<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 431 to 445.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/new-cms-doc-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/netmundial-transcript-archive"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-mundial-day-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-mundial-day-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-mundial-day-0"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/netizen-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-voices-february-11-2016-netizen-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hardnewsmedia-august-10-2015-abeer-kapoor-net-neutrality-india-is-a-keybattle-ground"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/himal-south-asian-laxmi-murthy-net-nanny-meets-muscular-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts">
    <title>New privacy Bill more refined &amp; has wider ambit, say experts</title>
    <link>https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts</link>
    <description>
        &lt;b&gt;But creates wide exceptions for government agencies.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/new-privacy-bill-more-refined-has-wider-ambit-say-experts-114040101013_1.html"&gt;published in the Business Standard&lt;/a&gt; on April 2, 2014. CIS welcomes changes in the Bill but is cautious of the wide exceptions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government’s latest attempt to draft a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Privacy+Bill" target="_blank"&gt;privacy Bill&lt;/a&gt; is being termed by as a refined one by experts as it expands its ambit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the Bill creates some wide exceptions for law enforcement and  intelligence agencies to collect personal information of individuals.  The government has made several attempts at drafting a privacy Bill  since 2010, with the aim of protecting individuals against data misuse  by government or private agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first draft, released in 2011, extended the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Right+To+Privacy" target="_blank"&gt;Right to Privacy&lt;/a&gt; to citizens of India. But, the 2014 version has expanded its ambit to  cover all residents of the country. The 2014 Bill also recognises the  Right to Privacy as a part of Article 21 of the Indian Constitution and  extends to the whole of India. In contrast, the 2011 Bill did not  explicitly recognise the Right to Privacy as being a part of Article 21,  and excluded Jammu and Kashmir from its purview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both the drafts include a list of circumstances under which  authorisation for the collection and processing of sensitive personal  data is not required. The lists are broadly the same. However, the  latest version exempts insurance company and government intelligence  agencies collecting or processing data “in the interest of the  sovereignty, integrity, security or the strategic, scientific or  economic interest of India.”&lt;br /&gt; &lt;br /&gt; A Bangalore-based Internet think-tank Centre for Internet and Society  said it welcomed many changes in the Bill, but were cautious on the wide  exceptions.&lt;br /&gt; &lt;br /&gt; “The Bill carves out another exception for government agencies, allowing  disclosure of sensitive personal data without consent to government  agencies mandated under law for the purposes of verification of  identity, or for prevention, detection, investigation, including cyber  incidents, prosecution and punishment of offences,” the Centre for  Internet and Society said in a note analysing the provisions of the  Bill.&lt;br /&gt; &lt;br /&gt; The privacy Bill was originally conceptualised to ensure the data  collected by the government under various new projects such as Aadhaar  or the National Information Grid (NATGRID) are not misused in any way.  But incidents, such as the tapping of phone conversations involving  former lobbyist &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Niira+Radia" target="_blank"&gt;Niira Radia&lt;/a&gt;, prompted the government to expand the ambit of the privacy law from just being a data protection one to also cover &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Surveillance" target="_blank"&gt;surveillance&lt;/a&gt; and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Interception" target="_blank"&gt;interception&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, it was unable to reach a consensus due to inter-ministerial  conflicts as the law was superseding various provisions under several  existing legislations.&lt;br /&gt; &lt;br /&gt; The government also set up a committee under retired Delhi high court  judge Ajit P Shah under the aegis of the Planning Commission to study  international best practices on privacy and surveillance. This committee  filed a report in 2012.&lt;br /&gt; &lt;br /&gt; Some additions to the Bill include the term personal identifier, defined  by any unique alphanumeric sequence of members, letters, and symbols  that specifically identifies an individual with a database or a data  set.&lt;br /&gt; &lt;br /&gt; The Bill has also re-defined sensitive personal data to denote personal  data relating to physical and mental health, including medical history,  biometric, bodily or genetic information, criminal convictions,  password, banking credit and financial data, narco analysis or polygraph  test data and sexual orientation.&lt;br /&gt; &lt;br /&gt; Once the law comes into being, the government or a private agency will  have to adequately inform citizens before collecting data, stating the  reasons and only collecting as much information as is necessary.&lt;br /&gt; &lt;br /&gt; It will also have to clearly define the time period for which the data  will be stored and the security measures taken to protect it from  misuse. The law also lays down the penalties in case of a breach.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts'&gt;https://cis-india.org/news/business-standard-april-3-2014-surabhi-agarwal-new-privacy-bill-more-refined-has-wider-ambit-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-03T11:06:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/new-cms-doc-2">
    <title>New Document on India's Central Monitoring System (CMS) - 2</title>
    <link>https://cis-india.org/internet-governance/blog/new-cms-doc-2</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/new-cms-doc-2'&gt;https://cis-india.org/internet-governance/blog/new-cms-doc-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2014-01-30T12:40:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy">
    <title>New Bill to decide on individual’s right to privacy</title>
    <link>https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy</link>
    <description>
        &lt;b&gt;A group of experts would identify issues relating to privacy and prepare a report to facilitate authoring the Privacy Bill. Vishwajoy Mukherjee's article was published in 
Tehelka on 6 February 2012.

&lt;/b&gt;
        
&lt;p&gt;American jurist William J Brennan once famously remarked, “If the right to privacy means anything, it is the right of the individual to be free from unwarranted governmental intrusion.” Now the Government of India is on the verge of formulating, for the first time, a Privacy Bill that will lay down a specific framework to adjudicate an individual’s right to privacy.&lt;br /&gt;&lt;br /&gt;The Planning Commission has constituted a small group of experts under the chairmanship of Justice A P Shah, former Chief Justice of the Delhi High Court, to identify issues relating to privacy and prepare a paper to facilitate authoring the Privacy Bill. The group will be studying the privacy laws and related bills promulgated by other countries and will also be analysing the impact of various programmes being implemented by the government, from the perspective of their impact on privacy. A detailed report with suggestions and remarks will then be handed to the Planning Commission by 31 March.&lt;br /&gt;&lt;br /&gt;In the run-up to the formulation of a new Privacy Bill in India, an All India Privacy Symposium was held on 4 February to discuss aspects of privacy in the context of transparency, national security and internet banking. One of the most vociferous oppositions to the idea of privacy becoming an enshrined right for individuals, has come from those who believe that national security is of paramount importance. “The notion that one has to choose between privacy and national security is a false dichotomy of choice… When the judiciary adjudicates between privacy and surveillance, privacy in almost all cases loses. Especially when the word terrorism is invoked,” said Oxblood Ruffin, a member of the Cult of the Dead Cow, an information security and publishing collective. Speaking at the conference Ruffin stressed on the idea that the State shouldn’t act as a “peeping Tom” but instead respect the “sovereignty of its people.” &lt;br /&gt;&lt;br /&gt;One of the more stark examples, in recent years, of the State clamping down on individual rights, such as the right to privacy, on the pretext of national security, is the Patriot Act in America. The Patriot Act was passed in the United States of America in the immediate aftermath of the September 2001 attacks on the twin towers, and allowed the government to scrutinise everything from “suspicious” bank accounts to wire-tapping lines of communication. Menaka Guruswamy, a lawyer at the Supreme Court of India, believes that unlike America, India does not yet have a codified view on privacy. “Pri­vacy is a vast, fragile, and an open space in the Indian justice system,” she told Tehelka.&lt;/p&gt;
&lt;p&gt;Though India doesn’t have clearly defined laws dealing with the issue of privacy, it does have certain directives under which surveillance methods such as wire-tapping can be done. Wire-tapping, which is regulated under the Telegraph Act of 1885, saw a major overhaul in a 1996 Supreme Court judgment, which ruled that wire-taps are a "serious invasion of an individual's privacy." The Supreme Court (SC) recognised the fact that the right to privacy is an integral part of the fundamental right to life enshrined under Article 21 of the Constitution, and therefore laid down guidelines defining who can tap phones and under what circumstances. Only the Union Home Secretary, or his counterpart in the states, can issue an order for a tap, and the government is also required to show that the information sought cannot to be obtained through any other means. The SC mandated the development of a high-level committee to review the legality of each wire-tap.&lt;/p&gt;
&lt;p&gt;“Interceptions and intrusions by the state have often gone on to help exonerate people who have been falsely accused, so I think it would be unfair to demonise wire-tapping in general. One does have to ensure though, that those who intercept exchanges do not exceed limits,” said a former chief of the Research and Analysis Wing (RAW).&lt;br /&gt;&lt;br /&gt;Besides the dimension of privacy versus surveillance, another important aspect which comes under the scanner when privacy laws are discussed is Internet banking. Details of personal bank accounts and other highly sensitive information of individuals have been whizzing around the cyber space with the advent of E-banking. Everything from booking tickets for movies and flights, to transferring money between accounts is happening via computers, and is happening fast. This growing trend has sparked a major debate on how safe is our information on the web, and what can the government do to secure it? In May 2000, the government passed the Information Technology Act, which laid down a set of laws intended to provide a comprehensive regulatory environment for electronic commerce.&lt;br /&gt;&lt;br /&gt;The Act also addressed computer crimes such as hacking, damage to computer source code, breach of confidentiality and viewing of pornography and created a Cyber Appellate Tribunal to oversee and adjudicate cyber crimes. However, at the same time, the legislation gave broad discretion to law enforcement authorities through several provisions, such as Section 69, allowing the interception of any information transmitted through a computer resource and mandates that users disclose encryption keys or face a jail sentence up to seven years. Section 80 of the Act allows deputy superintendents of police to conduct searches and seize suspects in public spaces without a warrant. &lt;br /&gt;&lt;br /&gt;“Confidentiality between banker and customer is the golden rule of traditional banking, but with the coming of E-banking, banks are using confidentiality as an excuse for not putting out data that shows how vulnerable they are to cyber crimes like hacking,” said N Vijayashankar, an E-business consultant, and a front runner in raising awareness about cyber laws in India. He said, “When framing privacy laws one has to ensure that banks are mandated to disclose data on breach of Internet security. That is the only way to ensure that banks take the necessary steps to secure customer information.” Malavika Jairam, a lawyer who focuses on technology and intellectual property, believes that allowing private participation in what should essentially be a sovereign State function is a dangerous path to tread on. “Tesco, a major retail chain in England, is now into E-banking… There are numerous examples of such private banking entities sharing customer information with insurance policy firms. These details are often used as markers for the kind of premium that will be set for a person,” Jairam said.&lt;br /&gt;&lt;br /&gt;With the current pace of technological advancements fast thinning the line between individual privacy and public content, it remains to be seen what kind of privacy laws India will frame to keep up. &lt;br /&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.tehelka.com/story_main51.asp?filename=Ws060212Privacy.asp"&gt;The original was published by Tehelka&lt;/a&gt;, Malavika Jayaram, a Fellow at CIS is quoted in it.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy'&gt;https://cis-india.org/news/new-bill-to-decide-on-individual2019s-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-07T07:19:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle">
    <title>New Approaches to Information Privacy – Revisiting the Purpose Limitation Principle</title>
    <link>https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle</link>
    <description>
