<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 311 to 325.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/breach-notifications.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/files/submission-to-trai-november-6-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/october-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cy-fy-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc18-offline-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/annual-report-2016-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/annual-report-2015-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns">
    <title>Aadhaar seeding: benefits and concerns</title>
    <link>https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns</link>
    <description>
        &lt;b&gt;Products and services such as bank accounts, life insurance policies and phone connections have to be linked with Aadhaar. But is this of any real help? &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shaikh Zoaib Saleem was published by &lt;a class="external-link" href="http://www.livemint.com/Money/Awu9Hz1DmuDzx0VTmQoPvL/Aadhaar-seeding-benefits-and-concerns.html"&gt;Livemint&lt;/a&gt; on November 14, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="A5l" style="text-align: justify; "&gt;The  government has made it mandatory for consumers to link many important  services with Aadhaar. You too may be getting frequent reminders to link  your banks account, mutual fund and mobile number with Aadhaar.  Recently, the Reserve Bank of India also clarified that it is mandatory  to link bank accounts with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest addition to this  list are insurance policies. In a circular, the Insurance Regulatory and  Development Authority of India (Irdai) has stated that linking of  Aadhaar number to insurance policies is mandatory under the Prevention  of Money-laundering (Maintenance of Records) Second Amendment Rules,  2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue is being discussed intensively, with the  Supreme  Court taking a decision in favour of linking Aadhaar biometrics and the  number with a host of services. Several petitions have been filed  challenging not just the linking of these services with Aadhaar but also  the validity of Aadhaar itself. We spoke to people who support and  those who oppose this linking, to understand how either case impacts  consumers.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;The benefits &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;According to the Unique  Identification Authority of India (UIDAI), government schemes are asking  for Aadhaar as it helps to clean out duplications and fakes, and  provides accurate data to enable implementation of direct benefit  programmes. “Use of Aadhaar reduces the cost of identifying persons and  provides increased transparency to the government in implementation of  its schemes,” the Authority states under frequently asked questions on  its website (read more at: &lt;a href="https://uidai.gov.in/your-aadhaar/help/faqs.html"&gt;https://uidai.gov.in/your-aadhaar/help/faqs.html) &lt;/a&gt;So,  when you link your bank account with your Aadhaar, government benefits  such as subsidy on LPG cylinders is credited directly to that  account. The FAQs, however, do not elaborate how such linking helps an  individual who does not get, or does not wish to get, such subsidies. In  a tweet, UIDAI had said that verifying a bank account using Aadhaar  adds an additional layer of security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nakul Saxena, a  former banker who now works on policy advocacy at the software think  tank iSpirt Foundation, said that linking of Aadhaar with these services  will help eradicate fake accounts, fake insurance policies and  unauthorised mobile connections. “It is possible that there are many  accounts in the system that have been opened using such documents and  copied signatures and even the banks may not be aware of it. Some people  may not even be aware that an account exists in their name. These  accounts need to be verified using Aadhaar now,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government claims to have removed millions of fake beneficiaries for government benefits by Aadhaar linking. As reported by &lt;i&gt;Mint&lt;/i&gt; in May 2017, over 23 million fake ration cards have been scrapped,  potentially saving the government Rs14,000 crore in food subsidy every  year. Another &lt;i&gt;Mint&lt;/i&gt; report in August says, three states discovered that about 2,72,000 fake students were availing the mid-day meal (MDM) scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  those who are against linking Aadhaar disagree with these arguments.  “Initially, Aadhaar was about delivery of services. But linking  everybody’s phone number and bank account is not about that anymore. The  real question is, what purpose this linking serves. If the intention is  to update the databases, then there can be other means to update  those,” said Rahul Narayan, a Supreme Court advocate who is among the  lawyers representing petitioners who have challenged Aadhaar linking in  court.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;The concerns &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The fundamental objection to  this linking of services is that all information on an individual will  be available at a single place, which could make surveillance easier and  also increase the risks if this information is hacked. “As of now, your  bank knows something about you, your insurance company knows something  and your mobile phone company knows something about you. Each of these  are different silos of information. When these converge, which is then  accessible to a single person, that person knows almost everything about  you,” said Narayan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, a user’s Aadhaar number  and fingerprint are permanent identifiers, and at least the Aadhaar  number has been compromised for over 130 million citizens, as per  a study by Centre for Internet &amp;amp; Society, said Nikhil Pahwa,  co-founder of the SaveTheInternet.in (&lt;a href="https://internetfreedom.in"&gt;https://internetfreedom.in) &lt;/a&gt;campaign  for net neutrality in India. “This leaves the users vulnerable to  social hacks, some of which we have already been reading about in the  news. To forcefully and mandatorily link Aadhaar to bank accounts means  that their finances are at risk,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saxena said the data  leaks that have been highlighted have been typically about demographic  details such as name, date of birth and address “which have been  commonly available so far.” However, given the heightened sensitivities  in this digital age, customers must ask their service providers to not  publish such details, nor provide this information freely, he added.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Grievance redressal and data privacy &lt;br /&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Another  major concern is the absence of a clear redressal mechanisms for  consumers in case of a data leak, misuse or hack. “When things go wrong,  consumers need to have access to a proper complaints mechanism. In the  case of Aadhaar, such access is to be provided through the establishment  of ‘contact centres’ under the Regulation 32 of the UIDAI Enrolment and  Update Regulations. To the best of our knowledge, not much beyond  Regulation 32 has yet been specified by the UIDAI,” said Renuka Sane,  associate professor at the National Institute of Public Finance and  Policy, who has worked on data privacy and security issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart  from this, Section 47 of the Aadhaar Act stipulates that only UIDAI or  its authorised officers can file a criminal complaint for violations of  the Act, she added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The UIDAI has been given complete discretion  in determining if and when to file a criminal complaint for violations  of the Act, and an individual aggrieved by actions of a third person is  left to rely upon the bonafide actions of the UIDAI,” Sane added. The  