<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 241 to 255.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2018-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2016-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2015-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/sense-and-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2018-newsletter">
    <title>September 2018 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/september-2018-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Highlights&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Wikisource is one of the trending Wikimedia projects. Many new editors and new books to Indic language Wikisource's get added over a period of time. However, new editors as well as existing editors face numerous problems while working with the content online. The Centre for Internet &amp;amp; Society's Access to Knowledge (CIS-A2K) team, to help the editors, has &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities"&gt;created a Wikisource Handbook&lt;/a&gt; for Indian communities. CIS invites feedback to the first draft of this Handbook.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Centre for Internet &amp;amp; Society (CIS) participated in the &lt;a class="external-link" href="https://cis-india.org/a2k/news/5th-global-congress-on-ip-and-the-public-interest"&gt;5th Global Congress on IP and Public Interest&lt;/a&gt; held in Washington in a big way. CIS signed on as a supporting member to the Civil Society Proposal for a Treaty on Education and Research Activities. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Sunil Abraham, &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news"&gt;in an article in the Hindustan Times&lt;/a&gt;, explores what leads to fake news. He has revealed that transparency regulations is the need of the hour especially for election campaigns and political advertising.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Amber Sinha, Elonnai Hickok, Udbhav Tiwari and Arindrajit Basu &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity"&gt;co-authored a blog post which examines cross-border data sharing&lt;/a&gt;. The authors have argued that conventional methods of compelling the presentation of evidence available for investigative agencies often fail when the evidence is not present within the territorial boundaries of the state. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Arindrajit Basu and Elonnai Hickok &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/artificial-intelligence-in-the-governance-sector-in-india"&gt;wrote a blog entry on usage of artificial intelligence&lt;/a&gt; in governance sector in India. As per research though artificial intelligence has the potential to ameliorate structural inefficiencies in governmental functions, the deployment of this technology across sub-sectors is still on the horizons.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Amber Sinha, Elonnai Hickok and Arindrajit Basu produced a &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/ai-in-india-a-policy-agenda"&gt;research paper&lt;/a&gt; on the implications of artificial intelligence in India in various sectors such as health, banking, manufacturing, and governance sectors. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Artificial Intelligence in many ways is in direct conflict with traditional data protection principles and requirements including consent, purpose limitation, data minimization, retention and deletion, accountability, and transparency. Authors Elonnai Hickok and Amber Sinha &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-srikrishna-committee-data-protection-bill-and-artificial-intelligence-in-india"&gt;have explained this in a blog entry&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The researchers@work programme has selected 10 essays, based on an &lt;a href="https://cis-india.org/raw/call-for-essays-offline"&gt;open call&lt;/a&gt; announced in August, engaging with the thematic of "offline". The &lt;a href="https://cis-india.org/raw/essays-on-offline-selected-abstracts"&gt;abstracts of the selected essays&lt;/a&gt; have been published, and the final essays will be published on the upcoming r@w blog.&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Articles&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/hindu-businessline-swaraj-paul-barooah-september-7-2018-indias-post-truth-society"&gt;India’s post-truth society&lt;/a&gt; (Swaraj Paul Barooah; Hindu Businessline; September 7, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-9-2018-digital-native-meme-too"&gt;Digital Native: #MemeToo&lt;/a&gt; (Nishant Shah; Indian Express; September 9, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-23-2018-the-right-words-for-love"&gt;The Right Words for Love&lt;/a&gt; (Nishant Shah; Indian Express; September 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news"&gt;A trust deficit between advertisers and publishers is leading to fake news&lt;/a&gt; (Sunil Abraham; Hindustan Times; September 30, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-30-2018-digital-native-hardly-friends-like-that"&gt;Digital Native: Hardly Friends Like That&lt;/a&gt; (Nishant Shah; Indian Express; September 30, 2018).&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;CIS in the News&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-september-5-2018-surupasree-sarmmah-can-this-curb-your-addiction"&gt;Can this curb your addiction?&lt;/a&gt; (Surupasree Sarmmah; Deccan Herald; September 5, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/medianama-september-7-2018-aroon-deep-why-should-we-talk-to-dunzo-state-regulators-fume-at-liquor-delivery"&gt;'Why should we talk to Dunzo?' State regulators fume at liquor delivery&lt;/a&gt; (Aroon Deep; Medianama; September 7, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/medianama-rana-september-9-2018-namaprivacy-data-protection-authoritys-regulatory-and-enforcement-challenges"&gt;#NAMAprivacy: Data Protection Authority's regulatory and enforcement challenges&lt;/a&gt; (Rana; Medianama; September 9, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-wire-karan-saini-september-12-2018-what-security-breach-the-unchanging-tone-of-uidai-denials"&gt;'What Security Breach?' The Unchanging Tone of UIDAI's Denials&lt;/a&gt; (Karan Saini; The Wire; September 12, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-september-17-2018-haryana-cops-say-internet-shutdowsn-hurt-police-operations"&gt;Haryana Cops Say Internet Shutdowns Hurt Police Operations&lt;/a&gt; (Gopal Sathe; Huffington Post; September 19, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/economic-times-surabhi-agarwal-september-20-2018-find-ways-to-trace-origin-of-messages-govt-to-whatsapp"&gt;Find ways to trace origin of messages: Government to WhatsApp&lt;/a&gt; (Surabhi Aggarwal; Economic Times; September 20, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/himal-south-asian-laxmi-murthy-net-nanny-meets-muscular-law"&gt;Net nanny meets muscular law&lt;/a&gt; (Laxmi Murthy; Himal South Asian; September 26, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/bloomberg-quint-nishant-sharma-september-27-2018-after-sc-setback-fintech-firms-await-clarity-on-aadhaar"&gt;After Supreme Court Setback, Fintech Firms Await Clarity On Aadhaar&lt;/a&gt; (Nishant Sharma; Bloomberg Quint; September 27, 2018).&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Our Access to Knowledge programme currently consists of two projects.  The Pervasive Technologies project, conducted under a grant from the  International Development Research Centre (IDRC), aims to conduct  research on the complex interplay between low-cost pervasive  technologies and intellectual property, in order to encourage the  proliferation and development of such technologies as a social good. The  Wikipedia project, which is under a grant from the Wikimedia  Foundation, is for the growth of Indic language communities and projects  by designing community collaborations and partnerships that recruit and  cultivate new editors and explore innovative approaches to building  projects.&lt;/p&gt;
&lt;h3&gt;Copyright and Patent&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/news/5th-global-congress-on-ip-and-the-public-interest"&gt;5th Global Congress on IP and the Public Interest&lt;/a&gt; (Organized by PublicCitizen, Washington College of Law, American University, O'Neill Institute and the American Assembly, Columbia University; Washington D.C.; September 24 - 29, 2018). Sunil Abraham, Anubha Sinha and Swaraj Paul Barooah were panelists at the event. &lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Wikipedia&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Publication&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities"&gt;Wikisource Handbook for Indian Communities&lt;/a&gt; (Bodhisattwa Mandal and Ananth Subray P. V.; September 19, 2018).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/christ-du-students-enrolls-for-3rd-wikipedia-certificate-course"&gt;Christ (DU) students enrolls for 3rd Wikipedia certificate course&lt;/a&gt; (Ananth Subray; September 23, 2018).&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;strong&gt;Events Organized&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Copyright_Workshop,_New_Delhi_(1-2_September_2018)"&gt;Copyright Workshop&lt;/a&gt; (CIS; New Delhi; September 1 - 2, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Meeting_on_digitization_%26_content_donation_at_Bhandarkar_Oriental_Research_Institute,_Pune"&gt;Meeting on Digitization and Content Donation&lt;/a&gt; (Bhandarkar Oriental Research Institute; Pune; September 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Orientation_session_on_Sanskrit_Wikipedia_at_Tilak_Maharashtra_Vidyapeeth"&gt;Orientation session on Sanskrit Wikipedia&lt;/a&gt; (Tilak Maharashtra Vidyapeeth; Pune; September 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Workshop_on_FOSS,_Unicode_%26_Wikimedia_Projects_for_Publishers,_Printers,_designers_%26_writers"&gt;Workshop on FOSS, Unicode &amp;amp; Wikimedia Projects for Publishers, Printers, Designers and Writers&lt;/a&gt; (Fergusson College; Pune; September 7, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Workshop_in_MKCL_regarding_Vanbodh_project_with_TRTI"&gt;Workshop in MKCL regarding Vanbodh Project with TRTI&lt;/a&gt; (Maharashtra Knowledge Corporation Limited; Mumbai; September 11, 2018).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;As part of its research on privacy and free speech, CIS is engaged with  two different projects. The first one (under a grant from Privacy  International and IDRC) is on surveillance and freedom of expression  (SAFEGUARDS). The second one (under a grant from MacArthur Foundation)  is on restrictions that the Indian government has placed on freedom of  expression online.&lt;/p&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Research Papers&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-srikrishna-committee-data-protection-bill-and-artificial-intelligence-in-india"&gt;The Srikrishna Committee Data Protection Bill and Artificial Intelligence in India&lt;/a&gt; (Amber Sinha and Elonnai Hickok; September 3, 2018).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/ai-in-india-a-policy-agenda"&gt;AI in India: A Policy Agenda&lt;/a&gt; (Amber Sinha, Elonnai Hickok and Arindrajit Basu; September 5, 2018).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/artificial-intelligence-in-the-governance-sector-in-india"&gt;Artificial Intelligence in the Governance Sector in India&lt;/a&gt; (Arindrajit Basu and Elonnai Hickok; edited by Amber Sinha, Pranav MB and Vishnu Ramachandran; ecosystem mapping by Shweta Mohandas and Anamika Kundu; September 14, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cross-border-data-sharing-and-india-a-study-in-processes-content-and-capacity"&gt;Cross-Border Data Sharing and India: A study in Processes, Content and Capacity&lt;/a&gt; (Amber Sinha, Elonnai Hickok, Udbhav Tiwari and Arindrajit Basu; September 27, 2018).&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/takshashilas-online-cogitatum-on-ai-and-ethics-in-india"&gt;Online Cogitatum on AI and Ethics in India&lt;/a&gt; (Organized by Takshashila; Takshashila Institution; August 27, 2018). Elonnai Hickok participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/conference-on-data-protection"&gt;Conference on Data Protection&lt;/a&gt; (Organized by National Institute of Public Finance and Policy; New Delhi; September 4, 2018). Sunil Abraham and Amber Sinha were discussant in the session Disclosures in Privacy Policies: Does Consent Work?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/symposium-on-data-privacy-and-citizens-rights"&gt;Symposium on Data Privacy and Citizen's Rights&lt;/a&gt; (Organized by Tech Law Forum of NALSAR University of Law; Hyderabad; September 9, 2018).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/gender-and-privacy-countering-the-patriarchal-gaze"&gt;Gender and Privacy: Countering the Patriarchal Gaze&lt;/a&gt; (Organized by Privacy International; United Kingdom; September 13 - 14, 2018).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/meeting-of-information-systems-security-and-biometrics-sectional-committee"&gt;Meeting of Information Systems Security and Biometrics Sectional Committee&lt;/a&gt; (Organized by Bureau of Indian Standards; New Delhi; September 14, 2018).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/forecasting-the-implications-of-the-cloud-act-around-the-world"&gt;Forecasting the Implications of the CLOUD Act Around the World&lt;/a&gt; (Organized by Global Network Initiative; Russell Senate Office Building, Washington D.C.; September 18, 2018). Elonnai Hickok was a speaker.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/networked-economies-and-gender-action-learning"&gt;Networked Economies and Gender Action Learning&lt;/a&gt; (Organized by IDRC and facilitated by Gender at Work; Ottawa; September 20 - 21, 2018). Elonnai Hickok, Sunil Abraham and Ambika Tandon participated in the meeting. Sunil Abraham, Swaraj Paul Barooah and Ambika Tandon also attended a workshop on Gender Action Learning on September 24 - 25, 2018, which discussed strategies to work on gender under a grant for Cyber Policy Centres.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/sflc-round-table-discussion-on-personal-data-protection-bill"&gt;Round Table Discussion on Personal Data Protection Bill&lt;/a&gt; (Organized by SFLC; Bengaluru; September 25, 2018). Shweta Mohandas participated in the event and moderated the first session on Data Protection Principles (Rights and Obligations). &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Cyber Security&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/symposium-on-india2019s-cyber-strategy"&gt;Symposium on India’s Cyber Strategy&lt;/a&gt; (India Habitat Centre, New Delhi; August 31, 2018).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing"&gt;Cyber-Security in the Age of Smart Manufacturing&lt;/a&gt; (Organized by Federation of Indian Chamber of Commerce &amp;amp; industry (FICCI) in association with Karnataka Innovation and Technology Society, and Government of Karnataka; The Lalit Ashok, Bengaluru; September 26, 2018). Arindrajit Basu attended the event.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;a class="external-link" href="http://cis-india.org/raw"&gt;researchers@work&lt;/a&gt;&lt;br /&gt;&lt;span style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt;The  researchers@Work (r@w)  programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/christ-du-students-enrolls-for-3rd-wikipedia-certificate-course"&gt;Essays on 'Offline' - Selected Abstracts&lt;/a&gt; (P.P. Sneha; September 6, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-9-2018-digital-native-meme-too"&gt;Digital Native: #MemeToo&lt;/a&gt; (Nishant Shah; Indian Express; September 9, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-23-2018-the-right-words-for-love"&gt;The Right Words for Love&lt;/a&gt; (Nishant Shah; Indian Express; September 23, 2018).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-30-2018-digital-native-hardly-friends-like-that"&gt;Digital Native: Hardly Friends Like That&lt;/a&gt; (Nishant Shah; Indian Express; September 30, 2018).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/plenary-talk-at-jyothi-nivas-college-research-symposium"&gt;Plenary Talk at Jyothi Nivas College Research Symposium&lt;/a&gt; (Organized by Jyoti Nivas College; Bangalore; September 28, 2018). P.P. Sneha made a presentation on presentation on new reading and writing practices in the digital context.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;span style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and  Society (CIS) is a non-profit organisation that undertakes  interdisciplinary research on internet and digital technologies from  policy and academic perspectives. The areas of focus include digital  accessibility for persons with disabilities, access to knowledge,  intellectual property rights, openness (including open data, free and  open source software, open standards, open access, open educational  resources, and open video), internet governance, telecommunication  reform, digital privacy, and cyber-security. The academic research at  CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet!  Write a cheque in favour of 'The Centre for Internet and Society' and  mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru -  5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify;"&gt;We invite researchers, practitioners, artists, and theoreticians,  both organisationally and as individuals, to engage with us on topics  related internet and society, and improve our collective understanding  of this field. To discuss such possibilities, please write to Sunil  Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for  academic research), with an indication of the form and the content of  the collaboration you might be interested in. To discuss collaborations  on Indic language Wikipedia projects, write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded  by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for  its core funding and support for most of its projects. CIS is also  grateful to its other donors, Wikimedia Foundation, Ford Foundation,  Privacy International, UK, Hans Foundation, MacArthur Foundation, and  IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2018-newsletter'&gt;https://cis-india.org/about/newsletters/september-2018-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-16T06:28:42Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2017-newsletter">
    <title>September 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/september-2017-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;CIS filed a request under the Right to Information Act in March 2016 as part of research for the paper: Patent Working Requirements and Complex Products: An Empirical Assessment of India's Form 27 Practice and Compliance (July 2017). Rohini Lakshané has &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-march-2016"&gt;captured the developments in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Last​ ​month’s​ ​judgment​ ​by​ ​the​ ​nine​ ​judge​ ​referral​ ​bench​ ​was​ ​an​ ​emphatic endorsement​ ​of​ ​the​ ​the​ ​constitutional​ ​right​ ​to​ ​privacy. Amber Sinha has dissected the various aspects of the right to privacy as put forth by the nine judge constitutional bench in the Puttaswamy matter. The papers on fundamental right to privacy can be &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"&gt;accessed here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;With offline as the theme of the third Internet Researchers' Conference (IRC18), CIS has &lt;a class="external-link" href="https://cis-india.org/raw/posts"&gt;invited teams of two or more members to submit sessions proposals&lt;/a&gt; by Sunday, October 22, 2017. The conference is expected to be held in Himachal Pradesh during February 22-24, 2018. The venue and dates will be confirmed soon.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Anonymity-based internet apps like Sarahah may not be as vicious for those surrounded by the comfort of social status. If your experience of Sarahah has been positive, it might be good to reflect on your own cultural and social capital, &lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-10-2017-digital-native-what-s-in-a-name-privilege"&gt;wrote Nishant Shah in an article in the Indian Express&lt;/a&gt;, dated September 10, 2017.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS in the news:&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cnn-tech-august-29-2017-rishi-iyengar-privacy-is-now-a-right-in-india"&gt;Privacy is now a right in India. Here's what that means for the tech industry&lt;/a&gt; (Rishi Iyengar; CNN Tech; August 29, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-russian-social-network-vkontakte-temporarily-blocked-in-india-for-blue-whale-threat"&gt;Russian social network VKontakte temporarily blocked in India for Blue Whale threat&lt;/a&gt; (Kim Arora; The Times of India; September 12, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Pervasive Technologies&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-march-2016"&gt;RTI request to Indian Patents Office for Form 27&lt;/a&gt; (Statement of Working of patents), March 2016 (Rohini Lakshané; September 9, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-2015"&gt;RTI request to Indian Patents Office for Form 27&lt;/a&gt; (Statement of Working of patents), 2015 (Rohini Lakshané; September 9, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;Our  work in the Openness programme   focuses on open data, especially open  government data, open access,  open  education resources, open knowledge  in Indic languages, open  media, and  open technologies and standards -  hardware and software. We  approach  openness as a cross-cutting  principle for knowledge  production and  distribution, and not as a  thing-in-itself.&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/openness/news/praja-enhancing-democracy-through-access-to-open-data-what-are-the-roles-of-government-and-civil-society-delhi-sep-08"&gt;Praja - Enhancing Democracy Through Access to Open Data: What Are the Roles of Government and Civil Society?&lt;/a&gt; (Organized by Praja; September 8, 2017; New Delhi). Sumandro Chattapadhyay was a speaker.&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/rethinking-national-privacy-principles"&gt;Rethinking National Privacy Principles: Evaluating Principles for India's Proposed Data Protection Law&lt;/a&gt; (Amber Sinha; September 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"&gt;The Fundamental Right to Privacy: An Analysis&lt;/a&gt; (Amber Sinha; September 27, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p&gt;►Big Data&lt;/p&gt;
&lt;strong&gt;Upcoming Event&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things"&gt;Emerging Issues in the Internet of Things&lt;/a&gt; (CIS, Bangalore; October 23, 2017). Andrew Rens will give a talk on the research that he is doing at the Internet Governance Lab. &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; &lt;/strong&gt;CIS is involved in promoting access and accessibility to   telecommunications services and resources, and has provided inputs to   ongoing policy discussions 	and consultation papers published by TRAI.   It has prepared reports on unlicensed spectrum and accessibility of   mobile phones for persons with disabilities 	and also works with the   USOF to include funding projects for persons with disabilities in its   mandate:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-september-8-2017-revamp-telecom-sector-and-revive-the-economy"&gt;Revamp Telecom Sector &amp;amp; Revive The Economy&lt;/a&gt; (Shyam Ponappa; Business Standard; September 7, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-10-2017-digital-native-what-s-in-a-name-privilege"&gt;Digital native: What’s in a name? Privilege&lt;/a&gt; (Indian Express, September 10, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Announcement &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/irc18-offline-call"&gt;Internet Researchers' Conference 2018&lt;/a&gt; (IRC18): Offline - Call for Session (P.P. Sneha; September 20, 2017). Teams of two or more members to submit sessions proposals by Sunday, October 22, 2017.&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Blog Entry&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/the-digital-humanities-from-father-busa-to-edward-snowden"&gt;The Digital Humanities from Father Busa to Edward Snowden&lt;/a&gt; (P.P. Sneha; September 4, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2017-newsletter'&gt;https://cis-india.org/about/newsletters/september-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-11-21T15:19:25Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2016-newsletter">
