<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 951 to 965.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/blogs/locating-mobile/locating-the-mobile"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/all-india-privacy-symposium"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/sense-and-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/quixotic-fight-to-clean-the-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/facebook-google-face-censorship-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/art-slash-activism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/streaming-on-your-nearest-screen"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/unkindest-cut-mr-sibal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/scrub-the-internet-clean"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/right-to-privacy-bill-conference"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses">
    <title>Data protection experts slam state for sending mass SMSes</title>
    <link>https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses</link>
    <description>
        &lt;b&gt;Experts in the field of data protection, privacy law and media have criticised the West Bengal government's mass SMS sent to individuals, companies and media houses through private mobile networks last Friday. Lara Choksey reports this in an article published in the Statesman on March 25, 2012.&lt;/b&gt;
        
&lt;p&gt;The government's use of private data in order to spread political messages is ethically dubious and dangerous, say some.&amp;nbsp; The SMS indirectly refers to The Telegraph's publication of the Poonam Pandey tweet, warning against the transmission of “provocative and indecent photographs for hurting the religious sentiments of people and disrupting communal harmony.” It urges recipients to “frustrate the designs of … unscrupulous people and maintain peace and communal harmony,” and is signed by “Mamata Banerjee, Chief Minister”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Speaking to The Statesman on Saturday, Mumbai-based media lecturer Ms Geeta Seshu identified two issues with the government sending out political messages through mobile phone networks.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Firstly, from an ethical standpoint, the unchecked freedom of mobile phone companies to hand out private data is “completely wrong”, she said.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Secondly, the use of government funds for such dissemination needs to be transparent. If the state government has used public funds to distribute its message through a mobile phone network, then this information should be readily available, said Ms Seshu.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Telecom Regulation Authority of India's (Trai) unsolicited commercial communications regulations allow unsolicited advertising through mobile phone networks.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Mr Apar Gupta, partner of Delhi-based law firm Advani and Co., explained, “The regulations are not wide enough to prohibit communications from a political party.” He observed, “Using SMS messages is a very efficient propaganda tool because so many people have access to mobile phones.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Mobile phone networks such as Vodafone make it clear in their privacy policies that the personal data of its customers “may be used for inclusion in any telephone or similar directory or directory enquiry service provided or operated by us or by a third party” (source Vodafone website).&lt;/p&gt;
&lt;p&gt;Any third party&amp;nbsp; ~ governmental or corporate ~ can therefore access the company's directory of private mobile numbers at the discretion of the network in question.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is not yet clear which government department coordinated the SMS, or what funds were used to cover the costs. Representatives from the ministry of information and cultural affairs were not able to shed a light on the matter. “I know that a message was sent out,” said the I &amp;amp; CA director Umapada Chatterjee, "But it was not sent from this department. I do not know that information.”&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Some commentators did not condemn the government's SMS. Delhi High Court lawyer and cyber law expert, Mr Praveen Dalal, criticised the publication of the Poonam Pandey tweet on the grounds of it violating the due diligence guidelines of the Cyber Law of India. He commented, “If casual and careless publications … continue, there would be no other option left for the government but to regulate their affairs in a more intrusive manner.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, executive director of the Centre for Internet and Society, Mr Sunil Abraham, called the state government's use of unsolicited SMS a “clear abuse of the powers afforded by elected office.” Mr Abraham explained that elected representatives would be justified in such measures, and in utilising public funds, in the event of a disaster, or when public order, public health or national security are compromised.&lt;/p&gt;
&lt;p&gt;“However in this case, the government is abusing the provisions of the law and using this incident as a pretext to threaten media professionals with surveillance and to intimidate for the purposes of reigning in free speech,” he told The Statesman. The chief minister was unavailable to make a comment on the matter.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.thestatesman.net/index.php?option=com_content&amp;amp;view=article&amp;amp;id=404338&amp;amp;catid=73"&gt;Read the original published in the Statesman&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses'&gt;https://cis-india.org/news/data-protection-experts-slam-state-for-sending-mass-smses&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-27T03:46:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/blogs/locating-mobile/locating-the-mobile">
    <title>Locating the Mobile: An Ethnographic Investigation into Locative Media in Melbourne, Bangalore and Shanghai </title>
    <link>https://cis-india.org/raw/digital-humanities/blogs/locating-mobile/locating-the-mobile</link>
    <description>
        &lt;b&gt;From Google maps, geoweb, GPS (Global Positioning System), geotagging, Foursquare and Jie Pang, locative media is becoming an integral part of the smartphone (and shanzhai or copy) phenomenon. For a growing generation of users, locative media is already an everyday practice. &lt;/b&gt;
        
&lt;div id="parent-fieldname-text" class="plain kssattr-atfieldname-text kssattr-templateId-blogentry_view.pt kssattr-macro-text-field-view"&gt;
&lt;p&gt;The transition from the analogue to the digital, from dial-up to 
broadband internet access was dramatic in how it changed our notions of 
space, catalysing new ways of thought and practice. In the case of 
locative media the uptake is more accelerated with it already engaging 
more than ten times those involved in the analogue-digital transition. 
The spread and usage of locative media is fast and promises to produce 
an even more dramatic transformation as the net becomes portable and 
pervasive.&lt;/p&gt;
&lt;p&gt;As yet we know little about the impact locative media is having, and 
will have upon people’s livelihoods and identity, or on public policy 
around privacy, identity, security and cultural production. Discourse in
 the field has opened up questions of art, innovation and 
experimentation (de Souza e Silva &amp;amp; Sutko 2009; Hjorth 2010, 2011). 
However, there remains a dearth of nuanced research on locative media 
that provides in-depth, contextual accounts of its socio-cultural and 
political dimensions. Little work has been conducted into locative media
 as it migrates from art and into the ‘messy’ (Dourish &amp;amp; Bell 2011) 
area of the everyday.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Locating the Mobile&lt;/em&gt; seeks to address this knowledge gap by 
undertaking close studies of locative media in three 
locations—Bangalore, Melbourne and Shanghai. We aim to capture and 
analyse the multiplicities of locative media practice emerging in both 
developed and developing contexts.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;These three locations have relatively high smartphones (or copies 
like shanzhai) usage and are indicative of twenty-first century 
migration, diaspora and transnational practices. As one of the leading 
regions for mobile media innovation (Hjorth 2009; Bell 2005; Miller 
&amp;amp; Horst 2005), the various contested localities in the Asia-Pacific 
provide a rich and complex case study for mobile media as it moves into 
locative media. The three locations also show how the presence of 
digital and internet technologies is ‘flattening’ the globalised 
landscape and bringing about dramatic changes in the ways in which these
 cities shape and develop (Shah 2010). We consider how place informs 
locative media practices and how, in turn, these practices are shaping 
new narratives of place.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Locating the Mobile&lt;/em&gt; seeks to collect and analyse some of the
 emergent, tacit, innovative and ‘making-do’ practices informing the 
rise, and resistance to, locative media. Drawing on pertinent issues for
 the present and future of locative media, Locating the Mobile aims to:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Pioneer and develop models and templates for comprehending the implications of locative media.&lt;/li&gt;&lt;li&gt;Develop a nuanced and situated understanding of locative media as part of cultural practice.&lt;/li&gt;&lt;li&gt;Provide, through multi-site analysis, new insights into the impact of locative media upon narratives of place and belonging.&lt;/li&gt;&lt;li&gt;Develop socio-cultural understandings of the role locative media plays in notions of intimacy and privacy.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;By
 bringing together an expert team that represent a commitment to probing
 the social, cultural and community dimensions of technological 
innovation, Locating the Mobile will develop methodologies that capture 
the dynamic and mundane features of this emergent media practice. By 
doing so, Locating the Mobile will move beyond binary debates about 
surveillance and privacy or ‘parachute’ case studies of locative art 
towards &lt;strong&gt;nuanced and complex understandings of locative media and its implication for future cultural practices&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Significance and Innovation&lt;/h3&gt;
&lt;p&gt;The nascent field of locative media is impacting upon cultural 
practice, place-making and policy in ways we can only imagine. While 
much analysis has been conducted in mobile media (Goggin &amp;amp; Hjorth 
2009) and experimental forms of locative media/art (de Souza e Silva 
&amp;amp; Sutko 2009), the increased ubiquity of locative media through 
devices such as the smartphone will undoubtedly transform the way in 
which place and mobility is articulated. Locating the Mobile seeks to 
substantially expand and contextualise upon the burgeoning area of 
locative media through a variety of innovative and significant ways.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Locating the Mobile&lt;/em&gt; is&lt;strong&gt; original &lt;/strong&gt;in its &lt;strong&gt;topic&lt;/strong&gt;, &lt;strong&gt;method&lt;/strong&gt;, &lt;strong&gt;outcomes&lt;/strong&gt; and &lt;strong&gt;industry collaboration&lt;/strong&gt;. &lt;strong&gt;Firstly&lt;/strong&gt;,
 it is significant in that it brings depth and innovation to the 
emergent area of locative media, and its impact upon discourses around 
mobile media in ideas of mobility and place-making. In the face of 
parachute nature of many locative art research (de Souza e Silva &amp;amp; 
Sutko 2009), Locating the Mobile is one of the first studies 
internationally to explore locative media over time in specific 
locations. &lt;strong&gt;Secondly&lt;/strong&gt;, it deploys a variety of methods 
(such as surveys, focus groups, interviews and diaries for scenario of 
use, overlaid with data-mining) across different devices (mobile phone, 
iPad) and platforms (Foursquare, Jie Pang) to analyse the local and 
socio-cultural dimensions of use. With its team of experts in mobile 
media (Hjorth, Bell and Horst), communication for development (C4D) 
(Tacchi and Shah), gaming (Hjorth), social networking (Shah, Zhou and 
Hjorth) as well as a range of methodologies, this three-year study will 
investigate and contextualise locative media in Bangalore, Melbourne and
 Shanghai. Despite its ubiquity in many locations in the Asia-Pacific 
region, much of the locative media literature remains Anglophonic or 
Eurocentric in focus.&lt;strong&gt; Thirdly&lt;/strong&gt;, through multi-site 
analysis of locative media practices we will provide innovative ways in 
which to reflect upon narratives of place, belonging and 
transnationalism. &lt;strong&gt;Fourthly&lt;/strong&gt;, by pioneering the first 
multi-site analysis of locative media over time, Locating the Mobile 
will develop the much missing socio-cultural understandings of locative 
media and how it impacts upon intimacy and privacy upon individual, 
group and policy levels. We will now detail these four key areas of 
significance and innovation. &lt;strong&gt;We will pioneer and develop models and templates for comprehending the implications of locative media&lt;/strong&gt;.
 In these models we actively address locative media in the transnational
 context of contemporary feelings about belonging, possession, mobility,
 migration, and dislocation. As locative media becomes more pervasive, 
the power of its banality needs further understanding beyond ‘global’ 
generalisations (see www.pleaserobme.com). Like the rise of mobile media
 that was accompanied by the ‘subversive user’ (Hjorth 2009), we need to
 figure out the digital subject who is shaped—both historically and 
socio-culturally—through the pervasive spread of locative media. As 
Gabriella Coleman (2010) observes in her review of ethnographic 
approaches to digital media, there are three main overlapping 
categories: research on the relationship between digital media and the 
cultural politics of media; the vernacular cultures of digital media; 
the prosaics of digital media (and this attention to the commonplace, 
the unromantic, the quotidian). In the case of locative media, 
ethnographic approaches—emphasising the situated, vernacular and 
prosaic—are needed in order to understand the relocations of mobility 
across a variety notions: technological, electronic and psychological to
 name a few. Moreover, given the relatively high proportion of Indian 
and Chinese migrants in Melbourne—and migration in Bangalore and 
Shanghai—exploring locative media can &lt;strong&gt;provide new models for conceptualising the impact of migration, diaspora, and transnationalism on place&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We will develop a nuanced and situated understanding of locative media as part of cultural practice&lt;/strong&gt;
 through methods that deploy both qualitative (ethnographic) and 
quantitative (datamining) approaches such as ‘ethno-mining’ (Anderson et
 al. 2009). With the emergence of ethnomining approaches—that is, 
data-based mining combined with ethnography—new models for analysing 
media and mobility can be found. Locating the Mobile addresses this need
 for innovative methodologies that capture the dynamic nature of 
locative media by situating it within three legacies: social, cultural 
and historical mediatisation. Further, Locating the Mobile seeks to 
frame locative media as evolving through the cultural precepts informing
 mobile media and urbanity LP120200829 (Submitted to RO) Dr Larissa 
Hjorth PDF Created: 16/11/2011 Page 8 of 123 discourses. Drawing upon 
case studies from a region renowned for divergent and innovative use of 
mobile media (Hjorth 2009) and gaming (Hjorth &amp;amp; Chan 2009)—the 
Asia-Pacific—Locating the Mobile seeks to understand the lived and local
 dimensions of locative media and how it can inform emergent and older 
forms of place-making, belonging and migration. By focusing upon this 
nascent but burgeoning area in global mobile media practice—locative 
media—Locating the Mobile not only places Australia as a forerunner in 
innovative, original, and challenging methodologies for new media, but 
also, by bringing together key industry partners, Intel, CIS and Fudan 
University,&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Locating the Mobile&lt;/em&gt; seeks to contextualise the research in 
terms of industry and community outcomes. In this sense, Locating the 
Mobile clearly addresses the National Priority 3, Frontier Technologies 
(see below for more details).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We will provide, through multi-site analysis, new insights 
into the impact of locative media upon narratives of place and belonging&lt;/strong&gt;
 through our three case study locations—Melbourne, Bangalore and 
Shanghai. Locative media can provide new models for conceptualising the 
impact of migration, diaspora, and transnationalism on place. Although 
place has always mattered to mobile media (Ito 2003; Bell 2005; Hjorth 
2003), locative media both amplify, redirect and redefine practices 
around place, community and a sense of belonging—phenomenon that impacts
 upon cultural policy and media regulation (Goggin 2011). Along with the
 digital interfaces that overlay our physical experiences as we enter 
into a state of augmented reality (AR), the presence of these 
cartographic, geospatial locative platforms also changes the ways in 
which the cities and how we navigate with them (Shah 2010). With the 
rise of locative media like Google maps we are seeing new ways to frame 
and narrate a sense of place through various technological lenses 
overlaying the social with the informational. This phenomenon is 
especially the case with smartphones and their plethora of applications 
(apps) drawing heavily upon locative media—even most photo apps come 
with locative media. With locative media we see the arrival of increased
 accessibility to augmented&lt;br /&gt;reality (AR). Instead of replacing the 
analogue with the digital, the physical with the virtual, they open up 
‘hybrid realities’ (a term used by de Souza e Silva to describe AR 
mobile games) that need new conceptual tools and located frameworks to 
unravel the dynamics. We are no longer looking at just the technology 
mediated hypervisual digitality but also exploring what these locative 
media augment and simulate in everyday practices.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;We will develop socio-cultural understandings of the role locative media plays in notions of intimacy and privacy&lt;/strong&gt;
 and how we might comprehend locative media’s implications on individual
 and cultural practices, and regulation. In the second generation of 
locative media that sees it move increasingly into the mainstream, 
questions about security, privacy and identity—and how these are shaped 
by the local—come into focus (Dourish &amp;amp; Anderson 2006). For Dourish 
and Anderson (2006) locative media can been viewed as a form of 
‘Collective Information Practice’ that have social and cultural 
implications upon how privacy and security are conceptualised. For 
others such as Siva Vaidhyanathan (2011) locative media like Google maps
 and street views are about a corporate surveillance. As a burgeoning 
field of media practice intersecting daily life, there is a need for 
in-depth situated accounts into locative media and their 
cultural-economic dimensions to understand the impact they will have on 
intimacy, privacy, identity and place-making. In Locating the Mobile, by
 developing and implementing new hybrid models for analysing locative 
media (Anderson et al. 2009), we consider the role locative media plays 
in how place shapes, and is shaped by, these practices and the future 
implications around cultural policy. The comparative dimension brings a 
rich data-set to bear on our understanding of locative media and the 
questions it may pose in the future. The outputs are significant not 
only for Australian mobile communication, gaming and internet studies—by
 providing a regional context for evaluating the socio-technologies—but 
also demonstrates internationally Australia’s lead in ground-breaking 
research into locative media (Priority 3, ‘frontier technologies’) in 
arguably the most significant sites for global ICTs production and 
consumption, the Asia-Pacific.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;National Research Priorities&lt;/strong&gt;: With the rise of 
smartphones becoming ubiquitous, location-based services have burgeoned.
 And yet, little is known about this area and its impact upon 
individuals, LP120200829 (Submitted to RO) Dr Larissa Hjorth PDF 
Created: 16/11/2011 Page 9 of 123 organisations and governments. Given 
this phenomenon, a comprehensive understanding of the impact upon 
locative media upon notions of privacy, identity and place-making is 
needed. In the twenty-first century, locative media will become an 
increasingly important part of everyday life—for individuals, 
communities, businesses and government agencies. Thus it is imperative 
that we have a robust comparative understanding of locative media in 
Australia and across the region. By conceptualising this impact within 
the context of the region, Locating the Mobile ensures Australia is at 
the frontier of new technologies and their impact upon future 
technological practices and policies. Such an understanding is 
fundamental to Australia’s technology and cultural sectors, thus 
contributing to National Research Priority 3 through one of the 
strongest currencies in twenty-first century global market, mobile 
media, as well as contributing to the broader long-term project of 
locating Australia in the region. By drawing on qualitative, 
cross-cultural longitudinal research into locative media, Locating the 
Mobile will document, analysis and provide future recommendations for 
how locative media is impacting upon people’s experience of place and 
identity. A study like this is important as it is innovative for not 
only pioneering methodologies to evaluate this media phenomenon but also
 to understand some of its long-term implications on how mobile media 
intervenes and even reconfigures experiences and perceptions of place 
which, in turn, impact upon cultural policy.&lt;/p&gt;
&lt;p&gt;Collaborators: Larissa Hjorth (RMIT University, Melbourne), Genevieve Bell (Intel, Shanghai)&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/blogs/locating-mobile/locating-the-mobile'&gt;https://cis-india.org/raw/digital-humanities/blogs/locating-mobile/locating-the-mobile&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Larissa Hjorth and Genevieve Bell</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2015-10-24T13:41:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/all-india-privacy-symposium">
    <title>All India Privacy Symposium</title>
    <link>https://cis-india.org/internet-governance/all-india-privacy-symposium</link>
    <description>
        &lt;b&gt;Are we citizens or subjects? Experts gather in Delhi for public symposium on privacy, transparency, e-governance and national security in India.

&lt;/b&gt;
        
&lt;p&gt;Following 18 months of research by Privacy India, the Centre for Internet and Society and the Society in Action Group, with support from London-based Privacy International, the groups today held an All India Privacy Symposium at the India International Centre in New Delhi. Speakers included Supreme Court Advocate Menaka Guruswamy, Microsoft Director of Corporate Affairs Deepak Maheshwari, social researcher and activist Usha Ramanathan, journalist Saikat Datta and former Chief of RAW Hormis Thorakan.&lt;/p&gt;
&lt;p&gt;A few themes recurred across all five panels (Privacy and Transparency, Privacy and E-Governance Initiatives, Privacy and National Security, Privacy and Banking, and Privacy and Health). Perhaps the most prominent was the repeated allegation that the Indian government' technological illiteracy is putting its citizens at risk. One panelist described how an RTI request had recently revealed that the government had no idea how many of its own computers had been hacked or how much data had been stolen – even though this information has been in the public domain since the Wikileaks diplomatic cable releases.&lt;/p&gt;
&lt;p&gt;The increased use of public-private partnerships and outsourcing was also a major cause for concern. Public money is being funneled into privately-held commercial enterprises – which, unlike public bodies, are not subject to RTI requests – and spent on e-governance initiatives like UID. Social researcher Anant Maringati spoke of a "hybrid world" in which government projects were fulfilled by completely unaccountable private actors. Advocate Malavika Jayaram remarked that, while private companies tend to have far greater technological expertise than government officials, they are ultimately motivated by profit rather than public benefit; we should therefore ask ourselves whether they can really be trusted with our information.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain" align="center"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/picture3.jpg/image_preview" alt="Privacy Symposium" class="image-inline image-inline" title="Privacy Symposium" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Government surveillance for the purposes of crime prevention also 
came under scrutiny, when Saikat Datta described how he himself had been
 put under illegal surveillance by an unauthorized intelligence agency. 
He warned of the dangers of excessive wiretapping, a practice that 
currently generates such a “mountain” of information that anything with 
real intelligence value tends to be ignored until it is too late, as 
happened with the Mumbai bombings in 2008. It is clear that the Indian 
government’s surveillance and interception programmes far exceed what is
 necessary for legitimate law enforcement.&lt;/p&gt;
&lt;p&gt;
Overall, panelists at the conference painted a vivid picture of India
 as a state that has made a habit of invading the privacy of individuals
 on a massive scale in the name of public benefit and law enforcement. 
Yet there is a clear sense that the benefits to society are not 
outweighing the costs to the individual. As Usha Ramanathan commented: 
“The question is, do we think of ourselves as citizens – or as 
subjects?”&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/all-india-privacy-symposium-webcast" class="external-link"&gt;See the webcast of the event here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/all-india-privacy-symposium'&gt;https://cis-india.org/internet-governance/all-india-privacy-symposium&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-01T06:16:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy">
    <title>New Bill to decide on individual’s right to privacy</title>
    <link>https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy</link>
    <description>
        &lt;b&gt;A group of experts would identify issues relating to privacy and prepare a report to facilitate authoring the Privacy Bill. Vishwajoy Mukherjee's article was published in 
Tehelka on 6 February 2012.