government is also working towards a data privacy legislation, that is  needed to give citizens protection against misuse of their data, and  them having some control over who gets their data, how it is used, and  where it can be shared. “However, a data privacy legislation and  mechanism will not ensure that data remains secure and protected, and  that processes are followed. The Act disallowing people from sharing  Aadhaar numbers did not prevent government departments from publishing  details online,” said Pahwa. He also said that systems can get hacked,  which could include the Aadhaar database, the parallel Aadhaar databases  with state governments, or eKYC databases held with banks and telecom  operators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saxena said the UIDAI has clarified that biometric  information is not stored with user agencies, and stored biometrics  can't be used for Aadhaar authentication or eKYC. “Hence, customers can  be assured when using Aadhaar and biometrics with authorized entities,”  he said. “The data privacy law will address data privacy and protection  in all digital systems, not just Aadhaar. It will equally apply to  social media and mobile apps. It should also go into the aspect of  ‘right to be forgotten’,” said Saxena.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pahwa, however, insists  that the least that should be done is to give citizens the right to not  link their Aadhaar and use other IDs for authentication, plus the  ability to change their ID number if the system gets compromised.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;What you should do &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;For  now, the deadlines for linking bank accounts with Aadhaar is 31  December 2017, and for mobile phones it is 7 February 2018. In its  latest hearing on the matter, the Supreme Court has directed service  providers to mention these deadlines in their reminders. “Right now,  regardless of what they say, nobody is going to shut down your bank  account or disconnect your mobile connection, at least till the  deadline. There are several petitions being heard in the Supreme Court.  The matter is supposed to be taken up by the Supreme Court in the last  week of November. The final word from the court is yet to come and it is  quite possible that at least the deadlines gets extended,” said  Narayan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you have already linked these services with Aadhaar,  you are in no trouble. But if you are having second thoughts, the  linking cannot be undone. If you are concerned about safety or other  aspects, you can wait to get more clarity from the Supreme Court.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns'&gt;https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-23T02:02:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/breach-notifications.pdf">
    <title>Breach Notifications</title>
    <link>https://cis-india.org/internet-governance/files/breach-notifications.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/breach-notifications.pdf'&gt;https://cis-india.org/internet-governance/files/breach-notifications.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-11-14T15:31:38Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf">
    <title>India UK Legal Regulatory Approaches</title>
    <link>https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf'&gt;https://cis-india.org/internet-governance/files/india-uk-legal-regulatory-approaches.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-11-14T15:25:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/files/submission-to-trai-november-6-2017">
    <title>Submission to TRAI (November 6, 2017)</title>
    <link>https://cis-india.org/telecom/files/submission-to-trai-november-6-2017</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/files/submission-to-trai-november-6-2017'&gt;https://cis-india.org/telecom/files/submission-to-trai-november-6-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-11-08T01:08:37Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/october-2017-newsletter">
    <title>October 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/october-2017-newsletter</link>
    <description>
        &lt;b&gt;October 2017 Newsletter&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Dear readers,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;CIS &lt;a class="external-link" href="https://cis-india.org/accessibility/blog/cis-comments-on-mobile-accessibility-guidelines"&gt;submitted its comments &lt;/a&gt;on mobile accessibility guidelines to the Ministry of Electronics &amp;amp; IT, Govt. of India. &lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;Between 1 to 16 September, an online discussion took place on the creation of social media guidelines and strategy for Telugu Wikimedia handles online. Manasa Rao &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/discussion-on-creation-of-social-media-guidelines-strategy-for-telugu-wikimedia"&gt;captured the developments in a blog post&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;Padma Venkataraman in a blog entry &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann"&gt;chronologically mapped&lt;/a&gt; CIS’ efforts at enhancing financial transparency and accountability at ICANN, while providing an outline of what remains to be done.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;Shyam Ponappa's article on NPAs and structural issues was published in the &lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-october-5-2017-npas-and-structural-issues"&gt;Business Standard&lt;/a&gt; on October 5, 2017.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;CIS in the News:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart"&gt;Attempted data breach of UIDAI, RBI, ISRO and Flipkart is worrisome&lt;/a&gt; (DailyO, October 4, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web"&gt;Sex, drugs and the dark web&lt;/a&gt; (Hindu; October 7, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data"&gt;Ahead of data protection law roll out, experts caution that it shouldn't limit collection and use of data&lt;/a&gt; (First Post; October 12, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-economics-and-business-models-of-iot"&gt;#NAMAprivacy: The economics and business models of IoT and other issues&lt;/a&gt; (Medianama; October 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/medianama-october-18-2017-namaprivacy-data-standards-for-iot"&gt;#NAMAprivacy: Data standards for IoT and home automation systems&lt;/a&gt; (Medianama; October 18, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake"&gt;Majority of top politicians' Twitter followers fake: audit &lt;/a&gt;(Furquan Moharkan; Deccan Herald; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/eastern-mirror-october-23-2017-awards-for-those-working-on-employment-opportunities-for-disabled"&gt;Awards for those working on employment opportunities for disabled&lt;/a&gt; (Eastern Mirror; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/new-indian-express-october-25-2017-nibbling-away-into-your-bank-account-salami-attackers-cart-away-a-fortune"&gt;Nibbling away into your bank account, salami attackers cart away a fortune&lt;/a&gt; (New Indian Express; October 25, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/accessibility/news/nirmita-narasimhan-wins-the-18th-ncpedp-mindtree-helen-keller-award-2017"&gt;Nirmita Narasimhan wins the 18th NCPEDP-Mindtree Helen Keller Award 2017!