    <title>September 2016 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/september-2016-newsletter</link>
    <description>
        &lt;b&gt;Welcome to the September 2016 newsletter of the Centre for Internet and Society (CIS). &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thank you for reading the Centre for Internet and Society's September newsletter. The past month was notable for the media presence that various CIS members had. Dr. Nirmita Narasimhan continued our work looking at the inaccessibility of everyday electronics with a piece in the Huffington Post about mobile applications and their low usability for persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Ting-Yi Chang continued her research into the gender gap in Wikipedia, with a series of blog posts looking at the various movements and discoveries she has made about the Indian and the global context.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We are also happy to announce that CIS, in partnership with the Centre for Information Technology and Public Policy, will organize the second Internet Researchers' Conference next year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;CIS in partnership with Centre for Information Technology and Public Policy will &lt;a class="external-link" href="http://cis-india.org/raw/irc17-call"&gt;organize the second Internet Researchers' Conference&lt;/a&gt; (IRC17) from March 3 - 5, 2017 at the International Institute of Information Technology in Bengaluru. It is a free and open conference. Sessions must be proposed by teams of two or more members on or before Friday, October 21, 2016. All submitted session proposals will go though an open review process, followed by each team that has proposed a session being invited to select ten sessions of their choice to be included in the Conference agenda. Final sessions will be chosen through these votes, and be announced on January 2, 2017.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In an &lt;a class="external-link" href="http://cis-india.org/accessibility/blog/huffington-post-september-22-2016-nirmita-narasimhan-mobile-apps-are-excluding-millions-of-indians-who-want-to-use-them"&gt;article published in the Huffington Post&lt;/a&gt;, Nirmita Narasimhan threw light on the fact that mobile applications which today form an essential part of our lives such as booking cabs, ordering groceries, making payments online, or simply connecting to friends are still excluding millions of people in India particularly the visually impaired who want to use them. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rohini Lakshané&amp;nbsp; has published a methodology to &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/methodology-statements-of-working-form-27-of-indian-mobile-device-patents" target="_blank"&gt;answer the research questions&lt;/a&gt; pertaining to working statements of mobile technology patents in India,  also known as Form 27, using the granted patents from the landscape. &lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In furtherance to the Wikimedia Foundation’s 2011 editor survey which revealed gender imbalance on online encyclopaedia, Ting-Yi Chang in a &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-1"&gt;blog post series (of three parts)&lt;/a&gt; has summarized the movements and discoveries about Wikipedia gender gap on both local (India) and global scales. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;In an &lt;a class="external-link" href="http://cis-india.org/openness/dna-september-17-2016-subhashish-panigrahi-software-freedom-day-importance-of-free-and-open-source-software"&gt;article published in the DNA&lt;/a&gt;, Subhashish Panigrahi has explained the concepts of FOSS, Free Software, Open Source, and FLOSS in light of the Software Freedom Day celebrated every year. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Pranesh Prakash in a response note to Unique Identification Authority of India’s (UIDAI) reply to Hans Verghese Mathews' article titled “Flaws in the UIDAI Process” (EPW, March 12, 2016) has noted that UIDAI do not illustrate the extent to which the false positive identification rates is expected to grow—neither in their initial paper, nor in their rebuttal to Mathews—whereas Mathews provides a method of estimating the increase of false positive identification rates. The article by Pranesh was &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw"&gt;published in the Economic &amp;amp; Political Weekly&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;CIS &lt;a class="external-link" href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;made a submission to the Telecom Regulatory Authority of India&lt;/a&gt; (TRAI) on Proliferation of Broadband through Public Wi­Fi Networks. Through comments prepared by Sunil Abraham, Sharath Chandra Ram, Vidushi Marda, and Thejaswi Melarkode, CIS pointed out that Wi-Fi, a radio transceiver must be deregulated further to bridge India's digital divide.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS in the news:&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents"&gt;Talking Point: Futile Battle Against Torrents&lt;/a&gt; (Deccan Herald; September 1, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act"&gt;Despite SC order, thousands booked under scrapped Sec 66A of IT Act&lt;/a&gt; (Aloke Tikku; Hindustan Times; September 7, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork"&gt;The DigiLocker was supposed to cut down paperwork but less than 0.1% of Indians are using it&lt;/a&gt; (Mayank Jain; Scroll.in; September 12, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases"&gt;How does the government track all its legal cases?&lt;/a&gt; (Shreeja Sen; Livemint; September 13, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content"&gt;SpaceX Explosion Slows Facebook &amp;amp; Israeli Efforts To Control Online Content&lt;/a&gt; (Kit O' Connell; Mint Press News; September 13, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms"&gt;India's Aadhaar mandate for smartphone makers may rile global firms&lt;/a&gt; (Alnoor Peermohammed; Business Standard; September 14, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/spicy-ip-september-19-2016-prof-colleen-v-chien-and-prof-jorge-l-contreras-made-in-india-innovation-policy"&gt;“Made in India” Innovation Policy&lt;/a&gt; (Prof. Collen Chien and Prof. Contreras; SpicyIP; September 19, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks"&gt;Is India Prepared for a Cyber Attack?&lt;/a&gt; Suckfly And Other Past Responses Say No (Sushil Kambampati; September 21, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/livemint-september-23-2016-vidhi-choudhary-to-embed-a-tweet-or-not"&gt;To embed a tweet or not?&lt;/a&gt; (Vidhi Choudhary; Livemint; September 23, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law"&gt;WhatsApp ruling: Experts seek privacy law&lt;/a&gt; (Apurva Venkat and Moulishree Srivastava; Business Standard; September 24, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/times-of-india-september-25-2016-manju-vi-when-the-war-is-on-whatsapp"&gt;When the war’s on WhatsApp&lt;/a&gt; (Manju V.; The Times of India; September 25, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;CIS members wrote the following articles&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs"&gt;Internet Rights and Wrongs&lt;/a&gt; (Pranesh Prakash; India Today; September 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/business-standard-september-1-2016-shyam-ponappa-digital-india-needs-these-policy-changes"&gt;Digital India Needs These Policy Changes&lt;/a&gt; (Shyam Ponappa; Business Standard and Organizing India Blogspot; September 1, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw"&gt;Glaring Errors in UIDAI's Rebuttal&lt;/a&gt; (Pranesh Prakash; Economic &amp;amp; Political Weekly; Vol. 51, Issue No. 36; September 3, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-september-3-2016-nishant-shah-quarter-life-crisis-the-world-wide-web-turns-25-this-year"&gt;Quarter Life Crisis: The World Wide Web turns 25 this year&lt;/a&gt; (Nishant Shah; Indian Express; September 3, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime"&gt;Indians Ask: Is Visiting a Torrent Site Really A Crime?&lt;/a&gt; (Subhashish Panigrahi; Global Voices; September 5, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/ammanudi-september-6-2016-making-telugu-suitable-for-internet"&gt;Making Telugu Suitable for Internet&lt;/a&gt; (Rahmanuddin Shaik; Ammanudi; September 6, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/spicy-ip-september-7-2016-anubha-sinha-where-is-the-regional-comprehensive-economic-partnership-headed"&gt;Where is the Regional Comprehensive Economic Partnership Headed?&lt;/a&gt; (Anubha Sinha; Spicy IP; September 12, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/dna-september-17-2016-subhashish-panigrahi-software-freedom-day-importance-of-free-and-open-source-software"&gt;Software Freedom Day: The Importance of Free and Open Source Software&lt;/a&gt; (Subhashish Panigrahi; DNA; September 17, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/samaja-september-17-2016-subhashish-panigrahi-let-us-write-our-code-in-our-own-hands"&gt;ଆମ ହାତେ ଆମ କୋଡ୍ ଲେଖିବା&lt;/a&gt; (Subhashish Panigrahi; Samaja; September 17, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/global-voices-september-17-2016-subhashish-panigrahi-it-is-september-and-that-means-it-is-time-for-software-freedom-day"&gt;It's September, and That Means It's Time for Software Freedom Day&lt;/a&gt; (Subhashish Panigrahi; Global Voices; September 17, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-september-18-2016-who-owns-your-phone"&gt;Who Owns Your Phone?&lt;/a&gt; (Nishant Shah; Indian Express; September 18, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/huffington-post-september-22-2016-nirmita-narasimhan-mobile-apps-are-excluding-millions-of-indians-who-want-to-use-them"&gt;Mobile Apps Are Excluding Millions Of Indians Who Want To Use Them&lt;/a&gt; (Nirmita Narasimhan; Huffington Post; September 22, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/the-wire-anubha-sinha-september-23-2016-delhi-high-court-ruling-against-publishers-is-a-triumph-for-knowledge"&gt;Delhi High Court’s Ruling Against Publishers is a Triumph For Knowledge&lt;/a&gt; (Anubha Sinha; September 23, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Jobs&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS is presently seeking applications for the following positions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/jobs/policy-officer-cyber-security"&gt;Policy Officer (Cyber Security)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/jobs/senior-policy-officer-cyber-security"&gt;Senior Policy Officer (Cyber Security)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a class="internal-link" href="http://cis-india.org/jobs/cis-a2k-programme-officer"&gt;Programme Officer (Communications)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a class="internal-link" href="http://cis-india.org/jobs/intern-for-pervasive-technologies-project"&gt;Intern (Pervasive Technologies Project)&lt;/a&gt; - Application accepted throughout the year&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/jobs/internship"&gt;Internship&lt;/a&gt; - Application accepted throughout the year&lt;/li&gt;
&lt;li&gt;&lt;a class="internal-link" href="http://cis-india.org/jobs/seeking-survey-participants-for-research-on-musician-livelihood"&gt;Survey Participants for Research on Musician Livelihood&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;-------------------------------------&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility &amp;amp; Inclusion&lt;/a&gt; &lt;br /&gt; ------------------------------------- 	&lt;br /&gt; India has an estimated 70 million persons with disabilities who don't    have access to read printed materials due to some form of physical,    sensory, 	cognitive or other disability. As part of our endeavour to    make available accessible content for persons with disabilities, we are    developing a text-to-speech software in 15 languages with support from    the Hans Foundation. The progress made so far in the project can be    accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Monthly Report&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/accessibility/blog/september-2016-report.pdf"&gt;September 2016 Report&lt;/a&gt; (Suman Dogra; August 31, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Copyright and Patent&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/methodology-statements-of-working-form-27-of-indian-mobile-device-patents"&gt;Methodology: Statements of Working (Form 27) of Indian Mobile Device Patents&lt;/a&gt; (Rohini Lakshané; September 14, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/workshop-on-innovation-economic-development-and-ip-in-india-and-china"&gt;Workshop on Innovation, Economic Development and IP in India and China&lt;/a&gt; (Organised by the Singapore Management University, O.P. Jindal Global University, and Renmin University of China; New Delhi; September 27 - 28, 2016). Anubha Sinha made a presentation on Investigating Limits to Innovation and Peer Production in India's Mobile Apps Economy. Rohini Lakshané made a presentation on Exploring Open Hardware in Mass Produced Mobile Phones. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/law-and-economy-policy-conference-2016"&gt;Law and Economy Policy Conference 2016&lt;/a&gt; (Organized by National Institute of Public Finance and Policy and Institute of New Economic Thinking; India Habitat Centre, New Delhi; September 28 - 30, 2016). Sunil Abraham served as a discussant on the "Towards a privacy framework for India" session of this conference.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by    organizing more than 100 outreach events and catalysed the release of    encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0)    license in four Indian languages (21 books in Telugu, 13 in Odia, 4    volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book    on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/wikiwomen2019s-meetup-at-st-agnes-college-explores-potentials-and-plans-of-women-editors-in-mangalore-karnataka"&gt;Wikiwomen’s Meetup at St. Agnes College Explores Potentials and Plans of Women Editors in Mangalore, Karnataka&lt;/a&gt; (Ting-Yi Chang; September 1, 2016).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/openness/a-workshop-to-improve-telugu-wikipedia-articles-on-nobel-laureates"&gt;A workshop to improve Telugu Wikipedia articles on Nobel laureates&lt;/a&gt; (Pavan Santhosh; September 12, 2016).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Another 5 Years: What Have We Learned about the Wikipedia Gender Gap and What Has Been Done? (&lt;a class="external-link" href="http://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-1"&gt;Part 1&lt;/a&gt;, &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-2"&gt;Part 2&lt;/a&gt; and &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3"&gt;Part 3&lt;/a&gt;; Ting-Yi Chang; September 18, 2016).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/openness/software-freedom-day"&gt;ସଫ୍ଟଓଏର ସ୍ୱାଧୀନତା ଦିବସ: ଆମ ହାତେ ଆମ କୋଡ଼ ଲେଖିବା&lt;/a&gt; (Subhashish Panigrahi; September 18, 2016). The blog post was mirrored in &lt;a class="external-link" href="https://odia.yourstory.com/read/b3b56fd08a/-?c=16"&gt;Your Story&lt;/a&gt;, &lt;a class="external-link" href="http://www.odishastory.com/odia/2016/09/software-freedom/"&gt;Odisha Story&lt;/a&gt; and &lt;a class="external-link" href="http://aajiraodisha.org/software-freedom/"&gt;Aajira Odisha&lt;/a&gt; on September 17, 2016. The originally published piece can be &lt;a class="external-link" href="http://psubhashish.com/post/150524560200/sfd"&gt;accessed here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/campaign-for-relicensing-copyrighted-books-under-creative-commons-licenses"&gt;Campaign for relicensing copyrighted books under Creative Commons licenses&lt;/a&gt; (Pavan Santhosh S. &amp;amp; Subhashish Panigrahi; September 20, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;Our  work in the Openness programme   focuses on open data, especially open  government data, open access,  open  education resources, open knowledge  in Indic languages, open  media, and  open technologies and standards -  hardware and software. We  approach  openness as a cross-cutting  principle for knowledge  production and  distribution, and not as a  thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Submission&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016"&gt;Comments on the Telangana State Open Data Policy 2016&lt;/a&gt; (Sumandro Chattapadhyay; September 1, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/fuel-gilt-conference-2016"&gt;Fuel Gilt Conference 2016&lt;/a&gt; (Organized by Fuel Project; New Delhi; September 24 - 25, 2016). Subhashish Panigrahi participated and made a presentation.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Participation in Events&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data"&gt;The Future of Privacy in the Age of Big Data&lt;/a&gt; (Organized by Friedrich Naumann Foundation for Freedom; September 3 - 10, 2016; Berlin and Hamburg). Vanya Rakesh was one of the participants from South Asia.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/litd-17-committee-bureau-of-indian-standards-meeting"&gt;LITD 17 Committee, Bureau of Indian Standards Meeting&lt;/a&gt; (Organized by Bureau of Indian Standards; September 23, 2016; Bengaluru). Vanya Rakesh attended the meeting. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;►Big Data&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016"&gt;Young Scholars' Programme, CPRSouth 2016&lt;/a&gt; (Organized by Communication Policy Research South; September 6 - 7, 2016; Zanzibar). Rohini Lakshané participated in this programme. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;►Cyber Security&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition"&gt;CYFY 2016 - The India Conference on Cyber Security and Internet Governance&lt;/a&gt; (Organized by Observer Research Foundation; September 28 - 30, 2016; New Delhi). Sunil Abraham was a speaker.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;strong&gt;----------------------------------- 	&lt;br /&gt;&lt;/strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; &lt;/strong&gt;CIS is involved in promoting access and accessibility to   telecommunications services and resources, and has provided inputs to   ongoing policy discussions 	and consultation papers published by TRAI.   It has prepared reports on unlicensed spectrum and accessibility of   mobile phones for persons with disabilities 	and also works with the   USOF to include funding projects for persons with disabilities in its   mandate:&lt;/p&gt;
&lt;p&gt;Submission&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/telecom/blog/cis-submission-to-trai-consultation-on-proliferation-of-broadband-through-public-wifi-networks"&gt;TRAI Consultation on Proliferation of Broadband through Public Wi­Fi Networks&lt;/a&gt; (Sunil Abraham, Sharath Chandra Ram, Vidushi Marda, and Thejaswi Melarkode; September 1, 2016). Shyam Ponappa and Arjun Venkatraman provided inputs.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/7-ways-to-con-fuse-the-internet-with-analogy-intergalactic-mix-talk-by-surfatial-september-26-6-pm"&gt;7 Ways to Con/fuse the Internet with Analogy (Intergalactic Mix) - Talk by Surfatial&lt;/a&gt; (CIS, Bangalore; September 26, 2016). Surfatial, a trans-local collective that works with text and sound gave a talk about their essay.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/iirc-reflections-on-irc16"&gt;IIRC: Reflections on IRC16&lt;/a&gt; (Sumandro Chattapadhyay; September 6, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/irc17-call"&gt;Internet Researchers' Conference 2017&lt;/a&gt; (IRC17) - Call for Sessions (Sumandro Chattapadhyay; September 23, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/blog_how-green-is-the-internet-the-good-the-bad-and-the-ugly"&gt;How Green is the Internet? The Good, the Bad, and the Ugly&lt;/a&gt; (Aishwarya Panicker; September 23, 2016).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/blog_mobilizing-online-consensus-net-neutrality-and-the-india-subreddit"&gt;Mobilizing Online Consensus: Net Neutrality and the India Subreddit&lt;/a&gt; (Sujeet George; September 27, 2016).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/sequoia-india-designathon-2016"&gt;Designathon 2016 &lt;/a&gt;(Organized by Sequoia India; Bangalore; September 10 - 11, 2016). &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/raw/iiit-delhi-workshop-on-center-for-it-and-society"&gt;Workshop on Center for IT and Society&lt;/a&gt; (Organized by IIIT, Delhi; September 17, 2016). Sumandro Chattapadhyay participated in the event.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2016-newsletter'&gt;https://cis-india.org/about/newsletters/september-2016-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Newsletter</dc:subject>
    

   <dc:date>2017-02-06T12:51:22Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2015-bulletin">
    <title>September 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2015-bulletin</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We are happy to share with you the ninth issue of the Centre for Internet and Society (CIS) newsletter (September 2015). It has been a significant month for public debates on the digital future of governance, citizenship, and economy in India, led by conversations around the draft National Encryption Policy, the Aadhaar number as a basis for provision of welfare services, the investigation of Google for potential abuse of market dominance by the Competition Commission of India, and the Guidelines for Examination of Computer Related Inventions released by the Indian Patents Office. We were busy engaging with these issues, and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The past editions of the newsletter can be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sumandro Chattapadhyay, Research Director&lt;/p&gt;
&lt;blockquote&gt;&lt;b&gt;&lt;a href="http://cis-india.org/raw/irc16-call"&gt;Internet Researchers' Conference (IRC) 2016 - Studying Internet in India&lt;/a&gt;&lt;/b&gt;&lt;br /&gt; With great excitement, we are announcing the beginning of an annual conference series titled Internet Researchers' Conference (IRC), the first edition of which is to take place in Delhi during February 25-27, 2016 (yet to be confirmed). We invite you to propose sessions for the conference by Sunday, November 15, 2015.&lt;/blockquote&gt;
&lt;p&gt; &lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS sent an &lt;a href="http://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015"&gt;Open Letter&lt;/a&gt; to Prime Minister Narendra Modi during his US visit, requesting him to urge USA to ratify the Marrakesh Treaty.&lt;/li&gt;
&lt;li&gt;During the month, NVDA team organized training programmes for the visually impaired at &lt;a href="http://cis-india.org/accessibility/blog/espeak-training-in-hindi-language-1"&gt;Kullu&lt;/a&gt;, &lt;a href="http://cis-india.org/accessibility/blog/report-on-5-day-tot-for-training-in-use-of-espeak-kannada-with-nvda"&gt;Bangalore&lt;/a&gt; and &lt;a href="http://cis-india.org/accessibility/blog/report-on-the-training-in-the-use-of-espeak-hindi-with-nvda"&gt;Ranchi&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Nehaa Chaudhari in a &lt;a href="http://cis-india.org/a2k/blogs/pervasive-technologies-working-document-series-research-questions-and-a-literature-review-on-actor-network-theory"&gt;blog post&lt;/a&gt; laid out a series of research questions, potentially seeking to apply actor-network theory as a research methodology.&lt;/li&gt;
&lt;li&gt;Recently, the Indian Patents Office released the Guidelines for  Examination of Computer Related Inventions (“2015 Guidelines/  Guidelines”) in an attempt to clarify examination of software related  patents in India. Anubha Sinha &lt;a href="http://cis-india.org/a2k/blogs/comments-on-the-guidelines-for-examination-of-computer-related-inventions-cris"&gt;analysed the 2015 Guidelines&lt;/a&gt;.  Read on to understand how the new guidelines will potentially lead to  an increase in software patenting activity by expanding the scope of  patentable subject matter – in negation of the legislative intent of  section 3(k) of the Indian Patents Act, 1970.&lt;/li&gt;
&lt;li&gt;As a part of its content donation initiative, &lt;a href="http://cis-india.org/a2k/blogs/cis-brings-nadustunna-charithra-magazine-under-by-cc-by-sa-licence"&gt;CIS has brought Nadustunna Charithra magazine under CC BY SA licence&lt;/a&gt;. CIS-A2K has received 74 issues as of now from the Telugu Jaati foundation.&lt;/li&gt;