&lt;/b&gt;
        
&lt;p&gt;American jurist William J Brennan once famously remarked, “If the right to privacy means anything, it is the right of the individual to be free from unwarranted governmental intrusion.” Now the Government of India is on the verge of formulating, for the first time, a Privacy Bill that will lay down a specific framework to adjudicate an individual’s right to privacy.&lt;br /&gt;&lt;br /&gt;The Planning Commission has constituted a small group of experts under the chairmanship of Justice A P Shah, former Chief Justice of the Delhi High Court, to identify issues relating to privacy and prepare a paper to facilitate authoring the Privacy Bill. The group will be studying the privacy laws and related bills promulgated by other countries and will also be analysing the impact of various programmes being implemented by the government, from the perspective of their impact on privacy. A detailed report with suggestions and remarks will then be handed to the Planning Commission by 31 March.&lt;br /&gt;&lt;br /&gt;In the run-up to the formulation of a new Privacy Bill in India, an All India Privacy Symposium was held on 4 February to discuss aspects of privacy in the context of transparency, national security and internet banking. One of the most vociferous oppositions to the idea of privacy becoming an enshrined right for individuals, has come from those who believe that national security is of paramount importance. “The notion that one has to choose between privacy and national security is a false dichotomy of choice… When the judiciary adjudicates between privacy and surveillance, privacy in almost all cases loses. Especially when the word terrorism is invoked,” said Oxblood Ruffin, a member of the Cult of the Dead Cow, an information security and publishing collective. Speaking at the conference Ruffin stressed on the idea that the State shouldn’t act as a “peeping Tom” but instead respect the “sovereignty of its people.” &lt;br /&gt;&lt;br /&gt;One of the more stark examples, in recent years, of the State clamping down on individual rights, such as the right to privacy, on the pretext of national security, is the Patriot Act in America. The Patriot Act was passed in the United States of America in the immediate aftermath of the September 2001 attacks on the twin towers, and allowed the government to scrutinise everything from “suspicious” bank accounts to wire-tapping lines of communication. Menaka Guruswamy, a lawyer at the Supreme Court of India, believes that unlike America, India does not yet have a codified view on privacy. “Pri­vacy is a vast, fragile, and an open space in the Indian justice system,” she told Tehelka.&lt;/p&gt;
&lt;p&gt;Though India doesn’t have clearly defined laws dealing with the issue of privacy, it does have certain directives under which surveillance methods such as wire-tapping can be done. Wire-tapping, which is regulated under the Telegraph Act of 1885, saw a major overhaul in a 1996 Supreme Court judgment, which ruled that wire-taps are a "serious invasion of an individual's privacy." The Supreme Court (SC) recognised the fact that the right to privacy is an integral part of the fundamental right to life enshrined under Article 21 of the Constitution, and therefore laid down guidelines defining who can tap phones and under what circumstances. Only the Union Home Secretary, or his counterpart in the states, can issue an order for a tap, and the government is also required to show that the information sought cannot to be obtained through any other means. The SC mandated the development of a high-level committee to review the legality of each wire-tap.&lt;/p&gt;
&lt;p&gt;“Interceptions and intrusions by the state have often gone on to help exonerate people who have been falsely accused, so I think it would be unfair to demonise wire-tapping in general. One does have to ensure though, that those who intercept exchanges do not exceed limits,” said a former chief of the Research and Analysis Wing (RAW).&lt;br /&gt;&lt;br /&gt;Besides the dimension of privacy versus surveillance, another important aspect which comes under the scanner when privacy laws are discussed is Internet banking. Details of personal bank accounts and other highly sensitive information of individuals have been whizzing around the cyber space with the advent of E-banking. Everything from booking tickets for movies and flights, to transferring money between accounts is happening via computers, and is happening fast. This growing trend has sparked a major debate on how safe is our information on the web, and what can the government do to secure it? In May 2000, the government passed the Information Technology Act, which laid down a set of laws intended to provide a comprehensive regulatory environment for electronic commerce.&lt;br /&gt;&lt;br /&gt;The Act also addressed computer crimes such as hacking, damage to computer source code, breach of confidentiality and viewing of pornography and created a Cyber Appellate Tribunal to oversee and adjudicate cyber crimes. However, at the same time, the legislation gave broad discretion to law enforcement authorities through several provisions, such as Section 69, allowing the interception of any information transmitted through a computer resource and mandates that users disclose encryption keys or face a jail sentence up to seven years. Section 80 of the Act allows deputy superintendents of police to conduct searches and seize suspects in public spaces without a warrant. &lt;br /&gt;&lt;br /&gt;“Confidentiality between banker and customer is the golden rule of traditional banking, but with the coming of E-banking, banks are using confidentiality as an excuse for not putting out data that shows how vulnerable they are to cyber crimes like hacking,” said N Vijayashankar, an E-business consultant, and a front runner in raising awareness about cyber laws in India. He said, “When framing privacy laws one has to ensure that banks are mandated to disclose data on breach of Internet security. That is the only way to ensure that banks take the necessary steps to secure customer information.” Malavika Jairam, a lawyer who focuses on technology and intellectual property, believes that allowing private participation in what should essentially be a sovereign State function is a dangerous path to tread on. “Tesco, a major retail chain in England, is now into E-banking… There are numerous examples of such private banking entities sharing customer information with insurance policy firms. These details are often used as markers for the kind of premium that will be set for a person,” Jairam said.&lt;br /&gt;&lt;br /&gt;With the current pace of technological advancements fast thinning the line between individual privacy and public content, it remains to be seen what kind of privacy laws India will frame to keep up. &lt;br /&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.tehelka.com/story_main51.asp?filename=Ws060212Privacy.asp"&gt;The original was published by Tehelka&lt;/a&gt;, Malavika Jayaram, a Fellow at CIS is quoted in it.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy'&gt;https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-07T07:19:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1">
    <title>Privacy, speech at stake in cyberspace</title>
    <link>https://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1</link>
    <description>
        &lt;b&gt;Internet censorship is becoming a trend, with many countries around the world filtering the Web in varying degrees, writes Leslie D’Monte in Livemint on February 3, 2012.&lt;/b&gt;
        
&lt;p&gt;Privacy and freedom of expression are gradually being compromised in 
cyberspace, say advocacy groups, with social networking sites and 
Internet companies buckling under pressure from governments to monitor 
and block “objectionable” content.&lt;/p&gt;
&lt;p&gt;Take the case of Twitter Inc., which on 26 January posted on its 
official blog that “...starting today, we give ourselves the ability to 
reactively withhold content from users in a specific country—while 
keeping it available in the rest of the world”. While Twitter reasoned 
that as it continues to grow internationally, it will have to deal with 
“countries that have different ideas about the contours of freedom of 
expression”, activists and bloggers cautioned that the new censorship 
policies could muffle online freedom.&lt;/p&gt;
&lt;p&gt;“The decision of Twitter to censor its content based on the political
 masters’ wishes in each country is an indication that commercial 
interests are always higher than democratic interests for these 
companies. The move of the Indian government to arm-twist the major 
intermediaries is, therefore, expected to succeed in due course once the
 initial resistance wears off,” cautioned Na. Vijayashankar, a 
Bangalore-based e-business consultant and founder secretary of the Cyber
 Society of India.&lt;/p&gt;
&lt;p&gt;In December, minister for communications and information technology 
(IT) Kapil Sibal said in New Delhi that the Centre had no option but to 
“evolve guidelines” to ensure that “blasphemous content on the Internet 
or television is not allowed”, since Internet and social networking 
sites such as Google Inc., Microsoft Corp., Twitter, Yahoo Inc., and 
Facebook Inc. failed “to respond to and cooperate with” the government’s
 request to keep “objectionable” content off their sites.&lt;/p&gt;
&lt;p&gt;A few days later, Sibal clarified that “...this government (of the 
United Progressive Alliance) does not believe in censorship”. And in an 
interview to Mint on 1 February, Gulshan Rai—head of the elite Indian 
Computer Emergency Response Team and coordinator of a committee on 
cyberlaw—said, inter alia, “We value the freedom of speech. We do not 
interfere there.”&lt;/p&gt;
&lt;p&gt;Internet censorship is a rising trend, with approximately 40 
countries filtering the Web in varying degrees, including democratic and
 non-democratic governments. YouTube and Gmail (both from Google), 
BlackBerry maker Research In Motion Ltd, WikiLeaks, Twitter and Facebook
 have all been censored, at different times, in China, Iran, Egypt and 
other countries.&lt;br /&gt;
  &lt;br /&gt;
“The clampdown on online free speech and the roll-out of a multi-tiered 
blanket surveillance regime via the draconian IT Act and its associated 
rules in India is part of a global trend,” said Sunil Abraham, executive
 director of the Centre for Internet and Society. “Big brother 
tendencies with the government have found common cause with powerful 
rights-holders, who are keen to crack down on intellectual property 
rights infringements. This, combined with the dramatic growth of the 
surveillance industry, has resulted in civil liberties being undermined 
across the world for a variety of pretexts ranging from child porn, 
obscenity, hate speech, organized crime, terrorism and piracy.”&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/statusreport.jpg/image_preview" alt="Status Report" class="image-inline image-inline" title="Status Report" /&gt;&lt;/p&gt;
&lt;p&gt;Transparency Report website—which logs content removal requests it 
receives from governments—the Internet company received 67 requests from
 the Indian government for the removal of 282 content items (such as 
videos critical of politicians) from YouTube and blogs during 
July-December 2010. Google said it complied with 22% of the requests. 
For the January-June 2011 (latest data available) period, Google 
received 68 content removal requests for 358 items from Indian 
government agencies. Google complied in 51% cases.&lt;/p&gt;
&lt;h3&gt;Entangling the user&lt;/h3&gt;
&lt;p&gt;Even as they face pressure from governments, companies such as Google
 and Facebook are tweaking their policies to allow for sharing of user 
data across multiple product offerings. They claim it will give their 
users a more “intuitive” experience, but advocacy groups say the 
policies are being altered to give advertisers more bang for the buck at
 the expense of user privacy.&lt;/p&gt;
&lt;p&gt;Google, for instance, is making changes to its privacy policies and 
terms of service, which take effect from 1 March. “Regulators globally 
have been calling for shorter, simpler privacy policies—and having one 
policy covering many different products is now fairly standard across 
the Web,” said Alma Whitten, Google’s director of privacy, product and 
engineering, on the official company blog. Google has begun notifying 
users of these changes since 24 January.&lt;/p&gt;
&lt;p&gt;For example, a search for restaurants in Mumbai may throw up Google+ 
posts or photos that people have shared with other users, or that are in
 their albums. Usability can be enhanced, for instance, by allowing 
memos from Google Docs to be read in Gmail, or adding a Gmail contact to
 a meeting in Google Calendar. Google, according to Whitten, does not 
sell personal information nor share it externally without permission 
“except in very limited circumstances like a valid court order”.&lt;/p&gt;
&lt;p&gt;Facebook, on its part, introduced its “Timeline” feature in December,
 which digs up a user’s past and displays it, but does not allow opting 
out of the service. The feature is being introduced for all 800 million 
users, around 40 million of whom are in India. Those not accustomed to 
checking their privacy settings will have a hard time going through the 
hundreds of messages they’ve posted over the last few years (Facebook 
was founded in 2004).&lt;/p&gt;
&lt;p&gt;The Electronic Privacy Information Center said the launch of Timeline
 forces more privacy setting changes on Facebook users, “which flies in 
the face of both privacy and a settlement reached between the firm and 
the US Federal Trade Commission (FTC)”. On 29 November, Facebook agreed 
to an FTC order that bars it from “deceiving” consumers about privacy 
practices and requires it to submit to monitoring for 20 years.&lt;/p&gt;
&lt;p&gt;“Privacy is certainly a very serious concern for Internet users. Some
 of the big brands like Facebook and Google simply have access to too 
much information about the life of their users, and this information 
could easily be misused by the brand or wilfully by someone else. Our 
guidance to consumers and clients is that first and foremost, they 
should be very conscious of these privacy challenges. If we put out any 
communication on a social network, it is akin to broadcast 
communication. By default, choose the tightest privacy setting and then 
gradually loosen up instead of accepting the default privacy setting of 
Facebook or Google. Don’t give out information like cellphone number, 
date of birth...or even names of close relations on social networks,” 
said Hareesh Tibrewala, joint chief executive officer of Social 
Wavelength, a company that advises clients on social media strategies.&lt;/p&gt;
&lt;p&gt;Mahesh Murthy, founder of digital marketing firm Pinstorm, 
acknowledged that “in reality, there is virtually no privacy online. 
Governments and companies try to assure apprehensive citizens about 
privacy, while at the same time doing everything to destroy it in 
reality”.&lt;/p&gt;
&lt;p&gt;He advises marketers to be upfront about their data collection and 
management policies, and declare them prominently on their online 
properties. On an individual level, Murthy takes comfort “in the fact 
that I could just be one of those 3 billion+ Internet users worldwide 
with my data a small part of the swarm out there that no one might take a
 special interest in”.&lt;/p&gt;
&lt;h3&gt;Electronic police state?&lt;/h3&gt;
&lt;p&gt;India has a history of exerting pressure on companies for access to 
communications data. According to Cryptohippie Inc., a provider of 
communication security services, India ranked 26 among the most policed 
states in the world in 2010—“one in which every surveillance camera 
recording, every email sent, every Internet site surfed, every post 
made, every check written, every credit card swipe, every cellphone 
ping…are all criminal evidence, and all are held in searchable 
databases”, according to the company that discontinued the report in 
2011, stating that “…most people are defending their ignorance; not much
 good will come from us repeating ourselves”.&lt;/p&gt;
&lt;p&gt;Currently, the Indian Telegraph Act and the IT Act, 2008 (amendments 
introduced in the IT Act, 2000), give the government the power to 
monitor, intercept and even block online conversations and websites. 
Moreover, under section 79 of the IT Intermediary (Rules and 
Guidelines), 2011, intermediaries—telcos, Internet services providers, 
network services providers, search engines, cyber cafes, Web-hosting 
companies, online auction portals and online payment sites—are mandated 
to exercise “due diligence” and advise users not to share/distribute 
information violative of the law or a person’s privacy and rights. 
Intermediaries are expected to act on a complaint within 36 hours of 
receiving it, and remove such content when warranted. In case the 
intermediary doesn’t find the content objectionable, the matter will 
have to be contested in a court of law.&lt;/p&gt;
&lt;p&gt;“The Indian government can, and should, monitor conversations and 
websites if it believes the content can harm the security, defence, 
sovereignty and integrity of the country,” maintained Pavan Duggal, a 
Supreme Court lawyer and a cyberlaw expert, but wondered how it would go
 about implementing the task of monitoring conversation on an 
unstructured Internet. “The intention is good, but the path is not 
clear,” said Duggal, who envisions a lot of cases being filed against 
misuse of these laws.&lt;/p&gt;
&lt;p&gt;“While the affected party can lodge a complaint with the 
intermediary, removal has to follow a due process, which should include 
suitable documentary evidence placed by the party. There should be a 
process of examination through an ombudsman, a process of arbitration 
where the request is disputed or a court order as may be required on a 
case to case basis,” said Vijayashankar of the Cyber Society of India.&lt;/p&gt;
&lt;p&gt;

&lt;a class="external-link" href="http://www.livemint.com/2012/02/02215454/Privacy-speech-at-stake-in-cy.html?h=B"&gt;The original was published in Livemint on 3 February 2012&lt;/a&gt;. Sunil Abraham was quoted in it.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1'&gt;https://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-02-03T11:27:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme">
    <title>Do we need the Aadhar scheme?</title>
    <link>https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme</link>
    <description>
        &lt;b&gt;"Decentralisation and privacy are preconditions for security. Digital signatures don’t require centralised storage and are much more resilient in terms of security", Sunil Abraham in the Business Standard on 1 February 2012.&lt;/b&gt;
        
&lt;p&gt;We don’t need Aadhar because we already have a much more robust identity management and authentication system based on digital signatures that has a proven track record of working at a “billions-of-users” scale on the internet with reasonable security. The Unique Identification (UID) project based on the so-called “infallibility of biometrics” is deeply flawed in design. These design disasters waiting to happen cannot be permanently thwarted by band-aid policies.&lt;/p&gt;
&lt;p&gt;Biometrics are poor authentication factors because once they are compromised they cannot be re-secured unlike digital signatures. Additionally, an individual’s biometrics can be harvested remotely without his or her conscious cooperation. The iris can be captured remotely without a person’s knowledge using a high-res digital camera.&lt;/p&gt;
&lt;p&gt;Biometrics are poor identification factors in a country where the registrars have commercial motivation to create ghost identities. For example, bank managers trying to achieve targets for deposits by opening benami accounts. Biometrics for these ghost identities can be imported from other countries or generated endlessly using image processing software. The de-duplication engine at the Unique Identification Authority of India (UIDAI) will be fooled into thinking that these are unique residents.&lt;/p&gt;
&lt;p&gt;An authentication system does not require a centralised database of authentication factors and transaction details. This is like arguing that the global system of e-commerce needs a centralised database of passwords and logs or, to use an example from the real world, to secure New Delhi, all citizens must deposit duplicate keys to their private property with the police.&lt;/p&gt;
&lt;p&gt;Decentralisation and privacy are preconditions for security. The “end-to-end principle” used to design internet security is also in compliance with Gandhian principles of Panchayat Raj. Digital signatures don’t require centralised storage of private keys and are, therefore, much more resilient in terms of security.&lt;/p&gt;
&lt;p&gt;Biometrics as authentication factors require the government to store biometrics of all citizens but citizens are not allowed to store biometrics of politicians and bureaucrats. The state authenticates the citizen but the citizen cannot conversely authenticate the state. Digital signatures as an authentication factor, on the other hand, does not require this asymmetry since citizens can store public keys of state actors and authenticate them. The equitable power relationship thus established allows both parties to store a legally non-repudiable audit trail for critical transactions like delivery of welfare services. Biometrics exacerbates the exiting power asymmetry between citizens and state unlike digital signatures, which is peer authentication technology.&lt;/p&gt;
&lt;p&gt;Privacy protections should be inversely proportional to power. The transparency demanded of politicians, bureaucrats and large corporations cannot be made mandatory for ordinary citizens. Surveillance must be directed at big-ticket corruption, at the top of the pyramid and not retail fraud at the bottom. Even for retail fraud, the power asymmetry will result in corruption innovating to circumvent technical safeguards. Government officials should be required by law to digitally sign the movement of resources each step of the way till it reaches a citizen. Open data initiatives should make such records available for public scrutiny. With support from civil society and the media, citizens will themselves address retail fraud. To solve corruption, the state should become more transparent to the citizen and not vice versa.&lt;/p&gt;
&lt;p&gt;UIDAI’s latest 23-page biometrics report is supposed to dispel the home ministry’s security anxieties. It says “biometric data is collected by software provided by the UIDAI, which immediately encrypts and applies a digital signature.” Surely, what works for UIDAI, that is digital signatures, should work for citizens too. The report does not cover even the most basic attack — for example, the registrar could pretend that UIDAI software is faulty and harvest biometrics again using a parallel set-up. If biometrics are infallible, as the report proclaims, then sections in the draft UID Bill that criminalise attempts to defraud the system should be deleted.&lt;/p&gt;
&lt;p&gt;The compromise between UIDAI and the home ministry appears to be a turf battle for states where security concerns trump developmental aspirations. This compromise does nothing to address the issues raised by the Parliamentary Standing Committee on Finance, headed by the Bharatiya Janata Party’s Yashwant Sinha.&lt;/p&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="http://www.business-standard.com/india/news/do-we-needaadhar-scheme/463324/"&gt;original published in the Business Standard&lt;/a&gt; on 1 February 2012&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme'&gt;https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-03T10:11:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/sense-and-censorship">
    <title>Sense and Censorship</title>
    <link>https://cis-india.org/internet-governance/sense-and-censorship</link>
    <description>
        &lt;b&gt;The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) bills, at the US House of Representatives and Senate, respectively, appear to enforce property rights, but are, in fact, trade bills. This article by Sunil Abraham was published in the Indian Express on 20 January 2012.&lt;/b&gt;
        