        &lt;b&gt;Article on Aadhaar throwing light on privacy and data protection.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://www.digitalpolicy.org/revisiting-the-principles-of-purpose-limitation-under-existing-data-protection-norms/"&gt;published in Digital Policy Portal&lt;/a&gt; on July 13, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Last year, Mukul Rohatgi, the Attorney General of India, called into question existing jurisprudence of the last 50 years on the constitutional validity of the right to privacy.&lt;sup&gt;1&lt;/sup&gt; Mohatgi was rebutting the arguments on privacy made against Aadhaar, the unique identity project initiated and implemented in the country without any legislative mandate.&lt;sup&gt;2&lt;/sup&gt; The question of the right to privacy becomes all the more relevant in the context of events over the last few years—among them, the significant rise in data collection by the state through various e-governance schemes,&lt;sup&gt;3&lt;/sup&gt; systematic access to personal data by various wings of the state through a host of surveillance and law enforcement initiatives launched in the last decade,&lt;sup&gt;4&lt;/sup&gt; the multifold increase in the number of Indians online, and the ubiquitous collection of personal data by private parties.&lt;sup&gt;5&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These developments have led to a call for a comprehensive privacy legislation in India and the adoption of the National Privacy Principles as laid down by the Expert Committee led by Justice AP Shah.&lt;sup&gt;6&lt;/sup&gt; There are privacy-protection legislation currently in place such as the Information Technology Act, 2000 (IT Act), which was enacted to govern digital content and communication and provide legal recognition to electronic transactions. This legislation has provisions that can safeguard—and dilute—online privacy. At the heart of the data protection provisions in the IT Act lies section 43A and the rules framed under it, i.e., Reasonable security practices and procedures and sensitive personal data information.&lt;sup&gt;7&lt;/sup&gt;Section 43A mandates that body corporates who receive, possess, store, deal, or handle any personal data to implement and maintain ‘reasonable security practices’, failing which, they are held liable to compensate those affected. Rules drafted under this provision also mandated a number of data protection obligations on corporations such the need to seek consent before collection, specifying the purposes of data collection, and restricting the use of data to such purposes only. There have been questions raised about the validity of the Section 43A Rules as they seek to do much more than mandate in the parent provisions, Section 43A— requiring entities to maintain reasonable security practices.&lt;/p&gt;
&lt;h3&gt;Privacy as control?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Even setting aside the issue of legal validity, the kind of data protection framework envisioned by Section 43A rules is proving to be outdated in the context of how data is now being collected and processed. The focus of Section 43 A Rules—as well as that of draft privacy legislations in India&lt;sup&gt;8&lt;/sup&gt;—is based on the idea of individual control. Most apt is Alan Westin’s definition of privacy: “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to other.”&lt;sup&gt;9&lt;/sup&gt; Westin and his followers rely on the normative idea of “informational self- determination”, the notion of a pure, disembodied, and atomistic self, capable of making rational and isolated choices in order to assert complete control over personal information. More and more this has proved to be a fiction especially in a networked society.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Much before the need for governance of information technologies had reached a critical mass in India, Western countries were already dealing with the implications of the use of these technologies on personal data. In 1973, the US Department of Health, Education and Welfare appointed a committee to address this issue, leading to a report called ‘Records, Computers and Rights of Citizens.’&lt;sup&gt;10&lt;/sup&gt; The Committee’s mandate was to “explore the impact of computers on record keeping about individuals and, in addition, to inquire into, and make recommendations regarding, the use of the Social Security number.” The Report articulated five principles which were to be the basis of fair information practices: transparency; use limitation; access and correction; data quality; and security. Building upon these principles, the Committee of Ministers of the Organization for Economic Cooperation and Development (OECD) arrived at the Guidelines on the Protection of Privacy and Transborder Flows of Personal Data in 1980.&lt;sup&gt;11&lt;/sup&gt; These principles— Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation and Accountability—are what inform most data protection regulations today including the APEC Framework, the EU Data Protection Directive, and the Section 43A Rules and Justice AP Shah Principles in India.&lt;/p&gt;
&lt;p&gt;Fred Cate describes the import of these privacy regimes as such:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“All of these data protection instruments reflect the same approach: tell individuals what data you wish to collect or use, give them a choice, grant them access, secure those data with appropriate technologies and procedures, and be subject to third-party enforcement if you fail to comply with these requirements or individuals’ expressed preferences”&lt;sup&gt;12&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is in line with Alan Westin’s idea of privacy exercised through individual control. Therefore the focus of these principles is on empowering the individuals to exercise choice, but not on protecting individuals from harmful or unnecessary practices of data collection and processing. The author of this article has earlier written&lt;sup&gt;13&lt;/sup&gt; about the sheer inefficacy of this framework which places the responsibility on individuals. Other scholars like Daniel Solove,&lt;sup&gt;14&lt;/sup&gt; Jonathan Obar&lt;sup&gt;15&lt;/sup&gt; and Fred Cate&lt;sup&gt;16&lt;/sup&gt; have also written about the failure of traditional data protection practices of notice and consent. While these essays dealt with the privacy principles of choice and informed consent, this paper will focus on the principles of purpose limitation.&lt;/p&gt;
&lt;h3&gt;Purpose Limitation and Impact of Big Data&lt;/h3&gt;
&lt;p&gt;The principles of purpose limitation or purpose specification seeks to ensure the following four objectives:&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;Personal information collected and processed should be adequate and relevant to the purposes for which they are processed.&lt;/li&gt;
&lt;li&gt;The entities collect, process, disclose, make available, or otherwise use personal information only for the stated purposes.&lt;/li&gt;
&lt;li&gt;In case of change in purpose, the data’s subject needs to be informed and their consent has to be obtained.&lt;/li&gt;
&lt;li&gt;After personal information has been used in accordance with the identified purpose, it has to be destroyed as per the identified procedures.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The purpose limitation along with the data minimisation principle—which requires that no more data may be processed than is necessary for the stated purpose—aim to limit the use of data to what is agreed to by the data subject. These principles are in direct conflict with new technology which relies on ubiquitous collection and indiscriminate uses of data. The main import of Big Data technologies on the inherent value in data which can be harvested not by the primary purposes of data collection but through various secondary purposes which involve processing of the data repeatedly.&lt;sup&gt;17&lt;/sup&gt;Further, instead to destroying the data when its purpose has been achieved, the intent is to retain as much data as possible for secondary uses. Importantly, as these secondary uses are of an inherently unanticipated nature, it becomes impossible to account for it at the stage of collection and providing the choice to the data subject.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Followers of the discourse on Big Data would be well aware of its potential impacts on privacy. De-identification techniques to protect the identities of individuals in dataset face a threat from an increase in the amount of data available either publicly or otherwise to a party seeking to reverse-engineer an anonymised dataset to re-identify individuals. &lt;sup&gt;18&lt;/sup&gt; Further, Big Data analytics promise to find patterns and connections that can contribute to the knowledge available to the public to make decisions. What is also likely is that it will lead to revealing insights about people that they would have preferred to keep private.&lt;sup&gt;19&lt;/sup&gt;In turn, as people become more aware of being constantly profiled by their actions, they will self-regulate and ‘discipline’ their behaviour. This can lead to a chilling effect.&lt;sup&gt;20&lt;/sup&gt; Meanwhile, Big Data is also fuelling an industry that incentivises businesses to collect more data, as it has a high and growing monetary value. However, Big Data also promises a completely new kind of knowledge that can prove to be revolutionary in fields as diverse as medicine, disaster-management, governance, agriculture, transport, service delivery, and decision-making.&lt;sup&gt;21&lt;/sup&gt; As long as there is a sufficiently large and diverse amount of data, there could be invaluable insights locked in it, accessing which can provide solutions to a number of problems. In light of this, it is important to consider what kind of regulatory framework is most suitable which could facilitate some of the promised benefits of Big Data and at the same time mitigate its potential harm. This, coupled with the fact that the existing data protection principles have, by most accounts, run their course, makes the examination of alternative frameworks even more important. This article will examine some alternate proposals made to the existing framework of purpose limitation below.&lt;/p&gt;
&lt;h3&gt;Harms-based approach&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Some scholars like Fred Cate&lt;sup&gt;22&lt;/sup&gt; and Daniel Solove&lt;sup&gt;23&lt;/sup&gt; have argued that there is a need for the primary focus of data protection law to move from control at the stage of data collection to actual use cases. In his article on the failure of Fair Information Practice Principles,&lt;sup&gt;24&lt;/sup&gt;Cate puts forth a proposal for ‘Consumer Privacy Protection Principles.’ Cate envisions a more interventionist role of the data protection authorities by regulating information flows when required, in order to protect individuals from risky or harmful uses of information. Cate’s attempt is to extend the principles of consumer protection law of prevention and remedy of harms.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In a re-examination of the OECD Privacy Principles, Cate and Viktor Mayer Schöemberger attempt to discard the use of personal data to only purposes specified. They felt that restricting the use of personal to only specified purposes could significantly threaten various research and beneficial uses of Big Data. Instead of articulating a positive obligations of what personal data collected could be used for, they attempt to arrive at a negative obligation of use-cases prevented by law. Their working definition of the Use specification principle broaden the scope of use cases by only preventing use of data “if the use is fraudulent, unlawful, deceptive or discriminatory; society has deemed the use inappropriate through a standard of unfairness; the use is likely to cause unjustified harm to the individual; or the use is over the well-founded objection of the individual, unless necessary to serve an over-riding public interest, or unless required by law.”&lt;sup&gt;25&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While most standards in the above definition have established understanding in jurisprudence, the concept of unjustifiable harm is what we are interested in. Any theory of harms-based approach goes back to John Stuart Mill’s dictum that the only justifiable purpose to exert power over the will of an individual is to prevent harm to others. Therefore, any regulation that seeks to control or prevent autonomy of individuals (in this case, the ability of individuals to allow data collectors to use their personal data, and the ability of data collectors to do so, without any limitation) must clearly demonstrate the harm to the individuals in question.&lt;/p&gt;
&lt;p&gt;Fred Cate articulates the following steps to identify tangible harm and respond to its presence:&lt;sup&gt;26&lt;/sup&gt;&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;Focus on Use — Actual use of the data should be considered, not mere possession. The assumption is that the collection, possession, or transfer of information do not significantly harm people, rather it is the use of information following such collection, possession, or transfer.&lt;/li&gt;
&lt;li&gt;Proportionality — Any regulatory measure must be proportional to the likelihood and severity of the harm identified.&lt;/li&gt;
&lt;li&gt;Per se Harmful Uses — Uses which are always harmful must be prohibited by law&lt;/li&gt;
&lt;li&gt;Per se not Harmful Uses — If uses can be considered inherently not harmful, they should not be regulated.&lt;/li&gt;
&lt;li&gt;Sensitive Uses — In case where the uses are not per se harmful or not harmful, individual consent must be sought for using that data for those purposes.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The proposal by Cate argues for what is called a ‘use based system’, which is extremely popular with American scholars. Under this system, data collection itself is not subject to restrictions; rather, only the use of data is regulated. This argument has great appeal for both businesses who can reduce their overheads significantly if consent obligations are done away with as long as they use the data in ways which are not harmful, as well as critics of the current data protection framework which relies on informed consent. Lokke Moerel explains the philosophy of ‘harms based approach’ or ‘use based system’ in United States by juxtaposing it against the ‘rights based approach’ in Europe.&lt;sup&gt;27&lt;/sup&gt; In Europe, rights of individuals with regard to processing of their personal data is a fundamental human right and therefore, a precautionary principle is followed with much greater top-down control upon data collection. However, in the United States, there is a far greater reliance on market mechanisms and self-regulating organisations to check inappropriate processing activities, and government intervention is limited to cases where a clear harm is demonstrable.&lt;sup&gt;28&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Continuing research by the Centre for Information Policy Leadership under its Privacy Risk Framework Project looks at a system of articulating what harms and risks arising from use of collected data. They have arrived a matrix of threats and harms. Threats are categorised as —a) inappropriate use of personal information and b) personal information in the wrong hands. More importantly for our purposes, harms are divided into: a) tangible harms which are physical or economic in nature (bodily harm, loss of liberty, damage to earning power and economic interests); b) intangible harms which can be demonstrated (chilling effects, reputational harm, detriment from surveillance, discrimination and intrusion into private life); and c) societal harm (damage to democratic institutions and loss of social trust).&lt;sup&gt;29&lt;/sup&gt;For any harms-based system, a matrix like above needs to emerge clearly so that regulation can focus on mitigating practices leading to the harms.&lt;/p&gt;
