/blog-old/open-access-to-law-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-access-2-law" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Open Standards (&lt;a href="https://cis-india.org/openness/blog-old/open-standards-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-standards" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Free/Open Source Software (&lt;a href="https://cis-india.org/openness/blog-old/foss-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/foss" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;Internet Governance (Free Speech)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Blocking of Websites (&lt;a href="https://cis-india.org/internet-governance/blog/blocking-websites.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/blocking-websites" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Freedom of Speech  (&lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-speech.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/free-speech" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Intermediary Liability (&lt;a href="https://cis-india.org/internet-governance/blog/intermediary-liability-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/intermediary" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Internet Governance Forum (&lt;a href="https://cis-india.org/internet-governance/blog/internet-governance-forum.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/igf" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Internet Governance (Privacy)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Privacy Events (&lt;a href="https://cis-india.org/internet-governance/blog/privacy-events.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/events" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Timeline (&lt;a href="https://cis-india.org/internet-governance/blog/privacy-timeline.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/events" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;UID (1) (&lt;a href="https://cis-india.org/internet-governance/blog/uid" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/uid" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unique-identity" class="internal-link"&gt;&lt;/a&gt;UID (2) (&lt;a href="https://cis-india.org/internet-governance/blog/uid-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/unique-identity" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;DNA (1) (&lt;a href="https://cis-india.org/internet-governance/blog/dna-1.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-1" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;DNA (2) (&lt;a href="https://cis-india.org/internet-governance/blog/dna-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-2" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Telecom&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Institutional Framework for Indian Telecommunication (&lt;a href="https://cis-india.org/telecom/blog/institutional-framework-for-indian-telecommunication.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/institutional-framework" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Growth of Telecom Industry in India (&lt;a href="https://cis-india.org/telecom/blog/growth-of-telecom-industry-in-india.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/growth-of-telecom" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Delicensed Spectrum (&lt;a href="https://cis-india.org/telecom/blog/delicensed-spectrum.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/delicensed" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Spectrum Sharing (&lt;a href="https://cis-india.org/telecom/blog/spectrum-sharing.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/spectrum" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;RAW Monographs&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Archives and Access (&lt;a href="https://cis-india.org/raw/archives-and-access.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/archives-access" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Internet, Society and Space in Indian Cities (&lt;a href="https://cis-india.org/raw/internet-society-and-space.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/internet-society-space" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;The Last Cultural Mile (&lt;a href="https://cis-india.org/raw/last-cultural-mile.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/last-cultural-mile" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Porn, Law, Video Technology (&lt;a href="https://cis-india.org/raw/porn-law-video-technology.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/porn-law-video-technology" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Re:Wiring Bodies (&lt;a href="https://cis-india.org/raw/rewiring-bodies.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/re-wiring-bodies" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Community Informatics and Open Government Data (Special Issue) (&lt;a href="https://cis-india.org/raw/community-informatics-open-govt-data.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/spl-issue-community-informatics-and-ogd" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;News and Media&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Media Coverage (&lt;a href="https://cis-india.org/internet-governance/blog/media-coverage.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/home-images/MC.png/view" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Organizational Chart (&lt;a href="https://cis-india.org/internet-governance/blog/organizational-chart.pdf" class="internal-link"&gt;PDF&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis'&gt;https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2014-02-25T09:15:58Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore">
    <title>Consilience – 2013</title>
    <link>https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore</link>
    <description>