&lt;/a&gt; (National Centre for Promotion of Employment for Disabled People; October 31, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our Access to Knowledge programme currently consists of two projects. The Pervasive Technologies project, conducted under a grant from the International Development Research Centre (IDRC), aims to conduct research on the complex interplay between low-cost pervasive technologies and intellectual property, in order to encourage the proliferation and development of such technologies as a social good. The Wikipedia project, which is under a grant from the Wikimedia Foundation, is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►&lt;/span&gt;Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/odia-wikisource-turns-3"&gt;Odia Wikisource Turns 3&lt;/a&gt; (Manasa Rao; October 22, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/wikimedia-workshop-at-ismailsaheb-mulla-law-college-satara"&gt;Wikimedia Workshop at Ismailsaheb Mulla Law College, Satara&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-edit-a-thon-at-dalit-mahila-vikas-mandal-satara"&gt;Marathi Wikipedia Edit-a-thon at Dalit Mahila Vikas Mandal, Satara&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-at-mgm-trusts-college-of-journalism-and-mass-communication-aurangabad"&gt;Marathi Wikipedia Workshop at MGM Trust's College of Journalism and Mass Communication, Aurangabad&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/orientation-program-at-kannada-university-hampi"&gt;Orientation Program at Kannada University, Hampi&lt;/a&gt; (A. Gopalakrishna; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/marathi-wikipedia-workshop-at-solapur-university"&gt;Marathi Wikipedia Workshop at Solapur University&lt;/a&gt; (Subodh Kulkarni; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/discussion-on-creation-of-social-media-guidelines-strategy-for-telugu-wikimedia"&gt;Discussion on Creation of Social Media Guidelines &amp;amp; Strategy for Telugu Wikimedia&lt;/a&gt; (Manasa Rao; October 24, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►Openness&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards - hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and IDRC) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on restrictions that the Indian government has placed on freedom of expression online.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;►&lt;/span&gt;Freedom of Expression&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy"&gt;ICANN’s Problems with Accountability and the .WEB Controversy&lt;/a&gt; (Padma Venkataraman; October 24, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/why-presumption-of-renewal-is-unsuitable-for-the-current-registry-market-structure"&gt;Why Presumption of Renewal is Unsuitable for the Current Registry Market Structure&lt;/a&gt; (Padma Venkataraman; October 29, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann"&gt;CIS’ Efforts Towards Greater Financial Disclosure by ICANN&lt;/a&gt; (Padma Venkataraman; October 29, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;►&lt;/strong&gt;Cyber Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cy-fy-2017"&gt;CyFy 2017&lt;/a&gt; (Organized by Observer Research Foundation; New Delhi; October 2 - 4, 2017).  Sunil Abraham was a speaker.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis"&gt;GDPR and India: A Comparative Analysis&lt;/a&gt; (Aditi Chaturvedi; October 17, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem"&gt;Securing The Digital Payments Ecosystem&lt;/a&gt; (Organized by NITI Aayog; October 9, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;br /&gt;
&lt;div&gt;&lt;strong&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;►&lt;/strong&gt;Big Data&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Blog Entry&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case"&gt;Revisiting Per Se vs Rule of Reason in Light of the Intel Conditional Rebate Case&lt;/a&gt; (Shruthi Anand; October 4, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Event Organized&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things"&gt;Emerging Issues in the Internet of Things&lt;/a&gt; (CIS, Bengaluru; October 23, 2017). Andrew Rens gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;/strong&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources, and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Article &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-october-5-2017-npas-and-structural-issues"&gt;NPAs &amp;amp; Structural Issues&lt;/a&gt; (Shyam Ponappa; Business Standard; October 4, 2017).&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;br /&gt;&lt;span&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by an emerging need to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It aims to produce local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Articles&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-october-9-digital-native-there-is-no-spoon-there-is-no-privacy"&gt;Digital Native: There is no spoon, There is no privacy&lt;/a&gt; (Nishant Shah; October 9, 2017).&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/raw/indian-express-nishant-shah-october-22-2017-digital-native-finger-on-the-buzzer"&gt;Digital Native: Finger on the buzzer&lt;/a&gt; (Nishant Shah; October 22, 2017).&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;-----------------------------------&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;br /&gt;&lt;/a&gt;&lt;span&gt;----------------------------------- &lt;/span&gt;&lt;/p&gt;
&lt;div class="keyResearch"&gt;
&lt;div id="parent-fieldname-text-8a5942eb6f4249c5b6113fdd372e636c"&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;► Support Us&lt;/p&gt;
&lt;div&gt;Please help us defend consumer and citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/div&gt;
&lt;p&gt;► Request for Collaboration&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay, Research Director, at sumandro@cis-india.org (for academic research), with an indication of the form and the content of the collaboration you might be interested in. To discuss collaborations on Indic language Wikipedia projects, write to Tanveer Hasan, Programme Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&lt;em&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="viewlet-below-content-body"&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/october-2017-newsletter'&gt;https://cis-india.org/about/newsletters/october-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2018-01-10T00:53:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data">
    <title>Ahead of data protection law roll out, experts caution that it shouldn't limit collection and use of data</title>
    <link>https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data</link>
    <description>
        &lt;b&gt;With India planning to roll out a new data protection regime following the landmark Supreme Court judgment upholding right to privacy as fundamental right, experts have cautioned that the new law should not limit collection and use of data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.firstpost.com/tech/news-analysis/ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data-4134753.html"&gt;published by First Post&lt;/a&gt; on October 12, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"The new data protection law should have data-driven innovation at its core," said Kamlesh Bajaj, Founder-CEO, Data Security Council of India (DSCI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It should not limit data collection and use, but limit harm to citizens," Bajaj added at a seminar on "Data Protection and Privacy" organised by non-profit industry body Internet and Mobile Association of India (IAMAI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a major boost to individual freedom, the Supreme Court in August declared that right to privacy was a fundamental right and protected as an intrinsic part of life and personal liberty and freedoms guaranteed by the Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Supreme Court judgment calls for production of a new law," said Sunil Abraham, Executive Director of Bangaluru-based research organisation, Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The experts noted that the Supreme Court judgment remains meaningless for digital Indians without a proper data protection law in place as all other existing laws, such as the Information Technology Act, 2000, do not adequately address the question of right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognising the importance of data protection and keeping personal data of citizens secure and protected, the Ministry of Electronics and Information Technology (MeitY) on 31 July, constituted a Committee of Experts under the chairmanship of its former judge Justice BN Srikrishna to study and identify key data protection issues and recommend methods for addressing them. The committee will also suggest a draft Data