&lt;p&gt;In developed countries like the US, intellectual property (IP) plays a
 dominant role in the economy, unlike in economies like India. Countries
 that have significant IP are keen to increase global and national 
enforcement activities, while countries with little domestic IP are keen
 to reduce outgoing royalties in the balance of payments and therefore, 
keen to expand alternatives, limitations and exceptions like copyleft 
licensing, compulsory/statutory licensing and fair dealing.&lt;/p&gt;
&lt;p&gt;The loss of generic medicines, hardware based on open standards, 
public domain content, free and open source software, open access 
journal articles, etc will equally impoverish consumers in the US and in
 India. SOPA and PIPA, therefore, do not represent the will of the 
average American but rather the interests of the IP sector, which has 
tremendous influence in the Hill. There is one more layer of 
complication for policy-makers to consider as they work towards a 
compromise of interests in Internet governance — the tension between the
 old and the new. The incumbents — corporations with business models 
that have been rendered obsolete by technological developments — versus 
emerging actors who provide competing products and services, often with 
greater technological sophistication, higher quality, at a lower cost.&lt;/p&gt;
&lt;p&gt;The US, in terms of policy and infrastructure, still controls the 
global Domain Name System (DNS) and consequently, post-SOPA/PIPA, can 
take unilateral trade action without worrying about national variations 
enabled by international law. These bills directly undermine the 
business models of many Indian companies — generic drug manufacturers 
like Ranbaxy, software service providers like Infosys, electronics 
manufacturers like Spice and players in many other sectors dominated by 
IP rights. So it is baffling that they have not added their voices to 
the global outcry.&lt;/p&gt;
&lt;p&gt;SOPA and PIPA, if passed, will enable the US administration to take 
three-pronged action against IP infringers — seizure of domain names and
 DNS filtering, blocking of transactions by financial intermediaries and
 revocation of hosting by ISPs. While circumvention may still be 
possible, it will get increasingly laborious — something like the Great 
Firewall of China, but worse. Unfortunately, the implementation of these
 blunt policy instruments will require more and more public-funded 
surveillance and censorship.&lt;/p&gt;
&lt;p&gt;The censorship potential of efforts like SOPA and PIPA may appeal to 
others, as autocratic and democratic regimes across the world have been 
keen to try technology-mediated social engineering — these efforts have 
been multiplied in the post-Arab Spring and Occupy Wall Street world. 
Organised religion, social conservatives and those who have been at the 
receiving end of free speech would all want to shut down platforms like 
WikiLeaks and political movements like Anonymous and the Pirate Party.&lt;/p&gt;
&lt;p&gt;These are equally dismal times for Internet governance in India. 
Google, Facebook and 20-odd other intermediaries are trying to avoid 
jail time at the hands of a Delhi court. However, ever since the IT Act 
amendments were put in place three years back, digital activists have 
been requesting intermediaries to register their protests early and 
often, regarding draconian provisions in the statute and in the 
associated rules. Their silence is going to be very expensive for all of
 us. We cannot depend on the private sector alone to defend our 
constitutional rights. As yet unpublished research from CIS demonstrates
 that private intermediaries only bother with defending freedom of 
expression when it undermines their business interests. Working with an 
independent researcher, we conducted a policy sting operation — faulty 
take-down notices were served to seven intermediaries asking for 
legitimate content to be taken down. In six of those cases, the 
intermediaries over-complied, in one case deleting all comments on a 
news article instead of just those comments identified in the notice. 
The only take-down that was resisted was one claiming that sale of 
diapers was “harmful to minors” under the Indian IT Act (because they 
caused nappy rash). It is clear that the IT Act and its associated rules
 have already had a chilling effect on online participation by Indians.&lt;/p&gt;
&lt;p&gt;Fortunately for us, during the previous parliamentary session — 
Jayant Chaudhary, Lok Sabha MP from the Rashtriya Lok Dal, asked for the
 revision of rules concerning intermediaries, cyber-cafes and reasonable
 security practices. The next Parliament session is the last opportunity
 for the House to reject these rules and intervene for a free Internet.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The writer is executive director of the Bangalore-based Centre for Internet and Society&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/sense-and-censorship/901686/1"&gt;Read&lt;em&gt; &lt;/em&gt;the original published in the Indian Express&lt;/a&gt;&lt;em&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/sense-and-censorship/901686/1"&gt; &lt;/a&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/sense-and-censorship'&gt;https://cis-india.org/internet-governance/sense-and-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-01-31T06:15:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill">
    <title>Privacy Matters — Analyzing the Right to "Privacy Bill" </title>
    <link>https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill</link>
    <description>
        &lt;b&gt;On January 21, 2012 a public conference “Privacy Matters” was held at the Indian Institute of Technology in Mumbai. It was the sixth conference organised in the series of regional consultations held as “Privacy Matters”. The present conference analyzed the Draft Privacy Bill and the participants discussed the challenges and concerns of privacy in India.&lt;/b&gt;
        
&lt;p&gt;The conference was organized by Privacy India in partnership with the Centre for Internet &amp;amp; Society, International Development Research Centre, Indian Institute of Technology, Bombay, the Godrej Culture Lab and Tata Institute of Social Sciences. Participants included a wide range of stakeholders that included the civil society, NGO representatives, consumer activists, students, educators, local press, and advocates.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-summary-and-critique-to-the-leaked-right-to-privacy-bill-2011" class="internal-link" title="High Level Summary and Critique to the Leaked Right to Privacy Bill 2011"&gt;Comments to the Right to Privacy Bill&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Welcome&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Prashant Iyengar&lt;/strong&gt; was the Lead Researcher with Privacy India, opened the conference with an explanation of Privacy India’s mandate to raise awareness, spark civil action and promote democratic dialogue around privacy challenges and violations in India. He summarized the five “Privacy Matters” series previously organised across India in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary" class="external-link"&gt;Kolkata&lt;/a&gt; on January 23, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore" class="external-link"&gt;Bangalore&lt;/a&gt; on February 5, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad" class="external-link"&gt;Ahmedabad&lt;/a&gt; on March 26, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report" class="external-link"&gt;Guwahati&lt;/a&gt; on June 23, 2011 and in&lt;a href="https://cis-india.org/internet-governance/privacy-chennai-report.pdf/view" class="external-link"&gt; Chennai &lt;/a&gt;on August 6, 2011.&lt;/p&gt;
&lt;h2&gt;Keynote Address&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Na. Vijayashankar&lt;/strong&gt; (popularly known as &lt;strong&gt;Naavi&lt;/strong&gt;), a Bangalore based e-business consultant, delivered the key note address on the quest of a good privacy law in India.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Naavi.jpg/image_mini" title="Naavi" height="171" width="155" alt="Naavi" class="image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;He described the essential features of good privacy legislation. In 
analyzing the Draft Privacy Bill’s definition of the right to privacy, 
he suggested it should be defined through the “right to personal 
liberty” rather than through what constitutes “infringements”.&amp;nbsp; Mr. 
Vijayashankar went on to explain that the “privacy right” should be 
taken beyond “information protection” and defined as a “personal privacy
 or a sense of personal liberty without constraints by the society”. He 
explained the various classifications and levels of protection 
associated with the availability and disclosure of data. He expressed 
concerns regarding monitoring of data processors and suggested that data
 controllers have contractual agreements between data processors, so as 
to ensure an obligation of data security practices. He also called for 
the simplification and division of offences and suggested numerous 
reasons as to why the Cyber Appellate Tribunal would not be an ideal 
monitoring mechanism or authority. See Naavi's presenation &lt;a href="https://cis-india.org/internet-governance/proposed-privacy-bill" class="internal-link" title="Proposed Privacy Bill"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Session I: Privacy and the Legal System&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Dr. Sudhir Krishnaswamy&lt;/strong&gt;, Assistant Professor at the National Law School of India&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Dr. Krishnaswamy started off the presentation by questioning the 
normative assumptions the Draft Privacy Bill makes. He referred to the 
controversy of Newt Gingrich's second marriage, to question the range of
 moral interests that were involved. The Bill falls short in accounting 
for dignity in relation to privacy.&lt;br /&gt;&lt;br /&gt;He described the Draft Privacy Bill as a reasonable advance, given where
 privacy laws were before. Although, he feels that it does fall short, 
in terms of a narrow position, on what privacy law should do. He also 
questioned if it satisfies constitutional standards. He stressed the 
importance of philosophical work around the Draft Privacy Bill 
considering that the nature of privacy is not neat and over-arching.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/sudhir.jpg/image_mini" title="Sudhir Krishnaswamy" height="144" width="152" alt="Sudhir Krishnaswamy" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Privacy and the Constitutional Law&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;N S Nappinai&lt;/strong&gt;, Advocate, High Court, Mumbai,&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/nappinai.jpg/image_preview" title="Nappinai" height="172" width="157" alt="Nappinai" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;Nappinai spoke on the constitutional right to privacy. She explained the
 substantial development of Article 21 of the Constitution of India to 
include the ‘right to privacy’ with regards to its interpretation and 
application. She described the different shift of the application of the
 right to privacy in the West in comparison to India. The West has moved
 from the right to privacy pertaining to property to the right to 
privacy concerning personal rights, whereas India moved from personal 
rights to property rights. She outlined three aspects of privacy: 
dignity, liberty and property rights. &lt;br /&gt;&lt;br /&gt;Ms. Nappinai dissected the Bill in its major components: interception, 
surveillance, method and manner of personal data, health information, 
collection, processing and use of personal data. Using these components,
 she questioned what precedence exists? What should be further protected
 or reversed? What lessons should legislators draw from?&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Shortcomings of the Draft Right to Privacy Bill falls include:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The objects and reasons section in the Draft Privacy Bill declares the right to privacy to every citizen as well as delineates the collection and dissemination of data. Nappinai dismisses the need for this delineation on the grounds that data protection is an inherent part of the right to privacy, it is not exclusive.&lt;/li&gt;&lt;li&gt;Large focus on transmission of data. The provisions do not account for property rights pertaining to the right to privacy. Therefore, the ‘knock-and-enter’ rule, the ‘right to be left alone’ and the ‘right to happiness’ should be included.&lt;/li&gt;&lt;li&gt;Applicability of the Bill should extend to all persons as well as data residing within the territory. It would be self-defeating if it only includes citizens, considering that the Constitution extends to all persons within the territory.&lt;/li&gt;&lt;li&gt;The right to dignity is unaccounted for.&lt;br /&gt;&lt;br /&gt;See Nappinai's presentation &lt;a href="https://cis-india.org/internet-governance/privacy-and-the-constitution" class="internal-link" title="Privacy and the Constitution"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Session II: Privacy and Freedom of Expression&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Apar Gupta&lt;/strong&gt;, Advocate, Delhi&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Apar Gupta is an advocate based in Delhi who specializes in IP and 
electronic commerce law, spoke predominantly on the interplay between 
privacy and freedom of expression. He used the example of an advocate 
tweeting about his criticism of a judges’ ruling, to illustrate how 
different realms of online anonymity enable freedom of speech. He went 
beyond the traditional realm of journalistic architecture such as 
television channels or newspapers and explained online community 
disclosure.
&lt;p&gt;Mr. Gupta provided a practical example of Indian Kanoon, a popular 
online database of Indian court decisions. Because Indian Kanoon is 
linked to the Google search engine, many individuals involved in civil 
and criminal matters have requested Indian Kanoon to remove the court 
judgments, under privacy claims. This particularly occurs with 
individuals involved in matrimonial cases. However, as court judgment 
constitute public records India Kanoon only removes court judgments when
 requested by a court order.&lt;/p&gt;
&lt;p&gt;He described the several ways legislators can define privacy and 
freedom of expression. Considering that the privacy of an individual may
 border upon freedom of speech and expression, he questioned whether or 
not privacy should override the right to freedom of speech and 
expression. In addition, Mr. Gupta discussed the debate on whether or 
not the Privacy Bill should override all existing provisions in other 
laws.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Gupta.jpg/image_preview" alt="Apar Gupta" class="image-inline image-inline" title="Apar Gupta" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Additionally, he analyzed the provisions of the Draft Privacy Bill 
using three judgments. In these judgments, different entities sought of 
various forms of speech to be blocked under privacy claims. He spoke 
about the dangers of a statutory right for privacy that does not 
safeguard freedom of speech and expression. Considering that the privacy
 statute may allow for a form of civil action permitting private parties
 to approach courts to stop certain publications, he stressed the 
importance for legislators to ensure balanced privacy legislation 
inclusive of freedom of speech and expression.&lt;/p&gt;
&lt;h3&gt;Sexual Minorities and Privacy&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Danish Sheikh&lt;/strong&gt;, researcher at Alternative Law Forum&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/danish.jpg/image_preview" alt="Danish " class="image-inline image-inline" title="Danish " /&gt;&lt;/td&gt;
&lt;td&gt;Danish examined the status of sexual minorities in the light of privacy 
framework in India. The tag of decriminalization has served to greatly 
alter the way institutions approach the question of privacy when it 
comes to sexual minorities. He used the Naz Foundation judgment as a 
chronological marker to map the developments in the right to privacy and
 sexual minorities over the years.
&lt;p&gt;He outlined four key effects on the right to privacy due to the Naz Foundation judgment:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Prepared the understanding of privacy as a positive right and placed obligations on the state,&lt;/li&gt;&lt;li&gt;Discussed privacy as dealing with persons and not just places, it took into account decisional privacy as well as zonal privacy,&lt;/li&gt;&lt;li&gt;Connected privacy with dignity and the valuable worth of individuals, and&lt;/li&gt;&lt;li&gt;Included privacy on one’s autonomous identity.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;He described various incidents that took place before the Naz Foundation judgment, pre-Naz, that altered the way we conceived of queer rights in general and privacy in particular, including the Lucknow incidents, transgender toilets, passport forms, the medical establishment and lesbian unions. Post-Naz, he described two incidents including the Allahabad Muslim University sting operation as well as the TV9 “Expose” that captured public imagination.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;He concluded by asking: “What do these stories tell us about privacy?” The issues faced by the transgender community tell us that privacy doesn’t necessarily encompass a one-size-fits-all approach, and can raise as many questions as it answers. The issues faced by the Lucknow NGOs display the institutionalized disrespect for privacy and that has marginally more devastating consequences for the homosexual community by the spectre of outing. The issues faced by lesbian women evidence yet another need for breaching the public/private divide, demonstrating how the protection of the law might be welcome in the family sphere. Alternate sexual orientation and gender identity might bring the community under a common rubric, but distilling the components of that rubric is essential for engaging in any kind of useful understanding of the community and the kind of privacy violations it suffers – or engage with situations when the lack of privacy is empowering.&lt;/p&gt;
&lt;h2&gt;Session III: Privacy and National Security&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Menaka Guruswamy&lt;/strong&gt;, Advocate, Supreme Court of India&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Menaka explored national security and its relationship to privacy. In
 her presentation, she compared the similar manner in which the courts 
approach national security and privacy issues. The courts feel national 
security and privacy issues are too complex to define, therefore, they 
take a case-by-case approach.&lt;br /&gt;
&lt;br /&gt;
&lt;p&gt;Ms. Guruswamy described three incidents that urged her to question 
national security and privacy. First, she was interested in the lack of 
regulation surrounding intelligence agencies and was involved in the 
introduction of the Regulations of Intelligence Agencies Bill as a 
private members bill. Second, national security litigation between the 
Salwa Judum judgment and the State of Chhattisgarh is an example of how 
national security triumphs constitutional rights and values. Third, 
privacy in the context of the impending litigation of Naz Foundation in 
the Supreme Court. She described the larger conversation of national security focus on 
values of equality and privacy. She discussed the following questions 
that serve in advancing certain conception of rights:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;How do we posit privacy which necessarily, philosophically as 
well as judicially, is carved out as the right of an individual to be 
left alone?&lt;/li&gt;&lt;li&gt;What are the consequences when national security, 
which is posited as the rights of the nation, is in conflict with the 
right of the individual to be left alone?&lt;/li&gt;&lt;li&gt;Considering that 
constitutional rights are posited as a public facet of citizenship how 
does a right to privacy play in that context?&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_menaka.jpg/image_preview" alt="Menaka" class="image-inline image-inline" title="Menaka" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Privacy and UID&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;R. Ramakumar&lt;/strong&gt;, professor at the Tata Institute of Social Sciences&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/ramkumar.jpg/image_preview" title="Ramakumar" height="171" width="202" alt="Ramakumar" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;Prof. Ramakumar spoke on UID, its collection of information and the 
threat to individual privacy. First, he provided a historical trajectory
 of national security that has led to increased identity card schemes. 
He described the concrete connection between UID and national security.
&lt;p&gt;&lt;br /&gt;He briefed the gathering on the objectives of the UID project. He 
described several false claims as proposed by the UIDAI. He explicitly 
disproved the UIDAI claim that Aadhaar is voluntary. He did this by 
comparing various legislations associated with the National Population 
Registrar that had provisions mandating the inclusion of the UID number.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;He went on to explain that the misplaced emphasis of technology to 
handle large populations remains unproven. He described two specific 
violations of privacy inherent in the UID system: convergence of 
information and consent. The UID database makes it possible for the 
linking or convergence of information across silos. In addition, consent
 is unaccounted for in the UID system. The UID enrollment form requires 
consent from a person to share their information. However, the software 
of the enrollment form automatically checks ‘yes’, therefore you are not
 asked. Even if you disagree, it automatically checks ‘yes’. Default 
consent raises the important question, “to what extent are we the owners
 of our information?” and “what are the privacy implications?”&lt;/p&gt;
&lt;p&gt;Mr. Ramakumar was once asked, by Yashwant Sinha in a Parliamentary Standing Committee meeting, “Is the Western concept of privacy important in developing country like India?”. Using this question posed to him, he stressed the importance of privacy to be understood as a globally valued right, entitlement and freedom. He also referred to Amartya Sen’s work on individual freedoms.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;During the daylong consultation numerous questions and themes relating to privacy were discussed:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;&lt;li&gt;How is the right to privacy defined?&lt;/li&gt;&lt;li&gt;How can the &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy" class="internal-link" title="Draft Bill on Right to Privacy"&gt;Draft Privacy Bill&lt;/a&gt; redefine the right to privacy?&lt;/li&gt;&lt;li&gt;How can reasonable deterrence mechanisms be included?&lt;/li&gt;&lt;li&gt;Does duplication of the right to privacy exists in different statutes?&lt;/li&gt;&lt;li&gt;Is the Cyber Appellate Tribunal an ideal monitoring mechanism or authority? &lt;br /&gt;&lt;/li&gt;&lt;li&gt;What are the circumstances under which authorized persons can exercise the Right of privacy invasion?&lt;/li&gt;&lt;li&gt;How can the Draft Privacy Bill account for the right to dignity?&lt;/li&gt;&lt;li&gt;How much information should the State be allowed to collect?&lt;/li&gt;&lt;li&gt;How can citizens become more informed about the use of their information and the privacy implications involved?&lt;/li&gt;&lt;li&gt;What would be the appropriate balance or trade-off between security and civil liberties?&lt;/li&gt;&lt;li&gt;What are the dangers with permitting the needs of national security to trump competing values?&lt;/li&gt;&lt;li&gt;What are the consequences for the homosexual community, when faced with institutionalized disregard for privacy? &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_usha.jpg/image_preview" alt="Usha " class="image-inline image-inline" title="Usha " /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;img src="https://cis-india.org/home-images/contests.jpg/image_preview" alt="Participants" class="image-inline image-inline" title="Participants" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/proposed-privacy-bill" class="internal-link" title="Proposed Privacy Bill"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill'&gt;https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2012-02-15T04:27:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/quixotic-fight-to-clean-the-web">
    <title>The Quixotic Fight to Clean up the Web </title>
    <link>https://cis-india.org/internet-governance/quixotic-fight-to-clean-the-web</link>
    <description>
        &lt;b&gt;The ongoing attempt to pre-screen online content won’t change anything. It will only drive netizens into the arms of criminals, writes Sunil Abraham in this article published in Tehelka Magazine, Vol 9, Issue 04, Dated 28 Jan 2012.&lt;/b&gt;
        &lt;p&gt;GOOGLE AND Facebook’s ongoing case in the Delhi High Court over offensive online content is curious in three ways. First, the complaint does not mention the IT Act, 2000. Prior to the 2008 amendment, intermediaries (in this case, Google, Facebook, etc) had no immunity. But after the amendment, intermediaries have significant immunity and are not considered liable unless takedown notices are ignored.&lt;/p&gt;
&lt;p&gt;Second, it is curious that the complaint does not mention specific individuals or groups directly responsible for authoring the allegedly offensive material. Only intermediaries have been explicitly named. If specific content items have been submitted in court then it is curious that specific accounts and users have not been charged with the same offences.&lt;/p&gt;
&lt;p&gt;Three, Delhi-based journalist Vinay Rai claims that takedown notices and requests for user information were ignored by the intermediaries. As yet, unpublished research at the Centre for Internet and Society has reached the exact opposite conclusion. We sent fraudulent takedown notices to seven of the largest intermediaries in India as part of a policy sting operation. Six of them over-complied and demonstrated no interest in protecting freedom of expression. Our takedown notices were complied with even though they were largely nonsensical. It is therefore curious that Rai’s takedown notices were ignored.&lt;br /&gt;&lt;br /&gt;Under Section 79 of the IT Act, the intermediary must not “initiate the transmission”, “select the receiver of the transmission” and “select or modify the information contained in the transmission”. In other words, they must not possess “actual knowledge” of the content. This would be absolutely true if intermediaries acted as “dumb pipes” or “mere conduits”. But today, they have reactive “human filters” ensuring conformance to community guidelines that often go beyond constitutional limits on freedom of expression.&lt;br /&gt;&lt;br /&gt;For example, Facebook deletes breastfeeding photographs if a certain proportion of the breast is visible, despite numerous protests. Intermediaries also use proactive “machine filters” to purge their networks of pornography and copyright infringing content. In order to retain immunity under the IT Act, intermediaries would have to demonstrate that they have no “actual knowledge”. This would also imply that they cannot proactively filter or pre-screen content without becoming liable for illegal content.&lt;/p&gt;
&lt;p&gt;More sophisticated “machine filters” will continue to be built for social media platforms as computing speeds increase and costs decrease dramatically. But there will be significant collateral damage — the vibrancy of online Indian communities will be diminished as legitimate content will be removed and this in turn will retard Internet adoption rates. Free media, democratic governance, research and development, culture and the arts will all be fundamentally undermined. So whether pre-censorship is technically feasible is an irrelevant question. The real question is what limits on freedom of expression are reasonable in the Internet age.&lt;/p&gt;
&lt;div class="pullquote"&gt;The legal tussle is yet another chance for reflecting on the shortcomings of the IT Act&lt;/div&gt;
&lt;p&gt;Censorship is like prohibition, illegal content will persist, the mafia will profit and ordinary citizens will be implicated in criminal networks. Use of anonymising proxies, circumvention tools and encryption technologies will proliferate, frustrating network optimisation efforts and law enforcement activities.&lt;/p&gt;
&lt;p&gt;This is yet another opportunity for reflecting on the shortcomings of the ITAct. A lot of the confusion and anxiety today emerges from vague language, unconstitutional limits on freedom of expression, multi-tiered blanket surveillance provisions, blunt security policy measures contained in the statute and its associated rules. The next Parliament session is the last opportunity for MPs to ask for the rules for intermediaries, cyber cafes and reasonable security practices to be revisited. The MP who musters the courage to speak will be dubbed a superhero.&lt;br /&gt;&lt;br /&gt;As told to Shonali Ghosal. Sunil Abraham is Executive director, centre for internet and society and can be contacted at &lt;a class="external-link" href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;. &lt;a class="external-link" href="http://www.tehelka.com/story_main51.asp?filename=Op280112proscons.asp"&gt;The original article was published in Tehelka&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Illustration by Sudeep Chaudhuri&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/quixotic-fight-to-clean-the-web'&gt;https://cis-india.org/internet-governance/quixotic-fight-to-clean-the-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-01-26T20:53:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/facebook-google-face-censorship-in-india">
    <title>Facebook, Google face censorship in India</title>
    <link>https://cis-india.org/news/facebook-google-face-censorship-in-india</link>
    <description>
        &lt;b&gt;Religious leaders in India are on a collision course with social media websites including Google, Facebook and Yahoo. Two Indian courts recently asked these American companies as well as 19 other websites to take down “anti-religious” material. They are now required to report their compliance by February. Betwa Sharma's blog post was published in SmartPlanet on 5 January 2012. Sunil Abraham has been quoted in it extensively.&lt;/b&gt;
        