        &lt;b&gt;The Law and Technology Committee of National Law School of India University, Bangalore is organising ‘Consilience – 2013′, an annual conference on law and technology, to be held on May 25 and 26, 2013. The Centre for Internet and Society is a co-partner for this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Theme: Data Protection and Cyber Security in India. Click to read the &lt;a href="https://cis-india.org/internet-governance/blog/consilience-2013.pdf" class="internal-link"&gt;report here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Topics:&lt;br /&gt;Frameworks for Data Protection in India: The J. A.P. Shah “Report of the Group of Experts on Privacy”&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       What is the scope of the principles/framework?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      What could be the strengths and limitation of their application?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       How does Report define privacy for India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      Would an alternative framework for privacy in India be better? If so, what would this framework look like?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India and the EU: The Privacy Debate&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How does the Indian data protection regime differ from the EU regime?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Was the EU is justified in not accepting India as a data secure country? Reason for or against.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.      In what way does the Indian regime on data protection not meet the requirements of EU’s data protection directive?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      What changes need to be made in the Indian regime to become  EU compliant? Are these changes feasible? Should India make these  changes?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Governmental Schemes, Data Protection, and Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. In India, do private public partnerships between government  and the private sector adequately incorporate data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. What have been concerns related to data protection and  security that have arisen from government schemes? (Please use two  governmental schemes as case studies)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Are these concerns related to the policy associated with the  project – the architecture of the project as well as the implementation?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Should the larger question of data protection for governmental  schemes be incorporated into a privacy legislation? If yes, how so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contracts and Data Protection in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How are contracts used to ensure data protection in India? What actors use contracts?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Are there weaknesses in using contracts to ensure data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       Do contracts address questions brought about from technology like the cloud?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cyber security in India&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;a.      What are the perceived challenges and threats to cyber security in India?&lt;/p&gt;
&lt;p&gt;b.      Are these currently being addressed through policy/projects? If yes, how so?&lt;/p&gt;
&lt;p&gt;c.      How does India’s cyber security regime compare to other countries?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance and Cyber Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.      Does policy in India enable the Government of India to surveil individuals for reasons related to cyber security?&lt;/p&gt;
&lt;p&gt;b.      If so – through what policy, projects, legislation?&lt;/p&gt;
&lt;p&gt;c.      Do the relevant policies, projects, and legislation impact privacy? How so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Draft National Cyber Security Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.   What is the scope of the National Cyber Security Policy of  India? Does the draft policy adequately address all of the concerns  within the ambit of cyber security?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.   Would the Draft National Cyber Security Policy of India be  effective in meeting the goal of enhancing cyber security levels in  India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.    How does the Draft National Cyber Security Policy compare to other countries cyber security policies?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Word Limit&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;Abstract:              750-800 words&lt;/p&gt;
&lt;p&gt;Paper:                   2,500 words&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Deadlines:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Abstract Submission:     April 30, 2013&lt;/p&gt;
&lt;p&gt;Paper Submission:        May 15, 2013&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contact Details&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;consilience2013[at]gmail[dot]com&lt;/p&gt;
&lt;p&gt;Mohak Arora:  +91-90359-21926&lt;/p&gt;
&lt;p&gt;Shivam Singla: +91-99167-08701&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each participant is required to submit an abstract on &lt;b&gt;any one&lt;/b&gt; of the seven topics above and can choose the specific issue within the selected topic to discuss.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For additional details, click&lt;b&gt; &lt;a href="http://consilience.co.in/index.php/component/content/article/20-frontpage/310-call-for-papers"&gt;here&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore'&gt;https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-20T06:15:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers">
    <title>The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers!</title>
    <link>https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers</link>
    <description>