&lt;li&gt;Sunil Abraham’s article titled Hits and Misses with the Draft Encryption Policy was published in &lt;a href="http://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy"&gt;The Wire&lt;/a&gt; on September 26, 2015.&lt;/li&gt;
&lt;li&gt;Vidushi Marda in a blog post titled &lt;a href="http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"&gt;Data Flow in the Unique Identification Scheme of India&lt;/a&gt; analysed the data flow within the UID scheme and highlighted the vulnerabilities at each stage.&lt;/li&gt;
&lt;li&gt;Vanya Rakesh in a blog post titled &lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015"&gt;Human DNA Profiling Bill 2012 v/s 2015 Bill&lt;/a&gt; has analysed the Human DNA Profiling Bill introduced in 2012 with the provisions of the 2015 Bill.&lt;/li&gt;
&lt;li&gt;CIS sought information from ICANN on their revenue streams by  sending them a second request under their Documentary Information  Disclosure Policy. This request and their response have been &lt;a href="http://cis-india.org/internet-governance/blog/didp-request-12-revenues"&gt;described in a blog post&lt;/a&gt; by Aditya Garg.&lt;/li&gt;
&lt;li&gt;CIS has &lt;a href="http://cis-india.org/raw/wheres-my-data-submission-for-knight-news-challenge-2015"&gt;submitted a joint proposal&lt;/a&gt; with DataMeet and Oorvani for the Knight News Challenge 2015. We are  proposing the development of "an application for users to search for  locally-relevant data, discuss missing data, demand data, explore and  respond to data demands by others, and start data crowd-sourcing  exercises."&lt;/li&gt;
&lt;li&gt;CIS made its submission on CCWG-Accountability 2nd Draft Proposal on Work Stream 1 Recommendations to ICANN's CCWG-Accountability.&lt;/li&gt;
&lt;li&gt;Pranesh Prakash, on behalf of CIS, &lt;a href="http://cis-india.org/telecom/blog/comments-on-dot-panel-report-via-mygov"&gt;submitted comments&lt;/a&gt; to the Department of Telecom Panel’s report on net neutrality via  MyGov. Prakash states that the report displays a far better  understanding of the underlying issues than the TRAI consultation paper  did, and is overall a good effort at balancing the different sides.&lt;/li&gt;
&lt;li&gt;Shyam Ponappa’s monthly column titled More on Those Dropped Calls was &lt;a href="http://cis-india.org/telecom/blog/business-standard-september-3-2015-shyam-ponappa-more-on-those-dropped-calls"&gt;published by Business Standard&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing a project on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed &lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Updates&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;September 2015 Report (Suman Dogra; September 30, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-the-training-in-the-use-of-espeak-hindi-with-nvda"&gt;Training in the use of eSpeak Hindi with NVDA&lt;/a&gt; (Organized by CIS and Lakshay for the Differently Abled; September 29 – 30, 2015; Ranchi). The event was conducted online by Dr. Homiyar over skype, with local support from Mritunjay Kumar and Zainab.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-5-day-tot-for-training-in-use-of-espeak-kannada-with-nvda"&gt;5 day TOT for Training in Use of eSpeak Kannada with NVDA&lt;/a&gt; (Organized by CIS, Mithra Jyoti, Enable India and NFB, Bangalore; September 21 – 25, 2015; Bangalore).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/espeak-training-in-hindi-language-1"&gt;eSpeak Training in Hindi Language&lt;/a&gt; (Organized by CIS and National Association for the Blind; Kullu; September 3 – 4, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/training-in-espeak-marathi"&gt;Training in eSpeak Marathi&lt;/a&gt; (Organized by CIS; Atmadepam Society; August 22 – 23, 2015). &lt;i&gt;The report was published in the month of September.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pervasive Technologies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/pervasive-technologies-working-document-series-research-questions-and-a-literature-review-on-actor-network-theory"&gt;Pervasive Technologies: Working Document Series - Research Questions and a Literature Review on the Actor-Network Theory&lt;/a&gt; (Nehaa Chaudhari; September 5, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/faq-cis-proposal-for-compulsory-licensing-of-critical-mobile-technologies"&gt;FAQ: CIS Proposal for Compulsory Licensing of Critical Mobile Technologies&lt;/a&gt; (Rohini Lakshané; September 25, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Other (Copyright and Patent)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/comments-on-the-guidelines-for-examination-of-computer-related-inventions-cris"&gt;Comments on the Guidelines for Examination of Computer Related Inventions&lt;/a&gt; (CRIs) (Anubha Sinha; September 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015"&gt;Open Letter to PM Modi on Intellectual Property Rights issues on His Visit to the United States of America in September 2015&lt;/a&gt; (Pranesh Prakash and Nehaa Chaudhari; September 23, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;National Conference: WTO, FTAs and Investment Treaties: Implications for development policy space (Organized by Focus on the Global South, Institute for Studies in Industrial Development (ISID), Madhyam, MSF Access Campaign, National Working Group on Patent Laws and WTO (NWGPL), Public Services International (PSI) – South Asia, South Solidarity Initiative – ActionAid, Third Word Network (TWN), and Forum against FTAs; September 22 – 23, 2015; Institute for Studies in Industrial Development, New Delhi). Nehaa Chaudhari made a presentation on &lt;a href="http://cis-india.org/a2k/blogs/copyright-access-to-knowledge-in-fta.pdf"&gt;Copyright: Access to Knowledge in Free Trade Agreements?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/news/ipex-2015"&gt;IPEX 2015&lt;/a&gt; (Organized by Confederation of Indian Industry, APTDC and TDPC; September 25 - 26, 2015; Chennai). Rohini Lakshané attended the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/news/live-law-apoorva-mandhani-september-23-2015-open-letter-from-cis-to-pm-modi-on-intellectual-property-rights-issues-on-his-visit-to-us"&gt;Open letter from CIS to PM Modi on Intellectual Property Rights issues on his Visit to US&lt;/a&gt; (Apoorva Mandhani; LiveLaw; September 23, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/cis-brings-nadustunna-charithra-magazine-under-by-cc-by-sa-licence"&gt;CIS brings Nadustunna Charithra magazine under CC BY SA licence&lt;/a&gt; (Tanveer Hasan; September 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/education-okfn-subhashish-panigrahi-september-25-2015-ocr-and-oer-update"&gt;OCR and OER – update&lt;/a&gt; (Subhashish Panigrahi; Open Education Working Group; September 25, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/wikimedia-foundation-blog-as-odia-wikipedia-turns-13-what-happens-next"&gt;As Odia Wikipedia turns 13, what happens next?&lt;/a&gt; (Subhashish Panigrahi; September 26, 2015). This was originally &lt;a href="https://blog.wikimedia.org/2015/08/21/odia-wikipedia-celebrates-13/"&gt;published on the Wikimedia Blog&lt;/a&gt; on August 21. The post was shared on Wikipedia's official &lt;a href="https://www.facebook.com/wikipedia/posts/10153481749053346"&gt;Facebook page&lt;/a&gt;, and on Twitter handles [&lt;a href="https://twitter.com/Wikipedia/status/635838494187913216"&gt;1&lt;/a&gt; and &lt;a href="https://twitter.com/Wikimedia/status/635838494200438784"&gt;2&lt;/a&gt;].&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/googles-optical-character-recognition-software-now-works-with-all-south-asian-languages"&gt;Google's Optical Character Recognition Software Now Works with All South Asian Languages&lt;/a&gt; (Subhashish Panigrahi; September 26, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/open-source-september-3-2015-subhashish-panigrahi-wikimedia-contributor-shares-his-linux-story"&gt;Wikimedia contributor shares his Linux story&lt;/a&gt; (Subhashish Panigrahi; September 27, 2015). &lt;i&gt;This article is part of a series called &lt;/i&gt;&lt;a href="https://opensource.com/tags/my-linux-story"&gt;&lt;i&gt;My Linux Story&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. To participate and share your Linux story, contact us at: &lt;/i&gt;&lt;a href="mailto:open@opensource.com"&gt;&lt;i&gt;open@opensource.com&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. Read the original published by &lt;/i&gt;&lt;a href="https://opensource.com/life/15/9/my-linux-story-subhashish-panigrahi"&gt;&lt;i&gt;Opensource.com&lt;/i&gt;&lt;/a&gt;&lt;i&gt; on September 3, 2015.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/events/rare-telugu-religious-and-historical-work-preserved-at-annamacharya-library-to-come-on-wikisource"&gt;Annamaya Library edit-a-thon&lt;/a&gt; (Organized by CIS-A2K and Telugu Wikipedia Community; August 6, 2015; Andhra Loyola College; Vijaywada).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/International_workshop_on_digitization_and_archiving,_Jadavpur_University"&gt;International Workshop on Digitization and Archiving&lt;/a&gt; (Organized by CIS-A2K and Wikipedia Community; August 19 – 21, 2015). Rahmanuddin Shaik was one of the trainers.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/odisha-sun-times-september-28-2015-ruby-nanda-unable-to-read-odia-on-your-android-device"&gt;Unable to read Odia on your android device? Don’t fret!&lt;/a&gt; (Ruby Nanda; Odisha Sun Times; September 28, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The advent of the Internet has radically redefined what it means to be open and collaborative. The Internet itself is built upon open standards and free/libre/open source software. Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Open Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;As one of the general stewards of the process, CIS was invited to take part in the final drafting meeting of the International Open Data Charter held before Con Datos 2015 in Santiago, Chile, but we could not take part in it. Apart from organising two public consultations on the draft Charter in Bengaluru and Delhi, we also submitted our &lt;a href="http://cis-india.org/openness/international-open-data-charter-comments-by-cis"&gt;detailed comments&lt;/a&gt; on the document. The final version of the &lt;a href="http://opendatacharter.net/" target="_blank"&gt;Charter document has been launched&lt;/a&gt; at the United Nation General Assembly meeting, on September 27.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Free Software&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/software-freedom-pledge-2015"&gt;Software Freedom Pledge&lt;/a&gt; (Pranesh Prakash; September 25, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Article&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy"&gt;Hits and Misses With the Draft Encryption Policy&lt;/a&gt; (Sunil Abraham; The Wire; September 26, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"&gt;Data Flow in the Unique Identification Scheme of India&lt;/a&gt; (Vidushi Marda; September 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015"&gt;Human DNA Profiling Bill 2012 v/s 2015 Bill&lt;/a&gt; (Vanya Rakesh; September 6, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/open-governance-and-privacy-in-a-post-snowden-world-webinar"&gt;Open Governance and Privacy in a Post-Snowden World: Webinar&lt;/a&gt; (Vanya Rakesh; September 26, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-changing-landscape-of-ict-governance-and-practice-convergence-and-big-data"&gt;The Changing Landscape of ICT Governance and Practice - Convergence and Big Data&lt;/a&gt; (Co-organized by Innovation Center for Big Data and Digital Convergence, Yuan Ze University, Taiwan; August 24 – 25, 2015). Sharat Chandra Ram was granted the &lt;a href="http://www.cprsouth.org/2015/02/call-for-applications-2015-young-scholar-awards/"&gt;Young Scholar Award 2015&lt;/a&gt; to attend the &lt;i&gt;Young Scholar Workshop&lt;/i&gt; followed by main &lt;a href="http://www.cprsouth.org/"&gt;&lt;i&gt;CPRSouth2015 conference&lt;/i&gt; (Communication Policy Research South) conference&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Free Speech and Expression&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/cis-submission-on-ccwg-accountability-2nd-draft-proposal-on-work-stream-1-recommendations"&gt;CIS Submission on CCWG-Accountability 2nd Draft Proposal on Work Stream 1 Recommendations&lt;/a&gt; (Pranesh Prakash; September 13, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/blog/didp-request-11-netmundial-principles"&gt;DIDP Request #11: NETmundial Principles&lt;/a&gt; (Aditya Garg; September 14, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/didp-request-12-revenues"&gt;DIDP Request #12: Revenues&lt;/a&gt; (Aditya Garg; September 14, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/peering-behind-the-veil-of-icann2019s-didp"&gt;Peering behind the veil of ICANN’s DIDP&lt;/a&gt; (Padmini Baruah; September 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/asian-regional-consultation-on-the-wsis-10-review"&gt;Asian Regional Consultation on the WSIS+10 Review&lt;/a&gt; (Organized by The Internet Democracy Project, Bytes for All, APNIC, the Association for Progressive Communications, ISOC, Global Partners Digital and ICT Watch; September 3 – 5, 2015). Jyoti Panday attended the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;IGF&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The tenth annual IGF meeting will be held in João Pessoa, Brazil, on November 10 - 13, 2015. IGF's MAG has decided to retain the title “Evolution of Internet Governance: Empowering Sustainable Development” as the overarching theme. Sunil Abraham will be a panelist for the following workshops:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/understanding-and-mitigating-online-hate-speech-and-youth-radicalisation"&gt;Understanding and Mitigating Online Hate Speech and Youth Radicalisation&lt;/a&gt; (Organized by Council of Europe, Oxford University, OHCHR, Google and ISOC; November 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/transnational-due-process-a-case-study-in-multi-stakeholder-cooperation"&gt;Transnational Due Process: A Case Study in Multi-stakeholder Cooperation&lt;/a&gt; (Organized by the United Nations; November 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/events/bangalore-chapter-meet-of-dsci-september-26-2015"&gt;Bangalore Chapter Meet of DSCI&lt;/a&gt; (Co-organized by DSCI and CIS; September 26, 2015). Melissa Hathaway, Commissioner, Global Commission for Internet Governance and Sunil Abraham gave a talk at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Miscellaneous&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/sustainable-smart-cities-india-conference-2015-bangalore"&gt;Sustainable Smart Cities India Conference 2015, Bangalore&lt;/a&gt; (Vanya Rakesh; September 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/comments-on-dot-panel-report-via-mygov"&gt;Comments on the DoT Panel Report via MyGov&lt;/a&gt; (Pranesh Prakash; September 26, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Op-ed&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/business-standard-september-3-2015-shyam-ponappa-more-on-those-dropped-calls"&gt;More on those Dropped Calls&lt;/a&gt; (Shyam Ponappa; Business Standard; September 2, 2015 and Organizing India Blogspot; September 3, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/wheres-my-data-submission-for-knight-news-challenge-2015"&gt;Where's My Data? Submission for Knight News Challenge 2015&lt;/a&gt; (Sumandro Chattapadhyay; September 30, 2015). &lt;i&gt;The text of the proposal was prepared by Nisha Thompson of DataMeet, Meera K of Oorvani, and Sumandro Chattapadhyay.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/blog_the-internet-in-the-indian-judicial-imagination"&gt;The Internet in the Indian Judicial Imagination&lt;/a&gt; (Divij Joshi; September 9, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/blog_the-many-lives-and-sites-of-internet-in-bhubaneswar"&gt;The Many Lives and Sites of Internet in Bhubaneswar&lt;/a&gt; (Sailen Routray; September 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-hindu-september-1-2015-parshathy-nath-does-this-click-with-you"&gt;Does this click with you?&lt;/a&gt; (Parshathy J. Nath; The Hindu; September 1, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/economic-times-september-3-2015-surabhi-agarwal-govt-tie-up-with-global-police-interpol-to-fight-child-pornography"&gt;Government may tieup with global police, Interpol to fight child pornography&lt;/a&gt; (Surabhi Agarwal; September 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-september-3-2015-harjeet-inder-singh-sahi-hiding-behind-rules-on-naming-sites-it-banned-govt-reveals-fears"&gt;Hiding behind rules on naming sites it banned, govt reveals fears&lt;/a&gt; (Harjeet Inder Singh Sahi; September 3, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/hindu-nikhil-varma-september-9-2015-outrage-before-sharing"&gt;Outrage before sharing&lt;/a&gt; (Nikhil Verma; The Hindu; September 9, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-week-september-20-2015-shweta-t-nanda-faking-a-stand"&gt;Faking a stand&lt;/a&gt; (Shweta T. Nanda; The Week; September 20, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/outlook-september-21-2015-arindam-mukherjee-some-key-words-are-missing"&gt;Some Key Words Are Missing&lt;/a&gt; (Arindam Mukherjee; Outlook; September 21, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-hindu-september-22-2015-atul-kabra-open-sesame"&gt;Open sesame&lt;/a&gt; (The Hindu; September 22, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/livemint-moulishree-srivastava-september-22-2015-india-encryption-policy-draft-faces-backlash"&gt;India encryption policy draft faces backlash&lt;/a&gt; (Moulishree Srivastava; September 22, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/first-post-naina-khedekar-september-23-2015-online-outcry-forces-government-to-withdraw-draft-encryption-policy"&gt;Online outcry forces government to withdraw draft encryption policy&lt;/a&gt; (Naina Khedekar; First Post; September 23, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/dna-september-23-2015-amrita-madhukalya-encryption-policy-would-have-affected-emails-operating-systems-wifi"&gt;Encryption policy would have affected emails, operating systems, WiFi&lt;/a&gt; (Amrita Madhukalya; DNA; September 23, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy"&gt;Govt presses 'undo' button on draft encryption policy&lt;/a&gt; (Business Standard; September 23; 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/today-september-24-2015-huge-outcry-forces-india-backtrack-social-media-data-proposal"&gt;Huge outcry forces India to backtrack on social media data proposal&lt;/a&gt; (Today; September 24, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/wsj-september-24-2015-newley-purnell-resty-woro-uniar-facebook-free-internet-access-program-in-developing-countries-provokes-backlash"&gt;Facebook’s Free Internet Access Program in Developing Countries Provokes Backlash&lt;/a&gt; (Newley Purnell and Resty Woro Uniar; The Wall Street Journal; September 24, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/business-standard-september-26-2015-ahead-of-hosting-modi-facebook-rebrands-internet-dot-org-as-free-basics"&gt;Ahead of hosting Modi, Facebook rebrands internet.org as Free Basics&lt;/a&gt; (Business Standard; September 26, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/asian-age-september-27-2015-s-raghotham-and-mayukh-mukherjee-by-weakening-our-security-govt-is-putting-us-at-risk-of-espionage"&gt;‘By weakening our security, govt is putting us at risk of espionage’&lt;/a&gt; (S. Raghotham and Mayukh Mukherjee; Asian Age; September 27, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/9ad9be9b09a49c7-9aa9be98199a9b69b0993-9ac9c79b69bf-9b89cd99f9c79b69a89c7-9ab9cd9b09bf-9939af9bc9be987-9ab9be987-99a9be9b29c1-9b99ac9c7"&gt;ভারতে পাঁচশোরও বেশি স্টেশনে ফ্রি ওয়াই-ফাই চালু হবে&lt;/a&gt; (BBC; September 28, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-register-september-29-2015-kieren-mccurthy-do-you-agree-with-our-fee-hike"&gt;Do you agree with our fee hike? Press 1 to answer Yes; or 2 for Yes&lt;/a&gt; (Kieren McCarthy; The Register; September 29, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception"&gt;Indian PM Narendra Modi’s digital dream gets bad reception&lt;/a&gt; (Amanda Hodge; September 29, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/ndtv-maya-sharma-september-29-2015-what-bengaluru-thinks-of-big-tech-announcements-in-silicon-valley"&gt;What Bengaluru Thinks of the Big Tech Announcements in Silicon Valley&lt;/a&gt; (Maya Sharma; NDTV; September 29, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the mediation and reconfiguration of social and cultural processes and structures by the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS - Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - Facebook:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - E-Mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Researchers at Work - E-Mail: &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Researchers at Work - Mailing List: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, Access to Knowledge, at &lt;a href="mailto:tanveer@cis-india.org"&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2015-bulletin'&gt;https://cis-india.org/about/newsletters/september-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-11-25T01:55:25Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2014-bulletin">
    <title>September 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2014-bulletin</link>
    <description>
        &lt;b&gt;Welcome you to the ninth issue of the newsletter (September 2014).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet &amp;amp; Society (CIS) welcome you to the ninth issue of the newsletter (September 2014). Archives of our newsletters can be 	accessed at: &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Nishant Shah was part of a working group writing a white paper on big data and social change, over the last six months. This	&lt;a href="http://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"&gt;white paper&lt;/a&gt; produced by a group of 	activists, researchers and data experts was published by Oxford.&lt;/li&gt;
&lt;li&gt;As part of the Pervasive Technologies project Maggie Huang interviewed Semiconductor Industry Professionals in Taiwan on the	&lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-1"&gt;trends and changes in technology&lt;/a&gt; and 	&lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-2"&gt; understanding mobile chip manufacturing&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS entered into a		&lt;a href="http://cis-india.org/openness/blog/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands"&gt;memorandum of understanding&lt;/a&gt; with the 		Andhra Loyola College for a period of 5 years to enhance Telugu Wikipedia through increased contributions to Wikipedia and make it available under free 		license. &lt;/li&gt;
&lt;li&gt; CIS-A2K &lt;a href="http://cis-india.org/openness/blog/nie-steps-in-to-grow-konkani-wikipedia"&gt;signed a memorandum of understanding&lt;/a&gt; with Nirmala 		Institute of Education, Goa to enhance digital literacy in Konkani in the education sector across Goa.&lt;/li&gt;
&lt;li&gt;Tejaswini Niranjana and Tanveer Hasan wrote a report on the workshop 	&lt;a href="http://cis-india.org/openness/blog/report-on-developing-digital-open-knowledge-resources-in-indian-languages"&gt; Developing Digital Open Knowledge Resources in Indian Languages &lt;/a&gt; for which CIS-A2K was one of the organizers. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS 		&lt;a href="http://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility"&gt; joined the Dynamic Coalition for Platform Responsibility &lt;/a&gt; towards creating due diligence recommendations for online platforms. &lt;/li&gt;
&lt;li&gt; CIS organized a 		&lt;a href="https://cis-india.org/internet-governance/report-on-cis-workshop-at-igf"&gt; workshop on an evidence-based framework for intermediary liability &lt;/a&gt; at the IGF held in Istanbul on September 3, 2014. Jyoti Panday coordinated the workshop in collaboration with Stanford Centre for Internet &amp;amp; 		Society. &lt;/li&gt;
&lt;li&gt; Elonnai Hickok contributed a thematic chapter on 		&lt;a href="http://www.giswatch.org/en/communications-surveillance/intermediary-liability-and-state-surveillance"&gt; Intermediary Liability and Surveillance &lt;/a&gt; in the GISWatch Report.&lt;/li&gt;