&lt;p&gt;Information technology minister Kapil Sibal also met with a delegation of different faith groups who are worried that certain internet content could lead to communal discord. India’s 1.2 billion people are made up of majority Hindus but it also has the third largest population of Muslims as well as large number of Christians, Sikhs, Buddhists, Jains and other faiths.&lt;/p&gt;
&lt;p&gt;India has an estimated 100 million internet users–the third largest in the world after U.S and China. The proposed restrictions are not at all comparable to China’s but is the internet free enough for the world’s largest democracy?&lt;/p&gt;
&lt;p&gt;Some observers are suspicious that promoting religious or social harmony is a front for censoring the internet. Sunil Abraham, head of Bangalore-based Centre for Internet and Society (CIS), said that "traditional intellectual property rights holders like movie studios, music companies and software vendors are trying to protect their obsolete business models by pushing for the adoption of blanket surveillance and filtering technologies."&lt;br /&gt;&lt;br /&gt;"They have found common cause with both totalitarian and so-called democratic regimes across the world interested in protecting the political status-quo after upheavals like the Arab Spring, Occupy Wall Street, Anonymous and the Pirate Party," he said.&lt;br /&gt;&lt;br /&gt;The Indian government has tried to reassure the public that it is not trying to censor. Google’s Transparency Report, however, recorded that out of the 358 items requested to be removed by the Indian government from Jan-June 2011, 255 had to do with government criticism and only a handful with hate speech.&lt;br /&gt;&lt;br /&gt;Sibal has also been speaking to executives from Facebook, Yahoo and Google in India. But no agreement has been reached on taking down hate speech. New rules, issued in April, require internet intermediaries like Facebook and Yahoo to check for “unlawful” material and take it down.&lt;br /&gt;&lt;br /&gt;CIS will soon be releasing a report called “Intermediary Liability in India: Chilling Effects on Free Expression on the Internet 2011." For the report, CIS conducted a sting operation by sending flawed takedown notices to seven intermediaries. The results showed that six intermediaries over-complied with the notices. "From the responses from the intermediaries don’t have sufficient legal competence or unwilling to dictate resources to determine legality of an online expression," Abraham said.&lt;/p&gt;
&lt;p&gt;"Various pretexts like national security, protection of children, crackdown on online crime and terrorism, defense against cyber war etc are used to compromise civil liberties and clamp down on freedom of expression," he added.&lt;/p&gt;
&lt;p&gt;(Photo-facebook24h.com/Google images)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.smartplanet.com/blog/global-observer/facebook-google-face-censorship-in-india/2180"&gt;Read the original published by SmartPlanet&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/facebook-google-face-censorship-in-india'&gt;https://cis-india.org/news/facebook-google-face-censorship-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-01-09T05:10:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/art-slash-activism">
    <title>Exposing Data: Art Slash Activism </title>
    <link>https://cis-india.org/internet-governance/art-slash-activism</link>
    <description>
        &lt;b&gt;Tactical Tech and the Centre for Internet and Society (CIS) organised a public discussion on the intersection of Art and Activism at the CIS office in Bangalore on 28 November 2011.  Videos of the event are now online. Ward Smith (Lecturer, University of California, LA), Stephanie Hankey and Marek Tuszinsky (Co-founders, Tactical Technology Collective), Ayisha Abraham (Film maker, Srishti School of Art Design) and Zainab Bawa (Research Fellow, Centre for Internet and Society) spoke in this event.&lt;/b&gt;
        
&lt;p&gt;In the information societies that we live in, data is the new currency. While data – objective enumerations of life – has been around as the basis of providing evidence in research, practice and art, there is a renewed attention on data as the digital technologies start mediating our everyday lives. Digitization (like electronification in earlier times) is a process by which messy, chaotic, everyday life can be sorted, classified, arranged and built into clean taxonomies that flatten the experiential and privilege the objective. In many ways, the process of ubiquitous digitization goes back to the Cartesian dualism of the immaterial mind over the emergent materiality of the body. Historically, different disciplines and practices within the social and natural sciences, humanities, arts, development work, and governmentality, etc. have established protocols to create robust, rigorous, efficient and reliable data that can be used as evidence for thought and action. These protocols are not permanent and are often questioned within the disciplinary framework but especially with interdisciplinary dialogues where conflicting methodologies and reading practices often render the same data sets unintelligible to each other.&lt;/p&gt;
&lt;p&gt;With the rise of the digital, these disciplines and practices start new negotiations with the world of databases, networks and archives. There is a growing anxiety that data, which was supposed to be an objective representation of reality, is increasingly becoming opaque in how it is structured. There is also an increasing awareness that the work that we make the —‘idea of data’— is not transparent. The Exposing Data Project came as a response to these anxieties, as we seek to unpack the processes, methodologies, challenges and implications of living in a data-rich, data-based world mediated by digital and internet technologies through a cross-disciplinary multi-sectoral dialogue.&lt;/p&gt;
&lt;p&gt;Exposing Data is a curated practice of bringing together differently located researchers, academics, practitioners, policy actors, artists and public interlocutors to tease out the tensions and conflicts that digital data brings to their own practice and thought, especially when talking to people who are ‘not like us’.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/DSC03518.JPG/image_large" alt="Art Slash Activism1" class="image-inline" title="Art Slash Activism1" /&gt;&lt;/p&gt;
&lt;p&gt;For its first conversation titled ‘Art Slash Activism’, we decided to look at the tensions that often split communities and practices across historically drawn battle lines. There has been a huge tension between artists and activists, who, even though they often use same kind of data sets, are often at logger-heads when it comes to using that data for their practice. Artists, especially those dealing with public and community art projects, often work in the same spaces and communities as the activists, in making strong political statements and working towards a progressive liberal ideology. Activism has depended on artistic expressions – especially those around free speech, censorship, surveillance, human rights, etc.&amp;nbsp; – in order to not only find peer support but also to oppose authoritarian forces that often seek to quell artistic voices. And yet, within the larger communities, the idea of political art – art that makes direct political statements – or activism as an art form – activism that takes the form of cultural production and overt subversion – often emerges as problematic. ‘Art Slash Activism’ brought together four people, identified (reluctantly, because they wear so many different hats) as an academic, as a researcher, as an activist and as an artist, who all straddle these chasms in their own work, to unpack the tensions through the lens of digital data.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.iids.org/witnessed/interviews/zb/interview-zb.html"&gt;Zainab Bawa&lt;/a&gt;, who is a research fellow at the Centre for Internet and Society, working on a monograph that deals with politics of transparency in Indian e-governance systems, set out the terms of the debate as she questioned the very meaning of the word ‘data’. Zainab, by looking at case-studies of land-record digitization in the country, started to look at how the word ‘data’, despite its apparent transparency and objectivity, is actually an opaque concept that eclipsed the politics of data formation – what gets identified as data? What gets discarded as noise? Who gets to identify something as data? What happens to things which are not data? What happens to people who cannot be identified through data? What are the systems of rationality that we inherit to talk of data?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Video of Zainab Bawa Talk&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLhz3IA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLhz3IA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;p&gt;These questions persisted through the different conversations but were brought into plain site when Ayisha Abraham, a film and video artist who also teaches at the &lt;a class="external-link" href="http://srishti.ac.in/"&gt;Sristhi School of Art Design&lt;/a&gt;, showed us a digitally restored piece of an old film that disintegrated even as it was being saved. Heidegger in his Basic Writings had proposed that “Art assumes that the truth that discloses itself in the work can never be derived from outside.” Ayisha&amp;nbsp; built on this idea to look at material historicity and physical presence of data to question the easy availability of data that has been established for data in art practices. When does data come into being? What precedes data? What happens to data when it decays beyond belief? How do we restructure reality in the absence of data? She mapped the role of affective restructuring, historical reconstruction and creative fictions in our everyday life when we deal with realities which cannot be supported by data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Video of Ayisha Abraham Talk&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLh0BEA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLh0BEA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;p&gt;Ward Smith added a layer of complication in his questioning of the established cause-effect relationship that data has with Reality. Within activism as well as in development and policy work, there is an imagination that data always followed reality – that it is a distilled set of abstractions based on experiences, information, knowledge, analyses, etc. However, Ward presented us with a case-study that shows that data is not benign. It doesn’t exist in a vacuum. Often, the creation of data sets and databases leads to construction of alternative and new material realities. Even within existing realities, the introduction of a data set or an attempt to account for the reality using data, produces new and evolved forms of reality. Drawing partly from the discussions within digital taxanomies and partly from conversations in quantum philosophy (remember Schrodinger’s Cat?) Ward showed how data realities need to be unpacked to reveal what lies underneath.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Video of Ward Smith Talk&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLh0DUA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLh0DUA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.tacticaltech.org/team"&gt;Marek Tuszinsky&lt;/a&gt; rounded up the conversations by introducing us to different ways of looking at data. Drawing from a rich ethnographic and experience data set at the &lt;a class="external-link" href="http://www.tacticaltech.org/"&gt;Tactical Technology Collective&lt;/a&gt;, Marek questioned how our relationships and reading practices – looking at data side-ways, for example – influences the shape, form, structure and meaning of the data under consideration. What came up was a compendium questions around data ethics, data values, our own strategies and reflectivity in dealing with a data-mediated and data-informed world. What are the kinds of imperatives that lead us to produce data? What methodologies do we deploy to render data intelligible? What kind of data manipulations do we engage in, in order to make it comprehensible to digital systems of archives and storage?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Video of Marek Tuzinsky Talk&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLh0HcA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLh0HcA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;p&gt;What are the politics of exclusion, inclusion and making invisible of data sets?&lt;/p&gt;
&lt;p&gt;The conversation further opened up to the other participants in the conversation to crystalise around three areas of concern:&lt;/p&gt;
&lt;h3&gt;Data Decay&lt;/h3&gt;
&lt;p&gt;An audience member pointed out that one is always confronted with the physical decay of data. While old film is an incredibly fragile medium, it has survived over 70 years to become a part of Ayisha’s work. A digital format, on the other hand, would likely become inaccessible within six years due to format changes and problems with compatibility. The discussion shifted to the temporary aspect of data. The digitization of data allows one to illuminate it in significant ways by adding new components and blowing up details of focus. Such options are not available in analogue form.&lt;/p&gt;
&lt;p&gt;However, the fact that digital media has a limited lifespan is something that one must consider. Are we depicting data for immediate attention and action, or for future reference? How far down the timeline of history do we want our records to stretch? Regardless of whether the producers of the film that turned out to be a hidden treasure for Ayisha asked these questions, the persistence of the film 70 years later served to illuminate an important moment in history and spoke of lives and stories the knowledge of which is still of interest and inspiration in our time. The future accessibility of data can be seen as our legacy and the inheritance of the generations to come.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Data Realities / Subjects&lt;/h3&gt;
&lt;p&gt;At the same time, can we be sure of the factual nature of recovered and existing data? It is important to ask who commissioned the source of information, who collected the data, who depicted and disseminated it? When asking “who”, one should also ask what their motives were, what resources they had and what settings they were working in. These are only several factors that influence the accuracy, message and understanding of the presented data. &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Data has political power, being used as a catalyst and a justifying factor for various policies and interventions. However, data that is collected and presented by policy makers, research organizations, NGO’s, and other institutions may not reflect the realities as they are experienced by the population represented by the data. Researchers may be asking the wrong questions, or seeking answers in the wrong places, as it was the case in the Atlanta homeless programs discussed in Ward’s presentation. Inaccurate or incomplete data can confuse cause and effect, as well as become the cause in and of itself by feeding into stereotypes and creating faulty convictions that shape conventional views and social action.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Data Values&lt;/h3&gt;
&lt;p&gt;The importance of deconstructing the nature of how data is presented was remarked on by an audience member. The question posed was how, in the process of data collection and presentation, one can make data more reflective of reality as it is experienced by the studied population through incorporating grassroots efforts to create a community-based ownership of data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To tackle this question, Marek brought up the example of mapping out the Kibera slum in Kenya. An open source approach was used in the project, where locals actively participated in the process of mapping. However, as Marek pointed out, it was still an intervention from outside the community. Somebody funded the project, someone gave the equipment, and they followed a certain methodology for reasons of their own. A completely unbiased and neutral representation of the slum was not possible due to the various agendas and perspectives of the parties involved, the dominant agenda being that of the project funders. Complete objectivity, even when efforts are made, is impossible.&lt;/p&gt;
&lt;p&gt;Is it really more data that we need then? Even though information exists, it may not be accurate and not everyone within the society has an equal reach to it. A worker from a village lacking in literacy skills has significantly less access to data than a PHD student from a renowned university, even though they both navigate within the same system. Access to data stems farther than what is put up on a website or a file that can be picked up from a government office. More important than having access to open data, Zainab believes that one should look for relationships and systems where there is responsiveness and responsibility of negotiating.&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, what came clear from the discussion is that there are existent infrastructures that enable researchers and activists in their quest for information and its fair representation. People, in their interactions with each other, in the institutions and ad hoc organizations we develop, take part in creating these enabling infrastructures. Being embedded in the system within which one is collecting information allows one to understand and manoeuvre the necessary avenues. Questions of data collection, representation, and dissemination are multidisciplinary, spanning across issues that touch all members of our society. From land property records, old abandoned film, government statistics, classifications, and artists’ quest for truth, data takes many forms and defines our lives in ways we cannot always control. Through revaluation and questioning of these processes we gain a better understanding of what shapes societal views, government action, and how we can take control and use data to illuminate the unseen and wheel social change.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/DSC03542.JPG/image_large" alt="Art Slash Activism 3" class="image-inline image-inline" title="Art Slash Activism 3" /&gt;&lt;/p&gt;
&lt;p&gt;This has been the first of our experiments at creating dialogues around Exposing Data. We invite people interested in these questions, to not only participate in the future conversations, but also help us draw upon different disciplines, questions and concerns around the subject of Data. The next conversation seeks to address the question of “Whose data is it anyway?” and we hope that the momentum of talk carries on.&lt;/p&gt;
&lt;p&gt;Nishant Shah&lt;br /&gt;Maya Ganesh&lt;br /&gt;Yelena Gulkhandanyan&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/art-slash-activism'&gt;https://cis-india.org/internet-governance/art-slash-activism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-29T13:31:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/streaming-on-your-nearest-screen">
    <title>Now Streaming on Your Nearest Screen </title>
    <link>https://cis-india.org/internet-governance/streaming-on-your-nearest-screen</link>
    <description>
        &lt;b&gt;Digital cinema, especially the kinds produced using mobile devices and travelling on Internet social networking systems like YouTube and MySpace, are often dismissed as apolitical and ‘merely’ a fad. Moreover, content in the non-English language, due to incomprehensibility or lack of understanding of the cultural context of the production, is labeled as frivolous, or inconsequential, writes Nishant Shah in this peer reviewed essay published in the Journal of Chinese Cinemas, Volume 3, Issue 1, June 2009.&lt;/b&gt;
        