        &lt;b&gt;Maria Xynou is conducting research on surveillance technology companies operating in India. So far, 76 companies have been detected which are currently producing and selling different types of surveillance technology. This post entails primary data on the first ever investigation of the surveillance industry in India. Check it out! &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post has been &lt;a class="external-link" href="http://www.medianama.com/2013/05/223-surveillance-industry-study-shows-at-least-76-companies-aiding-surveillance-in-india-cis-india/"&gt;cross-posted&lt;/a&gt; in Medianama on May 8, 2013. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;So yes, we live in an &lt;a href="http://www.schneier.com/blog/archives/2013/03/our_internet_su.html"&gt;Internet Surveillance State&lt;/a&gt;. And yes, we are constantly under the microscope. But how are law enforcement agencies even equipped with such advanced technology to surveille us in the first place?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Surveillance exists because certain companies produce and sell products and solutions which enable mass surveillance. Law enforcement agencies would not be capable of mining our data, of intercepting our communications and of tracking our every move if they did not have the technology to do so. Thus an investigation of the surveillance industry should be an integral part of research for any privacy advocate, which is why I started looking at surveillance technology companies. India is a very interesting case not only because it&lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting"&gt; lacks privacy legislation &lt;/a&gt;&lt;span&gt;which could safeguard us from the use of intrusive technologies, but also because no thorough investigation of the surveillance industry in the country has been carried out to date.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The investigation of the Indian surveillance industry has only just begun and so far, 76 surveillance technology companies have been detected. No privacy legislation...and a large surveillance industry. What does this mean?&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;A glimpse of the surveillance industry in India&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In light of the &lt;/span&gt;&lt;a href="http://uidai.gov.in/"&gt;UID scheme&lt;/a&gt;&lt;span&gt;, the &lt;/span&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;National Intelligence Grid&lt;/a&gt;&lt;span&gt; (NATGRID), the &lt;/span&gt;&lt;a href="http://ncrb.nic.in/cctns.htm"&gt;Crime and Criminal Tracking Network System&lt;/a&gt;&lt;span&gt; (CCTNS) and the &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System&lt;/a&gt;&lt;span&gt; (CMS), who supplies law enforcement agencies the technology to surveille us?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In an attempt to answer this question and to uncover the surveillance industry in India, I randomly selected a sample of 100 companies which appeared to produce and sell surveillance technology. This sample consisted of companies producing technology ranging from internet and phone monitoring software to  biometrics, CCTV cameras, GPS tracking and access control systems. The reason why these companies were randomly selected was to reduce the probability of research bias and out of the 100 companies initially selected, 76 of them turned out to sell surveillance technology. These companies vary in the types of surveillance technology they produce and it should be noted that most of them are not restricted to surveillance technologies, but also produce other non-surveillance technologies. Paradoxically enough, some of these companies &lt;/span&gt;&lt;a href="http://www.infoserveindia.com/products/26/Internet-Monitoring-System.html"&gt;simultaneously produce internet monitoring software and encryption tools&lt;/a&gt;&lt;span&gt;! Thus it would probably not be fair to label companies as ´surveillance technology companies´ per se, but rather to acknowledge the fact that, among their various products, they also sell surveillance technologies to law enforcement agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies selling surveillance technology in India are listed in &lt;a href="https://cis-india.org/internet-governance/blog/table-1.pdf" class="internal-link"&gt;Table 1&lt;/a&gt;. Some of these companies are Indian, whilst others have international headquarters and offices in India. Not surprisingly, the majority of these companies are based in India's IT hub, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/table-2.pdf" class="internal-link"&gt;Table 2&lt;/a&gt; shows the types of surveillance technology produced and sold by these 76 companies.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The graph below is based on &lt;a href="https://cis-india.org/internet-governance/blog/table-2.pdf" class="internal-link"&gt;Table 2&lt;/a&gt; and shows which types of surveillance are produced the most by the 76 companies.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Surveillancetechgraph.png" alt="Surveillance Graph" class="image-inline" title="Surveillance Graph" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Graph on types of surveillance sold to law enforcement agencies by 76 companies in India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Out of the 76 companies, the majority (32) sell surveillance cameras, whilst 31 companies sell biometric technology; this is not a surprise, given the &lt;/span&gt;&lt;a href="http://www.economist.com/node/21542814"&gt;UID scheme&lt;/a&gt;&lt;span&gt; which is rapidly expanding across India. Only &lt;/span&gt;&lt;a href="http://www.clear-trail.com/"&gt;one company&lt;/a&gt;&lt;span&gt; from the sample produces social network analysis software, but this is not to say that this type of technology is low in the Indian market, as this sample was randomly selected and many companies producing this type of software may have been excluded. Moreover, many companies (13) from the sample produce data mining and profiling technology, which could be used in social networking sites and which could have similar - if not the same - capabilities as social network analysis software. Such technology may potentially be aiding the &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central Monitoring System (CMS)&lt;/a&gt;&lt;span&gt;, especially since the project would have to monitor and mine Big Data.