&lt;li&gt;The Supreme Court of India revised the law on electronic evidence in the case of &lt;i&gt;Anvar v. P. K. Basheer&lt;/i&gt;. Bhairav Acharya has	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt;done an analysis on this&lt;/a&gt;. It was published 	by Law and Policy in India and subsequently mirrored on our website.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The updated draft is being reviewed by the Office of the Chief Commissioner for Persons with Disabilities. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/september-2014-nvda-report.pdf"&gt;Work Report for September&lt;/a&gt; (Suman Dogra; August 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/study-on-budget-allocation-and-expenditure-by-states-on-schemes-for-persons-with-disabilities"&gt; Study on Budget Allocation and Expenditure by States on Schemes for Persons with Disabilities &lt;/a&gt; (Anandhi Viswanathan; September 29, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pervasive Technologies&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-1"&gt; Interviews with Semiconductor Industry Professionals in Taiwan: Trends and Changes in Technology &lt;/a&gt; (Maggie Huang; September 26, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-professionals-in-taiwan-2"&gt; Interviews with Semiconductor Industry Professionals in Taiwan: Understanding Mobile Chip Manufacturing &lt;/a&gt; (Maggie Huang; September 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/report-on-developing-digital-open-knowledge-resources-in-indian-languages"&gt; Developing Digital Open Knowledge Resources in Indian Languages &lt;/a&gt; (Tejaswini Niranjana and Tanveer Hasan; September 30, 2014). The workshop was organized by Krantijyoti Savitribai Phule Women's Studies Centre, 		University of Pune (KSPWSC), Centre for Indian Languages in Higher Education (CILHE), Tata Institute of Social Sciences, Mumbai and CIS-A2K. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/nie-steps-in-to-grow-konkani-wikipedia"&gt;NIE Steps in to Grow Konkani Wikipedia&lt;/a&gt; (T. Vishnu Vardhan; September 6, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands"&gt; Expanding the World of Telugu Wikipedia - CIS-A2K and ALC join hands &lt;/a&gt; (T. Vishnu Vardhan and Rahmanuddin Shaik; September 17, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The following were published in August and mirrored on our website in September:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/open-glam-august-27-2014-subhashish-panigrahi-open-glam-at-wikimania-2014"&gt; OpenGLAM at Wikimania 2014 &lt;/a&gt; (Subhashish Panigrahi; OpenGLAM; August 27, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/we-are-wikipedia"&gt;We are Wikipedia&lt;/a&gt; (By Subhashish Panigrahi; Wikimedia Deutschland; August 25, 2014). Wikimedia Deutchland has included a paragraph about WeAreWikipedia on their blog. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://commons.wikimedia.org/wiki/Category:Kannada_Wikipedia_Workshop_at_Tumkur_%28Sep_27_2014%29"&gt;Kannada Wikipedia Workshop for Students&lt;/a&gt; (Tumkur University; Tumkur; September 27, 2014). Dr. U.B.Pavanaja conducted the workshop. Fifty people participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://commons.wikimedia.org/wiki/Category:Kannada_Wikipedia_Workshop_at_Bagalkot"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (Organized by Basaveshwara Science College and CIS-A2K; September 20, 2014). Dr. U.B.Pavanaja conducted the workshop. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/kannada-wikipedia-workshop-bagalkot"&gt;Implementation of IT in Kannada&lt;/a&gt; (Prajavani; September 21, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/bangalore-mirror-shyam-prasad-105-kannada-books-released-under-creative-commons"&gt; 105 Kannada books released under Creative Commons &lt;/a&gt; (Shyam Prasad S; Bangalore Mirror; September 29, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/odia-alphabet-and-order-teaching-in-primary-education"&gt; State Level Seminar on "Odia alphabet and order teaching in primary education" &lt;/a&gt; (Co-organized by Institute of Odia Studies and Research and Odia Bhasa Pratisthan, Bhubaneswar; September 14, 2014). Subhashish Panigrahi participated 		in the event and discussed about the applied aspects of Odia language in the context of primary education and need for reforms in the total number and 		order in the character-set citing problems with computer and internet. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/publishing-next"&gt;Publishing Next&lt;/a&gt; (Organized by CinnamonTeal Publishing; Goa; September 19 - 20, 2014). T. Vishnu Vardhan was a panelist at the 5th edition of Publishing Next the annual 		conference on the future of publishing. He spoke on Open Access, Copyright and Copyleft. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in 	enhancing respect for the right to privacy in developing countries. We have produced the following outputs during the month:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Note: The White Paper below is not a part of the SAFEGUARD project&lt;/i&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;White Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"&gt; Big Data and Positive Social Change in the Developing World: A White Paper for Practitioners and Researchers &lt;/a&gt; (Nishant Shah; Oxford: Oxford Internet Institute; September 30, 2014). Nishant Shah was part of a group of activists, researchers and data experts in 		producing this white paper. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Analysis&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; Anvar v. Basheer and the New (Old) Law of Electronic Evidence &lt;/a&gt; (Bhairav Acharya; September 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility"&gt; CIS joins the Dynamic Coalition for Platform Responsibility &lt;/a&gt; (Jyoti Panday; September 23, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/the-aadhaar-case"&gt;The Aadhaar Case&lt;/a&gt; (Vipul Kharbanda; September 5, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/uid-a-data-subjects-registration-tale"&gt;UID: A Data Subject's Registration Tale&lt;/a&gt; (Mukta Batra; September 11, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation"&gt;Biometrics: An 'Angootha Chaap' nation?&lt;/a&gt; (Mukta Batra; September 19, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground"&gt;UID and NPR: Towards Common Ground&lt;/a&gt; (September 19, 2014): &lt;i&gt;This is an anonymous post&lt;/i&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;CIS @ IGF&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ninth Internet Governance Forum ("IGF2014") was hosted by Turkey in Istanbul from September 2 to 5, 2014. A BestBits pre-event, which saw robust 	discussions on renewal of the IGF mandate, the NETmundial Initiative and other live Internet governance processes, flagged off a week of many meetings and 	sessions. CIS participated in multiple workshops and panels:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=Nu3GycFBLoo"&gt;WS112: Implications of post-Snowden Internet localization proposals&lt;/a&gt; (Organized by Center for Democracy and Technology, Istanbul, September 2, 2014). Sunil Abraham was a speaker at this IGF workshop. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/preserving-a-universal-internet"&gt; WS63: Preserving a universal Internet: Costs of fragmentation &lt;/a&gt; (Organized by OECD and Centre for International Governance Innovation; September 3, 2014). Sunil Abraham was a speaker at this IGF workshop. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=uwtQ18KzeiY"&gt;WS2 Mobile, Trust and Privacy&lt;/a&gt; (Organized by GSM Association; September 4, 2014). Sunil Abraham was a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=Us4BW1Sw4Vo"&gt;Transparency reporting as a tool for Internet governance&lt;/a&gt; (Organized by Global Network Initiative; September 3, 2014). Pranesh Prakash was a panelist. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.youtube.com/watch?v=v5tx-TBMm8E&amp;amp;list=PLediVl9G3xdMoSTKB3sFw0aszfwLgsqoV&amp;amp;index=105"&gt; WS149: Aligning ICANN policy with the privacy rights of users &lt;/a&gt; (Organized by Yale ISP; September 5, 2014). Pranesh Prakash was a moderator. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Participation&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/cis-at-igf-2014"&gt;Launch of the GISWatch Report&lt;/a&gt; (Association for Progressive Communications and the Humanist Institute for Cooperation with Developing Countries (Hivos). Elonnai Hickok contributed a 		thematic chapter on Intermediary Liability and Surveillance to this report. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/re-wiring-women-rights-debates-in-digital-age"&gt; Re-Wiring Women's Rights Debates in the Digital Age &lt;/a&gt; (Organized by IT for Change in partnership with Kutch Mahila Vikas Sangathan and ANANDI; September 13 - 14, 2014). Rohini Lakshane was a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/workshop-on-enabling-information-systems-for-local-governance"&gt; Workshop on Enabling Information Systems for Local Governance &lt;/a&gt; (Organized by Jamia Milla Islamia, Tagore Hall; New Delhi; September 18, 2014). Sunil Abraham was a participant. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/national-consultation-on-media-law"&gt;National Consultation on Media Law&lt;/a&gt; (Organized by Law Commission of India and the National University, Delhi; India Habitat Centre, New Delhi; September 27 - 28, 2014). Nehaa Chaudhari, 		Jyoti Panday and Anubha Sinha participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/cpdp-2015"&gt;CPDP 2015&lt;/a&gt; : The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. CIS is a moral 		supporter of CPDP. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-hindu-nikhil-varma-september-2-2014-fighting-battles-online"&gt; Fighting battles online &lt;/a&gt; (Nikhil Varma; The Hindu; September 2, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance"&gt; Colonial yoke or bureaucratic insouciance? &lt;/a&gt; (Vidya Venkat with additional reporting by K.T. Sangameswaran in Chennai; The Hindu; September 7, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/voice-of-america-september-10-2014-anjana-pasricha-kashmir-flood-social-media-aids-rescue"&gt; Social Media Aids Rescue Efforts in Flood-Hit Kashmir &lt;/a&gt; (Anjana Pasricha, September 10, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-economic-times-varun-aggarwal-september-11-2014-google-aims-to-win-india-with-android-one"&gt; Google aims to win 40% of India with Android One &lt;/a&gt; (Varun Aggarwal; Economic Times; September 11, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social 	sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new 	conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/raw/events/consultation-on-new-figures-of-learning-in-digital-context"&gt; Consultation on New Figures of Learning in the Digital Context &lt;/a&gt; (CIS, Bangalore, September 22, 2014). P.P. Sneha		&lt;a href="https://cis-india.org/raw/digital-humanities/consultation-new-figures-of-learning-in-digital-context"&gt;wrote a report&lt;/a&gt; on the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director - Research, at	&lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, 	Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2014-bulletin'&gt;https://cis-india.org/about/newsletters/september-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2015-01-02T01:26:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2013-bulletin">
    <title>September 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of September 2013 can be accessed below. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) welcomes you to the ninth issue of its newsletter for the year 2013. During this month we signed an MoU with the Goa University to enhance digital literacy in Konkani language, submitted a report on Inclusive Disaster and Emergency Management for persons with disabilities to the National Disaster Management Authority, published an updated version of the Privacy Protection Bill, 2013 based on feedback collected from the Privacy Round Table held on August 24, and published an analysis of the Crucifixion Protests in Paraguay. Further, updates on our upcoming events and media coverage are brought in this newsletter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our policies on Ethical Research Guidelines, Non-Discrimination and Equal Opportunities, Privacy, Terms of Website Use, and Travel can be &lt;a class="external-link" href="http://bit.ly/19dQSOV"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Accessibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our project on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India with the Hans Foundation, we bring you a new draft chapter on the union territory of Andaman and Nicobar. With this we have completed compilation of draft chapters for 21 states and 4 union territories. Feedback and comments are invited from readers for this chapter:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit Chapter&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;a class="external-link" href="http://bit.ly/18knnIq"&gt;Andaman and Nicobar Chapter&lt;/a&gt; (by CLPR, September 30, 2013)&lt;a href="http://bit.ly/18knnIq"&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Reports&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1ccMz7R"&gt;Inclusive Disaster and Emergency Management for Persons with Disabilities&lt;/a&gt; (by Deepti Samant Raja and Nirmita Narasimhan, September 17, 2013). It was submitted to the National Disaster Management Authority of India (NDMA) on September 17 for their action. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18E7Tjc"&gt;The ICT Opportunity for a Disability-Inclusive Development Framework&lt;/a&gt; (by leading international organisations such as G3ict, ITU, Microsoft, UNESCO, et.al.) was released on September 24. CIS gave its inputs to this report.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Access to Knowledge and Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge team at CIS is working on &lt;a class="external-link" href="http://bit.ly/SPqFOl"&gt;expanding the Indic language Wikipedia in partnership with the Wikimedia Foundation&lt;/a&gt;&lt;a href="http://bit.ly/SPqFOl"&gt;&lt;/a&gt;. As &lt;a class="external-link" href="http://bit.ly/X80ELd"&gt;part this project&lt;/a&gt;, we held seven Wikipedia workshops. Our project on Pervasive Technologies examines the relationship between production of pervasive technologies and intellectual property and we have produced a column in EuroScientist as part of our efforts of promoting openness including open government data, open standards, open access, and free/libre/open source software:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Open Access &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bdPdup"&gt;Open Access: An Opportunity for Scientists around the Globe&lt;/a&gt; (by Subbiah Arunachalam, Euro Scientist, September 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1f5xdBG"&gt;e - DIRAP Google+ Hangout: Open Government&lt;/a&gt; (by Christine Apikul, September 18, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1fWE6Wr"&gt;The Indian Council of Agricultural Research Adopts an Open Access Policy&lt;/a&gt; (by Nehaa Chaudhari, September 30, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Wikipedians from various communities can request for outreach programmes, technical bugs, logistics-merchandize and media, public relations and communications &lt;a class="external-link" href="http://bit.ly/TOcXId"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcements&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS Signs MoU with Goa University: The A2K team at CIS has signed an MoU with the Goa University to digitize the “Konkani Vishwakosh” under the Creative Commons license and build a digital knowledge partnership to enhance digital literacy in Konkani language. See &lt;a class="external-link" href="http://bit.ly/1fBZXlR"&gt;here for more details&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15Idlh7"&gt;Konkani Vishwakosh Digitization Project&lt;/a&gt;: The Centre for Internet and Society in collaboration with the University of Goa invites you to a two-month project on digitization of Konkani Vishwakosh. Please send in your applications by October 5, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Wikipedians Speak: Piotr Konieczny: This episode brings you a &lt;a class="external-link" href="http://bit.ly/16jYsBF"&gt;conversation with Piotr Konieczny&lt;/a&gt;, a veteran Wikipedian from Poland. He has contributed to over 514 DYK articles on Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Columns and Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19KtIwo"&gt;Recap on Konkani Wikipedia Workshop&lt;/a&gt; (by Subhashish Panigrahi, Startup Goa Blog, September 9, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/14QQkIo"&gt;ଅବସର ପରର ଦ୍ବିତୀୟ ଜୀବନ, ଅବସର ପରେ ସକ୍ରିୟ ଭାବେ ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆରେ ଲେଖାଲେଖି ଜାରୀ ରଖିଥିବା ଜଣେ ଡାକ୍ତରଙ୍କ ସ‌ହ ଭାବାଲୋଚନା&lt;/a&gt; (by Subhashish Panigrahi, Odiapua, September 10, 2013)&lt;a href="http://bit.ly/14QQkIo"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1fU7Ikl"&gt;Selection of Programme Officer — Pilot Projects, CIS-A2K&lt;/a&gt; (by Nitika Tandon, September 10, 2013)&lt;a href="http://bit.ly/1fU7Ikl"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18f9n1o"&gt;Wikipedia reaches Classrooms in Hyderabad&lt;/a&gt; (by Syed Muzammiluddin, September 20, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15LPoKZ"&gt;A Kannada Wikipedia Workshop in Mysore&lt;/a&gt; (University of Mysore, August 6, 2013): This is a report of the workshop conducted last month. Dr. Pavanaja conducted the workshop&lt;a href="http://bit.ly/15LPoKZ"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Introductory Workshop (Department of Computer Science and Technology, University of Goa, September 28, 2013). Nitika Tandon conducted this workshop. &lt;i&gt;The details will be posted soon&lt;/i&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1f1KOvm"&gt;Train the Trainer — Four-day long Residential Training Workshop in Bangalore&lt;/a&gt; (organised by CIS-A2K, Bangalore, October 3 – 6, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/174pugy"&gt;Digital Resources in Telugu: A Workshop for Research Scholars&lt;/a&gt; (co-organised by CIS-A2K and the English and Foreign Languages University, Hyderabad, September 13, 2013).  T. Vishnu Vardhan participated in this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18SsChu"&gt;Re-releasing Konkani Vishwakosh &amp;amp; Building Konkani Wikipedia&lt;/a&gt; (organised by CIS-A2K and the University of Goa, Conference Hall, Goa University, Taleigao, September 26, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Introductory Workshop (co-organised by CIS-A2K and wikipedians John Noronha and Supriya Kankumbikar, September 27, 2013). Nitika Tandon participated in this workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15NsTjM"&gt;Odisha: Wikipedia workshop at IIMC, Dhenkanal&lt;/a&gt; (co-organised by CIS-A2K and Odia Wikimedia community, September 30, 2013). Subhashish Panigrahi coordinated the entire event along with members of Odia Wikipedia, Dr Subas Chandra Rout, Mrutyunjaya Kar and Sasanka Sekhar Das. This was covered by Odisha Diary (&lt;a href="http://bit.ly/1bna9zd"&gt;http://bit.ly/1bna9zd&lt;/a&gt;), and eOdisha Samachar (&lt;a href="http://bit.ly/1aNJvv4"&gt;http://bit.ly/1aNJvv4&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16HNZpy"&gt;Workshop on e-Content Development&lt;/a&gt; (organised by Centre for Staff Training and Development, Dr. B.R. Ambedkar Open University, Hyderabad, September 4 – 6, 2013). Vishnu Vardhan gave a guest lecture on Open Source to Open Knowledge, Building Knowledge Bases and Platforms via Mass Collaboration on the Internet, e-Content in Indian languages – History, Challenges and Opportunities, Wikipedia Users to Wikipedia Authors – Exploring Wikipedia as an OER Tool, and e-Content, e-Student, e-Faculty – Reimagining classroom in the digital Age. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/183Atq0"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (organised by Department of Journalism and Mass Communication, SDM College, Ujire, September 15, 2013). Dr. U.B.Pavanaja participated in this workshop&lt;a href="http://bit.ly/183Atq0"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1eGviTY"&gt;Konkani Wikipedia Workshop&lt;/a&gt; (organised by St. Aloysius College, AIMIT, St Aloysius College (Autonomous), Beeri, Mangalore, September 13, 2013). Dr. U.B. Pavanaja participated in this&lt;a href="http://bit.ly/1eGviTY"&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;'&lt;a class="external-link" href="http://bit.ly/152vA0g"&gt;Help Konkani Wikipedia come out of incubation&lt;/a&gt;' (Deccan Herald, September 13, 2013): The article talks about the relative lack of content in Konkani Wikipedia. “To get it out of incubation, many should write Konkani articles for Wikipedia,” Dr. Pavanaja was quoted as having said. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18VgnEN"&gt;Konkani Vishwakosh relaunch tomorrow&lt;/a&gt; (The Hindu, September 26, 2013). A coverage of the re-release of the Konkani encyclopaedia under Creative Commons license. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18VgnV8"&gt;Goa university re-releasing Konkani encyclopaedia on Sept 26&lt;/a&gt; (The Times of India, September 24, 2013): Goa University and CIS-A2K re-released the four volume 3632 page Konkani Vishwakosh (encyclopaedia) in Goa. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/174rmpA"&gt;Goa University announces plan to upload Konkani encyclopedia on Wikipedia&lt;/a&gt; (Navhind Times, September 27, 2013)&lt;a href="http://bit.ly/174rmpA"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19EYl5T"&gt;Konkani Wikipedia from Goa University in 6 months&lt;/a&gt; (The Times of India, September 27, 2013): Goa University becomes the first varsity in India to allow data produced and copyrighted by an Indian university to be used by internet users. Professors, students and anyone with expertise or love for Konkani can come forward to help with the project for which training will be provided, says Vishnu Vardhan. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18jiG1B"&gt;Konkani Wikipedia in the making&lt;/a&gt; (by Prakash Kamat, The Hindu, September 29, 2013): Goa University re-launched a four-volume Konkani encyclopaedia and will upload it on Wikipedia. The process will be completed in six months times, says Vishnu Vardhan&lt;a href="http://bit.ly/18jiG1B"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bV5XWH"&gt;For the love of Konkani: Preserving Goa's official language&lt;/a&gt; (by Joanna Lobo, DNA, September 29, 2013): Konkani has 24 lakh speakers as per the Census Department of India 2001 but online documentation is limited. CIS-A2K wants to strengthen the Konkani Wikipedia, says Nitika Tandon&lt;a href="http://bit.ly/1bV5XWH"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18ROmfb"&gt;Goa University to make available online Konkani Wikipedia, within 6 months&lt;/a&gt; (by Jagran Josh, September 30, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bsZW4u"&gt;Goa University Partners CIS India to Build Konkani Wikipedia&lt;/a&gt; (by Apurva Chaudhary, Medianama, September 30, 2013)&lt;a href="http://bit.ly/1bsZW4u"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Access to Knowledge (Copyright and Pervasive Technologies)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/17J3g55"&gt;The Law and Economics of Copyright Users Rights&lt;/a&gt; (organised by the American University Washington College of Law, Massachusetts Ave., NW, Washington DC, September 26, 2013). Sunil Abraham presented the Pervasive Technologies project. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Internet Governance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are doing a project on conducting research on surveillance and freedom of expression (SAFEGUARDS) with Privacy International and IDRC. So far we have organised six privacy round tables and drafted the Privacy (Protection) Bill. This month we bring you the latest version of the Privacy (Protection) Bill and an analysis of the six privacy round tables. We are also doing a project on mapping cyber security actors in South Asia and South East Asia with the Citizen Lab, Munk School of Global Affairs, University of Toronto and IDRC. We did an interview with Lawrence Liang on privacy and free speech:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;SAFEGUARDS Project&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Bill&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/14WAgI7"&gt;Privacy (Protection) Bill, 2013&lt;/a&gt;: Updated Third Draft (by Bhairav Acharya, September 30, 2013): CIS has been researching privacy in India since 2010 with the objective of raising public awareness around privacy, completing in depth research, and driving a privacy legislation in India. As part of this work, we drafted the Privacy (Protection) Bill, 2013.  