&lt;h3&gt;Legitimate interests&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Lokke Moerel and Corien Prins, in their article “Privacy for Homo Digitalis – Proposal for a new regulatory framework for data protection in the light of Big Data and Internet of Things”&lt;sup&gt;30&lt;/sup&gt; use the ideal of responsive regulation which considers empirically observable practices and institutions while determining the regulation and enforcement required. They state that current data protection frameworks—which rely on mandating some principles of how data has to be processed—is exercised through merely procedural notification and consent requirements. Further, Moerel and Prins feel that data protection law cannot only involve a consideration of individual interest but also needs to take into account collective interest. Therefore, the test must be a broader assessment than merely the purpose limitation articulating the interests of the parties directly involved, but whether a legitimate interest is achieved.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Legitimate interest has been put forth as an alternative to the purpose limitation. Legitimate is not a new concept and has been a part of the EU Data Protection Directive and also finds a place in the new General Data Protection Regulation. Article 7 (f) of the EU Directive&lt;sup&gt;31&lt;/sup&gt; provided for legitimate interest balanced against the interests or fundamental rights and freedoms of the data subject as the last justifiable reason for use of data. Due to confusion in its interpretation, the Article 29 Working Party, in 2014,&lt;sup&gt;32&lt;/sup&gt;looked into the role of legitimate interest and arrived at the following factors to determine the presence of a legitimate interest— a) the status of the individual (employee, consumer, patient) and the controller (employer, company in a dominant position, healthcare service); b) the circumstances surrounding the data processing (contract relationship of data subject and processor); c) the legitimate expectations of the individual.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Federico Ferretti has criticised the legitimate interest principle as vague and ambiguous. The balancing of legitimate interest in using the data against fundamental rights and freedoms of the data subject gives the data controllers some degree of flexibility in determining whether data may be processed; however, this also reduces the legal certainty that data subject have of their data not being used for purposes they have not agreed to.&lt;sup&gt;33&lt;/sup&gt;However, it is this paper’s contention that it is not the intent of the legitimate interest criteria but the lack of consensus on its application which creates an ambiguity. Moerel and Prins articulate a test for using legitimate interest which is cognizant of the need to use data for the purpose of Big Data processing, as well as ensuring that the rights of data subjects are not harmed.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As demonstrated earlier, the processing of data and its underlying purposes have become exceedingly complex and the conventional tool to describe these processes ‘privacy notices’ are too lengthy, too complex and too profuse in numbers to have any meaningful impact.&lt;sup&gt;34&lt;/sup&gt;The idea of information self-determination, as contemplated by Westin in American jurisprudence, is not achieved under the current framework. Moerel and Prins recommend five factors&lt;sup&gt;35&lt;/sup&gt; as relevant in determining the legitimate interest. Of the five, the following three are relevant to the present discussion:&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li style="text-align: justify;"&gt;Collective Interest — A cost-benefit analysis should be conducted, which examines the implications for privacy for the data subjects as well as the society, as a whole.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The nature of the data — Rather than having specific categories of data, the nature of data needs to be assessed contextually to determine legitimate interest.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Contractual relationship and consent not independent grounds — This test has two parts. First, in case of contractual relationship between data subject and data controller: the more specific the contractual relationship, the more restrictions apply to the use of the data. Second, consent does not function as a separate principle which, once satisfied, need not be revisited. The nature of the consent (opportunities made available to data subject, opt in/opt out, and others) will continue to play a role in determining legitimate interest.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Replacing the purpose limitation principles with a use-based system as articulated above poses the danger of allowing governments and the private sector to carry out indiscriminate data collection under the blanket guise that any and all data may be of some use in the future. The harms-based approach has many merits and there is a stark need for more use of risk assessments techniques and privacy impact assessments in data governance. However, it is important that it merely adds to the existing controls imposed at data collection, and not replace them in their entirety. On the other hand, the legitimate interests principle, especially as put forth by Moerel and Prins, is more cognizant of the different factors at play — the inefficacy of existing purpose limitation principles, the need for businesses to use data for purposes unidentified at the stage of collection, and the need to ensure that it is not misused for indiscriminate collection and purposes. However, it also poses a much heavier burden on data controllers to take into account various factors before determining legitimate interest. If legitimate interest has to emerge as a realistic alternative to purpose limitation, there needs to be greater clarity on how data controllers must apply this principle.&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Prachi Shrivastava, “Privacy not a fundamental right, argues Mukul Rohatgi for Govt as Govt affidavit says otherwise,” Legally India, Jyly 23, 2015, http://www.legallyindia.com/Constitutional-law/privacy-not-a-fundamental-right-argues-mukul-rohatgi-for-govt-as-govt-affidavit-says-otherwise.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Rebecca Bowe, “Growing Mistrust of India’s Biometric ID Scheme,” Electronic Frontier Foundation, May 4, 2012, https://www.eff.org/deeplinks/2012/05/growing-mistrust-india-biometric-id-scheme.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lisa Hayes, “Digital India’s Impact on Privacy: Aadhaar numbers, biometrics, and more,” Centre for Democracy and Technology, January 20, 2015, https://cdt.org/blog/digital-indias-impact-on-privacy-aadhaar-numbers-biometrics-and-more/.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;“India’s Surveillance State,” Software Freedom Law Centre, http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/.&lt;/li&gt;
&lt;li&gt;“Internet Privacy in India,” Centre for Internet and Society, http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Vivek Pai, “Indian Government says it is still drafting privacy law, but doesn’t give timelines,” Medianama, May 4, 2016, http://www.medianama.com/2016/05/223-government-privacy-draft-policy/.&lt;/li&gt;
&lt;li&gt;Information Technology (Intermediaries Guidelines) Rules, 2011,&lt;br /&gt; http://deity.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Discussion Points for the Meeting to be taken by Home Secretary at 2:30 pm on 7-10-11 to discuss the drat Privacy Bill, http://cis-india.org/internet-governance/draft-bill-on-right-to-privacy.&lt;/li&gt;
&lt;li&gt;Alan Westin, Privacy and Freedom (New York: Atheneum, 2015).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;US Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, http://www.justice.gov/opcl/docs/rec-com-rights.pdf.&lt;/li&gt;
&lt;li&gt;OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fred Cate, “The Failure of Information Practice Principles,” in Consumer Protection in the Age of the Information Economy, ed. Jane K. Winn (Burlington: Aldershot, Hants, England, 2006) http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Amber Sinha and Scott Mason, “A Critique of Consent in Informational Privacy,” Centre for Internet and Society, January 11, 2016, http://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy.&lt;/li&gt;
&lt;li&gt;Daniel Solove, “Privacy self-management and consent dilemma,” Harvard Law Review 126, (2013): 1880.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Jonathan Obar, “Big Data and the Phantom Public: Walter Lippmann and the fallacy of data privacy self management,” Big Data and Society 2(2), (2015), doi: 10.1177/2053951715608876.&lt;/li&gt;
&lt;li&gt;Supra Note 12.&lt;/li&gt;
&lt;li&gt;Supra Note 14.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Paul Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization” available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006; Arvind Narayanan and Vitaly Shmatikov, “Robust De-anonymization of Large Sparse Datasets” available at https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;D. Hirsch, “That’s Unfair! Or is it? Big Data, Discrimination and the FTC’s Unfairness Authority,” Kentucky Law Journal, Vol. 103, available at: http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A Marthews and C Tucker, “Government Surveillance and Internet Search Behavior”, available at http://ssrn.com/abstract=2412564; Danah Boyd and Kate Crawford, “Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon”, Information, Communication &amp;amp; Society, Vol. 15, Issue 5, (2012).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Scott Mason, “Benefits and Harms of Big Data”, Centre for Internet and Society, available at http://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data#_ftn37.&lt;/li&gt;
&lt;li&gt;Cate, “The Failure of Information Practice Principles.”&lt;/li&gt;
&lt;li&gt;Solove, “Privacy self-management and consent dilemma,” 1882.&lt;/li&gt;
&lt;li&gt;Cate, “The Failure of Information Practice Principles.”&lt;/li&gt;
&lt;li&gt;Fred Cate and Viktor Schoenberger, “Notice and Consent in a world of Big Data,” International Data Privacy Law 3(2), (2013): 69.&lt;/li&gt;
&lt;li&gt;Solove, “Privacy self-management and consent dilemma,” 1883.&lt;/li&gt;
&lt;li&gt;Lokke Moerel, “Netherlands: Big Data Protection: How To Make The Draft EU Regulation On Data Protection Future Proof”, Mondaq, March 11. 2014, http://www.mondaq.com/x/298416/data+protection/Big+Data+Protection+How+To+Make+The+Dra%20ft+EU+Regulation+On+Data+Protection+Future+Proof%20al%20Lecture.&lt;/li&gt;
&lt;li&gt;Moerel, “Netherlands: Big Data Protection.”&lt;/li&gt;
&lt;li&gt;Centre for Information Policy Leadership, “A Risk-based Approach to Privacy: Improving Effectiveness in Practice,” Hunton and Williams LLP, June 19, 2014, https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/white_paper_1-a_risk_based_approach_to_privacy_improving_effectiveness_in_practice.pdf.&lt;/li&gt;
&lt;li&gt;Lokke Moerel and Corien Prins, “Privacy for Homo Digitalis: Proposal for a new regulatory framework for data protection in the light of Big Data and Internet of Things”, Social Science Research Network, May 25, 2016, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2784123.&lt;/li&gt;
&lt;li&gt;EU Directive 95/46/EC – The Data Protection Directive, https://www.dataprotection.ie/docs/EU-Directive-95-46-EC-Chapter-2/93.htm.&lt;/li&gt;
&lt;li&gt;Article 29 Data Protection Working Party, “Opinion 06/2014 on the notion of legitimate interests of the data controller under Article 7 of Directive 95/46/EC,” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp217_en.pdf.&lt;/li&gt;
&lt;li&gt;Frederico Ferretti, “Data protection and the legitimate interest of data controllers: Much ado about nothing or the winter of rights?,” Common Market Law Review 51(2014): 1-26. http://bura.brunel.ac.uk/bitstream/2438/9724/1/Fulltext.pdf.&lt;/li&gt;
&lt;li&gt;Sinha and Mason, “A Critique of Consent in Informational Privacy.”&lt;/li&gt;
&lt;li&gt;Moerel and Prins, “Privacy for Homo Digitalis.”&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle'&gt;https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-09T13:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/netmundial-transcript-archive">
    <title>NETmundial Transcript Archive</title>
    <link>https://cis-india.org/internet-governance/blog/netmundial-transcript-archive</link>
    <description>
        &lt;b&gt;We are archiving the live transcript from the NETmundial meeting (April 23-24, 2014).&lt;/b&gt;
        &lt;h2&gt;NETmundial Day 1&lt;/h2&gt;
&lt;br /&gt;&amp;gt;
&lt;br /&gt;&amp;gt;***LIVE SCRIBING BY BREWER &amp;amp; DARRENOUGUE - WWW.QUICKTEXT.COM***
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; LADIES AND GENTLEMEN, GOOD MORNING.  IN SOME MINUTES WE WILL HAVE OUR OPENING SESSION OF OUR GLOBAL MULTISTAKEHOLDER MEETING ON THE FUTURE OF THE INTERNET GOVERNANCE.  PLEASE TURN OFF YOUR MOBILE PHONES OR TURN THEM INTO VIBRATING.  PLEASE TAKE YOUR SEATS.  OR SHUT IT OFF.  THANK YOU VERY MUCH.
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; LADIES AND GENTLEMEN, PLEASE TAKE YOUR SEATS AND PLEASE TURN OFF YOUR MOBILE PHONES OR SET THEM INTO SILENT MODE.  IN SOME MINUTES, WE ARE GOING TO START OUR OPENING CEREMONY OF OUR GLOBAL MULTISTAKEHOLDER MEETING ON THE FUTURE GOVERNANCE OF THE INTERNET.
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; PLEASE TAKE YOUR SEATS AND TURN OFF YOUR MOBILE PHONES OR SET THEM INTO SILENT MODE.  IN A FEW MINUTES, WE WILL START OUR OPENING CEREMONY OF THE GLOBAL MULTISTAKEHOLDER MEETING ON THE FUTURE OF INTERNET GOVERNANCE.
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; LADIES AND GENTLEMEN, IN SOME MINUTES WE WILL START OFF THE OPENING CEREMONY OF THE GLOBAL MULTISTAKEHOLDER MEETING ON THE FUTURE OF INTERNET GOVERNANCE.
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;[MUSIC ]
&amp;gt;&amp;gt; THIS IS MY INTERNET.
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; THIS IS MY INTERNET.