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On countless occasions I have been told that surveillance is an issue which concerns the elite and which does not affect the poorer classes, especially since &lt;/span&gt;&lt;a href="https://opennet.net/research/profiles/india"&gt;the majority of the population in India does not even have Internet access&lt;/a&gt;&lt;span&gt;. However, the data in the graph above falsifies this mainstream belief, as many companies operating in India produce and sell phone and SMS monitoring technology, while &lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/half-of-indias-homes-have-cellphones-but-not-toilets/article2992061.ece"&gt;more than half the population owns mobile phones&lt;/a&gt;&lt;span&gt;.  Seeing as companies, such as &lt;/span&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail Technologies&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.shoghicom.com/"&gt;Shoghi Communications&lt;/a&gt;&lt;span&gt;, sell phone monitoring equipment to law enforcement agencies and more than half the population in India has mobile phones, it is probably safe to say that surveillance is an issue which affects everyone, not just the elite.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Did you Know:&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/spywarepic.jpg" alt="Spyware" class="image-inline" title="Spyware" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CARLOS62 on flickr &lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;WSS Security Solutions Pvt. Ltd. is &lt;a href="http://www.wssgroup.in/aboutus.html"&gt;north India´s first CCTV zone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Speck Systems Limited was &lt;a href="http://www.specksystems.com/sub-links/Strengths/core-strengths-UAV.htm"&gt;the first Indian company to design, manufacture and fly a micro UAV indigenously&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Mobile Spy India (Retina-X Studios) has the following &lt;a href="http://www.mobilespy.co.in/"&gt;mobile spying features&lt;/a&gt;: &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;SniperSpy&lt;/i&gt;: remotely monitors smartphones and computers from any location&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;Mobile Spy: &lt;/i&gt;monitors up to three phones and uploads SMS data to a server using GPRS without leaving traces&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;4. Infoserve India Private Limited produces an&lt;a href="http://www.infoserveindia.com/products/26/Internet-Monitoring-System.html"&gt; Internet monitoring System&lt;/a&gt; with the following features:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Intelligence gathering for an entire state or a region&lt;/li&gt;
&lt;li&gt;Builds a chain of suspects from a single start point&lt;/li&gt;
&lt;li&gt;Data loss of less than 2%&lt;/li&gt;
&lt;li&gt;2nd Generation Interception System&lt;/li&gt;
&lt;li&gt;Advanced link analysis and pattern matching algorithms&lt;/li&gt;
&lt;li&gt;Completely Automated System&lt;/li&gt;
&lt;li&gt;Data Processing of up to 10 G/s&lt;/li&gt;
&lt;li&gt;Automated alerts on the capture of suspicious data (usually based on keywords)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;5.  ClearTrail Technologies&lt;b&gt; &lt;/b&gt;deploys &lt;a href="https://www.documentcloud.org/documents/409231-111-cleartrail.html#document/p3/a68269"&gt;spyware into a target´s machine&lt;/a&gt;&lt;br /&gt;6.  Spy Impex&lt;b&gt; &lt;/b&gt;sells &lt;a href="http://www.tradedir.in/s/coca-cola-tin-camera"&gt;Coca Cola Tin Cameras&lt;/a&gt;!&lt;br /&gt;7.  Nice Deal&lt;b&gt; &lt;/b&gt;also sells Coca Cola Spy Cameras, as well as Spy Pen Cameras, Wrist Watch Cameras and &lt;a href="http://www.indiamart.com/nicedeal/spy-hidden-cameras.html"&gt;Lighter Video Cameras&lt;/a&gt; to name a few...&lt;br /&gt;8. Raviraj Technologies&lt;b&gt; &lt;/b&gt;is an Indian company which supplies &lt;a href="http://www.ravirajtech.com/index.html"&gt;RFID and biometric technology&lt;/a&gt; to multiple countries all around the world... Countries served by Raviraj Technologies include non-democracies, such as Zimbabwe and Saudi Arabia...as well as post-revolutionary countries, such as Egypt and Tunisia... Why is this concerning?&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Non-democracies lack adequate privacy and human rights safeguards and by supplying such regimes with biometric and tracking technology, the probability is that this will lead to further &lt;a href="http://www.rogerclarke.com/DV/Biometrics.html"&gt;oppression&lt;/a&gt; within these countries &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Egypt and Tunisia had elections to transit to democracy and by providing them biometric technology, this could lead to further oppression and stifle efforts to increase human rights safeguards&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;“I´m not a terrorist, I have nothing to hide!”&lt;/b&gt;&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/surveillancetechpic.jpg" alt="Surveillance Tec" class="image-inline" title="Surveillance Tec" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/r1chard/"&gt;r1chardm&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It´s not a secret: Everyone knows we are being surveilled, more or less. Everyone is aware of the CCTV cameras (luckily there are public notices to warn us...for now). Most people are aware that the data they upload on Facebook is probably surveilled...one way or the other. Most people are aware that mobile phones can potentially be wiretapped or intercepted. Yet, that does not prevent us from using our smartphones and from disclosing our most intimate secrets to our friends, from uploading hundreds of photos on Facebook and on other social networking sites, or from generally disclosing our personal data on the Internet. The most mainstream argument in regards to surveillance and the disclosure of personal data today appears to be the following:&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;“I´m not a terrorist, I have nothing to hide!”&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Indeed. You may not be a terrorist...and you may &lt;/span&gt;&lt;i&gt;think &lt;/i&gt;&lt;span&gt;you have nothing to hide. But in a surveillance state, to what extent does it really matter if you are a terrorist? And how do we even define ´risky´ and ´non-risky´ information?