Protection Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While the regulator should be given tools to make companies behave better, it should not start with harsh punitive actions," Abraham noted, adding that big fines could challenge the very logic of regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a question to whether a robust data protection regime should come in conflict with issue such as national security, he said that lawmakers should find a way to maximise both imperatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Surveillance is like salt in cooking. It is necessary, but in limited quantity," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participating in a chat with Google's Public Policy Director Chetan Krishnaswamy at the event, MP Rajeev Chandrasekhar, however, said that regulation should start with the process of data collection itself and consumers cannot be expected to demonstrate harm or inappropriate use of their data to enjoy the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It should not be a free run for companies to mine consumer data," the independent Rajya Sabha member said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He emphasised that the process of formulating a data protection law is as important as the law itself and all stakeholders should be able to openly put forward their views and apprehensions and it is only with such a consultative process that the opportunities for the technology space can be safeguarded.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data'&gt;https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-02T15:20:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web">
    <title>Sex, drugs and the dark web</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web</link>
    <description>
        &lt;b&gt;Blend anonymity and bitcoins for a ‘guaranteed safe’ cocktail of terrifying potential.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/internet/sex-drugs-and-the-dark-web/article19818872.ece"&gt;Hindu&lt;/a&gt; on October 7, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It’s hardly a secret that marijuana’s quite easy to get nowadays. Cigarette shop owners, paanwaalas, and otherwise innocuous dealers of innocuous goods hide their stash just out of sight of the unaware. Rustom Juneja is just another marijuana-smoking adult in one of India’s biggest cities. He used to get his ‘stuff’ from local dealers. Till he “got bored of Indian produce,” as he says. So, in 2015, he decided to go to the dark web.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I brought strains of marijuana from the U.S. and Canada, from a marketplace on the dark web,” Juneja says. The packages were shipped from their respective countries, they traversed borders, bypassed stringent security and checks, crossed continents, and landed at Juneja’s doorstep.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That is the dark web for you. Completely unpoliced, willing users can find anything, from the aforementioned marijuana, to “hard” drugs, to military grade-weaponry and even sex workers. All delivered to your doorstep just like books or designer watches from Amazon, Flipkart, or Snapdeal. And yes, some even offer cash-on-delivery. Returns might not be as simple, though.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, a group of students were arrested in Hyderabad on charges of purchasing LSD (also called ‘acid’) on the dark web. But they weren’t arrested because they had made the transaction on the dark web; they were arrested because the purchase and/ or use of LSD is illegal under Indian law (Narcotic Drugs and Psychotropic Substances Act, 1985).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, transactions on the dark web belong to a legal grey area. More importantly, the transactions here are mostly untraceable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, just what is the dark web?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Shadow world&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The world wide web is a Brobdingnagian mass of data, parts of which are ‘indexed’ so that they may be found by users through search engines (Google, Bing, etc). The parts of the web that aren’t indexed, and therefore available for public access, are known as the ‘deep web’. This was the part initially known as the dark web, with the ‘dark’ being more an allusion to being kept away from the light of regular access than its now more nefarious association. While it’s near impossible to put a number to it, unofficial estimates mostly concur that the vast majority of the web is unindexed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, in the early 2000s, programmers began developing techniques that would be able to offer anonymous access to these hidden bits of the web. In 2002, the U.S. Naval Laboratory released one of the earliest versions of The Onion Router (TOR), a software that would allow anonymous communication between American intelligence agents and operatives on foreign soil.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This didn’t go quite according to plan, though. Tor was soon appropriated by cyberpunks, who began using the protocol to give access to websites that would host, share, and trade illicit goods. Today, the dark web is a sub-section of the deep web, accessed using specialised software like Tor that ensures absolute anonymity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;The onion protocol&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“If you want to track anything on the &lt;a href="http://www.thehindu.com/tag/541-428/internet/?utm=bodytag"&gt;&lt;span&gt;Internet, &lt;/span&gt;&lt;/a&gt;it can happen at three levels — the level of the person who sends a request, at the level of the person responding to this request, or it can happen in between these two ends,” says Udbhav Tiwari, Policy Officer at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Because of this structure, it is easy to track actions and resources across the Internet, using the same terminology that makes it so easy to index and search. So, people began thinking this might become a problem.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of us have heard of the Hyper Text Transfer Protocol Secure or HTTPS, a protocol that ensures that information is encrypted and secure the moment it leaves a computer till the time it reaches a destination computer. But this protocol only protects one of the three levels on which information might be tracked. The dark web is built to ensure that the remaining levels are also protected and kept anonymous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The reason it’s called the ‘onion’ protocol is because there are bits of information that are encrypted over and over again. So, when something leaves one computer, it is encrypted with a layer, then it hits another computer and is encrypted with another layer, and it hits another computer, where it is encrypted yet again. When this information returns, each layer is peeled off, so that you get the information you requested, with none of the encryption,” Tiwari says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This kind of encryption makes it borderline impossible to figure out who is communicating with who and what they are talking about, unless the physical machines at either end are compromised, or a vulnerability on these machines is exploited by setting up a fake website on the Internet — a technique the FBI uses to track child pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And what does it all mean? A level of guaranteed secrecy with terrifying potential. A 2015 study found that light drugs were the most traded commodity on the dark web, and that as much as 26% of its content could be classified as ‘child exploitation’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A 2016 study found that almost 57% of live websites on the dark web hosted illicit material. The ease of access and the minimal chances of being caught has meant a steady rise in the use of the dark web and the murk it peddles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s a market where both buyer and vendor are rated, like Uber. This establishes trust, and authenticates the veracity of a potential transaction. Thus, for instance, buyers are obviously more inclined to buy an assault rifle from a highly-rated seller. And you will be sold grenades only if your ratings assure the vendor you’ll fulfil your end of the transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once a transaction is finalised, the payment is held ‘in escrow’ — a third party arbitration system which ensures the buyer is paid only after they have met their end of the bargain. The third parties also arbitrate in the event of a dispute.