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;------
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; LADIES AND GENTLEMEN, THE PRESIDENT OF BRAZIL, HER EXCELLENCY DILMA ROUSSEFF.  THE CHAIRMAN OF NETmundial, VIRGILIO ALMEIDA, AND THE MIKE RODENBAUGH OF SAO PAULO, THE COO OF ICANN, FADI CHEHADE, AND THE REPRESENTATIVE OF THE TECHNICAL SECTOR AND CREATOR OF THE WEB, TIM BERNERS-LEE.  REPRESENTATIVE OF THE PRIVATE SECRETARY AND VICE PRESIDENT OF GOOGLE, VINT CERF, AND THE REPRESENTATIVE OF THE -- OF CIVIL SOCIETY, COFOUNDER, NNENNA NWAKANMA.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&amp;gt;&amp;gt; WE ARE STARTING OFF THIS EFFORT AND WE ARE GOING TO LISTEN TO THE NATIONAL ANTHEM OF  BRAZIL.
&lt;br /&gt;&amp;gt;[ PLAYING OF NATIONAL ANTHEM. ]
[APPLAUSE ]
&amp;gt;&amp;gt; WE ARE GOING TO LISTEN TO THE WORDS OF THE MINISTER OF COMMUNICATIONS, PAULO BERNARDO.
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt;PAULO BERNARDO SILVA:  GOOD MORNING, HER EXCELLENCY DILMA ROUSSEFF, MEMBERS HERE AND PARTICIPANTS OF THIS MEETING.
&lt;br /&gt;&amp;gt;LADIES AND GENTLEMEN, WELCOME TO BRAZIL AND TO NETmundial.  WE ARE VERY PROUD AND FEEL VERY RESPONSIBLE FOR RECEIVING YOU IN SAO PAULO.
&lt;br /&gt;&amp;gt;ALL OF YOU WHO CARE ABOUT INTERNET IN THE FUTURE HAVE REASONS FOR BEING PLEASED WITH WHAT WE ARE GOING TO DO TODAY.
&lt;br /&gt;&amp;gt;THIS MEETING IS THE CONCRETIZATION OF ALL OUR WISHES.  WE NEEDED AN ADEQUATE ENVIRONMENT FOR THIS TO BE VOICED.  WE BELIEVE THAT NETmundial IS THIS ENVIRONMENT WE NEED.  FREE PARTICIPANTIVE AND PLURAL, AS WELL AS THE INTERNET WE BELIEVE IN.
&lt;br /&gt;&amp;gt;AND THIS IS SO BECAUSE THE CONCERN THAT GETS US TOGETHER IS GREATER THAN THE CONCERNS OF EACH PARTY.  WE ARE DISCUSSING THIS INTERNET AROUND THIS TABLE OR OTHERWISE WE WILL HAVE NO FUTURE FOR THE INTERNET FROM THE VERY FIRST MOMENT, THE DIFFERENT STAKEHOLDERS GOT INVOLVED IN THE ORGANIZATION OF THIS EVENT AND THE PROOF OF THIS ENVIRONMENT IS HERE IN THE GREAT DIVERSITY OF CONTRIBUTIONS RECEIVED.
&lt;br /&gt;&amp;gt;WE ALSO HAVE HERE MANY AUTHORITIES AND PARTICIPANTS.  WE'D LIKE TO THANK EACH ONE OF YOU AND CONGRATULATE EACH ONE OF YOU FROM DIFFERENT COUNTRIES.  WE'RE ALL PROTAGONISTS OF AN HISTORICAL MOMENT AND TODAY WHAT WE HAVE BEFORE US IS A CHALLENGE TO MAKE THE MOST FOR ALL THE DIFFERENT OPINIONS IN FAVOR OF A UNIQUE PATH.
&lt;br /&gt;&amp;gt;THIS PATH HAS A VERY STRAIGHT SENSE OF ORIENTATION, A FREE AND UNFRAGMENTED INTERNET.  THAT'S THE BEST WE CAN HAVE, THE CAPACITY TO CONNECT, TO MOBILIZE, TO INNOVATE, TO CREATE RICHNESS OF CULTURE OR WHATEVER, AND RESPECT THE LINKS.  SO INTERNET BEING RULED BY MORE PEOPLE COULD REACH MORE PEOPLE IN THE WORLD.
&lt;br /&gt;&amp;gt;SO I WISH THAT WHEN WE LEAVE SAO PAULO, WE CAN 81BRATE A NEW AND PROMISSORY BEGINNING.  THIS IS OUR RESPONSIBILITY HERE, AND THANK YOU VERY MUCH.  AND HAVE A GOOD MEETING.  THANK YOU.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&amp;gt;&amp;gt; NOW, MR. HONKING, SECRETARY-GENERAL OF THE UNITED NATIONS FOR BUSINESS MATTERS WILL DELIVER HIS MESSAGE FROM THE SECRETARY-GENERAL, BAN KI-MOON.
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt;WU HONGBO:  YOUR EXCELLENCY, PRESIDENT ROUSSEFF, DISTINGUISHED MINISTERS, EXCELLENCIES, DISTINGUISHED DELEGATES, COLLEAGUES, LADIES AND GENTLEMEN.
&lt;br /&gt;&amp;gt;I'M HONORED TO BE HERE WITH YOU FOR THIS IMPORTANT EVENT.  IT IS MY GREAT PLEASURE TO DELIVER A MESSAGE ON BEHALF OF THE UNITED NATIONS SECRETARY-GENERAL, MR. BAN KI-MOON.
&lt;br /&gt;&amp;gt;HERE I QUOTE:  I THANK THE GOVERNMENT OF BRAZIL FOR HOSTING THE NETmundial MEETING, AND I COMMEND THIS GLOBAL MULTISTAKEHOLDER NATURE.  ONLY THROUGH INCLUSIVE AND BOTTOM-UP PARTICIPATION WE BE ABLE TO FOSTER AN ACCESSIBLE, OPEN, SECURE, AND TRUSTWORTHY INTERNET.
&lt;br /&gt;&amp;gt;THE INTERNET IS TRANSFORMING SOCIETIES IN ALL REGIONS.  IT IS THE BACKBONE OF OUR GLOBAL ECONOMY AND AN ESSENTIAL VEHICLE FOR DISSEMINATING INFORMATION AND IDEAS.
&lt;br /&gt;&amp;gt;ONE-THIRD OF THE PEOPLE NOW HAVE ACCESS TO THE INTERNET AND THE KNOWLEDGE AND THE TOOLS IT PROVIDES.  INCREASING NUMBER OF PEOPLE NOW HAVE A PLATFORM TO VOICE THEIR OPINIONS AND PARTICIPATE IN SOCIETY FROM COMMERCE TO DEMOCRATIC DECISION-MAKING.  THAT IS WHY IT IS ESSENTIAL THAT INTERNET GOVERNANCE POLICIES CONTINUE TO FOSTER FREEDOM OF EXPRESSION AND THE FREE FLOW OF INFORMATION.
&lt;br /&gt;&amp;gt;THE INTERNET AND THE INFORMATION SOCIETY HOLD TREMENDOUS PROMISE FOR THE POST-2015 DEVELOPMENT AGENDA.
&lt;br /&gt;&amp;gt;THE INTERNET CAN STRENGTHEN EFFORTS TO ERADICATE POVERTY, ADDRESS INEQUALITY, AND PROTECT AND RENEW THE PLANET'S RESOURCES.
&lt;br /&gt;&amp;gt;BUT REALIZING THE PROMISE MEANS EXPANDING INTERNET ACCESS TO NEARLY 1.3 BILLION PEOPLE WHO CURRENTLY LACK IT.
&lt;br /&gt;&amp;gt;MOST ARE IN DEVELOPING COUNTRIES AND THERE ARE SIGNIFICANT GENDER GAPS.
&lt;br /&gt;&amp;gt;INTERNET GOVERNANCE MUST, THEREFORE, WORK TO BRIDGE THE DIGITAL DIVIDE THROUGH INCLUSIVE RIGHTS-BASED POLICIES.
&lt;br /&gt;&amp;gt;INTERNET GOVERNANCE SHOULD AIM FOR UNIVERSAL ACCESS TO AN INTEROPERABLE, GLOBALLY CONNECTED, AND SAFE ONLINE SPACE.
&lt;br /&gt;&amp;gt;TO THIS END, THE PRINCIPLES OF THE WORLD SUMMIT ON THE INFORMATION SOCIETY REMAIN RELEVANT.
&lt;br /&gt;&amp;gt;THE UNITED NATIONS INVITES ALL STAKEHOLDERS TO JOIN IN THE ONGOING SUMMIT REVIEW PROCESS.
&lt;br /&gt;&amp;gt;CONFIDENCE IN THE INTERNET AND ITS GOVERNANCE IS VITAL.  IF IT IS TO BE EFFECTIVELY CONTRIBUTING TO THE SUSTAINABLE DEVELOPMENT.
&lt;br /&gt;&amp;gt;IN THIS CONNECTION, I WISH TO INFORM THE MEETING I INTEND TO APPOINT AMBASSADOR JANIS KARKLINS OF LATVIA AS THE CHAIR OF THE MULTISTAKEHOLDER ADVISORY GROUP OF THE INTERNET GOVERNANCE FORUM.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&amp;gt;&amp;gt;WU HONGBO:  I COUNT ON MR. KARKLINS TO PROMOTE A STRENGTHENED INTERNET GOVERNANCE THROUGH BROADER PARTICIPATION, NOT ONLY BY GOVERNMENTS BUT ALSO THE PRIVATE SECTOR AND CIVIL SOCIETY, INCLUDING THE ACADEMIC AND THE TECHNICAL COMMUNITIES.
&lt;br /&gt;&amp;gt;BUILDING CONSENSUS ON THE ROADMAP FOR THE FUTURE OF INTERNET GOVERNANCE IS CRUCIAL.  THIS NETmundial IS AN IMPORTANT MILESTONE.  I WISH YOU A PRODUCTIVE MEETING.  UNQUOTE.
&lt;br /&gt;&amp;gt;THANK YOU VERY MUCH ON BEHALF OF UNITED NATIONS DEPARTMENT OF ECONOMIC AND SOCIAL AFFAIRS, UNDESA.  I WOULD LIKE TO THANK BRAZIL AND THE BRAZILIAN INTERNET STEERING COMMITTEE FOR NOT ONLY HOSTING THIS IMPORTANT MEETING, BUT ALSO FOR BEING CONSISTENT SUPPORTERS OF INTERNET GOVERNMENT FORUM.  THE IGF COMMUNITY LOOKS FORWARD TO RUNNING TO BRAZIL FOR THE SECOND TIME FOR THE 10TH IGF IN 2015.
&lt;br /&gt;&amp;gt;THANK YOU VERY MUCH.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&amp;gt;&amp;gt; NOW, WE ARE GOING TO LISTEN TO MS. NNENNA NWAKANMA, A REPRESENTATIVE OF CIVIL SOCIETY AND CONTRIBUTOR OF THE OPEN SOURCE FOUNDATION OF AFRICA.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&amp;gt;&amp;gt;NNENNA NWAKANMA:  OOH-LA-LA.  YOUR EXCELLENCIES, COLLEAGUES, PRESENT AND REMOTE LADIES AND GENTLEMEN, (NON-ENGLISH WORD OR PHRASE).  MY NAME IS I COME FROM THE INTERNET.  I ALSO COME FROM DIVERSE CIVIL SOCIETY TEAMS AND NETWORKS, ONE OF WHICH IS THE TEAM THAT WORKS WITH THE WORLD WIDE WEB FOUNDATION.
&lt;br /&gt;&amp;gt;AT THE WEB FOUNDATION, WE ARE ENGAGED IN THE ALLIANCE FOR AFFORDABLE INTERNET.  WE'RE ENGAGED IN THE WEB INDEX AND OPEN DATA INITIATIVES.  ONE THING I DO FOR A LIVING IS TO ESTABLISH THE OPEN WEB AS A GLOBAL PUBLIC GOOD AND A BASIC RIGHT, ENSURING THAT EVERYONE CAN ACCESS AND USE IT FREELY.  THAT'S WHAT I DO.
&lt;br /&gt;&amp;gt;I ALSO BELONG TO THE (INDISCERNIBLE) CIVIL SOCIETY PLATFORM, THE INTERNET GOVERNANCE CAUCUS FOR THE PAST 12 YEARS, AND THE AFRICA INTERNET GOVERNANCE FORUM.