This is the latest version with changes based on feedback from the Privacy Round Table held on August 24. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15Fj6vY"&gt;A Privacy Meeting with the Federal Trade Commission&lt;/a&gt; (co-organised by CIS and the Federal Trade Commission, Imperial Hotel, Janpath, New Delhi, September 20, 2013). Elonnai Hickok participated in this meeting. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/158ayNW"&gt;The National Privacy Roundtable Meetings&lt;/a&gt; (by Bhairav Acharya, September 19, 2013). Bhairav provides an analysis of the six round table meetings held in the cities of New Delhi, Bangalore, Chennai, Mumbai, and Kolkata.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/15AutoE"&gt;An Interview with Suresh Ramasubramanian&lt;/a&gt; (by Elonnai Hickok, September 6, 2013): Suresh Ramasubramanian from IBM speaks about cyber security and issues in the cloud. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Articles and Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1g5QbZj"&gt;India: Privacy in Peril&lt;/a&gt; (by Bhairav Acharya, Frontline, July 12, 2013). &lt;i&gt;The article was published in Frontline in July but was mirrored only recently on our website&lt;/i&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19DNYjs"&gt;Privacy Law Must Fit the Bill&lt;/a&gt; (by Sunil Abraham, Deccan Chronicle, September 9, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19NYTal"&gt;Transparency Reports — A Glance on What Google and Facebook Tell about Government Data Requests&lt;/a&gt; (by Prachi Arya, September 12, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16yLYFq"&gt;The National Cyber Security Policy: Not a Real Policy&lt;/a&gt; (by Bhairav Acharya, Observer Research Foundation's Cyber Security Monitor Vol. I, Issue.1, August 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1fln2vu"&gt;The Central Monitoring System: Some Questions to be Raised in Parliament&lt;/a&gt; (by Bhairav Acharya, September 19, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18oOTDk"&gt;CIS and International Coalition Calls upon Governments to Protect Privacy&lt;/a&gt; (by Elonnai Hickok, September 25, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16dKyoo"&gt;An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000 for Adjudication in the State of Maharashtra&lt;/a&gt; (by Bhairav Acharya, September 30, 2013): This is a brief review of some of the cases related to privacy filed under section 46 of the Information Technology Act, 2000 seeking adjudication for alleged contraventions of the Act in the State of Maharashtra.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bys2I1"&gt;Gmail ban looms for Indian gov't workers&lt;/a&gt; (by Beatrice Thomas, Arabian Business.com, September 1, 2013): The article says that government would ban Gmail for official communication in light of cyber spying by the US. Sunil Abraham agrees with the ban. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dJiSvF"&gt;Indien: Regierung will Nutzung von US-Mailprovidern in Verwaltungen verbieten&lt;/a&gt; (Netzpolitik, September 3, 2013). Sunil Abraham was quoted in this German newspaper. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19KvQV7"&gt;A dangerous trend: social media adds fire to Muzaffarnagar clashes&lt;/a&gt; (by Zia Haq, The Hindustan Times, September 9, 2013). The article speaks about censorship in wake of publication of malicious content. In such cases the government has a legitimate reason to censor speech, says Sunil Abraham&lt;a href="http://bit.ly/19KvQV7"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18VgnVe"&gt;Three Years Later, IPaidABribe.com Pays Off&lt;/a&gt; (by Jessica McKenzie, TechPresident, September 23, 2013): The article talks about IPaidABribe.com, an online portal focusing on civic engagement and improving governance. But the real problem in India is “high ticket bribes...at the top of the pyramid,” Sunil Abraham was quoted as having said. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/174yjHr"&gt;Indian biometric ID plan faces court hurdle&lt;/a&gt; (by John Ribeiro, Computer World, September 25, 2013): The article talks about Aadhar (India’s biometric system). The Aadhaar number now allows different agencies including private organizations to collect and exchange data between them, says Pranesh Prakash. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/GAsStr"&gt;Privacy Round Table, New Delhi&lt;/a&gt; (co-organised by FICCI, DSCI and CIS, FICCI Federation House, Tansen Marg, New Delhi, October 19, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/GAGLXL"&gt;Public Law and Jurisprudential Issues of Privacy&lt;/a&gt; (CIS, Bangalore, September 27, 2013): Abhayraj Naik, a graduate from the National Law School of India University, Bangalore, and the Yale Law School gave a talk on public law and jurisprudential issues related to privacy.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1byqRZg"&gt;Young Scholar Tutorials&lt;/a&gt; (organised by Communication Policy Research South, September 3-4, 2013). Nehaa Chaudhari participated in this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1eqxUb1"&gt;Privacy and Surveillance in India&lt;/a&gt; (organised by the Centre for Culture, Media and Governance, Jamia Millia Islamia, New Delhi, September 18, 2013). Sunil Abraham gave a talk. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dJT43q"&gt;Syllabus: “Policy and regulation conducive to rapid ICT sector growth in Myanmar: An introductory course”&lt;/a&gt; (organised by LIRNEasia in collaboration with Myanmar ICT Development Organization, and with support from the Open Society Foundation and the International Development Research Centre of Canada, September 28 – October 5, 2013). Sunil Abraham is supporting Prof. Samarajiva on the last optional day of this course in Yangon.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Congress on Privacy and Surveillance (organised by Swiss Federal Institute of Technology, Lausanne, September 30, 2013). Maria Xynou participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;Cyber Security Project&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;Video Interview&lt;/b&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Part 10: &lt;a class="external-link" href="http://bit.ly/17TMNsT"&gt;Interview with Lawrence Liang&lt;/a&gt; (September 10, 2013): In the ecology of online communication it is crucial for us to look at right to privacy and right to free speech as inseparable.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Forthcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16KOTvA"&gt;11th India Knowledge Summit 2013&lt;/a&gt; (organised by ASSOCHAM India, Hotel Shangri-La, New Delhi, October 14-15, 2013). CIS is one of the organisations supporting this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19HyyIZ"&gt;CYFY 2013: India Conference on Cyber Security and Cyber Governance&lt;/a&gt; (organised by Observer Research Foundation and the Federation of Indian Chambers of Commerce and Industry, Oberoi Hotel, New Delhi, October 14-15, 2013). Sunil Abraham will participate in this event as a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Knowledge Repository on Internet Access&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;CIS in partnership with the Ford Foundation is executing a project to create a knowledge repository on Internet and society. This repository will comprise content targeted primarily at civil society with a view to enabling their informed participation in the Indian Internet and ICT policy space. The repository is available at &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Modules&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/193RPYr"&gt;International Telecommunication Union&lt;/a&gt; (by Snehashish Ghosh and Anirudh Sridhar, September 30, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16MiB9u"&gt;Internet Corporation for Assigned Names and Numbers&lt;/a&gt; (ICANN) (by Snehashish Ghosh and Anirudh Sridhar, September 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Telecom&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa, a Distinguished Fellow at CIS is a regular columnist with the Business Standard. The articles published on his blog Organizing India Blogspot is mirrored on our website:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Newspaper Column&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/18RcDCm"&gt;Regrouping for Growth - Interest Rates – III&lt;/a&gt; (originally published in the Business Standard on September 4, 2013 and mirrored in Organizing India Blogspot on September 6, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;br /&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/188MWfr"&gt;Bangalore + Sustainability Summit&lt;/a&gt; (organized by Ashoka India, Green Lungi and IDEX, September 21, 2013, CIS, Bangalore): Denisse Albornoz has summarised the happenings in this report.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dIA9Cv"&gt;Youths brainstorm at social summit&lt;/a&gt; (The Times of India, September 21, 2013): A coverage of the Bangalore + Sustainability Summit hosted at CIS.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry + Video&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16tulHY"&gt;Revealing Protesters on the Fringe: Crucifixion Protest in Paraguay&lt;/a&gt; (by Denisse Albornoz, September 20, 2013): Denisse provides an analysis of the crucifix protest in Paraguay in the light of Nishant Shah’s piece: Whose Change is it Anyway?.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Digital Humanities&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1e5hDai"&gt;Thinking Digital Beyond Tools: Interview with Dr. Nishant Shah&lt;/a&gt; (by Noopur Raval, HASTAC, September 10, 2013): Nishant speaks about his interest in digital studies, the future of humanities, and his HASTAC experience. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dIA6GV"&gt;Reclaim Open Learning Symposium&lt;/a&gt; (organized by the Digital Media and Learning Research Hub, University of California Humanities Research Institute, UC Irvine, September 26-27, 2013): Nishant Shah participated in this event as a panelist. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;About CIS&lt;/b&gt;&lt;br /&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;:&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org or Nishant Shah, Director – Research, at nishant@cis-india.org. To discuss collaborations on Indic language wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at vishnu@cis-india.org&lt;/p&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects&lt;/i&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p class="normal"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2013-bulletin'&gt;https://cis-india.org/about/newsletters/september-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-10-24T06:48:33Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2011-bulletin">
    <title>September 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage that happened in the month of September 2011.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research base, the RAW programme has been collaborating with different organizations and individuals in order to focus on its two year thematic of Histories of the Internets in India. Five monographs were recently launched at a workshop, &lt;a href="https://cis-india.org/research/conferences/conference-blogs/workshop"&gt;Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum&lt;/a&gt; held in Ahmedabad from 19 to 22 August 2011.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/rewiring-bodies"&gt;Re:Wiring Bodies&lt;/a&gt; by Asha Achuthan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/last-cultural-mile"&gt;The Last Cultural Mile&lt;/a&gt; by Ashish Rajadhyaksha&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/porn-law-video-technology"&gt;Porn: Law, Video, Technology&lt;/a&gt; by Namita A Malhotra &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/archives-and-access"&gt;Archives and Access&lt;/a&gt; by Aparna Balachandran and Rochelle Pinto &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/histories-of-the-internet/internet-society-space"&gt;Internet, Society and Space in Indian Cities&lt;/a&gt; by Pratyush Shankar&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS, India and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;Featured Publication&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/blog/dnbook"&gt;Digital AlterNatives with a Cause?&lt;/a&gt; - This collaboratively produced collective, edited by Nishant Shah and Fieke Jansen, asks critical and pertinent questions about theory and practice around ‘digital revolutions’ in a post MENA (Middle East - North Africa) world. It works with multiple vocabularies and frameworks and produces dialogues and conversations between digital natives, academic and research scholars, practitioners, development agencies and corporate structures to examine the nature and practice of digital natives in emerging contexts from the Global South.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/digital-alternatives-book-review"&gt;Digital (Alter)Natives with a Cause? — Book Review by Maarten van den Berg&lt;/a&gt; - The books come in a beautifully designed cassette and are accompanied by a funky yellow package in the shape of a floppy disk containing the booklet ‘D:coding Digital Natives’, a corresponding DVD, and a pack of postcards portraying the evolution of writing - in the sentence ‘I love you’, written with a goose feather in 1734, to the character set ‘i&amp;lt;3u’ entered on a mobile device in 2011, writes Maarten van den Berg. The review was published in "&lt;a href="http://www.thebrokeronline.eu/Articles/Digital-Alter-Natives"&gt;The Broker&lt;/a&gt;" on 19 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/book-launch"&gt;Digital AlterNatives book launch&lt;/a&gt; – CIS and Hivos launched this book at the Museum for  Communication, Hague on 16 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/usof-meeting"&gt;Stakeholders Meeting of the USOF on Facilitating ICT Access to Persons with Disabilities in Rural Areas&lt;/a&gt;, on 7 September 2011. Nirmita Narasimhan made a presentation.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Access to Knowledge&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Access to Knowledge is a campaign to promote the fundamental principles of justice, freedom, and economic development. It deals with issues like copyrights, patents, and trademarks, which are an important part of the digital landscape. CIS believes that access to knowledge and culture is essential, and such access promotes creativity and innovation, and helps bridge the differences between the developing and developed worlds in a positive manner. Towards this end, CIS is campaigning for an international treaty on copyright exceptions for print-challenged people, advocating against laws (such as the PUPFIP Bill) that privatize public-funded knowledge, call for the WIPO Broadcast Treaty to be restricted to broadcast, question the demonization of 'pirates', and support endeavours that explore and question the current copyright regime.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/copyright-bill-parliament"&gt;Copyright Amendment Bill in Parliament&lt;/a&gt; by Nirmita Narasimhan, 30 August 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/photocopying-the-past"&gt;Photocopying the past&lt;/a&gt; by Sunil Abraham in the Indian Express, 2 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/calling-out-the-bsa-on-bs"&gt;Calling Out the BSA on Its BS&lt;/a&gt; by Pranesh Prakash, 9 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Internet technologies have fundamentally questioned the notion of governance, not only at the level of administration but also at the level of mechanisms of control, regulation and shaping of the individual. e-Governance initiatives, in combination with other regimes of surveillance, control and censorship, are redefining what it means to be a citizen, a subject, and an individual. We look at questions of governance — at the micro level of the individual and the private (family, relationships, community structures, etc.) as well as the level of governmentality — at the macro level of nation state, citizenship, market economies, and the public (spaces of consumption, work, leisure, political engagement, etc.) under the umbrella of digital governance.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/understanding-right-to-information"&gt;Understanding the Right to Information&lt;/a&gt; by Elonnai Hickok, 28 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/internet-as-a-tool-for-political-change"&gt;Using the Internet as a Tool for Political Change: Lessons Learned and Way Forward&lt;/a&gt;, IGF, Nairobi, 27 September 2011. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers.&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/telecom/blog/reviving-growth"&gt;Reviving Growth&lt;/a&gt;, published in the Business Standard on 1 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/open-spectrum-for-development-in-the-context-of-the-digital-migration"&gt;Open Spectrum for Development in the Context of the Digital Migration&lt;/a&gt;, IGF, Nairobi, 29 September 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;Film Screening&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/partners-in-crime"&gt;Screening of Partners in Crime&lt;/a&gt;, Vikalp@Smriti Nandan along with CIS screened the film and followed it with a discussion with the director of the film, Paromita Vohra, Smriti Nandan Cultural Centre, 9 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/workshop-rsa-encryption"&gt;Prime Security: The Mathematics of RSA Encryption&lt;/a&gt;, a one-day workshop with Rohit Gupta, a leading Mathematician.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-masks-forgotten-protests"&gt;India's social media "spring" masks forgotten protests&lt;/a&gt; [Alistair Scrutton in Reuters, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-key-to-hazare-success"&gt;Social media holds the key to Hazare's campaign success&lt;/a&gt; [Alistair Scrutton in NEWS.scotsman.com, 26 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/digital-divide"&gt;Digital divide: Why Irom Sharmila can’t do an Anna&lt;/a&gt; [FirstPost.Ideas, 25 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/revolutions-viral?searchterm=When+revolutions+go+viral+"&gt;When revolutions go viral&lt;/a&gt; [Times of India (Crescent Edition), 27 August 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ibsa-seminar"&gt;IBSA Seminar on Global Internet Governance&lt;/a&gt;, organised by the Brazilian Ministry of External Relations, with support from the Brazilian Internet Steering Committee (CGI.br) and the Center for Technology &amp;amp; Society (CTS/FGV) and governmental and non- governmental actors from India, Brazil and South Africa, 1 to 2 September 2011, Fundacao Getulio Vargas (FGV) - Rio de Janeiro, Brazil. Pranesh Prakash participated in this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/copyright-amendment-bill-in-indian-parliament"&gt;Copyrights Amendment Bill to Be Tabled in Indian Parliament – Parallel Import provisions have Been Removed&lt;/a&gt; [Mike Palmedo in infojustice.org, 5 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/power-of-information"&gt;The Power of Information: New Technologies for Philanthropy and Development&lt;/a&gt; [Indigo Trust, 15 September 2011]. Sunil Abraham participated in this event. A video of his speech is now available on &lt;a href="http://www.youtube.com/watch?v=XhpLkEhn9AY"&gt;YouTube&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/using-social-media-to-understand-peoples-pulse"&gt;Planning Commission, Census 2011 and India Post using social media to understand people's pulse better&lt;/a&gt; [Vikas Kumar in the Economic Times, 20 September 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/foss-instrument-for-accessible-development"&gt;The Impact of Regulation: FOSS and Enterprise&lt;/a&gt;, organised by FOSSFA and ICFOSS, IGF, Nairobi, 28 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/privacy-security-access-to-rights"&gt;Privacy, Security, and Access to Rights: A Technical and Policy Analyses&lt;/a&gt;, organised by Expression Technologies, IGF, Nairobi, 29 September 2011. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/how-can-privacy-be-protected"&gt;Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?&lt;/a&gt;, organised by GSM Association, 29 September 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/truman-show-in-kerala"&gt;The Truman Show, in Kerala&lt;/a&gt; [Times of India, posted on CIS website on 23 September 2011].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/making-difference-online-offline"&gt;Making a difference, online and offline&lt;/a&gt; [LiveMint, 27 September 2011].&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=456&amp;amp;qid=46981" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Follow CIS on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=457&amp;amp;qid=46981" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=458&amp;amp;qid=46981" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=459&amp;amp;qid=46981" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2011-bulletin'&gt;https://cis-india.org/about/newsletters/september-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-07-30T06:34:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins">
    <title>Separating the 'Symbiotic Twins'</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins</link>
    <description>
        &lt;b&gt;This post tries to undo the comfortable linking that has come to exist in the ‘radical’ figure of the cyber-queer. And this is so not because of a nostalgic sense of the older ways of performing queerness, or the world of the Internet is fake or unreal in comparison to bodily experience, and ‘real’ politics lies elsewhere. This is so as it is a necessary step towards studying the relationship between technology and sexuality.&lt;/b&gt;
        &lt;p&gt;Here, I would like to deal with ‘openness’ as an idea that seems to structure discussions on the nature of both the Internet and queerness, in different ways. What does it mean to read an object/phenomenon/practice as signalling the acts of opening? What is opening placed in opposition to? The terms that come together to constitute the &lt;em&gt;field of openness&lt;/em&gt;, so to speak, are these – transparency, publicness, privacy, safety, freedom, expression, anonymity (not so paradoxically), communication, virtuality on the one hand and opacity  on the other, the closet, danger, morality, prohibition, lack of access and real life.&lt;/p&gt;
&lt;p&gt;‘Openness’ is seen as the fundamental principle of the Internet. [1] The ramifications of this statement for Internet studies and by extension for studies on the ‘cyber queer’ or on the implications of Internet technology for alternative sexuality practices are then the concern of this post. What does this idea refer itself to in terms of how we live in the world? It refers to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;communication – the idea that with the Internet, communication has broken free of the temporal, spatial, linguistic and national restrictions imposed by earlier technologies; &lt;/li&gt;
&lt;li&gt;space – that space is no longer defined in material terms and the binary or inside/outside and public/private, has been radically recast by the entry into our lives of ‘cyberspace’ and of space thought of in virtual terms;&lt;/li&gt;
&lt;li&gt;body – dematerialization, disembodiment, terms that imply that on the Internet, you become an entity of the mind and of a desire that does not need the material body. The implications of this then being that the threat to the body, posed by its circulation in ‘real’ space and time, is now reduced, because that body no longer has as much at stake as the mind does, in the world of virtual technology. It also means release from a body that is encumbered by class difference and the various ‘markers’ of social relations;&lt;/li&gt;