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;As easy as pie&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Juneja bought marijuana three times, all from the same vendor, but only two shipments reached him. The third time, the parcel never landed, but the arbiters decided in favour of the vendor because he had a much better rating and Juneja lost his money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With no proper method to find out whether the vendor has shipped a product or the buyer has received it, this adjudication is seen as the best stop-gap arrangement. For Juneja, as for many others, the loss was a deal breaker, and he didn’t go back to the dark web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When the first two shipments did arrive though, they came with absolute swagger and nonchalance. “The product was sealed and flattened out, as if it were a magazine or postcard.” It does say something of international security that it can’t differentiate between a shipment of &lt;em&gt;The New Yorker&lt;/em&gt; and marijuana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dark web transactions were initially carried out using legal state-issued currencies. However, the simplicity of tracking online transactions made with property monitored by the government led to the rise of cryptocurrencies — digital or virtual currency that uses cryptographic techniques for security and which would be beyond state control. Besides the need to go underground, there was a political angle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These people see money as a state incursion into private affairs,” says Jyotirmoy Bhattacharya, economics professor at Delhi’s Ambedkar University.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first, and still most popular, cryptocurrency was released in 2009 — bitcoin. Created by an unknown person or group of people, going only by the pseudonym Satashi Nakamoto, bitcoin was intended as a ‘peer-to-peer electronic cash system’, which would be completely decentralised, with no central server or state authority. This meant that the value and proliferation of bitcoin would be determined by its creators and users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The idea of a virtual currency has been around since before Nakamoto, but a large problem was in limiting creation and supply. Bitcoin was the first to solve this problem. “Bitcoin uses a technique known as the ‘proof-of-work’ (POW). So, to create a new set of this currency, you have to spend some amount of computational resources. This limits how much currency you can generate, thus ensuring that the currency has a value,” says Bhattacharya.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;What is bitcoin?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“A bitcoin is simply a solution to a puzzle. If there are a set of puzzles that are a part of the bitcoin protocol, one bitcoin is simply one of the solved puzzles of that set, along with a digital signature of who solved the puzzle,” says Bhattacharya. A public ledger tracks the ownership of bitcoins, which ensures that the same one is not used again by the same person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Since there is no central authority, your transaction has to match the globally agreed ledger.” To ensure that ownership of bitcoin is legitimate, every transaction is published in the ledger, thus creating a ‘chain of transactions’ known as a blockchain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the past few years, the value of bitcoin has skyrocketed, so much so that people have begun investing in it, as an asset. When bitcoin was first used as tender in early 2010, it was valued at around $0.003. For a brief while in August, one bitcoin was valued at $4,500, a record high.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the everyday world of eggs and bread, though, bitcoin has limited use. It is still unrecognised by several nations, and deemed illegal in many others. It’s in the dark web that it finds its most votaries. While it would be flippant to suggest that bitcoin is used on the dark web solely for illicit uses, it is difficult to deny its origins for that purpose, and its continuing use there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bedavyasa Mohanty, an Associate Fellow at Observer Research Foundation Cyber Initiative, says that there are Indian users transacting on the dark web using bitcoin and claims that this number is only likely to increase as accessibility increases. “Bitcoin cannot be tracked,” says Mohanty. “With the ledger and the blockchain, you can trace the trail of a certain bitcoin, but it is anonymised. You can’t point out who owns that bitcoin.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, in effect, means an entirely anonymous transaction may be made on the dark web for any number of illegal goods or services using a currency that leaves a trail which goes nowhere and leaves no fingerprints. This, in a nutshell, is the danger when bitcoin combines with the dark web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several users I spoke to either claimed that fears about the dark web were mostly unfounded, or that the freedom it offered was an essential facet of the Internet. But it can’t be denied that the sheer possibility that somebody can deal in child porn or hard drugs or deadly weapons right under the nose of the law is a terrifying one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the perspective of Indian law enforcement, given the technical knowhow they have to track down owners and users of bitcoins, the chances of discovery are minimal, says Mohanty. The currency uses a system of public and private ‘keys’, ensuring that an intercepted bitcoin transmission is useless without those keys. To top it, India does not have any clear laws to regulate cryptocurrencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For India to regulate cryptocurrencies, it would need to legally recognise their existence,” says Mohanty. “And if you do recognise them, what do you treat them as? As a security? Or as a currency that can be traded openly, and so on. That’s part of the reason why the Reserve Bank hasn’t formally recognised cryptocurrencies.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Flagging illegal trades&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bitcoin exchanges in India insist that they follow strict guidelines and e-KYC (Know Your Customer) rules, ensuring that the identity of every customer on the exchange is verified. “If somebody tries to use a bitcoin from Zebpay or any other recognised exchange, they will definitely be tracked down,” says Saurabh Agrawal, co-founder of Zebpay, one of India’s largest bitcoin exchanges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We use strong software; if any of our users use bitcoins for illegal purposes, we close their accounts. We’ve done this in the past and will do so in future as well.” He claims their software maintains a list of web addresses deemed ‘red alert’ sites, and the moment a bitcoin is sent to such a site, the transaction is flagged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others are less positive. “While we can track whether a transaction is made through illegal routes, to some extent it’s true that we cannot track all transactions in real time as this takes a large amount of data,” says Sathvik Vishwanath, CEO, Unocoin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But if someone is trying to buy or sell from illegal marketplaces, we have a mechanism where we can — and do — stop it.” Given that customers are