&lt;br /&gt;&amp;gt;SO FOR ME, NETmundial, IN CONVENING US TO TAKE A CRITICAL LOOK AT THE PRINCIPLES AND ROADMAP FOR THE FUTURE OF THE INTERNET GOVERNANCE AVAILS ME WITH AN OPPORTUNITY TO RAISE THREE KEY ISSUES.
&lt;br /&gt;&amp;gt;THE FIRST ISSUE IS ACCESS.
&lt;br /&gt;&amp;gt;AS MUCH AS TWO-THIRDS OF THE WORLD'S POPULATION IS NOT YET CONNECTED TO THE INTERNET.  THE PENETRATION RATES IN DEVELOPED COUNTRIES AVERAGE AROUND 31%, BUT IN AFRICA WHERE I COME FROM, WE ARE ABOUT 16%.
&lt;br /&gt;&amp;gt;IN THE WORLD'S 49 LEAST DEVELOPED COUNTRIES, OVER 90% OF THE POPULATION ARE STILL NOT ONLINE.
&lt;br /&gt;&amp;gt;WE HAVE 1 BILLION PEOPLE LIVING WITH DISABILITY, AND 80% OF THESE LIVE IN THE DEVELOPING COUNTRIES.  EACH ONE OF THESE DESERVE ACCESS.
&lt;br /&gt;&amp;gt;ACCESS TO INFORMATION, ACCESS TO LIBRARIES, ACCESS TO KNOWLEDGE, AND ACCESS TO AFFORDABLE INTERNET.
&lt;br /&gt;&amp;gt;MY SECOND ISSUE IS SOCIAL AND ECONOMIC JUSTICE.
&lt;br /&gt;&amp;gt;THE INTERNET IS FAST BECOMING THE DOMINANT MEANS OF WEALTH CREATION, SO THE RIGHTS TO DEVELOPMENT, I THINK, SHOULD INCLUDE SOCIAL JUSTICE.
&lt;br /&gt;&amp;gt;FOR ME, IT IS NOT ENOUGH TO DO A SUPERFICIAL CAPACITY-BUILDING JUST FOR A FEW PERSONS.  I'M LOOKING FOR THE MECHANISM THAT ALLOWS THE HIGHEST NUMBER OF PERSONS TO BE INCLUDED, THE LARGEST NUMBER OF VOICES TO BE HEARD, THE WIDEST EXTENT OF ACCESS TO INNOVATION, AND THE DEEPEST CREATIVITY FOR THE HUMAN MIND TO FLOURISH.
&lt;br /&gt;&amp;gt;FOR THIS, I THINK WE NEED TO START CONSIDERING THE INTERNET AS PUBLIC COMMENTS.
&lt;br /&gt;&amp;gt;MY THIRD ISSUE IS HUMAN RIGHTS AND FREEDOM.
&lt;br /&gt;&amp;gt;NOW I WILL INVITE YOU TO LISTEN THROUGH MY VOICE TO SOMEONE THAT I GREATLY RESPECT.
&lt;br /&gt;&amp;gt;THIS PERSON IS A "SHE."  SHE WAS SPEAKING AT THE UNITED NATIONS GENERAL ASSEMBLY IN NEW YORK ON THE 25TH OF SEPTEMBER RAFT YEAR.  DO YOU WANT TO HEAR WHAT SHE SAID?
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; YES!
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt;NNENNA NWAKANMA:  SHE SAID, "I CANNOT BUT DEFEND IN AN UNCOMPROMISING FASHION THE RIGHT TO PRIVACY OF INDIVIDUALS.  IN THE ABSENCE OF THE RIGHT TO PRIVACY, THERE CAN BE NO TRUE FREEDOM OF EXPRESSION AND OPINION AND THERE IS NO EFFECTIVE DEMOCRACY."  AND THAT WAS DILMA ROUSSEFF.
&lt;br /&gt;&amp;gt;[CHEERS AND APPLAUSE ]
&amp;gt;&amp;gt;NNENNA NWAKANMA:  OKAY.  THANK YOU.  RIGHT.  LADIES AND GENTLEMEN, IN LOOKING FORWARD TOWARDS THE ROADMAP, I ALSO NEED TO RAISE THREE KEY ISSUES.
&lt;br /&gt;&amp;gt;MY FIRST ISSUE IS PARTICIPATION.  WHEN WE STARTED, WE KICKED OFF WITH THE BASIC UNDERSTANDING THAT ALL STAKEHOLDERS HAVE A PLACE, A ROLE, A CONTRIBUTION.
&lt;br /&gt;&amp;gt;BUT AS WE'VE MOVED FURTHER DOWN THE LINE, THE IDEA OF MULTISTAKEHOLDER ENGAGEMENT IS GETTING MUDDLED AND IT'S LOSING A BIT OF ITS MEANING, SO I WOULD REQUEST THAT WE GO BACK TO THE DRAWING BOARD AND WE REVISIT IT, AND IF IT NEEDS TO UPGRADE, PLEASE LET'S DO THAT.
&lt;br /&gt;&amp;gt;BECAUSE WE NEED TO ENGAGE ALL STAKEHOLDERS AT A GLOBAL, REGIONAL, AND NATIONAL LEVELS.
&lt;br /&gt;&amp;gt;WE NEED TO ESTABLISH RESPECT AND VALUE FOR ALL CONTRIBUTIONS COMING FROM ALL STAKEHOLDERS, AND WE NEED MEANINGFUL PARTICIPATION FROM INDIVIDUALS COMING FROM DEVELOPING COUNTRIES AND UNDERREPRESENTED GROUPS.
&lt;br /&gt;&amp;gt;MY SECOND ISSUE IS RESOURCES.
&lt;br /&gt;&amp;gt;HOW DO WE ENSURE THAT RESOURCES ARE MOBILIZED AND MAINTAINED FOR A VIABLE INTERNET GOVERNANCE MECHANISM?
&lt;br /&gt;&amp;gt;THE QUESTION IS NOT JUST AT THE GLOBAL LEVEL.  IT'S AT CONTINENTAL, REGIONAL, AND EVEN NATIONAL LEVELS.
&lt;br /&gt;&amp;gt;WHO'S RESOURCES ARE WE GOING TO COMMIT?
&lt;br /&gt;&amp;gt;MY FIRST THOUGHT IS THAT THE INTERNET SHOULD BE ABLE TO PROVIDE RESOURCES FOR ITS OWN GOVERNANCE.  MAYBE PART OF THE DOMAIN NAME FEES SHOULD BE REINVESTED IN THIS AREA.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt;NNENNA NWAKANMA:  NOW, MY THIRD ISSUE IS CHANGE.
&lt;br /&gt;&amp;gt;NETmundial IS OFFERING US A GREAT OPPORTUNITY FOR CHANGE.  CHANGE FROM ONE STAKEHOLDER HIJACKING THE PROCESS TO AN OPEN AND INCLUSIVE PROCESS.  CHANGE FROM ONE OFFICIAL ISSUING ORDERS TO COLLABORATION.  CHANGE FROM JUST REPORTS TO REAL TRANSPARENCY.
&lt;br /&gt;&amp;gt;CHANGE FROM POWER TO ACCOUNTABILITY.  CHANGE FROM MONOLOGUES TO DIALOGUES AND DEBATES.  CHANGE FROM THE RHETORIC OF CYBER-WAR TO THE NOTION OF INTERNET FOR PEACE.  CHANGE FROM CYBER-THREATS TO DIGITAL SOLIDARITY.  AND I DO BELIEVE THAT ALL OF THESE PRINCIPLES WILL ALSO GUIDE US IN IANA TRANSITION.
&lt;br /&gt;&amp;gt;LADIES AND GENTLEMEN, THERE IS ONE MESSAGE I MUST LEAVE WITH YOU TODAY, IT IS THE MESSAGE OF TRUST.
&lt;br /&gt;&amp;gt;WE'RE IN BRAZIL BECAUSE WE TRUST THE PERSON OF DILMA ROUSSEFF.  WE ARE HERE BECAUSE WE TRUST THE NETmundial PROCESS.  WE TRUST THE MULTISTAKEHOLDER APPROACH OF BRAZIL IN ITS OWN IGF, AND WE HAVE FOLLOWED THE STORY OF MARCO CIVIL AND I WANT TO SEE CONGRATULATIONS TO ALL BRAZILIANS ON THIS.
&lt;br /&gt;&amp;gt;[CHEERS AND APPLAUSE ]
&amp;gt;&amp;gt;NNENNA NWAKANMA:  HANG ON.  HANG ON.  HANG ON.
&lt;br /&gt;&amp;gt;THE TRUST THAT WE HAVE IN BRAZIL IS NEEDED AT ALL LEVELS.  BUT THIS TRUST HAS BEEN DESTROYED BY THE COLLECTION, PROCESSING, AND INTERCEPTION OF OUR COMMUNICATIONS.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&amp;gt;&amp;gt;NNENNA NWAKANMA:  YES.  SURVEILLANCE ON INTERNET SECURITY AND OUR TRUST IN ALL PERSONAL BUSINESS AND DIPLOMATIC COMMUNICATIONS.  THAT'S WHY WE SAY "NO."  THE WEB WE CAN TRUST, THAT IS THE WEB WE WANT.  THE WEB THAT CONTRIBUTES TO PEACE, THAT IS THE WEB WE WANT.  THE WEB THAT IS OPEN AND INCLUSIVE, THAT IS THE WEB WE WANT.  THE WEB OF OPPORTUNITIES AND SOCIAL JUSTICE, THAT IS WHY I AM HERE.
&lt;br /&gt;&amp;gt;LADIES AND GENTLEMEN, NETmundial, I THINK, IS THE WORLD CUP OF INTERNET GOVERNANCE.  WE NEED A ROBUST STADIUM THAT CAN HOLD US.  THAT IS INFRASTRUCTURE.  WE NEED TO ENJOY THE GAME.  THAT IS PARTICIPATION.  WE SHOULD NOT DISCRIMINATE.  THAT IS NET NEUTRALITY.  EVERYBODY'S FREE TO SUPPORT THEIR TEAM.  I SUPPORT (SAYING NAME) OF NIGERIA.  THAT IS FREEDOM.  I SUPPORT BRAZIL AS LONG AS THEY ARE NOT PLAYING AGAINST AFRICA, ANYWAY.
&lt;br /&gt;&amp;gt;[LAUGHTER ]
&amp;gt;&amp;gt;NNENNA NWAKANMA:  WE NEED TO BE ABLE TO WEAR OUR COSTUMES AS FANS AND THAT IS DIVERSITY.  AND MOST IMPORTANTLY, WE NEED TO KNOW THE RULES OF THE GAME AND PLAY BY IT.  THAT, FOR ME, IS TRANSPARENCY.
&lt;br /&gt;&amp;gt;SO IT'S NOT GOING TO BE ABOUT POWER AND CONTROL FOR GOVERNMENTS.  IT'S NOT GOING TO BE JUST INTEREST FOR THE INDUSTRY.  IT'S NOT GOING TO BE NAMES AND NUMBERS FOR TECHNICAL COMMUNITY.  IT'S NOT GOING TO BE FOR OR AGAINST FOR CIVIL SOCIETY.  I THINK THAT WE NEED HUMILITY.  THE HUMILITY TO LISTEN TO DIVERSE VOICES IS ESSENTIAL FOR AN AUTHENTIC DIALOGUE.  LET US TALK TO EACH OTHER AND NOT AT EACH OTHER.  BECAUSE SOMETIMES WE CAN BE SO DROWNED IN OUR OWN VOICES THAT WE DO NOT HEAR THE OTHER STAKEHOLDERS.
&lt;br /&gt;&amp;gt;JUST BEFORE I SIT DOWN, LADIES AND GENTLEMEN, TOMORROW IS GIRLS IN ICT DAY, SO I'M GOING TO SPEAK TO LADIES.
&lt;br /&gt;&amp;gt;GIRLS, IT IS UP TO US TO SEIZE THE OPPORTUNITY THAT THE INTERNET HAS GIVEN US.  LET'S SEIZE IT AND LET'S ROCK THE WORLD!  LET US GET WOMEN ONLINE.  LET US GET US ONLINE.