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Last year at the &lt;/span&gt;&lt;a href="http://lcaunderthestars.org.au/programme/schedule"&gt;linux.conf.au&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;a href="http://www.youtube.com/watch?v=GMN2360LM_U"&gt;Jacob Appelbaum&lt;/a&gt;&lt;span&gt; stated that in a surveillance state, everyone can potentially be a suspect. The argument “I´m not a terrorist, I have nothing to hide” is merely a psychological coping mechanism when dealing with surveillance and expresses a lack of agency. &lt;/span&gt;&lt;a href="http://www.schneier.com/essay-155.html"&gt;Bruce Schneier&lt;/a&gt;&lt;span&gt; has argued that the psychology of security does not necessarily reflect the reality of security. In other words, we may feel or think that our data is secure because we consider it to ential ´non-risky´ information, but the reality of security may indicate that our data may entail ´risky information´ depending on who is looking at it, when, how and why. I disagree with the distinction between ´risky´ and ´non-risky´ information, as any data can potentially be ´risky´ depending on the circumstances of its access.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;That being said, we do not necessarily need to disclose nude photos or be involved in some criminal organization in order to be tracked. In a surveillance society, &lt;/span&gt;&lt;a href="http://www.schneier.com/blog/archives/2013/03/our_internet_su.html"&gt;we are all potentially suspects&lt;/a&gt;&lt;span&gt;. The mining and profiling of our data may lead to us somehow being linked to someone who, for whatever reason, is a suspect (regardless of whether that person has committed an actual offence) and thus may ultimately end us up being suspects. Perhaps one of our interests (as displayed in our data), our publicly expressed ideas or even our browsing habits may fall under ´suspicious activity´. It´s not really an issue of whether we are involved in a criminal organisation per se or if we are disclosing so-called &lt;/span&gt;&lt;a href="http://www.computerworld.com/s/article/9176265/Half_of_social_networkers_post_risky_information_study_finds_"&gt;´risky information´&lt;/a&gt;&lt;span&gt;.  As long as our data is being surveilled, we are all suspects, which means that &lt;/span&gt;&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412"&gt;we can all potentially be arrested, interrogated and maybe even tortured&lt;/a&gt;&lt;span&gt;, just like any other criminal suspect.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;But what fuels a surveillance society? How can law enforcement agencies mine such huge volumes of data? Many companies, such as the 76 listed in this research, equip law enforcement agencies with the technology to monitor the Internet and our phones, to deploy malware to our computers, to mine and profile our data on social networking sites and to track our vehicles and movement. A main reason why we currently live in a Surveillance State is because the surveillance industry is blooming and currently equipping law enforcement agencies with the technology to watch our every move. Thus companies producing and selling surveillance technologies play an essential role in maintaining the surveillance state and should be accountable for the implications their products have on individuals´ right to privacy and other human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Surveillance technologies, however, are not the only factor which fuels a surveillance state. Companies produce technologies based on the market´s demand and without it, the surveillance industry would not exist. The &lt;/span&gt;&lt;a href="http://www.sourcesecurity.com/news/articles/co-1753-ga.4047.html"&gt;market appears to demand for surveillance technologies&lt;/a&gt;&lt;span&gt; because a pre-existing &lt;/span&gt;&lt;a href="http://www.abc.net.au/tv/bigideas/stories/2012/04/16/3476847.htm"&gt;surveillance culture&lt;/a&gt;&lt;span&gt; has been established which in turn may or may not have been created by political interests of public control. Nonetheless, surveillance appears to be socially integrated. The fact that some of the most profitable businesses in the world, such as &lt;/span&gt;&lt;a href="http://money.cnn.com/magazines/fortune/global500/2012/snapshots/284.html"&gt;3M&lt;/a&gt;&lt;span&gt;, produce and sell surveillance technologies, as well as the fact that, in most countries in the world, it is considered socially prestigious to work in such a company is minimum proof that &lt;/span&gt;&lt;a href="http://www.sscqueens.org/davidlyon/"&gt;surveillance is being socially integrated&lt;/a&gt;&lt;span&gt;. In other words, companies should be accountable in regards to the technologies they produce and who they sell them to, but we should also take into consideration that the only reason why these companies exist to begin with is because there is a demand for them.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;By not opposing to repressive surveillance laws, to the CCTV cameras in every corner, to surveillance schemes -such as &lt;/span&gt;&lt;a href="http://cybersecurityforindia.blogspot.in/2012/12/national-intelligence-grid-natgrid.html"&gt;NATGRID &lt;/a&gt;&lt;span&gt;and the &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;span&gt; in India- or by handing over our data, &lt;/span&gt;&lt;a href="http://www.schneier.com/essay-167.html"&gt;&lt;i&gt;we &lt;/i&gt;&lt;/a&gt;&lt;a href="http://www.schneier.com/essay-167.html"&gt;are fuelling the surveillance state&lt;/a&gt;&lt;span&gt;. Unlike Orwell's totalitarian state described in 1984, surveillance today does not appear to be imposed in a top-down manner, but rather it appears to be a product of both the Information Revolution &lt;/span&gt;&lt;i&gt;and &lt;/i&gt;&lt;span&gt;of our illusionary sense of control over our personal data. Our ´apathy´ enables surveillance laws to be enacted and companies to produce the technology which will aid law enforcement agencies in putting us all under the microscope. As easy as it would be to blame companies for producing surveillance technologies, the reality of surveillance appears to be much more complicated than that, especially if surveillance is socially integrated.