KYC-verified, “they don’t try to indulge in malicious activities,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pan to Rustom Juneja. Juneja made three transactions in 2015, using bitcoins purchased entirely legally from an exchange. “You have to create an account on any of the markets online, and transfer your bitcoins to that account,” Juneja informs me. His account too was KYC-verified, and they had all his details — PAN number, Aadhar, and so on. He had no clue then that the exchanges had tracking methods. “Look, if these actually worked, there’s no way we wouldn’t have been caught,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Part of the problem, of course, is that Indian law does not recognise the dark web as a separate entity from the ‘surface’ web; there are no special laws for it. Yet, even if laws were put in place, there are few ways in which states can monitor or block the use of the dark web owing to a host of technical and legal reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A sense of urgency [regarding the dark web], especially relating to the use of bitcoin for illicit activities, hasn’t been instilled in the government yet,” says Mohanty. “What they are worried about is terrorism, and the use of anonymous technologies and chatrooms for radicalisation, terror planning, or buying and selling weapons.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Juneja is one of a few thousand active Indian users on the dark web. Nothing stops them from buying a strain of marijuana from Canada. But nothing stops them from buying a Kalashnikov either.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Sunny side up&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The dark web isn’t necessarily only a marketplace for all of the world’s nefarious practices. The very anonymity and shrouds that the dark web offers can be used for general practices by users looking merely for privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aritra Ghosh, a Ph.D student of Computational Astrophysics at Yale University says, “(The dark web is) possibly the only way to do something in “secret” away from any kind of surveillance. Onion routing still hasn’t been broken. So, it can play a substantial role in movements against companies, governments and so on.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And this is a quality that many frequenters of the dark web swear by. Even the ability to use anonymous messenger service with a near-complete guarantee of not being ‘watched’ drives a lot of people here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akarsh Pandit, 24, says unrestricted access to many resources including books and documents is an area of huge potential. “Another significant pro is the avoidance of national firewalls that exist in some countries. Moreover, you gain access to unindexed search results,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web'&gt;https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-01-02T16:13:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cy-fy-2017">
    <title>CyFy 2017</title>
    <link>https://cis-india.org/internet-governance/news/cy-fy-2017</link>
    <description>
        &lt;b&gt;CyFy is a conference on internet governance and cyber security organised by the Observer Research Foundation (ORF) in New Delhi between 2 and 4 October 2017. Sunil Abraham was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker on a panel titled "Security Through Identity?" on the 4 October  2017 and chaired an invite only session titled "Encryption: The End of  Surveillance?" on the 3rd of October, 2017. Saikat Dutta and Udbhav Tiwari also participated in the encryption session. Saikat was a speaker in a session titled "Digital Vulnerabilities: Capacity Building for Tackling Cyber Crime" on 3 October 2017. Udbhav Tiwari chaired a session titled "Dangerous Disclosures: Cyber Security Incident Reporting" on 4 October 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conference agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2017-agenda"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cy-fy-2017'&gt;https://cis-india.org/internet-governance/news/cy-fy-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-26T09:36:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things">
    <title>Emerging Issues in the Internet of Things</title>
    <link>https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things</link>
    <description>
        &lt;b&gt;Andrew Rens will give a talk about research that he is doing at the Internet Governance Lab on October 23, 2017 at the Centre for Internet &amp; Society in Bengaluru.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It seems almost anything can be connected to the Internet: 3D printers, cars, traffic lights and even toasters. This proliferation of Internet enabled devices, the Internet of Things (IoT), raises a cloud of complex problems, of ownership and control, privacy and surveillance, ubiquity and network fragility. IoT doesn't just promise efficiency; cheap sensors and printers might put scientific research and customized manufacturing in the hands of millions more people. The governance of the IoT, exhibits the same super complexity as Internet governance generally; with multiple sites of governance and actors operating across legal borders. Legal regulation, standards and the architecture of technology determine how the IoT is configured and how it will be reconfigured in response to these problems. Where is the technology governance of the IoT currently taking shape? What forces will likely bear on the governance of the IoT? What role will permissionless innovation play, and what its limits? How will intellectual property laws complicate the IoT?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event, overall, is expected to be a thought provoking one for discussion on things related to IoT.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things'&gt;https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-10-03T01:53:25Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope">
    <title>The​ ​Fundamental​ ​Right​ ​to​ ​Privacy:​ ​Part​ ​III SCOPE</title>
    <link>https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope</link>
    <description>
        &lt;b&gt;This is the third paper in a series on the recent judgment on the right to privacy by the nine judge constitution bench of the Supreme Court in a reference matter in Puttaswamy and others v. Union of India. The first two papers on the Sources and Structure of the constitutional right to privacy are available here, and here, respectively.  While the previous papers dealt with the sources in the Constitution and the interpretive tools used by the bench to locate the right to privacy as a constitutional right, as well as the structure of the right with its various dimensions, this paper will look at the judgment for guidance on principles to determine what the scope of the right of privacy may be.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope'&gt;https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-10-02T04:14:00Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2017-newsletter">