&lt;li&gt;decentralization – that the Internet adopts the mode of ‘weaving’, which is seen as a refusal of hierarchisation, the kind imposed by the ways in which information is made available, or production and consumption are managed, the ways in which class, race and gender restrict the ways in which individuals ‘participate’. Weaving then refers to a network system in place of a top-down system. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;“The evidence of the trend towards openness is all around. Young people are sharing their lives online via Facebook, Twitter, Flickr, YouTube, Google, and whatever comes next. Though that mystifies their elders and appalls self-appointed privacy advocates, the transparent generation gains value from its openness. This is how they find each other, share, and socialize.”[2] (Jeff Jarvis, author of What would Google do?). We are henceforth titled the ‘transparent generation’, and we find the same value in the technology that defines our lives – the Internet. Why we are ‘transparent’ when compared to earlier generations? ‘Transparent’, ‘strawberry’, etc., are all terms that have come to describe the present generation of Internet users, the youth, a category born out of an idea of freedom from both moral and political constraint. In this imagination of them, they use technology in order to gain this freedom, in order to give their minds and bodies, which are straining at the leash, the required escape routes, from institutions (family, school and legal systems), from social relations (class and sexuality), and earlier forms of political identification.&lt;/p&gt;
&lt;p&gt;The 90s was seen as the decade of openness, both in terms of new media technology and sexual practice. “With liberalisation sweeping the Indian mindset, more and more people are determined to enjoy the secret thrills sex has to offer. While high-profile executives are being seduced by escort services, the middle-class minds are being titillated by 'parties'. Those who are more discreet go for phone sex or MMS.”[3] What comes across is an idea of a new relationship to the temporal and the spatial, the cultural and the social. And sexuality seems to be central to this relationship. “A sexual revolution is sweeping through the small and big towns of India, and to stay immune to it is a big (t)ask.”[4] This article from The Week tells us how the ‘new sexual’ or the ‘newly sexual’ is described in popular discourse. So much so that the violence of the right-wing groups against women and against ‘obscene’ texts are sometimes explained through this very revolution of/in sex. It is read as a backlash, in a moment that is producing this new relationship, with the help of new media technologies such as the mobile phone, the Internet, the web camera and the ‘things’ that enable this openness. And because it is read as a backlash, the practices of the Hindu right are read as wishing to &lt;em&gt;close&lt;/em&gt;, to reverse this process of opening out and to keep things &lt;em&gt;as they used to be&lt;/em&gt;. Openness is not just a set of practices; it is read as a mindset, a shift from an older era of being bound within certain social structures. “Earlier only newly married women had the right, indeed were expected, to advertise their sexuality before receding into wall-flowers as respectable married women but today all that has changed….Walk into any college or even a school campus across the country and you have young men and women equating liberation and sexuality” (Patricia Uberoi). The linking of sexuality and liberation or freedom is here crucial, because what is particular to this era is the fact that ‘sexual expression’ is seen an indicator of freedom, whether this freedom is placed against moral or political orthodoxies, or on the other hand posited as Westernisation. Popular discourse reveals us as having arrived at the desire for sexual freedom (whether or not sexual freedom itself).&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Queerness&lt;/em&gt;, a phenomenon of the 90s in the Indian context, is similarly described as an &lt;em&gt;opening out&lt;/em&gt;. ‘Queer’ signifies a stepping out of the binary of heterosexuality/homosexuality, which will no longer encumber the body or the mind. It is a conscious move away from identities like lesbian, gay, bisexual or transgender, in fact identity in itself is rendered fragmented and cannot emerge from a monolithic location.&lt;/p&gt;
&lt;p&gt;“There was excitement and apprehension in the early '90s as an endless diversity of images flowed into private and public spaces…. Sexual speech came under special attention as newscasts, talk shows, sitcoms and a variety of TV shows challenged conventional family values and sexual normativity including monogamy, marriage and heterosexuality” (Shohini Ghosh – “The Closet is Ajar”, in Outlook[6]). Queerness is then linked to this rapid spread, this breathless circulation, this new access. Technological change is inextricably tied to this idea of the closet being ajar. “…the rapid spread of satellite TV and new media technologies continue to transform the cultural practices of the urban middle class.” It seems to be an era in which the boundaries of the sexual norm are being forced to redraw themselves, simply by the massive onslaught of ideas, speech and images. Queer identities are then seen as riding the crest of a wave of sexual revolution that has been washing over India over the past two decades.&lt;/p&gt;
&lt;p&gt;These two formations, the Internet and the queer (we have not yet established what kind of formations they are), have been brought together in the term ‘cyber queer’ for the purpose of sociological and other analyses. The Levi’s ad for ‘innerwear’ shows a young black man saying, “On my web profile, I am a girl”. You can be a beer-bellied man in real life and turn into a voluptuous woman in second life. The virtual life, the virtual body and the virtual sex – the Internet is often spoken of as performing two functions for someone practicing alternative sexualities:&lt;/p&gt;
&lt;p&gt;that it lets them be ‘other’ than they are (or are forced to be in real life);&lt;/p&gt;
&lt;p&gt;by doing this, they are allowed to express their ‘real’ sexual desire or gender in a ‘safer’ space than in real life, thereby allowing for a freeing up or an opening (however, secretively it is done). “Cruising in physical spaces of the city has always been an affair which dangles on the edge of unsafety. Arrests and blackmail by policemen loaded with section 377, or extortion for money are often reported within queer circles. The &lt;a class="external-link" href="http://www.gaybombay.org/"&gt;Gay Bombay&lt;/a&gt; website has several articles and personal narratives which function as cruising guidelines and warnings. has several articles and personal narratives which function as cruising guidelines and warnings. In this context, Internet portals like &lt;a class="external-link" href="http://www.robtex.com/dns/guys4men.com.html"&gt;guys4men&lt;/a&gt; provide forums which can be used to manoeuvre cruising in a different manner, possibly much safer than in moonlit Nehru or Central Parks in Delhi or train-station loos in Bombay.” (Mario d’Penha, gay activist [7])&lt;/p&gt;
&lt;p&gt;Again, the notion of ‘space’ as suddenly emerging from the shadowy realms of ambiguity and secrecy, to stand in for freedom, is something that one often encounters in relation to cyber-queerness. And it is not just physical space which is pulled into this discourse of the technological shift, it is desire itself - “Desire is unabashed, playful and complex here”[8]. Desire, personified thus, is then seen as something set free by and through technological innovation.&lt;/p&gt;
&lt;p&gt;Though this notion of sudden freedom is contested by researchers and scholars within the field, the result of that contestation has often been to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;affirm, in place of a single figure of the liberated cyber queer, the multiplicity of behaviours, dangers and freedoms that are generated. This is a little like affirming, in place of a single body called &lt;em&gt;the public&lt;/em&gt;, several bodies that are termed multiple publics, or subaltern publics. The problem with this approach is that the nature of this public, the public-ness of it, is not then fully interrogated. It is assumed that the multiplicity in itself will be contest enough;&lt;/li&gt;
&lt;li&gt;return to the body as existing at the root of queer existence. This return then, in claiming something that has been forgotten, or disavowed (our bodily existence), finds a strange comfort in this body, settling within it as if having found a location from which to speak, about the virtual, about cyberspace. For example, though Jodi O’Brien, in her essay “Changing the Subject”[9] refutes the claim “There are no closets in cyberspace”, she finds it necessary to return to the ‘body’ and not to subjectivity in order to do so – it is as if the materiality of the body is the only &lt;em&gt;concrete&lt;/em&gt; thing that will allow this contestation. “The ‘alternative’ experiences that are enacted in ‘alternative’ or queer spaces are based on realities of the flesh: real, embodied experiences and/or fantasies cultivated through exposure to multisensory stimuli.” The body then becomes the explanatory fulcrum, and it is only from here that any kind of relationship to what is seen as virtuality can be understood.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;An ancestor to the above problem - “What precisely does the &lt;em&gt;cyber&lt;/em&gt; add to the &lt;em&gt;queer&lt;/em&gt; identity which it lacked previously?”[10] This question, framed as the most basic one can ask of this figure, makes the following assumptions – that ‘queer’ is a human subject that precedes ‘cyber’, a.k.a non-human technology that the latter &lt;em&gt;adds&lt;/em&gt; to this human subject and how it performs in the world, or has transformed it &lt;em&gt;after the fact&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;It is remarkably easy to say that in the great saga of sexual practices, technology has been an agent of transformation. Or, more importantly, to place cyberspace and queerness on par with each other, as sharing the same nature, or functioning on the same fundamental principle – of decentering or destabilizing a previously integrated or unified subject. Nina Wakeford asks of the term cyberqueer, “…what is the purpose of creating a hybrid of the two? It is a calculated move which stresses the interdependence of the two concepts, both in the daily practices of the certain and maintenance of a cyberspace which is lesbian, gay, transgendered or queer, and in the research of these arenas.”[11] By this logic, they are interdependent because there is some inherent quality in each that makes it offer itself to the other. “Queer sex is about following the desires of the flesh into an unnamed, uncategorized, uncharted realm, and doing something that neither of you can 'code'.”[12] The value of queerness therefore, derives from this lack of naming, an escape from coding of a particular kind, the zone of ambiguous enactments of desire.[13] “While it is this open transparent character of online existence that lays the Internet vulnerable to surveillance, it is also its self-inscribing character that makes it the playground of possibilities it is at its best. Cyberspace is habitat, playground, university, boulevard and refuge” (Shuddhabrata Sengupta, ‘Net Nomad on a Rough Route: A Despatch from Cyberspace’[14]). It is a zone of enactments of desire, a playground of possibilities, undefined, unbound.&lt;/p&gt;
&lt;p&gt;There is then a reading of technology and sexuality as feeding off each other - “The relationship between technology and sexuality is a symbiotic one. As humankind creates new inventions, people find ways of eroticizing new technology. So it is not surprising that with the advent of the information superhighway, more and more folks are discovering the sexual underground within the virtual community in cyberspace” (Daniel Tsang)[15]. The above quote assumes the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;that humankind existed before technology;&lt;/li&gt;
&lt;li&gt;that first a technology is born and then there is the eroticization of this technology. It is only because of these assumptions that technology (in this case the Internet) as such can be seen as fundamentally open. Latour’s critique of the first assumption is that “Without technological detours, the properly human cannot exist.”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;At the point of encountering this strange euphoria, we need to pause and consider, with Latour, this very relationship between technology and sexuality. “There has been a persistent silence on matters of sexuality in critical cultural studies of technology, perhaps partially because technology was associated with the instrumental to the exclusion of the representational (Case 1995). The creation of the term ‘cyber queer’ is itself an act of resistance in the face of such suppression” (Nina Wakeford). If the relationship between the two is viewed along representational lines, then the only direction that can be taken is one which will posit the human before the technological, will posit technological as that which enables (or not) representations of this human subject. In this sense, the representational is not far from the instrumental as an explanatory framework.&lt;/p&gt;
&lt;p&gt;In all the explanations we have seen above, at one level or another, technology has viewed as the ‘thing’[17], and morality as that which ascribes meaning in a particular way to this thing. For example, the mobile phone is seen as the thing, the technology, with concrete attributes and use value. Morality is what then prescribes how this thing is to be used or not used, or the dangers that follow from its use in the world of social relations. Latour argues against this way of positioning technology and morality, and instead calls them both modes of ‘alterity’, albeit two different modes. Alterity in his definition is being-as-another, technology and morality both then constituting a particular way of &lt;em&gt;being-as-another&lt;/em&gt;. Technology is not what you use, it is not a means to an end, it in fact changes the end to which it is the means. It is the curve, the detour. Morality is what questions means and ends and prevents the easy categorization of objects or people as one or another.&lt;/p&gt;
&lt;p&gt;We are used to thinking of morality as keeping things static, wanting them unchanged, preventing new ideas or practices from being absorbed into the domains of our existence. Especially when it comes to sexuality, morality is seen as that which blocks, which lives in the past, which ‘ossifies’ – “…morality consists precisely of the willingness/ability to accept and organize one's behaviour in accordance with… ‘ossified’ recipes for interaction. If gender is a primary (read: coded as ‘natural’) institution for organizing social interaction, then boundary transgressions are not only likely to arouse confusion but to elicit moral outrage from the boundary keepers.”[18] Morality here refers to boundary keeping. Latour shifts our understanding of morality in ways that allow us to read beyond the boundary keeping. According to him, morality constantly interrupts the means-to-end process by questioning the use of something/someone as a means towards an end. Morality is then a hindrance to this process, not an ossification of social relations or practices.&lt;/p&gt;
&lt;p&gt;This argument disrupts the location of technology as that which signals an opening out of the universe, and morality as signalling a closing off. True, Latour himself reads technology as creating &lt;em&gt;new&lt;/em&gt; functions, or as creating &lt;em&gt;new&lt;/em&gt; ends but he does not categorise these and the technologies they derive from as ‘open’. For him, technology is opaque, unreadable. Sexuality also then cannot be read as feeding off of technology, as some kind of symbiotic twin to it. The relationship between technological shifts and sexual practices or identities has to be read alternately to this idea of freedom from the shackles of social relations and bodily constraints. Sexuality cannot also then be opposed to morality, as it has often been done.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="discreet"&gt;[1] &lt;a class="external-link" href="http://www.openinternetcoalition.org/"&gt;www.openinternetcoalition.org.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[2] Jarvis, Jeff. “Openness and the Internet”, &lt;a class="external-link" href="http://www.businessweek.com/managing/content/may2009/ca2009058_754247.htm"&gt;http://www.businessweek.com/managing/content/may2009/ca2009058_754247.htm.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[3] Doval, Nikita. “Bold Bodies”, in The Week, September 7, 2008.&lt;/p&gt;
&lt;p class="discreet"&gt;[4] Ibid.&lt;/p&gt;
&lt;p class="discreet"&gt;[5] Quoted in Doval, Nikita. "Bold Bodies", in The Week, September 7, 2008, p 50.&lt;/p&gt;
&lt;p class="discreet"&gt;[6] &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?227507"&gt;http://www.outlookindia.com/article.aspx?227507&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[7] Quoted in Katyal, Akhil. “Cyber Cultures/Queer Cultures in Delhi”. See &lt;a class="external-link" href="http://mail.sarai.net/pipermail/urbanstudygroup/2007-July/002827.html"&gt;http://mail.sarai.net/pipermail/urbanstudygroup/2007-July/002827.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[8] Katyal, Akhil “Cyber Cultures/Queer Cultures in Delhi”. See &lt;a class="external-link" href="http://mail.sarai.net/pipermail/urbanstudygroup/2007-July/002827.html"&gt;http://mail.sarai.net/pipermail/urbanstudygroup/2007-July/002827.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[9] Women and Performance: Issue 17: Sexuality and Cyberspace.&lt;/p&gt;
&lt;p class="discreet"&gt;[10] Wakeford, Nina. “Cyberqueer”, in Bell, David and Barbara Kennedy, eds. The Cybercultures Reader. Routledge: London, 2000&lt;/p&gt;
&lt;p class="discreet"&gt;[11] “Cyberqueer”, in Bell, David and Barbara Kennedy, eds. The Cybercultures Reader.&lt;/p&gt;
&lt;p class="discreet"&gt;[12] O’Brien, Jodi. “Changing the Subject”. In Women and Performance, Issue 17: Sexuality and Cyberspace.&lt;/p&gt;
&lt;p class="discreet"&gt;[13] Here I deal with the idea of queerness at an almost commonsensical level, not at the level of the queer theory of Judith Butler or Eve Sedgwick, just as cyberspace is also dealt with at the level of what it seems to be seen as doing.&lt;/p&gt;
&lt;p class="discreet"&gt;[14] Quoted in the Sarai discussion.&lt;/p&gt;
&lt;p class="discreet"&gt;[15] Tsang, Daniel. “Notes on Queer ‘n’ Asian Virtual Sex”. In Bell, David and Barbara Kennedy, eds. The Cybercultures Reader. Routledge: London, 2000.&lt;/p&gt;
&lt;p class="discreet"&gt;[16] Latour, Bruno. “Morality and Technology: The End of the Means”. See &lt;a class="external-link" href="http://www.bruno-latour.fr/articles/article/080-en.html"&gt;http://www.bruno-latour.fr/articles/article/080-en.html&lt;/a&gt;.&lt;/p&gt;
&lt;p class="discreet"&gt;[17] I put this in quotes because latour has a very specific definition of ‘thing’ or Ding, which this is not.&lt;/p&gt;
&lt;p class="discreet"&gt;[18] O’Brien, Jodi. “Changing the Subject”, in Women and Performance, Issue 17: Sexuality and Cyberspace. See &lt;a class="external-link" href="http://web.archive.org/web/20040604123458/www.echonyc.com/~women/Issue17/art-browning.html"&gt;http://web.archive.org/web/20040604123458/www.echonyc.com/~women/Issue17/art-browning.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;[18] O’Brien, Jodi. “Changing the Subject”, in Women and Performance, Issue 17: Sexuality and Cyberspace. See &lt;a class="external-link" href="http://web.archive.org/web/20040604123458/www.echonyc.com/~women/Issue17/art-browning.html"&gt;http://web.archive.org/web/20040604123458/www.echonyc.com/~women/Issue17/art-browning.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/queer-histories-of-the-internet/symbiotic-twins&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nitya V</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>histories of internet in India</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    

   <dc:date>2019-09-18T14:10:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/sense-and-censorship">
    <title>Sense and Censorship</title>
    <link>https://cis-india.org/internet-governance/sense-and-censorship</link>
    <description>
        &lt;b&gt;The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) bills, at the US House of Representatives and Senate, respectively, appear to enforce property rights, but are, in fact, trade bills. This article by Sunil Abraham was published in the Indian Express on 20 January 2012.&lt;/b&gt;
        
&lt;p&gt;In developed countries like the US, intellectual property (IP) plays a
 dominant role in the economy, unlike in economies like India. Countries
 that have significant IP are keen to increase global and national 
enforcement activities, while countries with little domestic IP are keen
 to reduce outgoing royalties in the balance of payments and therefore, 
keen to expand alternatives, limitations and exceptions like copyleft 
licensing, compulsory/statutory licensing and fair dealing.&lt;/p&gt;
&lt;p&gt;The loss of generic medicines, hardware based on open standards, 
public domain content, free and open source software, open access 
journal articles, etc will equally impoverish consumers in the US and in
 India. SOPA and PIPA, therefore, do not represent the will of the 
average American but rather the interests of the IP sector, which has 
tremendous influence in the Hill. There is one more layer of 
complication for policy-makers to consider as they work towards a 
compromise of interests in Internet governance — the tension between the
 old and the new. The incumbents — corporations with business models 
that have been rendered obsolete by technological developments — versus 
emerging actors who provide competing products and services, often with 
greater technological sophistication, higher quality, at a lower cost.&lt;/p&gt;
&lt;p&gt;The US, in terms of policy and infrastructure, still controls the 
global Domain Name System (DNS) and consequently, post-SOPA/PIPA, can 
take unilateral trade action without worrying about national variations 
enabled by international law. These bills directly undermine the 
business models of many Indian companies — generic drug manufacturers 
like Ranbaxy, software service providers like Infosys, electronics 
manufacturers like Spice and players in many other sectors dominated by 
IP rights. So it is baffling that they have not added their voices to 
the global outcry.&lt;/p&gt;
&lt;p&gt;SOPA and PIPA, if passed, will enable the US administration to take 
three-pronged action against IP infringers — seizure of domain names and
 DNS filtering, blocking of transactions by financial intermediaries and
 revocation of hosting by ISPs. While circumvention may still be 
possible, it will get increasingly laborious — something like the Great 
Firewall of China, but worse. Unfortunately, the implementation of these
 blunt policy instruments will require more and more public-funded 
surveillance and censorship.&lt;/p&gt;
&lt;p&gt;The censorship potential of efforts like SOPA and PIPA may appeal to 
others, as autocratic and democratic regimes across the world have been 
keen to try technology-mediated social engineering — these efforts have 
been multiplied in the post-Arab Spring and Occupy Wall Street world. 
Organised religion, social conservatives and those who have been at the 
receiving end of free speech would all want to shut down platforms like 
WikiLeaks and political movements like Anonymous and the Pirate Party.&lt;/p&gt;
&lt;p&gt;These are equally dismal times for Internet governance in India. 
Google, Facebook and 20-odd other intermediaries are trying to avoid 
jail time at the hands of a Delhi court. However, ever since the IT Act 
amendments were put in place three years back, digital activists have 
been requesting intermediaries to register their protests early and 
often, regarding draconian provisions in the statute and in the 
associated rules. Their silence is going to be very expensive for all of
 us. We cannot depend on the private sector alone to defend our 
constitutional rights. As yet unpublished research from CIS demonstrates
 that private intermediaries only bother with defending freedom of 
expression when it undermines their business interests. Working with an 
independent researcher, we conducted a policy sting operation — faulty 
take-down notices were served to seven intermediaries asking for 
legitimate content to be taken down. In six of those cases, the 
intermediaries over-complied, in one case deleting all comments on a 
news article instead of just those comments identified in the notice. 