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Yet, the reality in India is that at least 76 companies are producing and selling surveillance technologies and equipping law enforcement agencies with them. This is extremely concerning because &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting"&gt;India lacks privacy legislation &lt;/a&gt;&lt;span&gt;which could safeguard individuals from potential abuse. The fact that India has not enacted a privacy law ultimately means that individuals are not informed when their data is collected, who has access to it, whether it is being processed, shared, disclosed and/or retained. Furthermore, the absence of privacy legislation in India also means that law enforcement agencies are not held liable and this has an impact on accountability and transparency, as it is not possible to determine whether surveillance is effective or not. In other words, there are currently absolutely no safeguards for the individual in India and simultaneously, the rapidly expanding surveillance industry poses major threats to human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Not only does India urgently need privacy legislation to be enacted to safeguard citizens from potential abuse, but the use of all surveillance technologies should be strictly regulated now. As previously mentioned, some companies, such as &lt;/span&gt;&lt;a href="http://www.ravirajtech.com/index.html"&gt;Raviraj Technologies&lt;/a&gt;&lt;span&gt;, are exporting biometric technology to non-democratic countries and to fragile states transitioning to democracy. This should be prevented, as equipping a country - which lacks adequate safeguards for its citizens - with the technology to ultimately control its citizens can potentially have severe effects on human rights within the country. Thus &lt;/span&gt;&lt;a href="https://www.privacyinternational.org/reports/our-response-to-eu-consultation-on-legality-of-exporting-surveillance-and-censorship-3"&gt;export controls&lt;/a&gt;&lt;span&gt; are necessary to prevent the expansion of surveillance technologies to countries which lack legal safeguards for their citizens. This also means that there should be some restrictions to international companies selling surveillance technologies from creating offices in India, since the country currently lacks privacy legislation.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Surveillance technologies can potentially have very severe effects, such as innocent people being arrested, interrogated, tortured...and maybe even &lt;/span&gt;&lt;a href="http://edition.cnn.com/2013/03/15/world/asia/u-n-drone-objections"&gt;murdered&lt;/a&gt;&lt;span&gt; in some states. Should they be treated as weapons? Should the same export restrictions that apply to arms apply to surveillance technologies? Sure, the threat posed by surveillance technologies appears to be indirect. But don't indirect threats usually have worse outcomes in the long run? We may not be terrorists and we may have nothing to hide...but we have no privacy safeguards and a massively expanding surveillance industry in India. We are exposed to danger...to say the least.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers'&gt;https://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>surveillance technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T11:59:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2013-bulletin">
    <title>April 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2013-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) welcomes you to the fourth issue of its newsletter for the year 2013. In this issue we bring you an overview of our research programs, updates of events organised by us, events we participated in, news and media coverage, and videos of some of our recent events.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis"&gt;&lt;b&gt;Celebrating 5 Years of CIS&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;We at the Centre for Internet and Society celebrate 5 years of existence with an exhibition showcasing our work and accomplishments over this time. The exhibition will be held concurrently at both our Bangalore and Delhi offices from May 20 to 24, 2013, from 10 a.m. to 8 p.m.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/google-policy-fellowship-call-for-applications-2013"&gt;Google Policy Fellowship&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;CIS is inviting applications for the Google Policy Fellowship programme. Google is providing a USD 7,500 stipend to the India fellow who will be selected by July 1, 2013. Fellowship focus areas include Access to Knowledge, Openness in India, Freedom of Expression, Privacy, and Telecom Send in your applications for the position by June 15, 2013.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt; CIS invites applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project), and &lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.  CIS also invites applications for the post of &lt;a href="https://cis-india.org/jobs/programme-officer-pilot-projects-access-to-knowledge"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge, Pilot Projects). To apply for this position send your resume to &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. One is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another is for developing a screen reader and text-to- speech synthesizer for Indian languages. CIS is also working with the World Blind Union and many other organisations to develop a Treaty for the Visually Impaired helped by the WIPO:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapters on Himachal Pradesh, Goa, Jammu and Kashmir and Rajasthan:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-himachal-pradesh-call-for-comments"&gt;The Himachal Pradesh Chapter&lt;/a&gt; (by Anandhi Viswanathan, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-goa-call-for-comments"&gt;Goa Chapter&lt;/a&gt; (by Anandhi Viswanathan, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-jammu-kashmir-call-for-comments"&gt;The Jammu &amp;amp; Kashmir Chapter&lt;/a&gt; (by Anandhi Viswanathan, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-rajasthan-call-for-comments"&gt;The Rajasthan Chapter&lt;/a&gt; (by Manojna Yeluri, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: &lt;i&gt;All of these are early drafts and will be reviewed and updated&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/girls-in-ict-day-mithra-jyothi"&gt;Girls in ICT Day&lt;/a&gt; (April 25, 2013, Mitra Jyothi Auditorium, HSR Layout, Bangalore). Dr. U.B. Pavanaja gave a talk on Social Media and Kannada Language for Women with Disabilities. Sara Morais wrote an event report.