&lt;h3&gt;Contextualising new digital cinema through Kuso&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;Deploying the aesthetic framework of kuso as political engagement, this essay analyzes how its ‘aesthetic’ form of expression offers spaces of political participation and negotiation for the ‘Strawberry Generation’ digital natives in Taiwan. This paper draws from various youth phenomena like the emergence of the ‘BackDorm Boys’ as iconic representations of flawed stardom, the adoption of kuso lifestyles and the consumption/distribution cycles of cinema on the web to see the possibilities they offer for political engagement and participation through cultural expressions and productions, that are otherwise dismissed in contemporary discourse.&lt;/p&gt;
&lt;p&gt;New digital technologies, initially developed for surveillance and strategic communication, because of the proliferation of the internet/s and the cyberspaces, have now become freely available at very inexpensive rates around the world. The easy availability of these technologies enables new conditions of production of hitherto privileged art forms. The new globalised circuits of un-contextualized distribution lead to the imagination of a deterritorialized community of consumers who share common systems of making meaning and receiving these objects. As has been noted in earlier cybercultures studies, objects found on the internet/s – the people and the narratives that they produce - are often consumed as outside of time and geographical space. William J. Mitchell (1996) in his now much critiqued conception of the ‘Infobahn’, conflates all geographical distinction in his imagining of the larger neural circuits of digital information and economy. Similarly, in his extraordinary book. Everything is Miscellaneous, David Weinberger (2007), explores the role that digital dissemination and distribution (as also storage and archiving) play in evolving a new miscellaneous form of sorting and classification, thus deconstructing established coda of knowledge determination. Weinberger, despite the keen insight into the importance of metadata and user-based personalised galaxies of information, is unable to talk of the entire range of phenomena as rooted in particular geo-political contexts. In fact, as Gasser and Palfresy (2008) make evident in their book Born Digial, whenever a body is referred to within cybercultures studies, it is the body of a white, upper class, masculine body; whenever a place is evoked, it is unequivocally the economic centres of the North-West; Time, which is an affiliate of the space and the body, is also then the linear and historical time determined by these concrete referents.&lt;/p&gt;
&lt;p&gt;The West, with its wide consumer base and widespread proliferation of new digital technologies, often becomes the hegemonic legitimising authority as objects produced elsewhere are understood through ‘foreign’ aesthetics and logistics. Imagining the internet/s as residing outside of the time-space continuums, allows for a cyclical re-assertion of the Western paradigms as credible and authentic, and other forms as parodic or derivative in nature. New forms of cultural expression and narrativisation, received outside of the context of their production or the circuits of distribution and reception, are often mis-read and interpreted to fit the existing modes of making meaning.&lt;/p&gt;
&lt;p&gt;This paper is an attempt to look at a specific form of new digital cinema in North East Asia that challenges the west-centric modes of understanding these objects. New digital cinema is a category that needs to be more sharply defined. In the last three decades of extensive technological advent and deployment in the fields of cinematic production, many different forms have claimed the space of new digital cinema. Post-celluloid cinema,&lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; production of movies augmented by technologies, studio house experiments in animation and 3D technologies, distribution of movies and the networks of piracy that come into being with peer2peer networks,&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; conditions of reception and movie watching with digitally owned copies of movies,&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; the emergence of multiplex cinema and conditions of consumption,&lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; etc. have been looked upon by different theoreticians and practitioners as new digital cinema.&lt;/p&gt;
&lt;p&gt;I use the term ‘new digital cinema’ in the rest of the paper in a very specific sense of the phrase to make a very clear point of departure from the aforementioned approaches, which, though exploring the possibilities that digital technologies offer, still, often, stay with contained and unquestioned understanding of the established cinematic practices of production, authorship, distribution and spectatorship. New digital cinema is located in the new wave of cinematic forms produced by people who are enabled to do so by the easy availability of conditions of production and distribution that are framed by new digital technologies. Instead of looking at movies being produced by ‘film-makers’ or ‘film-studios’, maintaining the distinctions of authorship, readership and distribution circuits, I explore movies which are produced by people who are otherwise relegated to the realm of spectatorship and consumption. For the scope of this paper, new digital cinema refers to the cheaply produced cinematic forms, shot through inexpensive and slowly-becoming ubiquitous camera enabled devices. Geared towards an almost obscene abundance of details and demanding an untiring self-narrativisation,&lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; these sites of social networking and expression have led to the production of videos and distribution of the self in unprecedented ways. These videos are further marked in their distribution through cyberspatial forms like YouTube, MySpace, and Google video, Television based reality shows based that run on user based programming consisting of personal videos, personal webcam sites, and MMS forums, to millions of users who enter into an interaction that is no longer limited to spectatorship.&lt;/p&gt;
&lt;p&gt;There are three dialectic processes around the ‘personal’ videos broadcast on such sites of digital social networking and sharing, that need to be mapped in order to understand the impulse of this paper as well as to look at the dialectic reconstruction of earlier categories as understood by non-digital, pre-internet cultural forms. The first trope of dialectic comes in the form of continuity. Histories of technology taking the When Old Technologies were New (Marvyn, 1988) approach, often produce these digital moving images as bearing a relational value with the emergence of earlier technological forms and the use of these forms to produce personal narratives – print, camera, video, to name the three most influential forms of self expression and narrativisation. Such a historical narrative, unless carefully inflected with the growth and development of indigenous technologies and the indigenisation of these technologies, reads both, the technological development as well as the cultural forms thus produced, only through a West-centric paradigm of aesthetics, glossing over the differences that might be present in the very process and methods of reading such technologised forms. This non-disruptive, uninterrupted historicisation, while it is fruitful in questioning some presumed categories in the process of cultural production,&lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt; still reinforce these digital moving images as merely a new form of old cinema.&lt;/p&gt;
&lt;p&gt;The second tension that needs to be mapped out occurs in the form of carefully maintained distinctions between the Sacred Cow of originality and the much maligned miasma of derivative, plagiarised, copied (left, right, centre), forms that have been facilitated by the proliferation of copy-paste digital technologies and internet networks. In the public as well as the theoretical discourse around these digital moving images, there is almost a Universal original (generally Western, otherwise canonised by the Western gaze in other geo-political contexts), to which everything else has a relation that is either praodic or uniformly derivative in nature. Even within the West, these videos on youtube and myspace are easily dismissed as plagiarised or unoriginal, often leading to a wide range of public controversy and exchange.&lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The third dialectic is in the blurring of the pre-digital accepted terms of producers, spectators and processes of reading that these digital moving images produce. It is necessary to realise that the context of not only the production but also that of the reader is crucial to understanding the aesthetics of cyberspatial forms. The author in the digital world is as digital and ephemeral as the object itself. The tension between the corporeal and the digital has been effectively resolved by conceptualising the ‘interface’ – the space between the two conflicting and tense oppositional ideas- as the bearer of thought, idea, meaning and intention for digital objects. Such a complex structuring challenges the earlier crystalised practices authorship, spectatorship, distribution and reception, thus marking new digital cinema as not merely a cinematic practice augmented by technology but as a new form of cinema that challenges, quite radically, the earlier cinematic forms, in very much the same way that, in another historical and cultural moment, the print did to the manuscript.&lt;/p&gt;
&lt;p&gt;This paper locates itself in these three dialectical flows to explore new digital cinema as a form of popular and cultural expression in Asia, specifically in Taiwan. It hopes to dismantle the myth of the universal/accessible/west-centric view of new digital cinema and demonstrate the need to assert the geo-socio-cultural contexts of their origin through exploring the aesthetics and genre of Kuso.&lt;/p&gt;
&lt;h3&gt;Knowing Miso from Kuso&lt;/h3&gt;
&lt;p&gt;Kuso, though it is a relatively new term, is highly popular in describing the new cybercultural forms that emerged with the proliferation of the internet/s. Anime fans are familiar with Kuso as an expletive or an interjection, used as the English equivalent of ‘Shit!’ Though Japanese in origin, it was made popular as a word, an aesthetic and a lifestyle in Taiwan around 2000, subsequently spreading to Hong Kong and China. Now, Kuso, along with other N.E. Asian products like Hentai,&lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; and Manga, is a popular way of identifying cybercultural forms. The wikipedia mentions that