&lt;br /&gt;&amp;gt;AND THIS, I WANT TO SAY A SPECIAL TRIBUTE TO ALL THE GIRLS IN MY WORLD FOUNDATION TEAM.  ALEXANDRA IS HERE, RENAT AVILA, SONIA GEORGE, ANGELA, AND NOT JUST NETmundial BUT GIRLS ACROSS THE WORLD WORK ON THE INTERNET EVERY DAY.  DEBORAH BROWN IS IN THE U.S.  MARION FRANKLIN IS IN EUROPE.  ANNA IS IN INDIA, (SAYING NAME) IS IN LATIN AMERICA HERE, (SAYING NAME) IS IN AFRICA, JOY LID I COT IS IN NEW ZEALAND, AND SALANIETA IS SOMEWHERE IN THE ISLANDS OF FIJI.  GREAT WOMEN WHO DO THIS WORK.  AND EVEN HERE IN BRAZIL, WE HAVE GREAT LADIES.  ONE IS (SAYING NAME) AND THE OTHER IS (SAYING NAME) BUT COME ON, IT'S NOT JUST ABOUT WOMEN.  THERE ARE GUYS, MEN, WHO WORK EVERY DAY, WHO PUT IN THE ENERGY, WHO PUT IN THEIR LIFE, WHO PUT IN ALL THEY HAVE, PUT IN THEIR EXPERTISE, SO THAT WE CAN HAVE A GLOBAL, TRUE, OPEN AND RESILIENT.  AND TO ALL OF US WHO LOVE THE INTERNET AND TO ALL OF US WHO ARE HERE AND TO SOMEONE CALLED EDWARD, EDWARD SNOWDEN, THANK YOU.
&lt;br /&gt;&amp;gt;[CHEERS AND APPLAUSE ]

&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; ---
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt;VINT CERF:  PRESIDENT DILMA ROUSSEFF, EXCELLENCIES, DISTINGUISHED GUESTS, LADIES AND GENTLEMEN, IT IS AN HONOR AND A PRIVILEGE TO PARTICIPATE IN NETmundial.  THIS DIALOGUE IS TIMELY AND MUCH NEEDED AS THE INTERNET CELEBRATES THE 40th YEAR OF ITS PUBLIC UNVEILING AND THE 31st YEAR OF ITS  OPERATION.  IN MAY 1974, THE DESIGN OF THE INTERNET WAS PUBLISHED IN THE IE EX-E PUBLICATIONS.  ROBERT KAHN AND I FELT STRONGLY THE DESIGN AND THE PROTOCOLS OF THE INTERNET NEEDED TO BE FREELY AND OPENLY AVAILABLE TO ANY INTERESTED PARTIES AND WITHOUT ANY BARRIERS TO ADOPTION AND USE.
&lt;br /&gt;&amp;gt;OVER FOUR DECADES BY WORKING TOGETHER AND INCLUDING THE EXPERIENCES GATHERED FROM OTHER GLOBAL NETWORK EXERCISES, AN INFORMAL COALITION HAS BUILT FROM THE BOTTOM UP THE  SUCCESSFUL, FREE AND OPEN INTERNET AND THE POPULAR WORLDWIDE WEB.  SOME 3 BILLION PEOPLE ARE ALREADY ONLINE WORKING TOGETHER TOWARDS GROWTH IN A POWERFUL ECONOMIC ENGINE AND POSITIVE SOCIAL FORCE.
&lt;br /&gt;&amp;gt;THIS INTERNET GOVERNANCE MEETING COMES AT A TIME WHEN THE INTERNET AND ITS USE REFLECTS THE FULL RANGE OF INTERESTS OF A GLOBAL AND INCREASINGLY ONLINE SOCIETY.
&lt;br /&gt;&amp;gt;IN ADDITION TO APPRECIATING THE ENORMOUS BENEFITS ALREADY  OBTAINED THROUGH THE COOPERATIVE CREATION, DISCOVERING AND SHARING OF INFORMATION ON THE INTERNET, IT IS ALSO APPARENT THAT USERS AND GOVERNMENTS ARE BECOMING CONCERNED ABOUT POTENTIAL HARMS THAT MAY BE ENCOUNTERED IN THIS DIGITAL WORLD.
&lt;br /&gt;&amp;gt;A SMALL FRACTION OF THE  INTERNET'S USERS DELIBERATELY SEEK TO BENEFIT THEMSELVES AT THE EXPENSE OF OTHERS OR JUST SEEK TO DO DAMAGE THROUGH A KIND OF DIGITAL VANDALISM, AS ALSO HAPPENS OFFLINE.
&lt;br /&gt;&amp;gt;MOREOVER, IT IS APPARENT THAT THE RICH SOCIAL NETWORKING APPLICATIONSES THAT ARE RAPIDLY PROLIFERATING ALSO HAVE A POLITICAL POTENTIAL THAT MAY BE ALARMING TO SOME REGIMES.
&lt;br /&gt;&amp;gt;GOVERNMENTS UNDERSTANDABLY SEEK WAYS TO DEFEND THE GENERAL PUBLIC AND PRIVATE SECTORS AGAINST HARM, SUCH AS FRAUD, MALWARE, IDENTITY THEFT AND BULLYING.  OTHERS VIOLATE HUMAN RIGHTS BY USING THE INTERNET TO CENSOR, MISINFORM, CONDUCT SURVEILLANCE AND RESTRICT SPEECH OR USE IT AS A MEANS TO IDENTIFY AND INCARCERATE THOSE WHO SPEAK TRUTH TO POWER.
&lt;br /&gt;&amp;gt;THE OPENNESS OF THE INTERNET HAS BEEN THE KEY TO ITS GROWTH AND VALUE.  PERMISSIONLESS INNOVATION IS THE MAIN SPRING OF INTERNET'S ECONOMIC POWER.  WE MUST FIND WAYS TO PROTECT THE VALUES THAT THE INTERNET BRINGS, INCLUDING THE RIGHTS OF ITS USERS WHILE ALSO PROTECTING THEM FROM HARM.
&lt;br /&gt;&amp;gt;THESE PRINCIPLES, TOGETHER WITH GROWING ACCESS TO THE INTERNET WILL PROVE TO BE OF LASTING VALUE TO THE DEVELOPING WORLD THAT CAN TAKE ADVANTAGE OF THE POSITIVE BENEFITS OF AN  EXPANDING INFORMATION ECONOMY.
&lt;br /&gt;&amp;gt;OUR WORK IS NOT NEARLY DONE UNTIL THE INTERNET IS ACCESSIBLE TO EVERYONE AND IPv6 IS ACCESSIBLE EVERYWHERE.
&lt;br /&gt;&amp;gt;BRAZIL HAS SET A POSITIVE EXAMPLE IN NETmundial.  IN A MULTIPARTY INITIATIVE LED BY CONGRESSMAN ALESANDRO MALONE, THE COUNTRY HAS JUST LEGISLATED MARCO CIVIL WHICH OFFERS IMPORTANT SAFEGUARDS TO PROTECT INTERMEDIARY INTERNET PROVIDERS AND PROTECT USER RIGHTS.  ITS INTERNET STEERING COMMITTEE, CGI.BR, IS A MODEL OF NATIONAL MULTISTAKEHOLDER GOVERNANCE.
&lt;br /&gt;&amp;gt;THIS MEETING, AMONG MANY OTHERS, REPRESENTS AN IMPORTANT OPPORTUNITY TO EXAMINE A MULTISTAKEHOLDER MODEL FOR INTERNET GOVERNANCE BASED ON THE PARTICIPATION OF ALL  STAKEHOLDERS, INCLUDING ROLES FOR GOVERNMENT, ACADEMICS, CIVIL SOCIETY, PRIVATE BUSINESSES AND THE TECHNICAL COMMUNITY.  THIS CONFERENCE HAS BROUGHT TOGETHER A RICH AND VARIED GROUP OF INTERESTED PARTIES TO EXPLORE PRINCIPLES AND GUIDELINES FOR FUTURE INTERNET GOVERNANCE AS IT REACHES THE OTHER 4 BILLION STILL UNCONNECTED PEOPLE IN THE WORLD.
&lt;br /&gt;&amp;gt;THE INTERNET HAS BEEN BUILT ON THE BASIS OF COLLABORATION AMONG A DIVERSE AND CONSTANTLY EVOLVING SET OF INTERESTED PARTIES.  AND THIS IS A  FOUNDATIONAL IDEA THAT MUST BE PRESERVED.  NEW INSTITUTIONS AND OPERATIONAL PLAYERS HAVE BEEN FORMED AT NEED, SUCH AS THE INTERNET ARCHITECTURE BOARD, THE INTERNET ENGINEERING TASK, THE INTERPRET SOCIETY, THE INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS, THE REGIONAL INTERNET REGISTRIES AND THE NUMBER RESOURCE ORGANIZATION, OTHER REGIONAL TLD ORGANIZATIONS SUCH AS CENTR AND LacTLD, THE ROOT SERVER OPERATORS, REGIONAL NETWORK OPERATION GROUPS, THE EMERGENCY RESPONSE TEAMS, INTERNET EXCHANGE POINTS, THE TOP-LEVEL DOMAIN REGISTRIES AND REGISTRARS AND THE NETWORK INFORMATION CENTERS SUCH AS THE BRAZILIAN NIC.
&lt;br /&gt;&amp;gt;OUT OF THE WORLD SUMMIT ON THE INFORMATION SOCIETY HAS COME THE ANNUAL INTERNET GOVERNANCE FORUM AND ITS REGIONAL AND NATIONAL ANALOGS.  WE CREATE INSTITUTIONS AT NEED.
&lt;br /&gt;&amp;gt;AS WE GATHER HERE FOR THE NEXT TWO DAYS, WE HAVE TWO SPECIFIC CHALLENGES TO CONSIDER.  THE LARGER ONE IS THE GENERAL DESIGN OF A GLOBAL, MULTISTAKEHOLDER INTERNET GOVERNANCE FRAMEWORK THAT PRESERVES THE FREE AND OPEN INTERNET AND PROVIDES TRANSNATIONAL PROTECTIONS FOR THE RIGHTS OF USERS.
&lt;br /&gt;&amp;gt;THE FRAMEWORK HAS TO ENABLE THE EVOLUTION OF THE INTERNET AND BE ABLE TO ADAPT TO IT.  THE MORE FOCUSED CHALLENGE IS TO DEVISE A RESPONSE TO THE U.S. INVITATION TO ASSURE THAT WHEN THE U.S. GOVERNMENT AND ITS CONTRACTUAL RELATIONSHIP WITH ICANN, THE MULTISTAKEHOLDER FRAMEWORK FOR ICANN'S MANAGEMENT OF UNIQUE IDENTIFIERS AND PARAMETERS WILL ADHERE TO THE PRINCIPLES THAT HAVE MADE THE INTERNET A REMARKABLE, GLOBAL AND BENEFICIAL INFRASTRUCTURE.
&lt;br /&gt;&amp;gt;I BELIEVE THAT THE CHALLENGE BEFORE US, ASSURING ICANN'S ADHERENCE CAN BE ACCOMPLISHED BY REINFORCING ITS ACCOUNTABILITY AND TRANSPARENCY MECHANISMS.  THE LARGER CHALLENGE, PROTECTING THE RIGHTS OF USERS WHILE  ASSURING THEIR SAFETY WILL REQUIRE LAYERED, LOCAL, NATIONAL AND TRANSNATIONAL ENABLING MECHANISMS.  WE CANNOT PRETEND TO KNOW THE SOLUTION TO ALL THE CHALLENGES AND OPPORTUNITIES THAT THE INTERNET POSES.  WE  CAN, HOWEVER, CREATE STRUCTURES THAT WILL ALLOW MULTISTAKEHOLDER COLLABORATIONS TO DISCOVER AND EVALUATE POSSIBLE ANSWERS.