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/events/global-accessibility-awareness-day-2013"&gt;Global Accessibility Awareness Day&lt;/a&gt; (May 9, 2013, TERI, Southern Regional Centre, Domlur, Bangalore).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/cis-itu-d-sector-membership"&gt;CIS Gets ITU-D Sector Membership&lt;/a&gt;: CIS has become a sector member of ITU-D.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two year grant of INR 26,000,000 to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;Beginning from September 1, 2012, Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of four members based in Delhi: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt;, and one team member &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; who is working from Bangalore office. &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;, Programme Officer has left the organisation. April 24, 2013 was her last working day.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Indic Wikipedia Visualisation Project&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages"&gt;Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/indian-wiki-women-history-month"&gt;Indian WikiWomen celebrate Women’s History Month&lt;/a&gt; (by Netha Hussain, April 29, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/konkani-wikipedia-analysis"&gt;Analysis of Konkani Wikipedia: Facts &amp;amp; Challenges&lt;/a&gt; (by Nitika Tandon, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-needs-assessment"&gt;Odia Wikipedia: Needs Assessment&lt;/a&gt; (by Subhashish Panigrahi, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop-udupi-april-29-2013"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (April 29, 2013, Govinda Pai Research Centre, MGM College Udupi). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;br /&gt;The following events were organised in the month of March but reports were written during the month of April. Vishnu Vardhan and Subhashish Panigrahi held meetings with wikipedians:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wiki-meet-up-kolkata"&gt;Kolkata Wiki Community Meetup&lt;/a&gt; (organised by CIS and Kolkata Wiki Community, March 14, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-cuttack-community-meetup-march-16-2013"&gt;Odia Wikipedia - Cuttack Community Meetup&lt;/a&gt; (organised by CIS and Odia Wiki Community, Cuttack, March 16, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-meet-up-bhubaneswar-march-17-2013"&gt;Odia Wikipedia – Bhubaneswar Community Meetup&lt;/a&gt; (organised by CIS and Odia Wiki Community, Bhubaneswar, March 17, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The following event was organised in the month of April. We will be publishing the report soon:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/telegu-wiki-mahotsavam-2013"&gt;Telugu Wiki Mahotsavam 2013&lt;/a&gt; (organised by Telugu Wikipedia Community and CIS, Hyderabad, April 9 – 11, 2013). Vishnu Vardhan was one of the trainers at the Wikipedia Academy at Centre for Good Governance on April 9, 2013. Vishnu Vardhan spoke about the Access to Knowledge work in one of the sessions of Wikimedia Meeting with Media Heads on April 10, 2013. Vishnu Vardhan gave a talk on A2K’s plans for the growth of Telegu Wikipedia in 2013-14 at the Telegu Wikipedia general meeting on April 11, 2013. Vishnu Vardhan also gave a talk about Access to Knowledge in the digital era at the Wiki Chaitanya Vedika on April 11, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Other &lt;/b&gt;&lt;a href="https://cis-india.org/a2k"&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/a&gt;&lt;b&gt; Updates&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;WIPO&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/cis-intervention-eu-blocking-wipo-treaty-for-blind"&gt;CIS Intervention on the Treaty for the Visually Impaired at SCCR/SS/GE/2/13&lt;/a&gt; (Geneva, April 18 – 20, 2013).  Pranesh Prakash participated in the session and spoke about the rights of the visually impaired.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes. Currently, CIS is doing a project with &lt;b&gt;Privacy International&lt;/b&gt;, London to facilitate research and events around surveillance, and freedom of speech and expression.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Information Technology&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison"&gt;IT (Amendment) Act, 2008, 69A Rules: Draft and Final Version Comparison&lt;/a&gt; (by Jadine Lannon, April 27, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-telegraph-act-419-a-rules-and-it-amendment-act-69-rules"&gt;Indian Telegraph Act, 1885, 419A Rules and IT (Amendment) Act, 2008, 69 Rules&lt;/a&gt; (by Jadine Lannon, April 28, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/it-amendment-act-69-rules-draft-and-final-version-comparison"&gt;IT (Amendment) Act, 2008, 69 Rules: Draft and Final Version Comparison&lt;/a&gt; (by Jadine Lannon, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/it-amendment-act-69-b-draft-and-final-version-comparison"&gt;IT (Amendment) Act, 2008, 69B Rules: Draft and Final Version Comparison&lt;/a&gt; (by Jadine Lannon, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Resources&lt;/b&gt;&lt;br /&gt;The below rules were published recently:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009"&gt;Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/resources/indian-telegraph-act-section-419-a-rules"&gt;Rules Under Section 419A of the Indian Telegraph Act, 1885&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record"&gt;Off the Record&lt;/a&gt; (by Nishant Shah, Indian Express, April 6, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Privacy&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;India´s ´Big Brother´: The Central Monitoring System&lt;/a&gt; (CMS) (by Maria Xynou, April 8, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;br /&gt;Maria Xynou gives an overview of the discussions and recommendations from the privacy round tables held in Delhi and Bangalore:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting"&gt;A Privacy Round Table in Delhi&lt;/a&gt; (organized by CIS and Federation of Indian Chambers of Commerce and Industry, FICCI Federation House, Tansen Marg, New Delhi, April 3, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table"&gt;A Privacy Round Table in Bangalore&lt;/a&gt; (organized by CIS and Federation of Indian Chambers of Commerce and Industry, Jayamahal Palace, Jayamahal Road, Bangalore, April 20, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;2nd Expert Committee meeting on draft 'Human DNA Profiling Bill 2012': The Department of Biotechnology has constituted an Expert Committee to discuss various issues of this Bill in detail. Sunil Abraham has been nominated as one of the members of this Committee. A meeting of this Expert Committee has been scheduled for May 13, 2013 under the Chairmanship of Dr. T. S. Rao, Adviser, DBT.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chinmayi Arun is one of the international experts supporting the Internet &amp;amp; Jurisdiction project, a global multi-stakeholder dialogue process.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table-chennai"&gt;A Privacy Round Table in Chennai&lt;/a&gt; (co-organised with Data Security Council of India and the Federation of Indian Chambers of Commerce and Industry, Residency Towers, Sir Thyagaraja Road, T Nagar, Chennai, May 18, 10.30 a.m. to 4.00 p.m.).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore"&gt;Consilience – 2013&lt;/a&gt; (National Law School of India University, Bangalore, May 26 – 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Other Event Hosted&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni"&gt;Or-bits.com — A Talk by Marialaura Ghidini&lt;/a&gt; (CIS, Bangalore, April 19, 2013). Marialaura Ghidini gave a talk abou the creation and activities of or-bits.com, a web-based curatorial platform that she founded in 2009.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News and Media&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-april-1-2013-prashant-jha-clarify-and-define-terms-in-it-rules-panel-tells-govt"&gt;Clarify and define terms in IT rules, panel tells govt&lt;/a&gt;. (by Prashant Jha, Hindu, April 1, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation"&gt;India takes its first serious step toward privacy regulation – but it may be misguided&lt;/a&gt; (Privacy Surgeon, April 9, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary"&gt;Regulating Social Media: Unrealistic, Impossible, Necessary?&lt;/a&gt; (NDTV, April 11, 2013). Pranesh Prakash participated in a discussion on social media aired on NDTV.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014"&gt;Social media may influence 160 LS seats in 2014&lt;/a&gt; (by Zia Haq, Hindustan Times, April 12, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wall-street-journal-april-15-2013-r-jai-krishna-vote-will-social-media-impact-the-election"&gt;Vote: Will Social Media Impact the Election?&lt;/a&gt; (by R. Jai Krishna, Wall Street Journal, April 15, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net"&gt;Untangling the web of India's 'ungovernable' Net&lt;/a&gt; (Deutsche Welle, April 15, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/gni-annual-report-mentions-cis"&gt;CIS in GNI Annual Report&lt;/a&gt; (April 25, 2013). CIS gets mentioned in GNI Annual Report. Sunil Abraham is quoted in it. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/india-together-april-27-2013-satarupa-sen-bhattacharya-is-free-speech-an-indian-value"&gt;Is free speech an Indian value?&lt;/a&gt; (by Satarupa Sen Bhattacharya, India Together, April 27, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS in partnership with the Ford Foundation is executing a project on Internet Access. It covers the history of the internet, technologies involved, principle and values of internet access, broadband market and universal access and will touch upon various polices and regulations which has an impact on internet access and bodies and mechanism which are responsible for formulation policies related to internet access. The blog posts and modules will be published in a new website: &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;br /&gt;We are hosting an “Institute on Internet and Society” with the support of Ford Foundation India, which is to be held from June 8, 2013 to June 14, 2013. Call for registration and relevant details have been &lt;a href="http://www.internet-institute.in/"&gt;announced&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The following units have been published:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-infrastructure"&gt;Internet Infrastructure&lt;/a&gt; (by Srividya Vaidyanathan, April 30, 2013).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/isp-introduction"&gt;Internet Service Provider – Introduction&lt;/a&gt; (by Srividya Vaidyanathan, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility of telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-april-4-2013-prioritizing-communications-energy"&gt;Prioritizing Communications &amp;amp; Energy&lt;/a&gt; (by Shyam Ponappa, Business Standard and Organizing India Blogspot, April 4, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/open-citizen-radio-networks-to-race-for-.radio-gtld"&gt;From Open Citizen Radio Networks to the Race for .RADIO gTLD&lt;/a&gt; (by Sharath Chandra Ram, April 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Broadband Policy Course (organised by Lirne Asia, Bangalore, April 5 – 6, 2013). Nirmita Narasimhan and Snehashish Ghosh attended the course.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;br /&gt; &lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2013-bulletin'&gt;https://cis-india.org/about/newsletters/april-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-05-31T08:07:38Z</dc:date>
   <dc:type>Page</dc:type>
   </item>




</rdf:RDF>