The only take-down that was resisted was one claiming that sale of 
diapers was “harmful to minors” under the Indian IT Act (because they 
caused nappy rash). It is clear that the IT Act and its associated rules
 have already had a chilling effect on online participation by Indians.&lt;/p&gt;
&lt;p&gt;Fortunately for us, during the previous parliamentary session — 
Jayant Chaudhary, Lok Sabha MP from the Rashtriya Lok Dal, asked for the
 revision of rules concerning intermediaries, cyber-cafes and reasonable
 security practices. The next Parliament session is the last opportunity
 for the House to reject these rules and intervene for a free Internet.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The writer is executive director of the Bangalore-based Centre for Internet and Society&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/sense-and-censorship/901686/1"&gt;Read&lt;em&gt; &lt;/em&gt;the original published in the Indian Express&lt;/a&gt;&lt;em&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/sense-and-censorship/901686/1"&gt; &lt;/a&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/sense-and-censorship'&gt;https://cis-india.org/internet-governance/sense-and-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-01-31T06:15:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology">
    <title>Security: Privacy, Transparency and Technology</title>
    <link>https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has been involved in privacy and data protection research for the last five years. It has participated as a member of the Justice A.P. Shah Committee, which has influenced the draft Privacy Bill being authored by the Department of Personnel and Training. It has organised 11 multistakeholder roundtables across India over the last two years to discuss a shadow Privacy Bill drafted by CIS with the participation of privacy commissioners and data protection authorities from Europe and Canada.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was co-authored by Sunil Abraham, Elonnai Hickok and Tarun Krishnakumar. It was published by Observer Research Foundation, &lt;a href="https://cis-india.org/internet-governance/blog/security-privacy-transparency-technology.pdf" class="internal-link"&gt;Digital Debates 2015: CyFy Journal Volume 2&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Our centre’s work on privacy was considered incomplete by some stakeholders because of a lack of focus in the area of cyber security and therefore we have initiated research on it from this year onwards. In this article, we have undertaken a preliminary examination of the theoretical relationships between the national security imperative and privacy, transparency and technology.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Privacy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Daniel J. Solove has identified the tension between security and privacy as a false dichotomy: "Security and privacy often clash, but there need not be a zero-sum tradeoff." &lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; Further unpacking this false dichotomy, Bruce Schneier says, "There is no security without privacy. And liberty requires both security and privacy." &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; Effectively, it could be said that privacy is a precondition for security, just as security is a precondition for privacy. A secure information system cannot be designed without guaranteeing the privacy of its authentication factors, and it is not possible to guarantee privacy of authentication factors without having confidence in the security of the system. Often policymakers talk about a balance between the privacy and security imperatives—in other words a zero-sum game. Balancing these imperatives is a foolhardy approach, as it simultaneously undermines both imperatives. Balancing privacy and security should instead be framed as an optimisation problem. Indeed, during a time when oversight mechanisms have failed even in so-called democratic states, the regulatory power of technology &lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; should be seen as an increasingly key ingredient to the solution of that optimisation problem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data retention is required in most jurisdictions for law enforcement, intelligence and military purposes. Here are three examples of how security and privacy can be optimised when it comes to Internet Service Provider (ISP) or telecom operator logs:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Data Retention&lt;/strong&gt;: We propose that the office of the Privacy Commissioner generate a cryptographic key pair for each internet user and give one key to the ISP / telecom operator. This key would be used to encrypt logs, thereby preventing unauthorised access. Once there is executive or judicial authorisation, the Privacy Commissioner could hand over the second key to the authorised agency. There could even be an emergency procedure and the keys could be automatically collected by concerned agencies from the Privacy Commissioner. This will need to be accompanied by a policy that criminalises the possession of unencrypted logs by ISP and telecom operators.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Privacy-Protective Surveillance&lt;/strong&gt;: Ann Cavoukian and Khaled El Emam &lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; have proposed combining intelligent agents, homomorphic encryption and probabilistic graphical models to provide “a positive-sum, ‘win–win’ alternative to current counter-terrorism surveillance systems.” They propose limiting collection of data to “significant” transactions or events that could be associated with terrorist-related activities, limiting analysis to wholly encrypted data, which then does not just result in “discovering more patterns and relationships without an understanding of their context” but rather “intelligent information—information selectively gathered and placed into an appropriate context to produce actual knowledge.” Since fully homomorphic encryption may be unfeasible in real-world systems, they have proposed use of partially homomorphic encryption. But experts such as Prof. John Mallery from MIT are also working on solutions based on fully homomorphic encryption.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Fishing Expedition Design&lt;/strong&gt;: Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal have proposed a standard &lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; that could be adopted by authorised agencies, telecom operators and ISPs. Instead of giving authorised agencies complete access to logs, they propose a format for database queries, which could be sent to the telecom operator or ISP by authorised agencies. The telecom operator or ISP would then process the query, and anonymise/obfuscate the result-set in an automated fashion based on applicable privacypolicies/regulation. Authorised agencies would then hone in on a subset of the result-set that they would like with personal identifiers intact; this smaller result set would then be shared with the authorised agencies.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;An optimisation approach to resolving the false dichotomy between privacy and security will not allow for a total surveillance regime as pursued by the US administration. Total surveillance brings with it the ‘honey pot’ problem: If all the meta-data and payload data of citizens is being harvested and stored, then the data store will become a single point of failure and will become another target for attack. The next Snowden may not have honourable intentions and might decamp with this ‘honey pot’ itself, which would have disastrous consequences.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If total surveillance will completely undermine the national security imperative, what then should be the optimal level of surveillance in a population? The answer depends upon the existing security situation. If this is represented on a graph with security on the y-axis and the proportion of the population under surveillance on the x-axis, the benefits of surveillance could be represented by an inverted hockey-stick curve. To begin with, there would already be some degree of security. As a small subset of the population is brought under surveillance, security would increase till an optimum level is reached, after which, enhancing the number of people under surveillance would not result in any security pay-off. Instead, unnecessary surveillance would diminish security as it would introduce all sorts of new vulnerabilities. Depending on the existing security situation, the head of the hockey-stick curve might be bigger or smaller. To use a gastronomic analogy, optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India the designers of surveillance projects have fortunately rejected the total surveillance paradigm. For example, the objective of the National Intelligence Grid (NATGRID) is to streamline and automate targeted surveillance; it is introducing technological safeguards that will allow express combinations of result-sets from 22 databases to be made available to 12 authorised agencies. This is not to say that the design of the NATGRID cannot be improved.&lt;/p&gt;
&lt;h3&gt;Security and Transparency&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;There are two views on security and transparency: One, security via obscurity as advocated by vendors of proprietary software, and two, security via transparency as advocated by free/open source software (FOSS) advocates and entrepreneurs. Over the last two decades, public and industry opinion has swung towards security via transparency. This is based on the Linus rule that “given enough eyeballs, all bugs are shallow.” But does this mean that transparency is a necessary and sufficient condition? Unfortunately not, and therefore it is not necessarily true that FOSS and open standards will be more secure than proprietary software and proprietary standards.&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Optimal surveillance is like salt in cooking—necessary in small quantities but counter-productive even if slightly in excess.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;The recent detection of the Heartbleed &lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; security bug in Open SSL, &lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt; causing situations where more data can be read than should be allowed, and Snowden’s revelations about the compromise of some open cryptographic standards (which depend on elliptic curves), developed by the US National Institute of Standards and Technology, are stark examples. &lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At the same time, however, open standards and FOSS are crucial to maintaining the balance of power in information societies, as civil society and the general public are able to resist the powers of authoritarian governments and rogue corporations using cryptographic technology. These technologies allow for anonymous speech, pseudonymous speech, private communication, online anonymity and circumvention of surveillance and censorship. For the media, these technologies enable anonymity of sources and the protection of whistle-blowers—all phenomena that are critical to the functioning of a robust and open democratic society. But these very same technologies are also required by states and by the private sector for a variety of purposes—national security, e-commerce, e-banking, protection of all forms of intellectual property, and services that depend on confidentiality, such as legal or medical services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In order words, all governments, with the exception of the US government, have common cause with civil society, media and the general public when it comes to increasing the security of open standards and FOSS. Unfortunately, this can be quite an expensive task because the re-securing of open cryptographic standards depends on mathematicians. Of late, mathematical research outputs that can be militarised are no longer available in the public domain because the biggest employers of mathematicians worldwide today are the US military and intelligence agencies. If other governments invest a few billion dollars through mechanisms like Knowledge Ecology International’s proposed World Trade Organization agreement on the supply of knowledge as a public good, we would be able to internationalise participation in standard-setting organisations and provide market incentives for greater scrutiny of cryptographic standards and patching of vulnerabilities of FOSS. This would go a long way in addressing the trust deficit that exists on the internet today.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Security and Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;A techno-utopian understanding of security assumes that more technology, more recent technology and more complex technology will necessarily lead to better security outcomes.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is because the security discourse is dominated by vendors with sales targets who do not present a balanced or accurate picture of the technologies that they are selling. This has resulted in state agencies and the general public having an exaggerated understanding of the capabilities of surveillance technologies that is more aligned with Hollywood movies than everyday reality.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;More Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Increasing the number of x-ray machines or full-body scanners at airports by a factor of ten or hundred will make the airport less secure unless human oversight is similarly increased. Even with increased human oversight, all that has been accomplished is an increase in the potential locations that can be compromised. The process of hardening a server usually involves stopping non-essential services and removing non-essential software. This reduces the software that should be subject to audit, continuously monitored for vulnerabilities and patched as soon as possible. Audits, ongoing monitoring and patching all cost time and money and therefore, for governments with limited budgets, any additional unnecessary technology should be seen as a drain on the security budget. Like with the airport example, even when it comes to a single server on the internet, it is clear that, from a security perspective, more technology without a proper functionality and security justification is counter-productive. To reiterate, throwing increasingly more technology at a problem does not make things more secure; rather, it results in a proliferation of vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Latest Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Reports that a number of state security agencies are contemplating returning to typewriters for sensitive communications in the wake of Snowden’s revelations makes it clear that some older technologies are harder to compromise in comparison to modern technology. &lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt; Between iris- and fingerprint-based biometric authentication, logically, it would be easier for a criminal to harvest images of irises or authentication factors in bulk fashion using a high resolution camera fitted with a zoom lens in a public location, in comparison to mass lifting of fingerprints.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Complex Technology&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Fifteen years ago, Bruce Schneier said, "The worst enemy of security is complexity. This has been true since the beginning of computers, and it’s likely to be true for the foreseeable future." &lt;a name="fr10" href="#fn10"&gt;[10]&lt;/a&gt; This is because complexity increases fragility; every feature is also a potential source of vulnerabilities and failures. The simpler Indian electronic machines used until the 2014 elections are far more secure than the Diebold voting machines used in the 2004 US presidential elections. Similarly when it comes to authentication, a pin number is harder to beat without user-conscious cooperation in comparison to iris- or fingerprint-based biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the following section of the paper we have identified five threat scenarios &lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt; relevant to India and identified solutions based on our theoretical framing above.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Threat Scenarios and Possible Solutions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Hacking the NIC Certifying Authority&lt;/strong&gt;&lt;br /&gt;One of the critical functions served by the National Informatics Centre (NIC) is as a Certifying Authority (CA). &lt;a name="fr12" href="#fn12"&gt;[12]&lt;/a&gt; In this capacity, the NIC issues digital certificates that authenticate web services and allow for the secure exchange of information online. &lt;a name="fr13" href="#fn13"&gt;[13]&lt;/a&gt; Operating systems and browsers maintain lists of trusted CA root certificates as a means of easily verifying authentic certificates. India’s Controller of Certifying Authority’s certificates issued are included in the Microsoft Root list and recognised by the majority of programmes running on Windows, including Internet Explorer and Chrome. &lt;a name="fr14" href="#fn14"&gt;[14]&lt;/a&gt; In 2014, the NIC CA’s infrastructure was compromised, and digital certificates were issued in NIC’s name without its knowledge. &lt;a name="fr15" href="#fn15"&gt;[15]&lt;/a&gt; Reports indicate that NIC did not "have an appropriate monitoring and tracking system in place to detect such intrusions immediately." &lt;a name="fr16" href="#fn16"&gt;[16]&lt;/a&gt; The implication is that websites could masquerade as another domain using the fake certificates. Personal data of users can be intercepted or accessed by third parties by the masquerading website. The breach also rendered web servers and websites of government bodies vulnerable to attack, and end users were no longer sure that data on these websites was accurate and had not been tampered with. &lt;a name="fr17" href="#fn17"&gt;[17]&lt;/a&gt; The NIC CA was forced to revoke all 250,000 SSL Server Certificates issued until that date &lt;a name="fr18" href="#fn18"&gt;[18]&lt;/a&gt; and is no longer issuing digital certificates for the time being. &lt;a name="fr19" href="#fn19"&gt;[19]&lt;/a&gt;Public key pinning is a means through which websites can specify which certifying authorities have issued certificates for that site. Public key pinning can prevent man-in-the-middle attacks due to fake digital certificates. &lt;a name="fr20" href="#fn20"&gt;[20]&lt;/a&gt; Certificate Transparency allows anyone to check whether a certificate has been properly issued, seeing as certifying authorities must publicly publish information about the digital certificates that they have issued. Though this approach does not prevent fake digital certificates from being issued, it can allow for quick detection of misuse. &lt;a name="fr21" href="#fn21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;‘Logic Bomb’ against Airports&lt;/strong&gt;&lt;br /&gt;Passenger operations in New Delhi’s Indira Gandhi International Airport depend on a centralised operating system known as the Common User Passenger Processing System (CUPPS). The system integrates numerous critical functions such as the arrival and departure times of flights, and manages the reservation system and check-in schedules. &lt;a name="fr22" href="#fn22"&gt;[22]&lt;/a&gt; In 2011, a logic bomb attack was remotely launched against the system to introduce malicious code into the CUPPS software. The attack disabled the CUPPS operating system, forcing a number of check-in counters to shut down completely, while others reverted to manual check-in, resulting in over 50 delayed flights. Investigations revealed that the attack was launched by three disgruntled employees who had assisted in the installation of the CUPPS system at the New Delhi Airport. &lt;a name="fr23" href="#fn23"&gt;[23]&lt;/a&gt; Although in this case the impact of the attack was limited to flight delay, experts speculate that the attack was meant to take down the entire system. The disruption and damage resulting from the shutdown of an entire airport would be extensive.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Adoption of open hardware and FOSS is one strategy to avoid and mitigate the risk of such vulnerabilities. The use of devices that embrace the concept of open hardware and software specifications must be encouraged, as this helps the FOSS community to be vigilant in detecting and reporting design deviations and investigate into probable vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Attack on Critical Infrastructure&lt;/strong&gt;&lt;br /&gt;The Nuclear Power Corporation of India encounters and prevents numerous cyber attacks every day. &lt;a name="fr24" href="#fn24"&gt;[24]&lt;/a&gt; The best known example of a successful nuclear plant hack is the Stuxnet worm that thwarted the operation of an Iranian nuclear enrichment complex and set back the country’s nuclear programme. &lt;a name="fr25" href="#fn25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The worm had the ability to spread over the network and would activate when a specific configuration of systems was encountered &lt;a name="fr26" href="#fn26"&gt;[26]&lt;/a&gt; and connected to one or more Siemens programmable logic controllers. &lt;a name="fr27" href="#fn27"&gt;[27]&lt;/a&gt; The worm was suspected to have been initially introduced through an infected USB drive into one of the controller computers by an insider, thus crossing the air gap. &lt;a name="fr28" href="#fn28"&gt;[28]&lt;/a&gt; The worm used information that it gathered to take control of normal industrial processes (to discreetly speed up centrifuges, in the present case), leaving the operators of the plant unaware that they were being attacked. This incident demonstrates how an attack vector introduced into the general internet can be used to target specific system configurations. When the target of a successful attack is a sector as critical and secured as a nuclear complex, the implications for a country’s security and infrastructure are potentially grave.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Security audits and other transparency measures to identify vulnerabilities are critical in sensitive sectors. Incentive schemes such as prizes, contracts and grants may be evolved for the private sector and academia to identify vulnerabilities in the infrastructure of critical resources to enable/promote security auditing of infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Micro Level: Chip Attacks&lt;/strong&gt;&lt;br /&gt;Semiconductor devices are ubiquitous in electronic devices. The US, Japan, Taiwan, Singapore, Korea and China are the primary countries hosting manufacturing hubs of these devices. India currently does not produce semiconductors, and depends on imported chips. This dependence on foreign semiconductor technology can result in the import and use of compromised or fraudulent chips by critical sectors in India. For example, hardware Trojans, which may be used to access personal information and content on a device, may be inserted into the chip. Such breaches/transgressions can render equipment in critical sectors vulnerable to attack and threaten national security. &lt;a name="fr29" href="#fn29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Indigenous production of critical technologies and the development of manpower and infrastructure to support these activities are needed. The Government of India has taken a number of steps towards this. For example, in 2013, the Government of India approved the building of two Semiconductor Wafer Fabrication (FAB) manufacturing facilities &lt;a name="fr30" href="#fn30"&gt;[30]&lt;/a&gt; and as of January 2014, India was seeking to establish its first semiconductor characterisation lab in Bangalore. &lt;a name="fr31" href="#fn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Macro Level: Telecom and Network Switches&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The possibility of foreign equipment containing vulnerabilities and backdoors that are built into its software and hardware gives rise to concerns that India’s telecom and network infrastructure is vulnerable to being hacked and accessed by foreign governments (or non-state actors) through the use of spyware and malware that exploit such vulnerabilities. In 2013, some firms, including ZTE and Huawei, were barred by the Indian government from participating in a bid to supply technology for the development of its National Optic Network project due to security concerns. &lt;a name="fr32" href="#fn32"&gt;[32]&lt;/a&gt; Similar concerns have resulted in the Indian government holding back the conferment of ‘domestic manufacturer’ status on both these firms. &lt;a name="fr33" href="#fn33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Following reports that Chinese firms were responsible for transnational cyber attacks designed to steal confidential data from overseas targets, there have been moves to establish laboratories to test imported telecom equipment in India. &lt;a name="fr34" href="#fn34"&gt;[34]&lt;/a&gt; Despite these steps, in a February 2014 incident the state-owned telecommunication company  Bharat Sanchar Nigam Ltd’s network was hacked, allegedly by Huawei. &lt;a name="fr35" href="#fn35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="pullquote"&gt;Security practitioners and policymakers need to avoid the zero-sum framing prevalent in popular discourse regarding security VIS-A-VIS privacy, transparency and technology.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;A successful hack of the telecom infrastructure could result in massive disruption in internet and telecommunications services. Large-scale surveillance and espionage by foreign actors would also become possible, placing, among others, both governmental secrets and individuals personal information at risk.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While India cannot afford to impose a general ban on the import of foreign telecommunications equipment, a number of steps can be taken to address the risk of inbuilt security vulnerabilities. Common International Criteria for security audits could be evolved by states to ensure compliance of products with international norms and practices. While India has already established common criteria evaluation centres, &lt;a name="fr36" href="#fn36"&gt;[36]&lt;/a&gt; the government monopoly over the testing function has resulted in only three products being tested so far. A Code Escrow Regime could be set up where manufacturers would be asked to deposit source code with the Government of India for security audits and verification. The source code could be compared with the shipped software to detect inbuilt vulnerabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyber security cannot be enhanced without a proper understanding of the relationship between security and other national imperatives such as privacy, transparency and technology. This paper has provided an initial sketch of those relationships, but sustained theoretical and empirical research is required in India so that security practitioners and policymakers avoid the zero-sum framing prevalent in popular discourse and take on the hard task of solving the optimisation problem by shifting policy, market and technological levers simultaneously. These solutions must then be applied in multiple contexts or scenarios to determine how they should be customised to provide maximum security bang for the buck.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. Daniel J. Solove, Chapter 1 in Nothing to Hide: The False Tradeoff between Privacy and Security (Yale University Press: 2011), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1827982.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. Bruce Schneier, “What our Top Spy doesn’t get: Security and Privacy aren’t Opposites,” Wired, January 24, 2008, http://archive.wired.com/politics/security commentary/security matters/2008/01/securitymatters_0124 and Bruce Schneier, “Security vs. Privacy,” Schneier on Security, January 29, 2008, https://www.schneier.com/blog/archives/2008/01/security_vs_pri.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. There are four sources of power in internet governance: Market power exerted by private sector organisations; regulatory power exerted by states; technical power exerted by anyone who has access to certain categories of technology, such as cryptography; and finally, the power of public pressure sporadically mobilised by civil society. A technically sound encryption standard, if employed by an ordinary citizen, cannot be compromised using the power of the market or the regulatory power of states or public pressure by civil society. In that sense, technology can be used to regulate state and market behaviour.