    <title>September 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/september-2017-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;CIS filed a request under the Right to Information Act in March 2016 as part of research for the paper: Patent Working Requirements and Complex Products: An Empirical Assessment of India's Form 27 Practice and Compliance (July 2017). Rohini Lakshané has &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-march-2016"&gt;captured the developments in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Last​ ​month’s​ ​judgment​ ​by​ ​the​ ​nine​ ​judge​ ​referral​ ​bench​ ​was​ ​an​ ​emphatic endorsement​ ​of​ ​the​ ​the​ ​constitutional​ ​right​ ​to​ ​privacy. Amber Sinha has dissected the various aspects of the right to privacy as put forth by the nine judge constitutional bench in the Puttaswamy matter. The papers on fundamental right to privacy can be &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"&gt;accessed here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;With offline as the theme of the third Internet Researchers' Conference (IRC18), CIS has &lt;a class="external-link" href="https://cis-india.org/raw/posts"&gt;invited teams of two or more members to submit sessions proposals&lt;/a&gt; by Sunday, October 22, 2017. The conference is expected to be held in Himachal Pradesh during February 22-24, 2018. The venue and dates will be confirmed soon.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Anonymity-based internet apps like Sarahah may not be as vicious for those surrounded by the comfort of social status. If your experience of Sarahah has been positive, it might be good to reflect on your own cultural and social capital, &lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-10-2017-digital-native-what-s-in-a-name-privilege"&gt;wrote Nishant Shah in an article in the Indian Express&lt;/a&gt;, dated September 10, 2017.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS in the news:&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cnn-tech-august-29-2017-rishi-iyengar-privacy-is-now-a-right-in-india"&gt;Privacy is now a right in India. Here's what that means for the tech industry&lt;/a&gt; (Rishi Iyengar; CNN Tech; August 29, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-russian-social-network-vkontakte-temporarily-blocked-in-india-for-blue-whale-threat"&gt;Russian social network VKontakte temporarily blocked in India for Blue Whale threat&lt;/a&gt; (Kim Arora; The Times of India; September 12, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Pervasive Technologies&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-march-2016"&gt;RTI request to Indian Patents Office for Form 27&lt;/a&gt; (Statement of Working of patents), March 2016 (Rohini Lakshané; September 9, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-2015"&gt;RTI request to Indian Patents Office for Form 27&lt;/a&gt; (Statement of Working of patents), 2015 (Rohini Lakshané; September 9, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;Our  work in the Openness programme   focuses on open data, especially open  government data, open access,  open  education resources, open knowledge  in Indic languages, open  media, and  open technologies and standards -  hardware and software. We  approach  openness as a cross-cutting  principle for knowledge  production and  distribution, and not as a  thing-in-itself.&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/openness/news/praja-enhancing-democracy-through-access-to-open-data-what-are-the-roles-of-government-and-civil-society-delhi-sep-08"&gt;Praja - Enhancing Democracy Through Access to Open Data: What Are the Roles of Government and Civil Society?&lt;/a&gt; (Organized by Praja; September 8, 2017; New Delhi). Sumandro Chattapadhyay was a speaker.&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/rethinking-national-privacy-principles"&gt;Rethinking National Privacy Principles: Evaluating Principles for India's Proposed Data Protection Law&lt;/a&gt; (Amber Sinha; September 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"&gt;The Fundamental Right to Privacy: An Analysis&lt;/a&gt; (Amber Sinha; September 27, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p&gt;►Big Data&lt;/p&gt;
&lt;strong&gt;Upcoming Event&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things"&gt;Emerging Issues in the Internet of Things&lt;/a&gt; (CIS, Bangalore; October 23, 2017). Andrew Rens will give a talk on the research that he is doing at the Internet Governance Lab. &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; &lt;/strong&gt;CIS is involved in promoting access and accessibility to   telecommunications services and resources, and has provided inputs to   ongoing policy discussions 	and consultation papers published by TRAI.   It has prepared reports on unlicensed spectrum and accessibility of   mobile phones for persons with disabilities 	and also works with the   USOF to include funding projects for persons with disabilities in its   mandate:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-september-8-2017-revamp-telecom-sector-and-revive-the-economy"&gt;Revamp Telecom Sector &amp;amp; Revive The Economy&lt;/a&gt; (Shyam Ponappa; Business Standard; September 7, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-10-2017-digital-native-what-s-in-a-name-privilege"&gt;Digital native: What’s in a name? Privilege&lt;/a&gt; (Indian Express, September 10, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Announcement &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/irc18-offline-call"&gt;Internet Researchers' Conference 2018&lt;/a&gt; (IRC18): Offline - Call for Session (P.P. Sneha; September 20, 2017). Teams of two or more members to submit sessions proposals by Sunday, October 22, 2017.&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Blog Entry&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/the-digital-humanities-from-father-busa-to-edward-snowden"&gt;The Digital Humanities from Father Busa to Edward Snowden&lt;/a&gt; (P.P. Sneha; September 4, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2017-newsletter'&gt;https://cis-india.org/about/newsletters/september-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-11-21T15:19:25Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf">
    <title>Amber Sinha - The​ ​Fundamental​ ​Right​ ​to​ ​Privacy:​ ​Part​ ​II - Structure</title>
    <link>https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf'&gt;https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-09-28T08:37:26Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc18-offline-call">
    <title>Internet Researchers' Conference 2018 (IRC18): Offline - Call for Sessions</title>
    <link>https://cis-india.org/raw/irc18-offline-call</link>
    <description>
        &lt;b&gt;Does being offline necessarily mean being disconnected? Beyond anxieties such as FOMO, being offline is also seen as disengagement from a certain milieu of the digital (read: capital), an impediment to the way life is organised by and around technologies in general. However, being offline is not the exception, as examples of internet shutdown and acts on online censorship illustrate the persistence and often alarming regularity of the offline even for the ‘connected’ sections of the population. The *offline* is the theme of the third Internet Researchers' Conference (IRC18). We invite teams of two or more members to submit sessions proposals by Sunday, November 19 (final deadline). The session selection process is described below. The Conference will be hosted by the Sambhaavnaa Institute of Public Policy and Politics (Kandbari, Palampur, Himachal Pradesh) on February 22-24, 2018.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a href="#offline"&gt;IRC18: Offline&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;&lt;a href="#call"&gt;Call for Sessions&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;&lt;a href="https://cis-india.github.io/irc/irc18/proposed-sessions.html" target="_blank"&gt;Proposed Sessions&lt;/a&gt; (Conference Website)&lt;/h4&gt;
&lt;h4&gt;&lt;a href="http://www.sambhaavnaa.org/" target="_blank"&gt;Sambhaavnaa Institute of Public Policy and Politics&lt;/a&gt; (External Link)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3 id="offline"&gt;&lt;strong&gt;IRC18: Offline&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Does being offline necessarily mean being disconnected? Beyond anxieties such as FOMO, being offline is also seen as disengagement from a certain milieu of the digital (read: capital), an impediment to the way life is organised by and around technologies in general. However, being offline is not the exception, as examples of internet shutdown and acts on online censorship illustrate the persistence and often alarming regularity of the offline even for the ‘connected’ sections of the population.&lt;/p&gt;
&lt;p&gt;State and commercial providers of internet and telecommunication services work in tandem to produce both the “online” and the “offline” - through content censorship, internet regulation, generalised service provision failures, and so on. Further, efforts to prioritise the use of digital technologies for financial transactions, especially since demonetisation, has led to a not-so-subtle equalisation of the ‘online economy’ with the ‘formal economy’; thus recognising the offline as the zones of informality, corruption, and piracy. This contributes to the offline becoming invisible, and in many cases, illegal, rather than being recognised as a condition that necessarily informs what it means to be digital.&lt;/p&gt;