&lt;br /&gt;&amp;gt;AMONG THE MECHANISMS THAT SHOULD BE REINFORCED AND SUPPORTED, I WOULD SINGLE OUT THE INTERNET GOVERNANCE FORUM.  IT NEEDS FINANCIAL SUPPORT AND A PROPERLY STAFFED SECRETARIAT.  IT HAS ILLUMINATED OUR UNDERSTANDING OF THE PROSPECTS AND PROBLEMS  ARISING FROM THE GLOBAL GROWTH OF THE INTERNET.
&lt;br /&gt;&amp;gt;MOBILE TECHNOLOGY RAPIDLY  DROPPING COSTS FOR  INTERNET-ENABLING EQUIPMENT AND COMMUNICATIONS, AND BOUNDLESS DEVELOPMENT OF NEW APPLICATIONS HAVE CREATED A RICH PALATE FROM WHICH TO PAINT A BENEFICIAL DIGITAL FUTURE.  THE GLOBAL IGF AND ITS REGIONAL AND NATIONAL COUNTERPARTS CAN BECOME AN EVEN MORE HELPFUL MECHANISM FOR HIGHLIGHTING ISSUES BY TRACKING THEIR SOLUTIONS IN A VARIETY OF FORUMS AND ENABLING THE EMERGENCE OF NEW APPROACHES WHEN THESE SEEM NECESSARY.
&lt;br /&gt;&amp;gt;WE WOULD HAVE TO BE A PRETTY SILLY SPECIES NOT TO TAKE ADVANTAGE OF THE GIFT THAT THE TECHNOLOGY HAS GIVEN US.  THOSE OF US PARTICIPATING IN THE NETmundial -- WELL, I HAVE A VERY INTERESTING PROBLEM HERE, MY SPEECH ENDS BECAUSE THE REST OF IT WASN'T PRINTED OUT.
&lt;br /&gt;&amp;gt;[LAUGHTER ]
&lt;br /&gt;&amp;gt;SO I WILL END BY THANKING YOU VERY MUCH FOR THE TIME ON THIS STAGE.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt;TIM BERNERS-LEE:  TECHNOLOGY IS PERFECT THEN.
&lt;br /&gt;&amp;gt;45 YEARS AGO VINT CERF AND BOB KAHN PUT TOGETHER THE IDEA OF THE INTERNET, DESIGNED THAT, AND MADE THAT OPEN.  25 YEARS AGO -- A LONG TIME LATER, THE INTERNET WAS RUNNING.  THERE WAS REMOTE --- . THERE WAS EMAIL RUNNING OVER THE INTERNET.  BUT THERE WERE NO WEB, NO WEB SITES, NO WEB PAGES, NO LINKS.  I FELT IT WAS REALLY IMPORTANT THERE SHOULD BE SO I INVENTED THE WEB.  AND AS THE WORLDWIDE WEB PROJECT GREW, I NEEDED COLLABORATORS.  I INVENTED HTML AND HTTP AND  URLS BUT THE DEVELOPMENT OF THOSE HAD TO BE DONE BY A LARGE TECHNICAL COMMUNITY.  I WENT TO THE INTERNET ENGINEERING TASK FORCE, I FOUNDED THE WORLDWIDE WEB CONSORTIUM THAT ASSESS THE STANDARDS FOR THE WEB AND ITS MOTTO IS TO LEAD THE WEB TO ITS FULL POTENTIAL.
&lt;br /&gt;&amp;gt;SO THE COLLABORATION BETWEEN THESE MULTISTAKEHOLDER GROUPS LIKE IETF AND W3C AND ALL THE PEERS THEY WORK WITH LIKE ECMA, TC39 FOR (SAYING NAME) THAT HAS BEEN REALLY CRUCIAL AND IT REALLY HAS BEEN HOW THIS HAS ALL WORKED.
&lt;br /&gt;&amp;gt;I HOPE YOU WILL AGREE THAT PEOPLE WORKING TOGETHER HAVE DONE A REASONABLE JOB AND LOOKING BACK AT THE 25 YEARS OF THE WEB, IT HAS BEEN -- IT HAS BEEN AN INCREDIBLE RIDE AND WE REALIZE NOW THAT RATHER THAN BEING A FUN PROJECT LIKE ALL THESE THINGS STARTED OFF WITH, IT NOW BECOMES SOMETHING WE HAVE TO REGARD AS TO BEING CRUCIAL.
&lt;br /&gt;&amp;gt;SOME OF THESE ORGANIZATIONS WHICH BELIEVE IN OPEN STANDARDS IN THIS PARTICULAR SORT OF MULTISTAKEHOLDER OPEN ON THE WEB SORT OF MEANING OF THE WORD, DEVISED THE WORD OPEN STAND.  YOU CAN GO TO OPENSTAND.ORG TO EXPRESS THE WAY IT SHOULD BE ABOUT WITH OPEN DISCUSSION WITH THE DOCUMENTS BEING FREELY AVAILABLE ON THE WEB.  WITH W3C SPECIFICALLY COMPANIES COMMIT THAT WHEN THEY START AND WORK TOWARDS THESE STANDARDS, THAT WHEN THE STANDARDS COME OUT THAT THEY WILL NOT CHARGE ROYALTIES TO ANYBODY WHO WANTS TO IMPLEMENT IT.  SO KEEPING IT ROYALTY FREE HAS ALSO BEEN REALLY IMPORTANT.
&lt;br /&gt;&amp;gt;THE WEB GREW AS SOMETHING WHICH DID NOT INVOLVE BORDERS BECAUSE IT GREW ON THE INTERNET AND THE INTERNET, WHEN YOU CONNECT -- WHEN I WROTE A PROGRAM TO CONNECT FROM ONE COMPUTER TO THE OTHER, NEITHER PROGRAM HAD AN AWARENESS, NEEDED TO KNOW OR NECESSARILY FOUND IT EASY TO FIND OUT WHICH COUNTRY THOSE TWO COMPUTERS WERE IN.  BUT INTERNET WAS TECHNICALLY -- IS A  NATIONLESS THING.  SO IN A  NON-NATIONAL ENVIRONMENT, THE WEB GROWING UP, IT HAS BEEN A NON-NATIONAL SOCIETY WHICH HAS GROWN UP AROUND IT.
&lt;br /&gt;&amp;gt;YES, THERE HAS BEEN -- FORMALLY, THERE HAS BEEN A CONNECTION BETWEEN THE U.S. GOVERNMENT AND THE WAY INTERNET NUMBERS AND NAMES HAVE BEEN ASSIGNED.  AND I'M VERY GLAD THAT THE U.S. GOVERNMENT HAS ACCEPTED TO RELEASE THAT OVERSIGHT.  I THINK THAT IS VERY OVERDUE AND A VERY IMPORTANT STEP.
&lt;br /&gt;&amp;gt;IT IS AN IMPORTANT STEP BECAUSE ICANN SHOULD SERVICE -- IT SERVICES THE GLOBAL PUBLIC INTERNET, AND, THEREFORE, IT SHOULD BE A GLOBAL PUBLIC BODY.  SO FOR ME, WHAT DOES THAT MEAN?  IT IS EASY TO SAY IN THE PUBLIC INTEREST.  FOR ME, FOR ICANN, THAT MEANS THAT DECISIONS THAT IT MAKES ABOUT TOP-LEVEL  DOMAINS, ABOUT WHATEVER, ABOUT HOW TO SPEND ITS FUNDING, THEY SHOULD BE MADE BY STEPPING BACK AND THINKING, WELL, NEVERMIND THE PEOPLE WE KNOW INTIMATELY WHO ARE INVOLVED IN THAT DECISION BUT LET'S THINK ABOUT THE PLAN AS A WHOLE.  WHAT IS BEST FOR HUMANITY AS A WHOLE?  THAT SHOULD GUIDE EVERY DECISION THAT ICANN MAKES.
&lt;br /&gt;&amp;gt;OBVIOUSLY, ONE OF THE THINGS THAT ICANN DOES IS IT HAS FUNDS TO SPEND AND SO PARTLY IT CAN FURTHER THE WORLD BY SPENDING THOSE IN A BENEFICIAL WAY SUCH AS SUPPORTING -- WELL, SUPPORTING STANDARDIZATION, SUPPORTING HARDENING WEB TECHNOLOGY, SUPPORTING PIECES OF TECHNOLOGY LIKE THAT, THE INTERNATIONALIZATION OF THE TECHNOLOGY, KEEPING IT SO IT WORKS WITH EVERY CULTURE AND LANGUAGE, ACCESSIBILITY FOR PEOPLE WITH DISABILITIES AND, OF COURSE, CLOSING THE DIGITAL DIVIDE FOR REALLY IMPORTANT AGENDAS WHICH ICANN CAN THINK ABOUT SUPPORTING.
&lt;br /&gt;&amp;gt;THE INTERNET HAS THRIVED FROM THE EMPOWERMENT OF CAPABLE AND PUBLIC-SPIRITED PEOPLE.  INITIALLY, THEY WERE FROM THE TECHNICAL COMMUNITY AND ACADEMIA BUT MORE RECENTLY THE WHOLE PRIVATE SECTOR, CIVIL SOCIETY AND GOVERNMENTS.  WE NEED INTERNET GOVERNMENTS WHICH  ALLOWS EACH COMMUNITY TO BRING ITS PARTICULAR STRENGTHS TO THE TABLE BUT ALLOWS NONE OF THEM TO ELEVATE ITS OWN INTEREST ABOVE THE PUBLIC GOOD.
&lt;br /&gt;&amp;gt;FIVE YEARS AGO, RELATIVELY RECENTLY IN INTERNET TIME, SOME OF US REALIZE THAT ALL THE TECHNICAL WORK WE WERE DOING WAS WONDERFUL BUT IT WAS EVERY SINGLE THING DID WAS INCREASING THE DIGITAL DIVIDE, INCREASING THE GAP BETWEEN THE POWER OF THE PEOPLE WHO HAD THE WEB AND DID NOT HAVE IT.  SO AT THAT POINT, WE STARTED THE WORLDWIDE WEB FOUNDATION ABOUT WHICH YOU ALREADY HEARD SOME TO MAKE SURE THAT THE WEB -- WELL, YES, THAT IT GETS TO, FOR EXAMPLE, THE 60% OF THE PEOPLE WHO IN THE WORLD WHO DON'T HAVE IT AT ALL BUT ALSO FOR THE PEOPLE WHO HAVE IT, THAT IT REALLY IS THE WEB THAT WE WOULD WANT, THE WEB HAS NOW BECOME AN ESSENTIAL PUBLIC UTILITY SO WE HAVE TO REGARD IT AS SUCH.
&lt;br /&gt;&amp;gt;MUCH OF OUR TRADITIONAL THINKING ABOUT HUMAN RIGHTS APPLIES DIRECTLY TO EVERYTHING ON THE INTERNET SUCH AS FREE  EXPRESSION.  BUT NEW THINGS BECOMING IMPORTANT IN THE NETWORK CONTEXT, NET NEUTRALITY MEANS KEEPING THE NET FREE FROM DISCRIMINATION, BE IT COMMERCIAL OR POLITICAL.
&lt;br /&gt;&amp;gt;THE INNOVATIVE EXPLOSION WHICH HAPPENED ACROSS THE NET OVER THE LAST 25 YEARS HAS HAPPENED ONLY BECAUSE THAT NET HAS BEEN NEUTRAL.  THE SOCIAL  GROUND-BREAKING SENSE OF POSSIBILITY THAT WE CAN UNDERSTAND EACH OTHER AND POSSIBLY LIVE IN PEACE RELIES ON AN OPEN NET.  OH, AND THANKS TO EVERYBODY WHO HAS EVER HELD UP A BANNER IN ANY FORUM ABOUT PUSHING FOR THE OPEN NET AND PUSHING AGAINST LAWS WHICH RESTRICT THE OPEN NET.
&lt;br /&gt;&amp;gt;SO THAT SENSE OF EXCITEMENT WHICH WE ALL HAVE GIVES US ALSO A RESPONSIBILITY THAT WE MUST KEEP THE NET NEUTRAL -- THE NET AS A NEUTRAL PLATFORM IN THE FUTURE.