&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p class="callout"&gt;[t]he roots of Taiwanese “Kuso’ was Kuso-ge’s from Japan. The word Kuso-ge is a portmanteau of Kuso and game, which means, quite literally, “shitty games.” The introduction of such a category is to teach gamers how to appreciate and enjoy a game of poor quality – such as appreciating the games’ outrageous flaws instead of getting frustrated at them. &lt;br /&gt;(Wikipedia, 2006)&lt;/p&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;It was an attempt to not only identify or locate flaws but to celebrate them and encourage an active production of them. Kuso, for the younger generation in Taiwan (and the thousands of fans all around the world, who subscribe to Kuso Bulletin Boards and discussion forums) is not just a cursory form of parody but a lifestyle. A Taiwanese artist, Yeh Yi-Li, in her solo exhibition, seems to suggest that as well. Her introduction to her exhibition titled ‘KUSO – Red, Spring Snow, Orange Flower’ says&lt;/p&gt;
&lt;p class="callout"&gt;In Taiwan’s pop culture, internet subculture and video gamers’ communities, it (Kuso) became a trendy term that suggests “making fun of anything, playing practical jokes on everything.” KUSO subverts conventional values and turns things into garbage. It has no limits, history, agendas or logic. Like an amoeba, it is a subculture phenomenon that has no rules. (Yi-Li, 2006)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Making a list of characteristics of what might be Kuso is futile. As Yi-Li seems to suggest, Kuso, on the surface, is located on the ‘fun’ and ‘hilarity’ of an object. However, Kuso actually resides in the processes of subversion and resistance. Kuso not only makes ‘things into garbage’ but also, by logical corollary, turns ‘garbage into things’. It started as a subculture phenomenon but is now highly popular in mainstream cultures – on reality TV on youth oriented channels like MTV and Channel V, in local performances and spectacles, and in Stephen Chou movies. Kuso seems to refer to not just the discourse around a particular object but a subjective mode of representing the self into different narrative conditions enabled by new digital technologies. Kuso is about the ability to create fluid and transitory spectacles of the self as a trope of social interaction and communication. While Yi-Li might look upon Kuso as without ‘limits, history, agendas or logic’, she forgets that Kuso has been the way for organising political protests, flash mobs and social awareness collectives in many part of Asia.&lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt; It is in this very ‘free’ and ‘excessive’ structure of Kuso that one can locate the politics and processes by which New Digital Cinema can be understood.&lt;/p&gt;
&lt;p&gt;In her Kuso exhibition, Yi-Li created the ‘Worm-man’ that&lt;/p&gt;
&lt;p class="callout"&gt;drags its body and slithers in the ever-changing world. In different kinds of worlds, the Worm-man develops into different phases. As phenomena are happening, it is also transforming. The Worm-man has multipe possibilities, multiple personalities and multiple identities. &lt;br /&gt;(Yi-Li, 2006)&lt;/p&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;While Kuso is often understood as parody, trash culture or camp humour, and is even attributed to MTV style movies by enthusiasts, for the large section of Kuso consumers, it is the governing principle for social interaction, dressing and appearance, hair and accessories, consumption of products and modes of expression. Kuso seems to be a way in which they produce themselves as parodic forms of themselves – producing themselves in conditions of constant transformation with ‘multiple possibilities, multiple personalities and multiple identities.’ As Yi-Li suggests in her art, Kuso is not just about producing parodies and mimicking popular art forms but it is also a way of producing the spectacle of the self. It is not surprising then, that Kuso emerges as an aesthetic with the proliferation of technologies and tools which allow for a narrativisation of the self for distribution and consumption in the public.&lt;/p&gt;
&lt;h3&gt;Contexualising Kuso&lt;/h3&gt;
&lt;p&gt;I look at two specific instances of Kuso to understand and frame the concept in this paper. The first emerged out of my own involvement with some of the students and their scheduled performances at the annual sports day.&lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt; My Chinese language teacher Mandy Hua, who is an undergraduate student at the NCU, is also a professional hip hop dancer. For her annual day performance at the university, Mandy chose (with some inputs from me) a popular Bollywood song that was creating raves in India at that time.&lt;a name="fr12" href="#fn12"&gt;[12]&lt;/a&gt; Mandy chose the song, edited the audio to make it tighter and shorter in duration and started the practice. Along with a flock of dancers from other schools on the campus, Mandy replicated an ‘Indian’ aesthetic for the song, doing elaborate costumes which included a lot of flowing skirts, veils, sequins and shimmer – the kind that was shown in the song. The female performers were in a state of erotic relationship – not only in their imitation of the seductive postures and movements of the dance sequence in the original movie song but also in presenting themselves as eroticised objects of glamour and desire to a young audience made primarily of students. The expected reactions of cat calls, of hooting, of lascivious laughter and of gasps of wonder and awe were all present in the crowd. However, a brief minute into the performance, their narrative of seduction, eroticism and obvious parody-imitation was disrupted and somehow harmoniously irrupted by a group of boys, wearing glasses, their bodies far from the perfectly sculpted eroticised bodies of the female performers, wearing clumsy looking ill-fitting karate dresses and making unrehearsed animal movements around the female performers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;It was the introduction of these dancers that completely displaced the element of parody within which I understood the performance. The male performers, who were completely unfamiliar with the original song, were imitating the female dancers on the ground. They were not interested in replicating either the movements of the female dancers or the sequences they were following. They were more interested in undermining the very aesthetic that the female dancers were trying to replicate or produce. Their movements were jerky, unpractised, bordering on the ridiculous. Their half naked bodies were un-sculpted and uneroticised. These were not the college hunks or super jocks coming out to parade their masculinities but the ‘geeks’ or the ‘dorks’ who were ravelling in their un-eroticised status and celebrating it with gusto.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;What was more interesting was the way in which the audience was receiving these male performers. In spite of the engaged erotic relationship with the female performers, the audience was extremely appreciative of the male performers’ attempts at overthrowing the female performers’ spectacle. The audience was egging them to constantly be more ridiculous, be more flamboyant, be more self mocking, guiding their movements and actions, leading to a final mock chase sequence, where the male performers chased the female performers off the ground, stripped themselves to their shorts, flexed their un-muscled bodies and made their exit among huge cheering and applause. They were obviously the star attraction of the performance. Such a response was puzzling. It was the women who had put in hours of practice to produce themselves as erotic objects of consumption. The audience, in the beginning had engaged with them at that level. And yet, it was this bunch of slightly ‘with an L on my head’ guys who emerged in their buffoonery and antics as the heroes of the minute.&lt;/p&gt;
&lt;p&gt;My first impulse was to read in it, the dynamics of a gendered space and a certain mock valorisation of this hyper masculinity. While gendered readings of the performance are indeed valuable and might offer an entry into looking at the construction of eroticism, desire, spectacle and the performative self, I am going to focus on the Kuso in this performance. My own gendered impulses were quickly overshadowed by the repeated use of the word Kuso that the members of the audience were using in order to explain the male performances. It was obvious that these male performers, in spite of their actions, were not really clowns but some sort of heroes and embodying this peculiar word – Kuso.&lt;/p&gt;
&lt;p&gt;When I started asking around for Kuso, people pointed at several different objects, from Stephen Chou movies to Reality TV on Channel V, from personal videos to popular Kuso shows where people engaged in a set of ludicrous, often bizarre performances to make a public spectacle of themselves. The more I encountered these Kuso forms, the more difficult and incomprehensible it became to understand either the appeal or the aesthetic of the form. It looked like cheesy camp or an extension of a certain MTV aesthetic as a result of vulgarisation of technologies. When I crawled on the web looking at discussion forums that were devoted to Kuso, I found a huge number of people sharing my incomprehensibility and raised eyebrows at the Kuso objects, trying to figure out what it was that was attracting thousands of users to produce and consume Kuso with such dedication.&lt;/p&gt;
&lt;p&gt;Especially in the context of Taiwan, Kuso belongs to the realm of what is called the ‘Strawberry Generation’ (Tsao-Mei Yi-Dai). The Strawberry generation in Taiwan refers to the people born between 1981 and 1991, and, despite its suggestions in English, carries negative connotations with it. The three most popular characteristics of the Strawberry generation – a phrase that has huge currency in popular media – have been severally explained. Rachel, who writes on the National Central University’s (Taiwan) website, explains:&lt;/p&gt;
&lt;p class="callout"&gt;In Taiwan, the Strawberry Generation refers to those who were born between 1981 and 1991, ranging from the 22-year-old university students to the 12-year-old junior high school students. This generation is labeled as “strawberry” due to two reasons: first, this generation of youth was raised in a better environment, as strawberries grown and nourished in a greenhouse, than the earlier generation. Second, strawberries are known for their beauty, delicacy and high price, suggesting that the young people can not withstand pressure, difficulties, and frustration as they grew up in a nice and comfortable environment and are able to get almost whatever they ask for.&lt;br /&gt;(Rachel, 2008)&lt;/p&gt;
&lt;p&gt;Henrry (2006), a student who also belongs to the Strawberry Generation, writes in his classroom assignment, ‘People of this generation are said to be fragile when facing pressure, just like the strawberries.’ He further goes on to suggest that the problems of the Strawberry Generation are largely economic in nature and might lead to serious problems for Taiwan’s economy. Myr Lim (2006) also looks at the economic and political instability of this generation and describes them as ‘Like the fruit, they look extremely good and sinfully juicy, who wouldn’t want one? But they have a very limited shelf life.’ Built into this criticism is also the understanding that the Strawberry Generation is also in a state of political disavowal.&lt;/p&gt;
&lt;p&gt;And yet, when introduced to the different manifestations of Kuso, there was a very clear idea of resistance, subversion and mobilisation. A local incident, which made temporary heroes of two teenage boys who stripped in Public, on a university campus, was read as a sign of resisting the University’s attempts at regulating dress-codes for the students.&lt;a name="fr13" href="#fn13"&gt;[13]&lt;/a&gt; Other videos which were made for internet circulation had the digital natives refusing the Western models of masculinity or heroism and producing buffoon-like images to correspond with the glorified pop icons from the West – often producing infantile and juvenile forms of behaviour to exaggerate the effect. Other Kuso manifestations were in consumption, as different objects which were seemingly ‘cute’ (se-jiao) or ‘innocent’ were invested with sinister or often ludicrous intent.&lt;a name="fr14" href="#fn14"&gt;[14]&lt;/a&gt; The same kinds of aesthetics were also seen on the ‘LOL Cat’&lt;a name="fr15" href="#fn15"&gt;[15]&lt;/a&gt; and ‘All your base are belong to us’&lt;a name="fr16" href="#fn16"&gt;[16]&lt;/a&gt; internet memes which have gained currency online. It is while browsing through these worlds that I was introduced to a Kuso phenomenon which was garnering huge media and popular attention globally. This was a phenomenon which has now popularly been dubbed as the Backdorm Boys.&lt;/p&gt;
&lt;p&gt;BackDorm Boys were three graduate students, two of whom became instant celebrities – Huang Yi Xin and Wei Wei - from the Guangzhu Academy of Fine Arts in China, who shot to instant fame when, in a state of boredom, they made a lip-sync cover version of popular Backstreet Boys singles, using nothing more than cheap digital cameras on their computers, in the restrictive space of their dormitories, and distributing them through video sharing spaces like YouTube, MySpace and other blogs (The Full Plate, 2008). These weren’t, at a first glance, very different from the ‘funny’ videos that one encounters online all the time – cheaply produced, shot with a webcam mounted on the screen, an almost unedited, uninterrupted full frontal frame, and an exaggerated attempt creating a certain Kitsch video that have gained popularity in the past. However, within my own contexts, the BackDorm Boys had strong resonances with the earlier dance performance I described. Once again, the three students in the videos were not the hyper eroticised masculinities that the boy bands like Backstreet Boys have embodied in popular cultures. Given the Confucian model of academia and studentship, students are not easily granted such erotic value to begin with. These were also not students who were particularly talented at singing. In fact, they were not singing at all, they were lip synching the songs in their videos. The videos did not involve any attempts at shooting but were in the full-frontal, almost pornographic frames of spectacle where the camera was mounted over the screen and the two performers were being caught in that frame. Dressed in identical clothes, the two main performers sang with extraordinary histrionics, the otherwise mellow and slightly cliché ridden love ballads that the Backstreet Boys had made their signature. In the background, one of their other dorm mates, played a Kuso-ge called Quaker throughout the video. He occasionally simulated the actions of a music mixer or a DJ or sometimes helped them with props.&lt;a name="fr17" href="#fn17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/boyz.jpg/image_preview" alt="Boys" class="image-inline image-inline" title="Boys" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;There was, at the first glance, nothing spectacular about the Backdorm Boys. As one of the responders on a blog dedicated to the Backdorm Boys very succinctly puts it:&lt;/p&gt;
&lt;p align="left" class="callout"&gt;Let’s face it: it doesn’t take a lot of talent to make faces. They didn’t write the song, didn’t sing the song, didn’t play any musical instructions, etc. Their sole accomplishment is they made faces at a camera. That’s not talent, man!!! And if they weren’t Chinese—i.e., didn’t have the freak factor of Chinese boys lip-synching to Backstreet Boys songs—NOBODY will notice this.&lt;br /&gt;Da Xiangchang 2005&lt;/p&gt;
&lt;p align="left"&gt;And yet, the Backdorm Boys, apart from cults developing around them and various internet memes devoted to them,&lt;a name="fr18" href="#fn18"&gt;[18]&lt;/a&gt; were featured live on NBC and both dropped out of their academic programmes to become hugely successful brand ambassadors and spokespersons for some of the largest mass media brands in China. They have both acquired a celebrity status and are role models and now popular media persons on TV channels, hosting their own shows.&lt;a name="fr19" href="#fn19"&gt;[19]&lt;/a&gt; In trying to understand these Kuso products in the realm of parody one starts asking the wrong kind of questions: where is the talent? Several respondents, including Da Xiangchang very pointedly pointed out that ‘it takes very little talent to make a fool out of yourselves.’ The more interesting question to ask would be the question that Yi-Li asked in her exhibition: How does Kuso manage to make garbage out of things? And further, is it possible, to read into Kuso, a new politics which guises itself as ‘fun’ or ‘hilarity’.&lt;/p&gt;
&lt;h3&gt;Differentiating between parody and Kuso&lt;/h3&gt;
&lt;p&gt;The Western gaze will only allow Kuso to be understood in a relationship of parody. However, looking at the contexts within which Kuso emerges and its ability to ‘make garbage out of things’, Kuso changes the relationship between the ‘original’ and the ‘discursive’ objects. parody, as a literary and a narrative form, resides more in the object being parodied (original) rather than in the parodic creation (discursive). To understand, appreciate or enjoy the discursive object, it becomes necessary to be familiar with, sometimes at a very intimate level, with the original object. The chief aim of a parody is to invoke the original object by introjecting it into new frames of references and meaning making, establishing a tenuous relationship of invocation between the original and the discursive objects. Parody seeks, not to replace the original but add to the ‘aura’ of the original object. Legends, myths, cult-stories and folklores can be understood as parodic in nature as they add to the understanding of the original or the core object. In the case of cinema especially, parody is not simply a process of poking fun at an earlier cinematic form or object but is an effort to evoke the original as a way of making meaning and seeking sense in the narrative.&lt;/p&gt;
&lt;p&gt;The relationship between the original object and the discursive object is one of invocation where the parody invokes, glorifies and seeks justification for its existence through the original object. parody also resides in a certain historical reading of cinema as it produces often unintentional but present residues of earlier forms. parody can be looked upon as enabling a certain genealogical reading of cinematic narratives and forms. In the non-linear consumption patterns of cinema reception, especially with cable television and global distribution, the boundaries between the original and the discursive are often blurred and reconfigured. Often the audiences and consumers encounter the discursive before they get familiar with the original and hence they change the way in which the original object is understood or received, often mis/reading it through the lens of the parody instead of the other way round. Cinema also makes more visible, the ways in which the parody can also work through different genres and media – be it in the production of books that try to appropriate the cinematic language of telling stories or in the production of movies that are based on books or sometimes try to deploy the narrative conditions of books in the cinematic narratives. The only way to talk of parody is to read it in the cinematic object itself and in the invocations that it produces with the imagined or the real object. The concept of an original is necessary to the understanding of the parody.&lt;/p&gt;
&lt;p&gt;It is exactly this relationship between the original and the parody that Kuso disrupts from the within. Kuso does not produce the definitive terminal points of the original and the discursive objects that parody requires. In the instance of any Backdorm Boys video, there is no presumed knowledge of either the Backstreet Boys videos or the kind of globalised consumption that they can be contextualised under. While there are many references – almost at the level of invocation, in the clothes that they wear, in the choices they make in songs etc. – they are not necessarily the frameworks through which their videos can be made meaning of. If it was merely a question of parody of Backstreet Boys, their subsequent videos where they also ‘Kuso-ed’ other performers and local artists would not have worked for their fans.&lt;/p&gt;
&lt;p&gt;Like a network, the relationship between the original and the discursive objects of Kuso is masked so that each constantly feeds back into the other. Hence, in the case of the Backdorm Boys, if you tried to understand their work as simply a Chinese/Asian parody of a Western form of popular culture, you end up bewildered, unable to account for the huge popularity and success. However, if we place their production as Kuso, it allows us to realise that the objects being parodied in the videos, are not American popular cultural forms or specifically Backstreet Boys videos. What is being parodied is the original self of the performers.&lt;/p&gt;
&lt;p&gt;Instead of the framework of parody or intertextuality, we can locate the Backdorm Boys Kuso videos as embedded in a particular lifestyle choices and consumption of cultural forms, accessories, appearances, class differences, language and most importantly the conditions made available by technologies. The original object is the three boys and their ‘real’ or ‘original’ status in their lived practices. The discursive object is also the three boys and their projected selves or desired selves which they are expected to either appropriate or wish for. The Kuso is in exaggerating the differences between these two and celebrating the obvious flaws in them and making them available as a public spectacle. While I shall steer away from discussions of talent, it becomes more evident that Kuso allows for us to recognise the aesthetics, politics and proliferation of these new digital cinema artefacts which earlier notions of parody did not.&lt;/p&gt;
&lt;p&gt;Kuso establishes more non-linear, sometimes disruptive relationships, between different objects that it refers to in its production. The relationship between the various objects is not invocative but evocative in nature. The Kuso narrative does not presume specific knowledge of some other object being invoked. Instead, it produces a redolent relationship where the different objects mutually explain each other. Like any cyberspatial form, Kuso seems to produce a system of self-referential, almost cannibalistic meaning making where a range of objects seem to co-exist in improbably frames of non-real and in-credible, each forming a node through which the others are understood. The references Kuso makes in its narrative, are not to the other, original object in a wistfully reconstructed or imagined past but to the other back-tracking objects present in the narrative itself. This produces an almost infinite chain of inter-referencing objects that justify each others’ existence. Kuso thus disrupts the more linear and historical constructions that parody (and the subsequent attempts to read parody as a relationship between new digital cinema and Cinema) establishes. It is located in the materiality of the object, its reception, its manipulation, its distribution, its transformation and its ability to escape the more effective-causal circuits of meaning making.&lt;/p&gt;
&lt;p&gt;While parody seeks to reaffirm the similarities between the original and the discursive objects, Kuso emphasises the inability of the original to explain the discursive, thus producing a relationship of difference rather than one of similarity. While parody deals with the questions of representation, Kuso enters into conditions of simulation. It is this evocative relationship that allows me to locate Kuso as an aesthetic of understanding New Digital Cinema in Asia and to materialise it as a lifestyle and as a condition of reception in the body of the Asian consumer.&lt;/p&gt;
&lt;h3&gt;Politicising Kuso&lt;/h3&gt;
&lt;p&gt;An uncontextualised notion of Kuso only allows for a relationship at the level of the Parodic. Hence, the discussants of the Backdorm Boys were always in a condition of unintelligibility about why these slightly clownish characters would become imitable heroes for a particular generation. Given the highly polarized nature of political orientations in Taiwan, it has been the despair of many educators and practitioners that the Strawberry Generation, which is also the largest subscriber base to Kuso, has no apparent interest in politics. It is a generally lamented as a generation that is unashamedly devoted only to having fun. I propose, in my reading and understanding of Kuso objects and Kuso as an aesthetic, that the participatory and performative nature of Kuso paradigm, offers space for negotiation and expression of political intent. I shall demonstrate this particular argument at two levels – the level of the body and the personal, and at the level of the public and the national.&lt;/p&gt;
&lt;p&gt;The question of the body becomes central to almost all representation studies. Analysis of Kuso videos or objects lends itself easily to see how the accessorisation and the freedom to produce unsupervised spectatorial narratives of the self lead to new spaces of negotiation. There is also, very clearly, a definite deconstruction of the traditional, masculine and often imported forms of masculinity, femininity and sexuality which the videos lend themselves to. Cross dressing, excessive make-up, exaggerated actions, etc. all create a fluid world where gender structures used to define the body are dismissed and indeed, enter into parodic relationship with traditional perceptions or expectations. However, for the scope of this paper, I shall more narrowly focus on the construction of the heroic body in the Kuso videos.&lt;/p&gt;
&lt;p&gt;The body comes to materialise Kuso through various practices and becomes the site upon which the Kuso self is enacted. As Kuso celebrates the flaws and exaggerates the imperfections, it allows for a certain masked relationship between the private self and the public politics. As is demonstrated in the case of the Backdorm Boys, Kuso, with its self referential boundaries, allows for a critical engagement with the very practices of the generation that subjects them to sever criticism. The Kuso bodies or the narratives of self are not longer in relation with the imagined body of the star or the aura of the star vehicle but in masked relationship with the larger politics of its time. The bewilderment or unintelligibility that the discussants of the Backdorm videos exhibit, is not particularly about why or how the video was created but how heroism or stardom was created by the celebration of the un-iconic or the unheroic.&lt;/p&gt;
&lt;p&gt;And it is to answer this question that we go back to the Strawberry Generation again. The Strawberry Generation in Taiwan was not merely marked by economic transitions and infidelity. It is also a generation that has seen a severely politicised state of nationalism and national identity in Taiwan. The younger generation that grew up after the removal of the martial law has engaged in serious consumerism as a part of their national identity. As Chen Kuan Hsing (1998) points out, ‘From 1994 onwards…the cultural atmosphere was mediated through commodity structures.’ Chen further goes on to explain how the political economy and the question of the national are intrinsically linked. Given the hegemonic presence of the West in the cultural galaxy of Taiwan and the constant negotiations between the political position vis-à-vis China as well as the cultural imperialism of Japan, the Taiwanese Strawberry Generation finds itself without a particular model of national identity to follow. Along with these are the allegations of widespread corruption and the complete disinterest of the current political parties in the ill-effects of liberalisation (Asian Economic News, 2007) which contribute to a high rate of mental ill-health and suicides in the Strawberry Generation (The China Post, 2008). Given such a murky situation, the Strawberry Generation has indeed withdrawn from active political participation of fighting in the streets and has taken to new forms of expression, which, outside of the context, appear as solipsistic or merely for fun.&lt;/p&gt;
&lt;p&gt;Kuso, as an aesthetic then, transcends the analysis of gender and sexuality, performativity and spectatorship, and becomes a site of national representation and subversion and the Kuso stars like the BackDorm boys embody these positions for a Strawberry Generation in Taiwan. The notion of flawed heroism, which simultaneously mocks the ubiquitous presence of the pop-culture from the West, the inability of the local cultural industries to produce original works of art, the apathy of the younger generation caught in the mechanisms of a liberalised globalisation, and the unavailability of spaces for political negotiations that they are built in. This is the defence that many of the Taiwanese and other Chinese speaking individuals produce on the discussions around Kuso. On the discussions on the Sinosplice blog, one of the most vocal defenders, John, who starts with calling this condition, a ‘rare talent’ goes on to say,&lt;/p&gt;
&lt;p class="callout"&gt;Have you ever tried to make a funny video? It’s much harder than you give these boys credit for. The fact that they were able to do it merely by lip synching is testament to their talent. If they’re using certain cultural expectations for humorous effect, then that’s further evidence of talent.&lt;br /&gt;(John, Sinosplice, 2005)&lt;/p&gt;
&lt;p&gt;However, John’s idea of ‘playing with cultural expectation’ remains a solitary voice. The other discussants go on to talk about how this particular series is only interesting because of the ‘freak value’ of the videos. Karen, another participant who introduces herself as a student in the West, writes&lt;/p&gt;
&lt;p class="callout"&gt;I have to reluctantly admit, as politically incorrect and offensive (sic) some of the comments may be, they are mostly valid in my opinion. I’m not saying that the “Back Dormitory Boys’” talent doesn’t play a part in why it’s so funny but the fact that the they’re Chinese with no doubt plays a huge role in the humour that that you could easily find elsewhere. How hard is it to find a few college students making goofball videos and putting them on the internet?&lt;br /&gt;(Karen, Sinosplice, 2005)&lt;/p&gt;
&lt;p&gt;The opinions that Karen and XiangChang express, resonate with the general perception of the BackDorm boys on many different discussion groups and media talks around the world. As they gained more popularity and exposure, there were more and more people exclaiming at why these antics were being heralded as heroic. However, there were no explanations which were forwarded. The interesting part is that a similar predecessor called the ‘Numa Numa Boy’ (Wolk, 2006), who also had a parodic relationship with the Romanian song, while he gained equal amounts of popularity, was not at the centre of any debate. His claim to fame was slapstick humour and very clearly complied with the Western understanding of parody. However, in the case of the Backdorm Boys, the debates continue as the existing understanding of parody as a universal value fail to account for the aura that surrounds them.&lt;/p&gt;
&lt;p&gt;Kuso, as a way of looking at it, offers that the Backdorm Boys were not mere imitators. Imitation would have been in them trying to do a representation of the original Backstreet Boys videos. Instead, the Backdorm Boys are in a world of simulation, where they are simulating the flawed masculinities and identities that are excluded within popular cultures. In this method of simulation, they are able to produce a new and perhaps more believable ‘reality’ which needs to be dealt with in the larger context of the production.&lt;/p&gt;
&lt;p&gt;The reason why Kuso makes garbage of things is because that is the only way to deal with the way things are – demolish them, look at their flaws, and find, within those flaws, interstices of negotiation and interaction, which are no longer available. The Kuso, refuses to identify a homogeneous way of understanding digital cinema on the web and insists on thus, contextualising the cultural products through their geo-political status. Because of the geographical origins of digital technologies – the West, and the generally assumed audience and paradigms of understanding it – the West again, most of these new digital cinema forms are looked upon as derivative or engaging in a parodic relationship with the original which is placed in the West. Kuso is a way of complicating the relationship between the two.&lt;/p&gt;
&lt;p&gt;This is the first step in thinking about ways in which one can formulate a digital aesthetic which does not presume a homogenised community online but asserts, not only the physical bodies that are behind the production of these narratives but also the geographical boundaries and socio-cultural locations, without which the objects become incomprehensible and indecipherable. Moreover, it is necessary to rescue such ‘popular’ ‘aesthetic’ forms from discussions that confine them to the realms of performance or solipsism and look at the larger potential they have in creating new conditions of political engagement. For Taiwan’s Strawberry Generation, Kuso is a lifestyle, by which they are able to establish discursive and subversive relationships with the very actions and practices which subject them to sever criticism. The wave of new digital cinema, streaming on a screen near us, thus emphasise the need to revisit the relationship between aesthetics and politics on the one hand and the connections between the universal and the contextual on the other.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;References&lt;/h3&gt;
&lt;p&gt;Asian Economic News. 2007. “Thousands Protest Against Taiwan President”. Retrieved on 5th March, 2007 from &lt;a class="external-link" href="http://findarticles.com/p/articles/mi_m0WDP/is_2007_Sept_15/ai_n27465185"&gt;http://findarticles.com/p/articles/mi_m0WDP/is_2007_Sept_15/ai_n27465185&lt;/a&gt;&lt;br /&gt;Kuan-Hsing, Chen. 2005. “Interview with Kuan-Hsing Chen” by Greert Lovink. Retrieved on 12th March, 2007 from &lt;a class="external-link" href="http://www.nettime.org/Lists-Archives/nettime-l- 9803/msg00002.html"&gt;http://www.nettime.org/Lists-Archives/nettime-l-&lt;br /&gt;9803/msg00002.html&lt;/a&gt;&lt;br /&gt;China Post, The. 2008. “Disturbing Suicide Rate Among Young People”. Retrieved on 11th August, 2008 from &lt;a class="external-link" href="http://www.chinapost.com.tw/editorial/taiwan%20issues/2008/08/01/168122/Disturbing-suicide.htm"&gt;http://www.chinapost.com.tw/editorial/taiwan%20issues/2008/08/01/168122/Disturbing-suicide.htm&lt;/a&gt;&lt;br /&gt;Fischer, Herve. 2006. The Decline of the Hollywood Empire. Tr. Rhonda Mullins. New York: Talon Books.&lt;br /&gt;Full Plate, The. 2008. “Back Dorm Boys: Where are they now?”. Retrieved on 18th March, 2008 from &lt;a class="external-link" href="http://escapetochengdu.wordpress.com/2008/02/24/back-dorm-boyswhere-are-they-now/"&gt;http://escapetochengdu.wordpress.com/2008/02/24/back-dorm-boyswhere-are-they-now/&lt;br /&gt;&lt;/a&gt;Gasser, Urs and John Palfrey. 2008. Born Digital: Understanding the first generation of Digital Natives. New York : Basic Books.&lt;br /&gt;Henrry. 2006. Retrieved on 5th March, 2008. from Michel Cheng’s blog for her Writing Class at NCCU, available at &lt;a class="external-link" href="http://nccujuniorwriting.blogspot.com/2006/06/weaknessesof-strawberry-generation_09.html"&gt;http://nccujuniorwriting.blogspot.com/2006/06/weaknessesof-strawberry-generation_09.html&lt;br /&gt;&lt;/a&gt;Ko, Yu-Fen. 2000. “Hello Kitty and the Identity Politics in Taiwan”. Retrieved on 10th January, 2007 from &lt;a class="external-link" href="http://www.international.ucla.edu/cira/paper/TW_Ko.pdf"&gt;http://www.international.ucla.edu/cira/paper/TW_Ko.pdf&lt;/a&gt;&lt;br /&gt;Lessig, Lawrence. 2008. “In Defence of Piracy”. The Wall Street Journal retrieved on 11th October 2008, available at &lt;a class="external-link" href="http://online.wsj.com/article/SB122367645363324303.html?mod=googlenews_wsj"&gt;http://online.wsj.com/article/SB122367645363324303.html?mod=googlenews_wsj&lt;br /&gt;&lt;/a&gt;Liang, Lawrence. Forthcoming. “A brief history of the internet in the 14th and the 15th Century”&lt;br /&gt;Lim, Myr. 2006. Retrieved on 5th March, 2008 from her blog titled ‘Wanderlust’ available at &lt;a class="external-link" href="http://myr_fashionstylist.blogs.friendster.com/myr/2006/08/strawberry_gene.html"&gt;http://myr_fashionstylist.blogs.friendster.com/myr/2006/08/strawberry_gene.html&lt;br /&gt;&lt;/a&gt;Mark Mclelland. 2006. “A Short History of Hentai”. Intersections: History and Culture in the Asian Context. Issue 12 http://intersections.anu.edu.au/issue12/mclelland.html&lt;br /&gt;Marvin, Carolyn.1990. When Old Technologies Were New: Thinking about Electric communication in the earliest 19th Century. London: Oxford University Press.&lt;br /&gt;Mitchell, William J. 1996. City of Bits: Space, Place and the Infobahn. Massachusetts: MIT Press&lt;br /&gt;Rachel. 2008. Retrieved on 5th March, 2008 from the National Central University’s (Taiwan) PR Team Page available at &lt;a class="external-link" href="http://www.sinosplice.com/life/archives/2005/10/25/back-dorm-boys"&gt;http://www.sinosplice.com/life/archives/2005/10/25/back-dorm-boys&lt;/a&gt;&lt;br /&gt;Yi-Li, Yeh. 2006. KUSO –Red, Spring Snow, Orange Flower. Taipei National University of the Arts, Taipei. Retrieved on 20th November, 2006 from &lt;a class="external-link" href="http://www2.tnua.edu.tw/etnua/modules/news/article.php?storyid=28"&gt;http://www2.tnua.edu.tw/etnua/modules/news/article.php?storyid=28&lt;/a&gt;&lt;br /&gt;Sinosplice. 2005. “Backdorm Boys”, a blog entry on a blog. Retrieved on 10th November 2006 from &lt;a class="external-link" href="http://www.sinosplice.com/life/archives/2005/10/25/back-dorm-boys"&gt;http://www.sinosplice.com/life/archives/2005/10/25/back-dorm-boys&lt;/a&gt;&lt;br /&gt;Turkle, Sherry. 1996. Life on the screen: Identity in the age of the internet. London: Weidenfeld and Nicolson.&lt;br /&gt;Weinberger, David. 2007. Everything is Miscellaneous The Power of the new digital disorder. New York : Times Books.&lt;br /&gt;Wolk, Douglas. 2006. “The Syncher, Not the Synch : The irresistible rise of the Numa Numa Dance”. Retrieved on 10th November, 2007 from &lt;a class="external-link" href="http://www.believermag.com/issues/200606/?read=article_wolk"&gt;http://www.believermag.com/issues/200606/?read=article_wolk&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;].A first draft of this article was first presented at the ‘New Cinemas in Asia’ conference organized by the Centre for the Study of Culture and Society at the Christ University, Bangalore. The paper owes its gratitude to S.V. Srinivas for his support both for my journey to Taiwan and for the confidence required to write such an essay on cultures and phenomena that I cannot with confidence claim to be my own.&lt;br /&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. The Jadavpur University Film and Media Lab, as recently as November 2008, organized a conference to discuss The Future of Celluloid,where, there were many engrossing presentations on what celluloid can mean in the digital age and where its futures reside. Ashish Rajadhyaksha, in his key-note speech, made a significant remark that the Celluloid is the original object that the digital shall always invoke in its manifestation; not merely in its aesthetics, which might change, but in the sheer capacity that the digital has to pay unprecedented attention to the moving image and reconstruct it for new meanings.&lt;br /&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. Hervé Fischer, in The Decline of The Hollywood Empire, arrives in a long line of prophets who have been announcing the demise and the end of Celluloid Cinema as we know it. Fischer announces, quite early in the book, ‘[d]igital distribution will end this archaic system of distribution and hasten the decline of the Hollywood Empire: Two giant steps forward for film in one fell step!’&lt;br /&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. The large undivided screen gets replaced by a small ‘Window’ on the right hand corner of the monitor which also houses various other contesting media forms that vie for the users’ attention. Sherry Turkle, in her study of MUD users also talks of how the Window has become a metaphor of our times.&lt;br /&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;].In a much more measured tone, Kim Soyoung, in her formulation of a trans-cinema and new public spheres simulated by Korean Cinema, suggests that ‘new digital cinema…attentive to the transformation of its production, distribution and reception modes as shown by independent digital filmmaking and its availability on the net’. She further goes on to propose ‘digital and net, cinema LCD screens (installed in subways, taxis and buses) and gigantic electrified display boards (chonkwangpan in Korean) should be seen as spaces into which cinema theories and criticism should intervene.’ This paper adds to the list, the extremely personalised but virtually public and shared space of the computer monitor and portable media devices.&lt;br /&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. In another essay exploring the aesthetics of social networking and blogging (especially with the increasing implementation of Web 2.0), I make a claim at these sites being sustained through a constant and incessant production of both the virtual persona of the author as well as the body of the author that serves as an anchor to the virtual reality. I further suggest that this process of continuous translation leads to the self as being recognised and gratified only in a state of performativity over inter-looped surfaces.&lt;br /&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. Lawrence Liang, in his forthcoming essay, “The History of the Internet from the 15th to the 18th Century”, examines the history of the print and pre-print cultures, to make a brilliant argument around the questions of knowledge, the authority of the knowledge, and the problems of legitimacy or authenticity that have surrounded the Wikipedia in recent years.&lt;br /&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. The anxiety around such objects primarily circulates around questions of copyright infringements and piracy. The Music And Film Independent Association, for instance, claims that due to the re-mix, unlicensed distribution, and/or re-working of their material, they are suffering a heavy financial loss, leading to ridiculous legal cases that seem to hold no legitimacy in their sense or sensibility. Lawrence Lessig looks at a recent controversy on youtube where a mother, who broadcast digital moving images of her 13 month old son dancing to Prince’s song Let’s go Crazy was accused of copyright violation by the License owners who demanded the withdrawal of the video from YouTube.&lt;br /&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. In A short History of Hentai, Marc Mclelland, defines Hentai as follows: “Hentai is a Sino-Japanese compound term widely used in modern Japanese to designate a person, action or state that is considered queer or perverse, particularly in a sexual sense. Unlike the English term 'queer', however, hentai does not have predominantly homosexual connotations but can be used to describe any sexual acts or motivations other than what might be termed 'normal' sexual relations. Indeed the loanword nōmaru (normal) is sometimes used as an antonym for hentai. Apart from this general use of the term hentai, it can also be used to designate a specific genre of Japanese manga and animation that features extreme or perverse sexual content and it is in this sense that hentai has become well-known among western fans of Japanese popular culture.”&lt;br /&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. Professor Yu-Fen Ko (2000) at the Hsih-Shin University in Taipei, locates similar receptions of the ‘Hello Kitty’ phenomenon in Taiwan. Yu-Fen Ko examines how, the larger reception of popular cultural artifacts fail to look at the political potential that these objects have in the way they reconfigure the existing relationship between the personal and the political.&lt;br /&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. This paper owes great intellectual and emotional debt to many people. Mandy Hua, who, apart from teaching me Chinese, also helped me get introduced to the intricacies of youth fashion and trends in Taiwan. Ted Cheng, who introduced me to many different Kuso objects and helped, whenever my own skills at access or analysis flailed. Amie Parry, Naifei Ding, David Barton, Chen Kuan-Hsing and Josephine Ho who made my stay in Taiwan so fruitful, providing emotional support, and listened to me patiently, correcting me when I was wrong and directing me to people and resources that helped me frame this argument and understand the entire new digital cinema phenomenon in a new light.&lt;br /&gt;[&lt;a name="fn12" href="#fr12"&gt;12&lt;/a&gt;]. After much screening and watching of Indian movie songs from Bollywood, we finally narrowed down to “Kajrare Kajrare” from the movie Bunty aur Bubly, with Aishwarya Rai doing a special dance number.&lt;br /&gt;[&lt;a name="fn1" href="#fr13"&gt;13&lt;/a&gt;]. The particular video can be viewed at &lt;a class="external-link" href="http://tw.youtube.com/watch?v=9NlZaDGPEOg"&gt;http://tw.youtube.com/watch?v=9NlZaDGPEOg&lt;/a&gt; The original video that is supposed to make this particular kind of Kuso-streaking is the video which also shot two young men into becoming Television celebrities and can be viewed at http://tw.youtube.com/watch?v=0caIbkYfWTY&lt;br /&gt;[&lt;a name="fn14" href="#fr14"&gt;14&lt;/a&gt;]. One of the most popular icons of such consumption is in the popularity of Hello Kitty – a young female cat without a mouth (and hence without speech or the need to eat) - and has elicited much popular discourse. An example of how Hello Kitty is used as a way of also resisting the Western, Disneyfied, Barbie concepts of femininity can be seen in the video available at &lt;a class="external-link" href="http://www.youtube.com/watch?v=JFBHPbEtfqA"&gt;http://www.youtube.com/watch?v=JFBHPbEtfqA&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn15" href="#fr15"&gt;15&lt;/a&gt;]. LOLCat started as an internet meme which displayed a set of cat pictures, with cheeky captions, parodying ot only the internet slang known as ‘netspeak’ but also reflecting upon how central internet discussions and arguments were to the lives of the digital natives. Some of the most famous examples of LOLCat captions are ‘I can haz cheezburger’, ‘Ceiling Cat’ and then subsequently ‘Basement Cat’. More information and almost an exhaustive range of pictures can be seen at &lt;a class="external-link" href="http://icanhascheezburger.com/"&gt;http://icanhascheezburger.com/&lt;/a&gt; More interesting LOLCat phenomena also include the under construction LOLCat Bible translation project available at&lt;br /&gt;&lt;a class="external-link" href="http://www.lolcatbible.com/"&gt;http://www.lolcatbible.com/&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn16" href="#fr16"&gt;16&lt;/a&gt;]. ‘All your base are belong to us’ started as a successful parody of the obsession with UFO and space travel in the late nineties. The meme borrows this slightly cryptic line from European Sega Mega Drive Version of the video game Zero Wing, where it signified victory and total takeover of enemy territories by aliens, and specializes in putting up the caption on different familiar images taken from contemporary as well as historical times. A large collection of ‘All your base are belong to us’ images can be found at &lt;a class="external-link" href="http://www.allyourbasearebelongtous.com/"&gt;http://www.allyourbasearebelongtous.com/&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn17" href="#fr17"&gt;17&lt;/a&gt;]. A full list of their videos is available to view and download at &lt;a class="external-link" href="http://twochineseboys.blogspot.com/"&gt;http://twochineseboys.blogspot.com/&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn18" href="#fr18"&gt;18&lt;/a&gt;]. A quick glimpse of their popularity can be obtained on fan and internet monitoring sites like &lt;a class="external-link" href="http://www.milkandcookies.com/tag/backdormboys/"&gt;http://www.milkandcookies.com/tag/backdormboys/&lt;/a&gt; and &lt;a class="external-link" href="http://www.tian.cc/2005/10/asian-backstreetboys.html"&gt;http://www.tian.cc/2005/10/asian-backstreetboys.html&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn19" href="#fr19"&gt;19&lt;/a&gt;]. This trajectory from Reality TV to popular cultural icons is not unfamiliar or new. Various popular shows like American Idol in the USA, Big Brother in the UK, SaReGaMaPa in India, and Kuso Kuso in China, have all spawned instant celebrities who have cashed their media presence and fame to bag roles in featured television programming, cinema, etc. This particular ability of making one’s self popular and recognizable, often by using the internet as a medium for the same, and then penetrating more corporatized and affluent mass media markets, is a ploy that many aspiring media professionals are employing these days.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/now-streaming-nearest-screen.pdf/view" class="external-link"&gt;Click &lt;/a&gt;for the &lt;img alt="" /&gt; PDF document, 297 kB (305086 bytes) &lt;br /&gt;&lt;a class="external-link" href="http://www.intellectbooks.co.uk/journals/view-Article,id=8200/"&gt;Click &lt;/a&gt;to read the original published in the Journal of Chinese Cinemas, Volume 3, Issue 1, June 2009&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/streaming-on-your-nearest-screen'&gt;https://cis-india.org/internet-governance/streaming-on-your-nearest-screen&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    