&lt;p&gt;Who is offline, and is it a choice? The global project of bringing people online has spurred several commendable initiatives in expanding access to digital devices, networks, and content, and often contentious ones such as Free Basics / internet.org, which illustrate the intersectionalities of scale, privilege, and rights that we need to be mindful of when we imagine the offline. Further, the experience of the internet, for a large section of people is often mediated through prior and ongoing experiences of traditional media, and through cultural metaphors and cognitive frames that transcend more practical registers such as consumption and facilitation. How do we approach, study, and represent this disembodied internet – devoid of its hypertext, platforms, devices, it's nuts and bolts, but still tangible through engagement in myriad, personal and often indiscernible ways.&lt;/p&gt;
&lt;h4&gt;For the third edition of the Internet Researchers’ Conference (IRC18), we invite participants to critically discuss the *offline*. We invite sessions that present or propose academic, applied, creative, or technical works that explore social, economic, cultural, political, infrastructural, or aesthetic dimensions of the *offline*.&lt;/h4&gt;
&lt;p&gt;For example, the sessions may explore one or more of the following themes:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Geographies of internet access: Infrastructural, socio-political, and discursive forces and contradictions&lt;/li&gt;
&lt;li&gt;Terms, objects, metaphors, and events of the internet and their offline remediation and circulation&lt;/li&gt;
&lt;li&gt;Minimal computing, maker cultures, and digital collaboration and creativity in the offline&lt;/li&gt;
&lt;li&gt;Offline economic cultures and transition towards less-cash economy&lt;/li&gt;
&lt;li&gt;Offline as democratic choice: the right to offline lives in the context of global debates on privacy, surveillance, and data justice&lt;/li&gt; 
&lt;li&gt;Methodologies of studying the *offline* at the intersections of offline and online lives&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Please note that the above are not sub-themes or tracks under which a session should be proposed, but are illustrations of possible session themes and concerns.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 id="call"&gt;&lt;strong&gt;Call for Sessions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;We invite teams of two or more members to propose sessions for IRC18. All sessions will be one and half hours long, and will be fully designed and facilitated by the team concerned, including moderation (if any). Please remember this when planning the session. Everything happening during the session, except for logistical support, will be led and managed by the session team.&lt;/p&gt;
&lt;p&gt;The sessions are expected to drive conversations on the topic concerned. They may include presentation of research papers but this is not mandatory.&lt;/p&gt;
&lt;p&gt;We look forward to sessions that involve collaborative work (either in groups or otherwise), including discussions, interactions, documentation, learning, and making, are most welcome.&lt;/p&gt;
&lt;p&gt;We also look forward to sessions conducted in Indic languages. The proposing team, in such a case, should consider how participants who do not understand the language concerned may engage with the session. IRC organisers and other participants shall help facilitate these sessions, say by offering translation support.&lt;/p&gt;
&lt;p&gt;The only eligibility criteria for proposing sessions are that they must be proposed by a team of at least two members, and that they must engage with the *offline*.&lt;/p&gt;
&lt;p&gt;The deadline for submission of sessions proposals for IRC18 is &lt;strong&gt;Sunday, November 19 (final deadline)&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;To propose a session, please send the following documents (as attached text files) to raw@cis-india.org:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Title of the Session:&lt;/strong&gt; The session should be named in the form of a hashtag (check the &lt;a href="https://cis-india.org/raw/irc17-selected-sessions"&gt;IRC17 selected sessions&lt;/a&gt; for example).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Context of the Session:&lt;/strong&gt; This should be a 300 words note discussing the context, the motivations, and the expectations behind the proposed session.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session Plan:&lt;/strong&gt; This should describe the objectives of the session, what will be done and discussed during the session, and who among the people organising the session will be responsible for what. This note need not be more than 300 words long. If your session involves inviting others to present their work (say papers), then please provide a description and timeline of the process through which these people will be identified.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session Team Details:&lt;/strong&gt; Please share brief biographic notes of each member of the session team, and contact details.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;There is no registration fee for the Conference, but participants are expected to pay for their own travel and accommodation (to be organised by CIS) expenses. Limited funding will be available to support travel and accommodation expenses of few participants who are unemployed or under-employed.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session selection process:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;November 19:&lt;/strong&gt; Deadline of submission of session proposals.All submitted sessions will be posted on the CIS website, along with the names and details of the session team members.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;November 20 - December 17:&lt;/strong&gt; Open review period. All session teams, as well as other interested contributors, are invited to review and comment upon each other's submitted proposals and revise their own. Read the proposed sessions here: &lt;a href="https://cis-india.github.io/irc/irc18/proposed-sessions.html"&gt;Conference Website&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;December 18-31:&lt;/strong&gt; The selection process takes place. All session teams will select 10 sessions to be included in the IRC18 programme. The votes will be anonymous, that is no session team will know which other sessions have voted for their session.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;January 08:&lt;/strong&gt; Announcement of selected sessions.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;February 22-24:&lt;/strong&gt; IRC18 at Sambhaavnaa Institute!&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc18-offline-call'&gt;https://cis-india.org/raw/irc18-offline-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>IRC18</dc:subject>
    
    
        <dc:subject>RAW Events</dc:subject>
    

   <dc:date>2017-11-29T12:30:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/annual-report-2016-2017">
    <title>Annual Report 2016-2017</title>
    <link>https://cis-india.org/internet-governance/files/annual-report-2016-2017</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/annual-report-2016-2017'&gt;https://cis-india.org/internet-governance/files/annual-report-2016-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-09-20T01:43:30Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/annual-report-2015-2016">
    <title>Annual Report 2015-2016</title>
    <link>https://cis-india.org/internet-governance/files/annual-report-2015-2016</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/annual-report-2015-2016'&gt;https://cis-india.org/internet-governance/files/annual-report-2015-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-09-20T01:35:54Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