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. Ann Cavoukian and Khaled El Emam, “Introducing Privacy-Protective Surveillance: Achieving Privacy and Effective Counter-Terrorism,” Information &amp;amp; Privacy Commisioner, September 2013, Ontario, Canada, http://www.privacybydesign.ca/content/uploads/2013/12/pps.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin and Lalana Kagal, “Information Integration and Analysis: A Semantic Approach to Privacy”(presented at the third IEEE International Conference on Information Privacy, Security, Risk and Trust, Boston, USA, October 2011), ebiquity.umbc.edu/_file_directory_/papers/578.pdf.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. Bruce Byfield, “Does Heartbleed disprove ‘Open Source is Safer’?,” Datamation, April 14, 2014, http://www.datamation.com/open-source/does-heartbleed-disprove-open-source-is-safer-1.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. “Cybersecurity Program should be more transparent, protect privacy,” Centre for Democracy and Technology Insights, March 20, 2009, https://cdt.org/insight/cybersecurity-program-should-be-more-transparent-protect-privacy/#1.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. “Cracked Credibility,” The Economist, September 14, 2013, http://www.economist.com/news/international/21586296-be-safe-internet-needs-reliable-encryption-standards-software-and.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. Miriam Elder, “Russian guard service reverts to typewriters after NSA leaks,” The Guardian, July 11, 2013, www.theguardian.com/world/2013/jul/11/russia-reverts-paper-nsa-leaks and Philip Oltermann, “Germany ‘may revert to typewriters’ to counter hi-tech espionage,” The Guardian, July 15, 2014, www.theguardian.com/world/2014/jul/15/germany-typewriters-espionage-nsa-spying-surveillance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. Bruce Schneier, “A Plea for Simplicity,” Schneier on Security, November 19, 1999, https://www.schneier.com/essays/archives/1999/11/a_plea_for_simplicit.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. With inputs from Pranesh Prakash of the Centre for Internet and Society and Sharathchandra Ramakrishnan of Srishti School of Art, Technology and Design.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn12" href="#fr12"&gt;12&lt;/a&gt;]. “Frequently Asked Questions,” Controller of Certifying Authorities, Department of Electronics and Information Technology, Government of India, http://cca.gov.in/cca/index.php?q=faq-page#n41.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn13" href="#fr13"&gt;13&lt;/a&gt;]. National Informatics Centre Homepage, Government of India, http://www.nic.in/node/41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn14" href="#fr14"&gt;14&lt;/a&gt;]. Adam Langley, “Maintaining Digital Certificate Security,” Google Security Blog, July 8, 2014, http://googleonlinesecurity.blogspot.in/2014/07/maintaining-digital-certificate-security.html.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn15" href="#fr15"&gt;15&lt;/a&gt;]. This is similar to the kind of attack carried out against DigiNotar, a Dutch certificate authority. See: http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1246&amp;amp;context=jss.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn16" href="#fr16"&gt;16&lt;/a&gt;]. R. Ramachandran, “Digital Disaster,” Frontline, August 22, 2014, http://www.frontline.in/the-nation/digital-disaster/article6275366.ece.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn17" href="#fr17"&gt;17&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn18" href="#fr18"&gt;18&lt;/a&gt;]. “NIC’s digital certification unit hacked,” Deccan Herald, July 16, 2014, http://www.deccanherald.com/content/420148/archives.php.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn19" href="#fr19"&gt;19&lt;/a&gt;]. National Informatics Centre Certifying Authority Homepage, Government of India, http://nicca.nic.in//.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn20" href="#fr20"&gt;20&lt;/a&gt;]. Mozilla Wiki, “Public Key Pinning,” https://wiki.mozilla.org/SecurityEngineering/Public_Key_Pinning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn21" href="#fr21"&gt;21&lt;/a&gt;]. “Certificate Transparency - The quick detection of fraudulent digital certificates,” Ascertia, August 11, 2014, http://www.ascertiaIndira.com/blogs/pki/2014/08/11/certificate-transparency-the-quick-detection-of-fraudulent-digital-certificates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn22" href="#fr22"&gt;22&lt;/a&gt;]. “Indira Gandhi International Airport (DEL/VIDP) Terminal 3, India,” Airport Technology.com, http://www.airport-technology.com/projects/indira-gandhi-international-airport-terminal -3/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn23" href="#fr23"&gt;23&lt;/a&gt;]. “How techies used logic bomb to cripple Delhi Airport,” Rediff, November 21, 2011, http://www.rediff.com/news/report/how-techies-used-logic-bomb-to-cripple-delhi-airport/20111121 htm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn24" href="#fr24"&gt;24&lt;/a&gt;]. Manu Kaushik and Pierre Mario Fitter, “Beware of the bugs,” Business Today, February 17, 2013, http://businesstoday.intoday.in/story/india-cyber-security-at-risk/1/191786.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn25" href="#fr25"&gt;25&lt;/a&gt;]. “Stuxnet ‘hit’ Iran nuclear plants,” BBC, November 22, 2010, http://www.bbc.com/news/technology-11809827.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn26" href="#fr26"&gt;26&lt;/a&gt;]. In this case, systems using Microsoft Windows and running Siemens Step7 software were targeted.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn27" href="#fr27"&gt;27&lt;/a&gt;]. Jonathan Fildes, “Stuxnet worm ‘targeted high-value Iranian assets’,” BBC, September 23, 2010, http://www.bbc.com/news/technology-11388018.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn28" href="#fr28"&gt;28&lt;/a&gt;]. Farhad Manjoo, “Don’t Stick it in: The dangers of USB drives,” Slate, October 5, 2010, http://www.slate.com/articles/technology/technology/2010/10/dont_stick_it_in.html.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn29" href="#fr29"&gt;29&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn30" href="#fr30"&gt;30&lt;/a&gt;]. “IBM invests in new $5bn chip fab in India, so is chip sale off?,” ElectronicsWeekly, February 14, 2014, http://www.electronicsweekly.com/news/business/ibm-invests-new-5bn-chip-fab-india-chip-sale-2014-02/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn31" href="#fr31"&gt;31&lt;/a&gt;]. NT Balanarayan, “Cabinet Approves Creation of Two Semiconductor Fabrication Units,” Medianama, February 17, 2014, http://articles.economictimes.indiatimes.com/2014-02-04/news/47004737_1_indian-electronics-special-incentive-package-scheme-semiconductor-association.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn32" href="#fr32"&gt;32&lt;/a&gt;]. Jamie Yap, “India bars foreign vendors from national broadband initiative,” ZD Net, January 21, 2013, http://www.zdnet.com/in/india-bars-foreign-vendors-from-national-broadband-initiative-7000010055/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn33" href="#fr33"&gt;33&lt;/a&gt;]. Kevin Kwang, “India holds back domestic-maker status for Huawei, ZTE,” ZD Net, February 6, 2013, http://www.zdnet.com/in/india-holds-back-domestic-maker-status-for-huawei-zte-70 00010887/. Also see “Huawei, ZTE await domestic-maker tag,” The Hindu, February 5, 2013, http://www.thehindu.com/business/companies/huawei-zte-await-domesticmaker-tag/article4382888.ece.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn34" href="#fr34"&gt;34&lt;/a&gt;]. Ellyne Phneah, “Huawei, ZTE under probe by Indian government,” ZD Net, May 10, 2013, http://www.zdnet.com/in/huawei-zte-under-probe-by-indian-government-7000015185/.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn35" href="#fr35"&gt;35&lt;/a&gt;]. Devidutta Tripathy, “India investigates report of Huawei hacking state carrier network,” Reuters, February 6, 2014, http://www.reuters.com/article/2014/02/06/us-india-huawei-hacking-idUSBREA150QK20140206.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn36" href="#fr36"&gt;36&lt;/a&gt;]. “Products Certified,” Common Criteria Portal of India, http://www.commoncriteria-india.gov.in/Pages/ProductsCertified.aspx.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology'&gt;https://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-09-15T10:53:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf">
    <title>Security, Surveillance and Data Sharing Schemes and Bodies in India</title>
    <link>https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf'&gt;https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:35:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy">
    <title>Security, Governments, and Data: Technology and Policy</title>
    <link>https://cis-india.org/internet-governance/events/security-governments-data-technology-policy</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;About the Conference&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;&lt;strong&gt;Conference &lt;/strong&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;&lt;span&gt;Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with.  Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws &amp;amp; policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.&lt;/span&gt;&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;Panel Descriptions&lt;/h3&gt;
&lt;p align="left"&gt; &lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt;Challenges &amp;amp; Present Scenario&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities.  The Government of India has taken numerous steps to address and resolve such challenges.  In July 2013, the National Cyber Security Policy  was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52&lt;/span&gt;&lt;sup&gt;nd&lt;/sup&gt;&lt;span&gt; Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre.  CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Law &amp;amp; Policy&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things,  mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Architecture &amp;amp; Technology&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;International and Domestic Markets&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015.  Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised.  Towards this end, the Government of India  has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment.  Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the &lt;/span&gt;&lt;span&gt;Wassenaar agreement, they have yet to be accepted.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;/td&gt;
&lt;td&gt;Key Note Speech&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;/td&gt;
&lt;td&gt;Challenges &amp;amp; Present Scenario&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;/td&gt;
&lt;td&gt;Law &amp;amp; Policy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;/td&gt;
&lt;td&gt;Architecture &amp;amp; Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;/td&gt;
&lt;td&gt;International &amp;amp; Domestic Markets&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.30&lt;/td&gt;
&lt;td&gt;Conclusion &amp;amp; Closing Remarks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-governments-data-technology-policy'&gt;https://cis-india.org/internet-governance/events/security-governments-data-technology-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-24T08:06:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy">
    <title>Security, Governments and Data: Technology and Policy </title>
    <link>https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy</link>
    <description>
        &lt;b&gt;On January 8, 2015, the Centre for Internet and Society, in collaboration with the Observer research foundation, hosted the day long conference "Security, Governments, and Data: Technology and Policy"  The conference discussed a range of topics including internet governance, surveillance, privacy, and cyber security. &lt;/b&gt;
        &lt;p&gt;The full report written and compiled by Lovisha Aggarwal and Nehaa Chaudhari and edited by Elonnai Hickok &lt;a href="https://cis-india.org/internet-governance/blog/security-governments-data-technology-policy.pdf" class="internal-link"&gt;can be accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The conference was focused on the technologies, policies, and practices around cyber security and surveillance. The conference reached out to a number of key stakeholders including civil society, industry, law enforcement, government, and academia and explored the present scenario in India to reflect on ways forward. The conference was a part of CIS’s work around privacy and surveillance, supported by Privacy International.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Welcome Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The welcome address opened with a reference to a document circulated by CIS in 2014 which contained hypothetical scenarios of potential threats to Indian cyber security. This document highlighted the complexity of cyber security and the challenges that governments face in defending their digital borders. When talking about cyber security it is important that certain principles are upheld and security is not pursued only for the sake of security. This approach allows for security to be designed and to support other rights such as the right of access, the right to freedom of expression, and the right to privacy. Indeed, the generation, use, and protection of communications data by the private sector and the government are a predominant theme across the globe today. This cannot be truer for India, as India hosts the third largest population on the internet in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the welcome, a brief introduction to the Centre for Internet and Society was given. It was noted that CIS is a 6.5 half year old organization that is comprised of lawyers, mathematicians, sociologists, and computer scientists and works across multiple focus areas including accessibility, internet governance, telecom, openness, and access to knowledge. CIS began researching privacy and surveillance in 2010, and has recently begun to expand their research into cyber security. The purpose of this is to understand the relationship between privacy, surveillance, and security and is the beginning of a learning process for CIS. In 2013 CIS undertook a process to attempt to evolve a legal regime to intelligently and adequately deal with privacy in India. Industry specific requirements are key in the Indian context and this process was meant to try and evolve a consensus on what a privacy law in India should look like by bringing together key stakeholders for roundtables. CIS is now in the final stages of preparing individual legal proposals that will be sent to the Government – to hopefully have an informed Privacy Law in India. This event represents CIS’s first attempt to have a simultaneous dialogue on surveillance, cyber security, and privacy. As part of this event and research CIS is trying to understand the technology and market involved in surveillance and cyber security as these are important factors in the development of policy and law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy'&gt;https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-04T05:59:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-research">
    <title>Security Research</title>
    <link>https://cis-india.org/internet-governance/blog/security-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;State surveillance in India has been carried out by Government agencies for many years. Recent projects include: NATGRID, CMS, NETRA, etc. which aim to overhaul the overall security and intelligence infrastructure in the country. The purpose of such initiatives has been to maintain national security and ensure interconnectivity and interoperability between departments and agencies. Concerns regarding the structure, regulatory frameworks (or lack thereof), and technologies used in these programmes and projects have attracted criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance/Security Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Central Monitoring System -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Monitoring System or CMS is a clandestine mass electronic surveillance data mining program installed by the Center for Development of 	Telematics (C-DOT), a part of the Indian government. It gives law enforcement agencies centralized access to India's telecommunications network and the 	ability to listen in on and record mobile, landline, satellite, Voice over Internet Protocol (VoIP) calls along with private e-mails, SMS, MMS. It also 	gives them the ability to geo-locate individuals via cell phones in real time.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Central Monitoring System: Some Questions to be Raised in Parliament &lt;span&gt;http://bit.ly/1fln2vu&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India´s ´Big Brother´: The Central Monitoring System (CMS) &lt;a href="http://bit.ly/1kyyzKB"&gt;http://bit.ly/1kyyzKB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India's Central Monitoring System (CMS): Something to Worry About? &lt;a href="http://bit.ly/1gsM4oQ"&gt;http://bit.ly/1gsM4oQ&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; C-DoT's surveillance system making enemies on internet 	&lt;a href="http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet"&gt; http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2. Surveillance Industry : Global And Domestic -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry is a multi-billion dollar economic sector that tracks individuals along with their actions such as e-mails and texts. With the 	cause for its existence being terrorism and the government's attempts to fight it, a network has been created that leaves no one with their privacy. All 	that an individual does in the digital world is suspect to surveillance. This included surveillance in the form of snooping where an individual's phone 	calls, text messages and e-mails are monitored or a more active kind where cameras, sensors and other devices are used to actively track the movements and 	actions of an individual. This information allows governments to bypass the privacy that an individual has in a manner that is considered unethical and 	incorrect. This information that is collected also in vulnerable to cyber-attacks that are serious risks to privacy and the individuals themselves. The 	following set of articles look into the ethics, risks, vulnerabilities and trade-offs of having a mass surveillance industry in place.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance Technologies http://bit.ly/14pxg74 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;New Standard Operating Procedures for Lawful Interception and Monitoring &lt;span&gt;http://bit.ly/1mRRIo4&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Video Surveillance and Its Impact on the Right to Privacy 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy"&gt; http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;More than a Hundred Global Groups Make a Principled Stand against Surveillance 	&lt;a href="http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"&gt; http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Models for Surveillance and Interception of Communications Worldwide 	&lt;a href="http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"&gt; http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why 'Facebook' is More Dangerous than the Government Spying on You 	&lt;a href="http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you"&gt; http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Difficult Balance of Transparent Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"&gt; http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; UK's Interception of Communications Commissioner - A Model of Accountability 		&lt;a href="http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt; http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 		&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; State Surveillance and Human Rights Camp: Summary &lt;a href="http://bit.ly/ZZNm6M"&gt;http://bit.ly/ZZNm6M&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis - It is Now Officially Confirmed		&lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Spy Files 3: WikiLeaks Sheds More Light on the Global Surveillance Industry &lt;a href="http://bit.ly/1d6EmjD"&gt;http://bit.ly/1d6EmjD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy &lt;a href="http://bit.ly/1ilTJts"&gt;http://bit.ly/1ilTJts&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Hacking without borders: The future of artificial intelligence and surveillance &lt;a href="http://bit.ly/1kWiwGv"&gt;http://bit.ly/1kWiwGv&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes &lt;a href="http://bit.ly/1mr3KTH"&gt;http://bit.ly/1mr3KTH&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Brief: Oversight Mechanisms for Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"&gt; http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;3. Judgements By the Indian Courts -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry in India has been brought before the court in different cases. The following articles look into the cause of action in these 	cases along with their impact on India and its citizens.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Anvar v. Basheer and the New (Old) Law of Electronic Evidence 	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Gujarat High Court Judgement on the Snoopgate Issue 	&lt;a href="http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"&gt; http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;4. International Privacy Laws -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the universality of the internet, many questions of accountability arise and jurisdiction becomes a problem. Therefore certain treaties, agreements 	and other international legal literature was created to answer these questions. The articles listed below look into the international legal framework which 	governs the internet.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications 		&lt;a href="http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"&gt; http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security Can Co-exist		&lt;a href="http://cis-india.org/internet-governance/blog/privacy-and-security"&gt;http://cis-india.org/internet-governance/blog/privacy-and-security&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; European Union Draft Report Admonishes Mass Surveillance, Calls for Stricter Data Protection and Privacy Laws 		&lt;a href="http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance"&gt; http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Draft International Principles on Communications Surveillance and Human Rights &lt;a href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Indian Surveillance Framework -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government's mass surveillance systems are configured a little differently from the networks of many countries such as the USA and the UK. This 	is because of the vast difference in infrastructure both in existence and the required amount. In many ways, it is considered that the surveillance network 	in India is far worse than other countries. This is due to the present form of the legal system in existence. The articles below explore the system and its 	functioning including the various methods through which we are spied on. The ethics and vulnerabilities are also explored in these articles.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Paper-thin Safeguards and Mass Surveillance in India - 	&lt;a href="http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers! - 	&lt;a href="http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India - An Analysis of Indian Security Expos 	&lt;a href="http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"&gt; http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;GSMA Research Outputs: different legal and regulatory aspects of security and surveillance in India	&lt;a href="http://cis-india.org/internet-governance/blog/gsma-research-outputs"&gt;http://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Way to watch 		&lt;a href="http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch"&gt; http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Free Speech and Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/free-speech-and-surveillance"&gt; http://cis-india.org/internet-governance/blog/free-speech-and-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance rises, privacy retreats 		&lt;a href="http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"&gt; http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Freedom from Monitoring: India Inc. should Push For Privacy Laws 	&lt;a href="http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"&gt; http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Surat's Massive Surveillance Network Should Cause Concern, Not Celebration 	&lt;a href="http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration"&gt; http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Vodafone Report Explains Government Access to Customer Data 	&lt;a href="http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"&gt; http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicator officers under the IT Act 	&lt;a href="http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"&gt; http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications	&lt;a href="http://bit.ly/U6T3xy"&gt;http://bit.ly/U6T3xy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;SEBI and Communication Surveillance: New Rules, New Responsibilities? &lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Snooping Can Lead to Data Abuse		&lt;a href="http://cis-india.org/internet-governance/blog/snooping-to-data-abuse"&gt;http://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Brother is Watching You &lt;a href="http://bit.ly/1arbxwm"&gt;http://bit.ly/1arbxwm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Moving Towards a Surveillance State 		&lt;a href="http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"&gt; http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; How Surveillance Works in India 		&lt;a href="http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt; http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State http://bit.ly/1nkg8Ho &lt;/li&gt;
&lt;li&gt; Can India Trust Its Government on Privacy? 		&lt;a href="http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy"&gt; http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Indian surveillance laws &amp;amp; practices far worse than US 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt; http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Security, Surveillance and Data Sharing Schemes and Bodies in India 		&lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view"&gt; http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Paper on Surveillance in India 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp:/cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications 		&lt;a href="http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt; http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 1: Foundations http://bit.ly/1ntqsen &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test		&lt;a href="http://bit.ly/1dH3meL"&gt;http://bit.ly/1dH3meL&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court's Wrong Turn		&lt;a href="http://bit.ly/1kBosnw"&gt;http://bit.ly/1kBosnw&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Mastering the Art of Keeping Indians Under Surveillance 		http://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-research'&gt;https://cis-india.org/internet-governance/blog/security-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:55:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights">
    <title>Security and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a public discussion on optimizing security and safeguarding human rights at its Bangalore office on Friday, December 19th, 2014, 16:00 to 18:00.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, in collaboration with Privacy International UK, has undertaken exploratory research into surveillance, security, and the security market in India.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Through this research, we hope to understand and document policy and law associated with security, surveillance, and the security market in India and learn about the regulation of security and related technologies such as encryption, filtering, monitoring software, and interception equipment. We also hope to understand the import and export policy regime for dual use technologies.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such findings will be critical in creating evidence based research to inform security policy and regulation in India and work towards enabling regulatory frameworks that optimize the nation’s security while protecting the rights of citizens.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights'&gt;https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-19T08:46:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