   <dc:date>2011-12-24T08:58:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/unkindest-cut-mr-sibal">
    <title>That’s the unkindest cut, Mr Sibal</title>
    <link>https://cis-india.org/internet-governance/unkindest-cut-mr-sibal</link>
    <description>
        &lt;b&gt;There’s Kolaveri-di on the Internet over Kapil Sibal’s diktat to social media sites to prescreen users’ posts. That diktat goes far beyond the restrictions placed on our freedom of expression by the IT Act. But, says Sunil Abraham of the Centre for Internet and Society, India is not going to be silenced online.&lt;/b&gt;
        
&lt;p&gt;Thanks to leaked reports about unpublicised meetings that communications minister Kapil Sibal had with social media operators – or Internet intermediaries, to use legalese — such as Facebook, Google and Indiatimes.com, censorship policy in India has gained public attention, and caused massive outrage.&lt;/p&gt;
&lt;p&gt;According to The New York Times India Ink reportage, quoting unnamed sources from the Internet intermediaries, Mr Sibal demanded proactive and pre-emptive screening of posts that people make on social media sites, ostensibly to filter out or remove “offensive” content and hate speech. In a television interview, however, the minister denied he wanted to censor what Indians thought and shared with others online.&lt;/p&gt;
&lt;p&gt;One is tempted to believe him. He was, after all, the amicus for the landmark People’s Union of Civil Liberties (PUCL) wiretapping judgment of 1996, which is pivotal to protecting our civil liberties when using communication technology in India.&lt;br /&gt;&lt;br /&gt;Last week, though, Mr Sibal came out in public with his demands, saying that there was a lot of content that risked hurting the sensibilities of people and could lead to violence. “It was brought to my notice some of the images and content on platforms like Facebook, Twitter and Google are extremely offensive to the religious sentiments of people ...”We will not allow Indian sentiments and religious sentiments of large sections of the community to be hurt,” he said.&lt;br /&gt;&lt;br /&gt;There was even a threat of state action if Internet companies did not comply with demands to screen content before it was posted online.&lt;br /&gt;&lt;br /&gt;The NYT blogpost said, however, quoting executives from the Internet companies Mr Sibal had reportedly met, that the minister showed them a Facebook page that maligned Congress president Sonia Gandhi and told them, “This is unacceptable.”&lt;br /&gt;&lt;br /&gt;Google responded to Mr Sibal by releasing its Transparency Report, saying that out of 358 items that it had been requested to remove between January and June 2011, only eight requests pertained to hate speech, while as many as 255 complaints were against “government criticism”.&lt;br /&gt;&lt;br /&gt;Indian netizens raged against Mr Sibal, and very quickly #IdiotKapil Sibal was ‘trending’ on Twitter, with thousands posting comments against attempts to ‘censor’ Internet content. Much has changed, in Mr Sibal’s reckoning, between 1996 and 2011.&lt;br /&gt;&lt;br /&gt;So, what’s all the fuss over ‘pre-screening’ and what’s at stake here? Critics of Mr Sibal say, our freedom of speech and expression is under threat. They see a pattern in the way the government has sought to impose rules and restrictions on Internet and telecommunications players, with demands on BlackBerry-maker RIM to give it access to its users’ email and messenger content, on telecom players to install electronic surveillance equipment and let the government eavesdrop as it sees fit, and on the likes of Google and Yahoo to part with email content and users’ details.&lt;br /&gt;&lt;br /&gt;It all started with the amendments to the Information Tech-nology Act 2000 in 2008. Together, they constitute damaging consequences for citizens, including the creation of a multi-tier blanket surveillance regime, inappropriate security recommendations, and undermining freedom of speech and expression.&lt;br /&gt;&lt;br /&gt;The amendments passed in 2008 — without any discussion in Parliament – did solve some existing policy concerns, but simultaneously introduced new ones. For instance, Section 66, introduced during this amendment, criminalises sending offensive messages through any ICT-based communication service.&lt;br /&gt;&lt;br /&gt;Offensive messages are described as “grossly offensive, menacing character..... or causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will.” These terms are not defined in the IT Act or in any other existing law, rules or case-law, except for a couple of exceptions such as what constitutes “criminal intimidation”. These limits on the freedom of expression go well beyond Article 19(2) of the Constitution, which only permits “reasonable restrictions...in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality or in relation to contempt of court, defamation or incitement to an offence.”&lt;br /&gt;&lt;br /&gt;If Mr Sibal himself were to don his lawyer’s coat again and launch a legal challenge to Section 66, in all likelihood, courts in India would strike it down as unconstitutional.&lt;br /&gt;&lt;br /&gt;Section 79, which was amended, brought into being an intermediary liability regime. This was in part precipitated by the arrest of Avnish Bajaj, the former CEO of bazee.com in December 2004 for the infamous Delhi Public School MMS clip which was being sold on his e-commerce platform. Policy-makers were, however, convinced to follow international best practices and grant intermediaries immunity under certain conditions.&lt;br /&gt;&lt;br /&gt;Just as the postal department is not considered liable for the content of letters or telecom operators liable for the content of phone conversations, Internet intermediaries, too, were to be considered “dumb pipes” or “common carriers” of content produced and distributed by users. Intermediaries therefore earned immunity from legal action so long as they acted upon take-down notices, or written requests for deletion of illegal content.&lt;br /&gt;&lt;br /&gt;Section 79 was further clarified in April this year when the Intermediaries Guidelines Rules were notified. Stakeholders from the technology industry, media and civil society had sent feedback to the Department of Information Technology under the Ministry of Communication and Information Technology in February, but DIT choose to ignore the feedback and finalised rules with serious flaws in them. For one, a standardised “Terms of Service” that focused on limits on free expression had to be implemented by all intermediaries – forcing a one-size-fits-all approach.&lt;br /&gt;&lt;br /&gt;Content that was 'harmful to minors' was not permissible regardless of the target market of the website. All intermediaries were supposed to act upon take-down notices within 36 hours, something that a Google may be able to do, but an average blogger could not.&lt;br /&gt;&lt;br /&gt;Two, the vague terms introduced in Section 66A were left undefined. Intermediaries were asked to sit on judgment on the question of whether an article, image or video was causing 'inconvenience'.&lt;br /&gt;&lt;br /&gt;Three, all principles of natural justice were ignored – the person responsible for posting the content would not be informed, s/he would not be given an opportunity to file a counter-notice to challenge the intermediary’s decision in court.&lt;br /&gt;&lt;br /&gt;Four, the rules left it open for economically or politically motivated actors to seriously damage opponents online using fraudulent take-down notices, instead of treating abuse of the take-down notice system as an offence.&lt;br /&gt;&lt;br /&gt;How the take-down system terrorises free expression on the Internet was illustrated when the Centre for Internet and Society, where this author works, undertook a research project. A pro-bono independent researcher who led the exercise sent fraudulent take-down notices to seven Internet companies in India. These included some of the largest and most popular Indian and foreign search engines, news portals and social media platforms.&lt;br /&gt;&lt;br /&gt;Although they all employ the most competent lawyers in the country, six of the seven intermediaries over-complied, confirming our worst fears. In one case, a news portal deleted not just the specific comment that was mentioned in the take-down notice but 14 other comments as well. Most importantly, it must be pointed out, the comment identified in the take-down notice was itself an excellent piece of writing that could not be construed as “offensive” by any stretch!&lt;br /&gt;&lt;br /&gt;In the single exception to the rule, one e-commerce portal refused to act upon a take-down notice trying to prevent the sale of diapers on the grounds that it was “harmful to minors”, rightly dismissing the notice as frivolous. But that exception simply proved a rule: Private intermediaries use their best lawyers to protect their commercial interests, but are highly risk-averse and do not value freedom of expression, unless it affects their bottomline.&lt;br /&gt;&lt;br /&gt;Proactive and pre-emptive screening of social media content, as Mr Sibal has demanded, will only further compromise online civil liberties in what’s already a dismal situation. In short, we move from a post-facto to a pre-emptive censorship regime.&lt;br /&gt;&lt;br /&gt;In fact, given the magnitude of the task of pre-screening in a nation with a 100 million Internet users and growing, such an intense censorship regime will mean not only that what Indian citizens say or post will be censored by private companies, but those private companies will, in turn, use machines to screen what humans are saying and doing! After all, otherwise, companies would require armies of human censors to screen the millions of posts that are made on Twitter and Facebook every minute.&lt;br /&gt;&lt;br /&gt;But the Supreme Court has held that even the executive arm of government cannot engage in censorship prior to publication, let alone ordering private companies to do so. In any case, it’s a policy that’s bound to fail, for both technical reasons and for its failure to take into account human motivations.&lt;br /&gt;&lt;br /&gt;Machines, as we know, continue to be poor judges of the nuances of human expression and will likely cause massive damage to the idea of public debate. Humans, on the other hand, will begin to circumvent machine filters – for example, content labelled as PRON instead of PORN will go through.&lt;br /&gt;&lt;br /&gt;Draconian crackdown on certain types of fringe content is likely to have the counterproductive result of the general society developing an unhealthy obsession for exactly such content. Despite the comprehensive censorship controls in Saudi Arabia, for instance, pornography consumption is rampant, usually accessed via pirated satellite TV and circulated using personal computing devices and mobile phones.&lt;br /&gt;&lt;br /&gt;But all is not lost yet, perhaps. Faced with the barrage of criticism, Mr Sibal has now called for public consultations on the issue of pre-screening content. There’s hope yet for freedom of speech and expression in India. Thanks to the Internet, a throwback to 1975 simply does not look possible.&lt;/p&gt;
&lt;p&gt;Sunil Abraham is executive director of the Centre for Internet and Society, Bengaluru. He wrote this article in the Deccan Chronicle on December 11, 2011. Read the original &lt;a class="external-link" href="http://www.deccanchronicle.com/node/76807"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/unkindest-cut-mr-sibal'&gt;https://cis-india.org/internet-governance/unkindest-cut-mr-sibal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-12T04:59:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/scrub-the-internet-clean">
    <title>Govt wants to scrub the Internet clean</title>
    <link>https://cis-india.org/news/scrub-the-internet-clean</link>
    <description>
        &lt;b&gt;Web advocacy groups, experts say govt’s move to evolve content guidelines amounts to censorship. This article by Surabhi Agarwal &amp; Leslie D’monte was published in Livemint on 7 December 2011. Sunil Abraham has been quoted in this article.&lt;/b&gt;
        
&lt;p&gt;India, the world’s largest democracy, may force companies such as Google Inc​., Microsoft Corp​., Yahoo Inc. and Facebook Inc​. to take down online content that it deems offensive because they haven’t been able to come up with an effective self-censorship mechanism governing millions of users.&lt;/p&gt;
&lt;p&gt;The Congress-led United Progressive Alliance government had no option but to "evolve guidelines" to ensure that "blasphemous content on the Internet or television is not allowed", with Internet and social networking sites such as those above "failing to respond to and cooperate with" the government’s request to keep "objectionable" content out of their websites, Kapil Sibal, minister of communications and information technology (IT), said in New Delhi on Tuesday.&lt;/p&gt;
&lt;p&gt;His comments unleashed a firestorm of criticism by Internet advocacy groups and experts, who said the move amounted to censorship and was anti-democratic, impractical and unwarranted since existing laws were comprehensive enough to remove "objectionable" content. The move, they argued, would also stem the growth of user-generated content sites, and thus the Internet itself.&lt;/p&gt;
&lt;p&gt;The government has been battling a series of corruption scandals and criticism of its inability to move forward on policy reforms. A campaign against corruption fuelled by online support has also challenged the government’s authority to legislate, forcing its own version of an anti-graft legislation onto the agenda.&lt;/p&gt;
&lt;p&gt;The latest move by the government follows the introduction of new rules to the Information Technology Act, 2008, that were published earlier this year, also heavily criticized, that called on Internet service providers (ISPs) along with other entities to police online postings, including blogs.&lt;/p&gt;
&lt;p&gt;Sibal referred to what he considered objectionable content as a "matter of grave concern", which affects the "sensibility of our people and is against our cultural ethos".&lt;/p&gt;
&lt;p&gt;Once the new policy framework is implemented, companies “will be duty-bound to share information about those who post content, even if it (the content) is posted outside India”. He didn’t say by when the policy would be put in place.&lt;/p&gt;
&lt;p&gt;Discussions with executives from the firms mentioned above had begun in September, Sibal said. They had been asked to come up with solutions to address the perceived problem in a month’s time and had failed to do so, he said.&lt;/p&gt;
&lt;p&gt;According to local media reports, the move follows posts about some senior Congress leaders, including party president Sonia Gandhi​. The minister, who is also one of India’s top lawyers, did not refer to any specific "objectionable" material during his press briefing, but rued that “the content has still not been removed".&lt;/p&gt;
&lt;p&gt;Google India defended the right of free speech, while saying that it didn’t condone illegality.&lt;/p&gt;
&lt;p&gt;"Even where content is legal but breaks our own terms and conditions, we take that down too, once we’ve been notified about it," Google India said in a release. "But it also means that when content is legal but controversial, we don’t remove it because people’s differing views should be respected, so long as they are legal."&lt;/p&gt;
&lt;p&gt;Facebook India also said that it would remove any content that crossed the line.&lt;/p&gt;
&lt;p&gt;It "has policies and onsite features in place that enable people to report abusive content", the company said. "We will remove any content that violates our terms, which are designed to keep material that is hateful, threatening, incites violence or contains nudity off the service."&lt;/p&gt;
&lt;p&gt;While Yahoo India declined to comment, Microsoft did not respond to an email till press time.&lt;/p&gt;
&lt;p&gt;Internet censorship is a rising trend, with approximately 40 countries filtering the Web in varying degrees, including democratic and non-democratic governments. Governments are using increasingly sophisticated censorship and surveillance techniques, including blocking social networks, to restrict a variety of types of content, says the 2010 Global Network Initiative (GNI) report. GNI seeks to protect freedom of speech online.&lt;/p&gt;
&lt;p&gt;This August, for instance, the Centre had written to the department of telecommunications, asking it to "ensure effective monitoring of Twitter and Facebook", which minister of state for communications and IT Milind Deora acknowledged a few days later in a written reply to a question in the Rajya Sabha. He mentioned access to “encrypted data” on social networking sites, but did not elaborate on the subject.&lt;/p&gt;
&lt;p&gt;Currently, the Indian Telegraph Act and the IT Act, 2008, (amendments were introduced in IT Act, 2000) give the government the power to monitor, intercept and even block online conversations and websites. The Centre for Internet and Society (CIS) has put up a list of 11 such websites blocked by a government order. The data was received from the department of information technology (DIT).&lt;/p&gt;
&lt;p&gt;Moreover, under section 79 of the IT Intermediary (Rules and Guidelines), 2011, intermediaries (comprising telcos, ISPs, network services providers, search engines, cyber cafes, Web-hosting companies, online auction portals and online payment sites) are mandated to exercise "due diligence" and advise users not to share/distribute information violative of the law or a person’s privacy and rights. Intermediaries are expected to act on a complaint within 36 hours of receiving it, and remove such content when warranted.&lt;/p&gt;
&lt;p&gt;In case the intermediary doesn’t find the content objectionable, the matter will have to be contested in a court of law.&lt;/p&gt;
&lt;p&gt;"Currently, you need a court of law to direct a company in case something has to be removed. That takes a lot of time. So there has to be a mechanism that is faster in dealing with such content as (it) can be very damaging," said a DIT official, who did not want to be named.&lt;/p&gt;
&lt;p&gt;"The Indian government can, and should, monitor conversations and websites if it believes the content can harm the security, defence, sovereignty and integrity of the country," said Pavan Duggal, a Supreme Court lawyer and cyber law expert. However, he wondered how the government would go about implementing the task of monitoring each and every conversation on an unstructured Internet.&lt;/p&gt;
&lt;p&gt;Bangalore-based CIS, an Internet advocacy group, said "this pre-emptive manual screening of content, if implemented, would sound the death knell of freedom of expression in India".&lt;/p&gt;
&lt;p&gt;"This screening is worrisome. Companies will err on the side of caution in a bid to please the government, and the courts will not be involved," said Sunil Abraham, executive director of CIS. “This is not only unconstitutional, but technically impossible too. Speech and words have nuances. Can humans decipher these with accuracy?"&lt;/p&gt;
&lt;p&gt;The move will undermine key principles on which the Internet was built, said Nikhil Pahwa, editor and publisher of digital industry news and analysis blog MediaNama.&lt;/p&gt;
&lt;p&gt;"It is completely impossible to enforce this. There is no way that content can be prescreened before it is placed online," he said. “It also kills the concept of immediate communication, which the Internet stands for."&lt;/p&gt;
&lt;p&gt;Cyber law expert NA Vijayashankar, who runs cyber law information portal Naavi, said: "The government has valid reason to control anti-national activities on the Internet. But there are existing laws for it. The current proposition is impractical since pre-scrutiny of content on the Internet is not possible. It will affect the growth of user-generated content, which is helping Internet penetration grow in India."&lt;/p&gt;
&lt;p&gt;Internet censorship happens frequently in countries such as Myanmar, Cuba, China (which had blocked keyword searches of the word "Egypt" on the Internet as well as on Weibo, the Chinese equivalent of Twitter), Iran, Egypt and Saudi Arabia. On the very day the Egyptian government set out to block Internet services in the country (in January), US Republican​ senator Susan Collins floated the COICA Bill, popularly called the "kill switch" Bill, which, if approved, would give the US president similar powers.&lt;/p&gt;
&lt;p&gt;Read the original published in Livemint &lt;a class="external-link" href="http://www.livemint.com/2011/12/06222621/Govt-wants-to-scrub-the-Intern.html?atype=tp"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/scrub-the-internet-clean'&gt;https://cis-india.org/news/scrub-the-internet-clean&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-07T04:07:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/right-to-privacy-bill-conference">
    <title>Privacy Matters — Analyzing the "Right to Privacy Bill"</title>
    <link>https://cis-india.org/internet-governance/right-to-privacy-bill-conference</link>
    <description>
        &lt;b&gt;Privacy India in partnership with International Development Research Centre, Canada, Indian Institute of Technology, Bombay, the Godrej Culture Lab, Tata Institute of Social Sciences, Mumbai and the Centre for Internet and Society, Bangalore is organising "Privacy Matters", a public conference at IIT, Bombay on 21 January 2012. &lt;/b&gt;
        
&lt;p&gt;The conference will focus on the questions and dilemmas posed by privacy in India today, with a concentration on the "Right to Privacy Bill". The right to privacy in India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, India does not as yet have a horizontal legislation that deals comprehensively with privacy across all contexts. The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. — people who most need to know that sensitive information is protected.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.privacyindia.org"&gt;Privacy India&lt;/a&gt; was established in 2010 with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. One of our goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, legislators and the legal and academic community.&lt;/p&gt;
&lt;p&gt;The event will focus on discussing the challenges and concerns to privacy in India. We invite you to attend the meeting and contribute your views. Please confirm your participation by getting in touch with Natasha (&lt;a class="external-link" href="mailto:natasha@cis-india.org"&gt;natasha@cis-india.org&lt;/a&gt;). We sincerely hope that you will be able to attend and look forward to your participation.&lt;/p&gt;
&lt;h2&gt;Agenda&lt;br /&gt;&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:30- 10:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00- 10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Welcome- Privacy in India&lt;/strong&gt;&lt;br /&gt;Prashant Iyengar is a practicing lawyer and lead researcher for Privacy India. He will present who Privacy India is, and the objectives of Privacy India's research. His presentation will focus on&lt;br /&gt;discussing privacy in India.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30- 11:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Key Note Address- Draft Privacy Bill Critique&lt;/strong&gt;&lt;br /&gt;Na. Vijayashankar is an e-business consultant. He established the premier Cyber Law information portal in India. He is the founder secretary of Cyber Society of India, Founder Trustee of International Institue of Information Technology Law, and Founder Chairman of Digital Society Foundation. He will present a critique of the Draft Privacy Bill.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15- 11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30- 12:15&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Session I&lt;/h3&gt;
&lt;strong&gt;Privacy and the Legal System&lt;/strong&gt;&lt;br /&gt;Sudhir Krishnaswamy is an Assistant Professor at the National law School of India University and is currently writing a Doctoral Thesis at the Faculty of Law, Oxford University on ‘The Basic Structure Doctrine in Indian Constitutional Adjudication’. His presentation will look at the trajectory of privacy through the years from a legal perspective.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:15- 13:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy and Constitutional Law&lt;/strong&gt;&lt;br /&gt;N. Nappinai is an advocate who specializes in IP and technology laws. She is a founder member of Technology Law Forum (TLF). She has spearheaded and driven several initiatives of TLF with various organization including NASSCOM, FICCI, IMC etc., and has also conducted several workshops and training sessions for the Mumbai Police, Public Prosecutors &amp;amp; Industry verticals in Cyber Laws. Her presentation will define the scope of Article 21 under the Indian Constitution, which protects the right to privacy.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00- 13:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Discussion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:15- 14:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00- 14:45&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Session II&lt;/h3&gt;
&lt;strong&gt;Privacy and Freedom of Expression&lt;/strong&gt;&lt;br /&gt;Apar Gupta is an advocate who specializes in intellectual property, electronic commerce law and technology media and telecoms. He holds a master from Columbia Law School and has authored a Commentary on the Information Technology Act, 2000. His presentation will focus on the limits of a privacy right when it competes and conflicts with the freedom of speech and expression. He will examine certain provisions of the Draft Privacy Bill questioning how privacy arguments may be used to stifle debate or disclosure made in the public interest.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:45- 15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Sexuality Minorities and Privacy&lt;/strong&gt;&lt;br /&gt;Danish Sheikh graduated from Nalsar University of Law with a B.A., LL.B. (Hons.). Currently, he is a researcher at the Alternative Law Forum in Bangalore. He will examine the status of sexual minorities in the light of privacy framework in India. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, he&lt;br /&gt;will bring to light the privacy violations being committed by both individuals as we all state authorities.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-&lt;br /&gt;15:45&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Discussion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:45-&lt;br /&gt;16:30&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Session III&lt;/h3&gt;
&lt;strong&gt;Privacy and National Security&lt;/strong&gt;&lt;br /&gt;Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India and has law degrees from all three schools. Menaka has advised the United National Development Program and the United Nations Development Fund for Women. She will discuss the relationship between national security and privacy, from the perspective of surveillance by the state etc.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-&lt;br /&gt;17:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy and UID&lt;/strong&gt;&lt;br /&gt;R. Ramkumar is a Professor at the Tata Institute of Social Sciences. He is advocate as well as a patent and trademark attorney. His presentation will focus on what standards of privacy are afforded within the UID system.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:15- 17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-&lt;br /&gt;18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Discussion and Questions&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;h2 align="center"&gt;Organizers&lt;/h2&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&amp;nbsp;&lt;img src="https://cis-india.org/home-images/PrivacyIndia.jpg/image_preview" title="Privacy India" height="51" width="124" alt="Privacy India" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;strong&gt;Privacy India&lt;/strong&gt;&lt;br /&gt;Privacy India was established in 2010 with the 
objective of raising awareness, sparking civil action and promoting 
democratic dialogue around privacy challenges and violations in India. 
One of our goals is to build consensus towards the promulgation of 
comprehensive privacy legislation in India through consultations with 
the public, legislators and the legal and academic community.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/PrivacyInternational.jpg/image_preview" title="Privacy International" height="97" width="113" alt="Privacy International" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy International&lt;/strong&gt; (&lt;a class="external-link" href="https://www.privacyinternational.org/"&gt;https://www.privacyinternational.org/&lt;/a&gt;)&lt;br /&gt;Privacy International’s mission is to defend the right to privacy across the world, and to fight surveillance and other intrusions into private life by governments and corporations. PI has been providing citizens and policy-makers with the tools and perspectives to enable them to hold to account those who threaten privacy since 1990. PI has active associates and networks in 46 countries.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/IDRC.jpg/image_preview" title="IDRC" height="47" width="145" alt="IDRC" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;The International Development Research Centre&lt;/strong&gt; (&lt;a class="external-link" href="http://www.idrc.ca/EN/Pages/default.aspx"&gt;www.idrc.ca/&lt;/a&gt;)&lt;br /&gt;Canada’s International Development Research Centre (IDRC) is one of the world’s leading institutions in the generation and application of new knowledge to meet the challenges of international development. They help developing countries use science and technology to find practical, long-term solutions to the social, economic, and environmental problems they face. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/CISlogo1.jpg/image_preview" title="CIS_Logo" height="70" width="184" alt="CIS_Logo" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;The Centre for Internet &amp;amp; Society&lt;/strong&gt; (&lt;a href="https://cis-india.org/" class="external-link"&gt;http://cis-india.org/&lt;/a&gt;)&lt;br /&gt;The Centre for Interenet &amp;amp; Society brings together a team of practitioners, theoreticians, researchers and artists to work on the emerging field of Internet and Society to critically engage with concerns of digital pluralism, public accountability and pedagogic practices, with particular emphasis on South-South dialogues and exchange.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;h2 align="center"&gt;&amp;nbsp;Partners&lt;/h2&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/Godrej.jpg/image_preview" alt="Godrej India Cultural Lab" class="image-inline image-inline" title="Godrej India Cultural Lab" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;The Godrej India Culture Lab&lt;/strong&gt; (&lt;a class="external-link" href="http://www.godrej.com"&gt;www.godrej.com&lt;/a&gt;)&lt;br /&gt;The Godrej India Culture Lab is an interdisciplinary space which aims to build knowledge networks and interpret the changes rapidly taking place in contemporary India by bringing together the best minds from global academia, business and the creative worlds working on different aspects of Indian society.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/IITBombay.jpg/image_preview" title="IIT Bombay" height="142" width="145" alt="IIT Bombay" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;IIT, Bombay&lt;/strong&gt; (&lt;a class="external-link" href="http://www.iitb.ac.in/"&gt;www.iitb.ac.in/&lt;/a&gt;)&lt;br /&gt;Established in 1958, IIT is recognised worldwide as a leader in the field of engineering education and research. It is reputed for the quality of its faculty and the outstanding calibre of students graduating from its undergraduate and postgraduate programmes. Over the years, there has been dynamic progress at IIT Bombay in all academic and research activities, and a parallel improvement in facilities and infrastructure, to keep it on par with the best institutions in the world.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/Tiss.jpg/image_preview" title="Tata Institute of Social Sciences" height="145" width="105" alt="Tata Institute of Social Sciences" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tata Institute of Social Sciences&lt;/strong&gt; (&lt;a class="external-link" href="http://www.tiss.edu/"&gt;http://www.tiss.edu/&lt;/a&gt;)&lt;br /&gt;Tata Institute of Social Sciences (TISS) offers higher professional education in the field of human service and applied social science research. The institute has gone beyond the initial concern of social work education, since its inception in 1936, to consistently contribute to the promotion of sustainable, participatory development and social justice. Through its work, the Institute facilitates strong linkages between education, research, field action and policy advocacy.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Speakers&lt;/h3&gt;
&lt;p&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Apar Gupta&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;Danish
Sheikh,&lt;/strong&gt; Alternative Law Forum&lt;/p&gt;
&lt;p&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;NA
Vijayashankar,&lt;/strong&gt; E-Business Consultant, Founder Secretary of
Cyber Society of India, Founder Trustee of International Institute of
Information Technology Law, and Founder Chairman of Digital Society Foundation&lt;/p&gt;
&lt;p&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;N
S Nappinai,&lt;/strong&gt; Advocate and Founder Member of Technology Law
Forum&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;Prashanth
Iyengar,&lt;/strong&gt; Assistant Professor &amp;amp; Assistant Director,
Centre for Intellectual Property Rights Studies, Lead Researcher with Privacy
India, Bangalore; Legal Aid Manager with Rural Development Institute,
Hyderabad; Researcher &amp;amp; Lawyer with Alternative Law Forum&lt;/p&gt;
&lt;p&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;R.
Ramkumar,&lt;/strong&gt; Assistant Professor, School of Social Sciences,
Tata Institute of Social Sciences&lt;/p&gt;
&lt;p&gt;7.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;Shishir
Jha, &lt;/strong&gt;Project Lead at Creative Commons India and
Associate Professor at Indian Institute of Technology, Bombay&lt;/p&gt;
&lt;p&gt;8.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;Menaka Guruswamy,&lt;/strong&gt;
practices
law at the Supreme Court of India.&lt;/p&gt;
&lt;p&gt;9.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;Sudhir Krishnaswamy, &lt;/strong&gt;is
an Assistant Professor at the National law School of India University.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/analyzing-right-2-privacy-bill.pdf" class="internal-link" title="Analyzing the Right to Privacy Bill"&gt;Download the invitation&lt;/a&gt; [PDF, 988 kb]&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-matters-mumbai.pdf" class="internal-link" title="Privacy Matters — Analyzing the &amp;quot;Right to Privacy Bill&amp;quot; Poster"&gt;Download the event poster&lt;/a&gt; [PDF, 2155 kb]&lt;/li&gt;&lt;li&gt;IIT Bombay Map&lt;a class="external-link" href="http://www.iitb.ac.in/campus/howto/howtoget.html"&gt; http://www.iitb.ac.in/campus/howto/howtoget.html&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLr2ysA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr2ysA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr23oA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr23oA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr3CEA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr3CEA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr3U4A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr3U4A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr71AA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr71AA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr8BsA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr8BsA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr8SMA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr8SMA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr8h8A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr8h8A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/right-to-privacy-bill-conference'&gt;https://cis-india.org/internet-governance/right-to-privacy-bill-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-04-28T04:10:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