&lt;br /&gt;&amp;gt;FREEDOM OF EXPRESSION IS A CRUCIAL RIGHT BUT IT HAS TO BE COUPLED ON THE NETWORK WITH A COMPLIMENTARY RIGHT TO PRIVACY AS, MADAM PRESIDENT, YOU HAVE POINTED OUT BEFORE AND HAVE ALREADY BEEN QUOTED TODAY.
&lt;br /&gt;&amp;gt;SO I WON'T QUOTE YOU AGAIN, BUT I WOULD, YES, AGREE THAT THERE ARE A LOT OF PEOPLE THAT ARE WORRIED ABOUT SURVEILLANCE AND FEEL IT IS PERHAPS THE MOST IMMEDIATE THREAT.  IT FEELS THE MOST IMMEDIATE THREAT.  AND, OF COURSE, SURVEILLANCE ALL AFFECTS THE INTERNET, IT IS ONE OF THE MORE INSIDIOUS ONES BECAUSE YOU DON'T SEE IT HAPPENING UNLIKE CENSORSHIP.
&lt;br /&gt;&amp;gt;IT IS GREAT TO BE BACK IN BRAZIL TODAY, NOT JUST BECAUSE BRAZIL IS A WONDERFUL COUNTRY AND ONE WHICH HAS HAD A REALLY VIBRANT SENSE OF WHAT OPPORTUNITY ON THE NET BUT, OF COURSE, ESPECIALLY TODAY IS A SPECIAL DAY.  YESTERDAY WAS A VERY SPECIAL  DAY, THE MARCO CIVIL GOING THROUGH IS WONDERFUL.  A FANTASTIC EXAMPLE OF HOW GOVERNMENTS COMPARE POSITIVE ROLE IN ADVANCING WEB RIGHTS AND KEEPING THE WEB OPEN.  YES, EUROPEANS ALSO CELEBRATE, THE EUROPEAN PARLIAMENT PASSING LEGISLATION PROTECTING USERS ON THE WEB.  WELL DONE.  SO TWO DATA POINTS THAT SUGGEST WE ARE MAKING PROGRESS.  THAT IS GREAT, BUT, BOY, WE HAVE GOT A HUGE WAY THE PRINCIPLES OF HUMAN RIGHTS ON THE NET ARE NEW AND THEY'RE NOT UNIVERSALLY ACCEPTED.
&lt;br /&gt;&amp;gt;THE WEB BECOMES EVER MORE EXCITING WITH EVERY ADVANCING TECHNOLOGY LIKE MOBILE WEB AND SO ON, BUT 60% OF THE WEB -- OF THE POPULATION CAN'T USE THE WEB AT ALL.
&lt;br /&gt;&amp;gt;AS THE WEB GIVES PEOPLE GREATER AND GREATER POWER, INDIVIDUALLY AND COLLECTIVELY, SO MANY FORCES ARE ABUSING OR THREATEN TO ABUSE THE NET AND ITS CITIZENS.  THE WEB THAT WE WILL HAVE IN ANOTHER 25 YEARS' TIME IS, BY NO MEANS, CLEAR.  BUT IT IS COMPLETELY UP TO US TO DECIDE WHAT WE WANT TO MAKE THAT WEB, WHAT WE WANT TO MAKE THAT WORLD.
&lt;br /&gt;&amp;gt;THAT'S WHY I'M ASKING WEB USERS AROUND THE WORLD, NOT JUST PEOPLE HERE IN THIS CONFERENCE ROOM AND THE OTHER CONFERENCE ROOMS WHERE THIS IS BEING RELAYED, NOT JUST PEOPLE IN THIS CONFERENCE BUT PEOPLE ALL OVER THE WORLD, TO GO AND THINK ABOUT WHAT YOU WANT AND TO FIND SOME SORT OF GLOBAL MAGNA CARTA FOR THE INTERNET.  THAT IS WHY --
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&amp;gt;&amp;gt;TIM BERNERS-LEE:  THAT IS WHY I'M ASKING COUNTRIES EVERYWHERE TO FOLLOW BRAZIL'S EXAMPLE AND EUROPE'S EXAMPLE AND DEVELOP POSITIVE LAWS THAT PROTECT AND EXPAND THE RIGHTS OF USERS IN AN OPEN, FREE, AND UNIVERSAL WEB.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt;TIM BERNERS-LEE:  THANK YOU.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&amp;gt;&amp;gt; LADIES AND GENTLEMEN, THE PRESIDENT OF THE REPUBLIC HAS APPROVED A LAW THAT GUARANTEES THE RIGHTS AND DUTIES FOR THE USE OF INTERNET IN THE WORLD.
&lt;br /&gt;&amp;gt;[CHEERS AND APPLAUSE ]
&amp;gt;&amp;gt;H.E. DILMA ROUSSEFF:  GOOD MORNING TO ONE AND ALL.  I WOULD LIKE TO THANK THOSE WHO SPOKE BEFORE ME FOR PERFECTLY PRONOUNCING "GOOD MORNING" IN PORTUGUESE, (NON-ENGLISH WORD OR PHRASE) AS VOICED BY OUR DEAR REPRESENTATIVE FROM AFRICA, NNENNA NWAKANMA.
&lt;br /&gt;&amp;gt;THANK YOU VERY MUCH FOR PERFECTLY PRONOUNCING (NON-ENGLISH WORD OR PHRASE) IN BRAZILIAN PORTUGUESE.  GOOD MORNING.
&lt;br /&gt;&amp;gt;AND BY GREETING HER, I WOULD LIKE TO EXTEND MY GREETINGS TO ALL WOMEN WHO ARE CURRENTLY ACTIVE ON THE WEB.  BOTH THE GIRLS AND THE GUYS WHO ARE EQUALLY ACTIVE ON THE WEB.
&lt;br /&gt;&amp;gt;GREETINGS, LIKEWISE, TO THE MAYOR OF SAO PAULO WHO HAS SO KINDLY WELCOMED US, AND ABOVE ALL, I WOULD RECYCLE TO, FIRST OF ALL, GREET TWO MEMBERS OF CONGRESS FROM BRAZIL.  NAMELY MR. (SAYING NAME) REPRESENTING THE HOUSE OF REPRESENTATIVES WHO SERVED AS RAPPORTEUR OF THE BILL OF LAW WHICH LED UP TO THE PASSING YESTERDAY OF THE INTERNET CIVIL FRAMEWORK, AS WELL AS REPRESENTATIVE -- RATHER SENATOR (SAYING NAME), AND THROUGH HIM, I WOULD LIKE TO FURTHER EXTEND MY GREETINGS, LIKEWISE, TO THE SENATE RAPPORTEURS WHO WERE ABLE TO PASS THE PIECE OF LAW IN A RECORD TIME, SENATOR (SAYING NAME), SENATOR (SAYING NAME), AND SENATOR (SAYING NAME).  THANK YOU.
&lt;br /&gt;&amp;gt;AND SO SENATOR (SAYING NAME) AND TO REPRESENTATIVE (SAYING NAME), I WOULD LIKE TO VOICE MY THANKS FOR YOUR EFFORTS IN PASSING THE INTERNET CIVIL FRAMEWORK.
&lt;br /&gt;&amp;gt;GREETINGS, LIKEWISE, TO THE SECRETARY-GENERAL OF THE UNITED NATIONS, HONG BO.  SPECIAL GREETINGS LIKEWISE TO THE INVENTOR OF THE INTERNET, TIM BERNERS-LEE.
&lt;br /&gt;&amp;gt;I WOULD LIKE TO GREET THE VICE PRESIDENT OF GOOGLE, AND A KEY PERSON -- RATHER A KEY PERSON IN THE ESTABLISHMENT OF THE INTERNET, MR. CERF.
&lt;br /&gt;&amp;gt;GREETINGS, ONCE AGAIN, TO MR. (SAYING NAME) WHO, ON OCTOBER THE 8TH LAST YEAR, 2013 -- CORRECT, FADI, IF I'M NOT MISTAKEN, WE MET IN BRAZIL YEAH AND ON THAT OCCASION DURING THAT MEETING WITH YOU THE SEMINAL IDEA SURFACED OF ESTABLISHING THIS INTERNET GOVERNANCE SUMMIT MEETING THAT IS REALIZED HERE TODAY, SO THANK YOU VERY MUCH AN ALL OF YOU, INCLUDING CABINET MINISTERS AND FOREIGN DELEGATES ATTENDING THIS SESSION TODAY.  ---
&lt;br /&gt;&amp;gt;MAY I ALSO USE THE OPPORTUNITY ---
&lt;br /&gt;&amp;gt;MAY I ALSO USE THE OPPORTUNITY TO GREET ALL CABINET MINISTERS WHO HAVE BEEN ACTIVELY INVOLVED IN THE PROCESS THAT LED UP TO THE PASSING OF THE INTERNET GOVERNANCE CIVIL FRAMEWORK, AN EFFORT WHICH OF COURSE INVOLVED ALL STAKEHOLDERS AND SOCIETY.
&lt;br /&gt;&amp;gt;SPECIAL THANKS TO MINISTER OF FOREIGN AFFAIRS, AMBASSADOR (SAYING NAME), MINISTER OF JUSTICE CARDOZO, ALSO MINISTER OF COMMUNICATIONS, MINISTER OF SCIENCE AND TECHNOLOGY, (SAYING NAME), AND MAY I ALSO GREET AND THANK SENATOR AND MINISTER OF CULTURE (SAYING NAME) AS WELL AS THE BRAZILIAN SECRETARY-GENERAL OF THE PRESIDENT'S OFFICE, (SAYING NAME).  GREETINGS LIKEWISE TO ALL ATTENDEES, PARTICULARLY THE MEDIA PROFESSIONALS, JOURNALISTS, PHOTOGRAPHERS, AND CAMERAMEN AND WOMEN.
&lt;br /&gt;&amp;gt;MAY I SAY THAT YOU ARE ALL MOST WELCOME TO BRAZIL.
&lt;br /&gt;&amp;gt;AS ATTENDEES TO THIS GLOBAL MULTISTAKEHOLDER MEETING ON THE FUTURE OF INTERNET GOVERNANCE, THE SO-CALLED NETmundial AS WE CALL IT IN PORTUGUESE.
&lt;br /&gt;&amp;gt;AT THIS POINT IN TIME I WOULD ALSO LIKE TO VOICE MY GREETINGS TO THE ORGANIZERS, I.E., THE INTERNET MANAGEMENT OR MANAGING COMMITTEE AS WELL AS THE 1net COMMITTEE.  IT GIVES ME GREAT JOY TO SEE IN THIS PLENARY HALL REPRESENTATIVES OF ALL DIFFERENT SECTORS WHO -- OR WHICH ARE IN ONE WAY INVOLVED IN THE INTERNET GOVERNANCE.
&lt;br /&gt;&amp;gt;IN THIS HALL TODAY, WE HAVE CIVIL SOCIETY, ACADEMIA, MEMBERS OF THE TECHNICAL COMMUNITY, BUSINESSES, AND GOVERNMENTS AT LARGE.
&lt;br /&gt;&amp;gt;THIS HEALTHY DIVERSITY -- AND I STRESS IT IS A HEALTHY DIVERSITY -- IS ALSO A HALLMARK OF THOSE GROUPS THAT HAVE JOINED US THROUGH THE INTERNET AND THIS MEETING, AND I WOULD LIKE TO USE THE OPPORTUNITY TODAY TO ESTABLISH A DIALOGUE ON THE ISSUES AND THE PURPOSES THAT BRING US TOGETHER IN SAO PAULO TODAY.
&lt;br /&gt;&amp;gt;BACK IN MID-2013 WHEN THE REVELATION SURFACED ON THE COMPREHENSIVE MECHANISMS FOR COLLECTIVE MONITORING OF COMMUNICATIONS CAUSED ANGER AND REPUDIATION IN VAST CIRCLES OF PUBLIC OPINION BOTH IN BRAZIL AND IN THE WORLD AT LARGE, IN BRAZIL CITIZENS, COMPANIES, DIPLOMATIC REPRESENTATIONS AND EVEN THE PRESIDENCY OF THE REPUBLIC ITSELF WERE TARGETED, AND THEIR COMMUNICATIONS INTERCEPTED.
&lt;br /&gt;&amp;gt;THESE EVENTS ARE NOT ACCEPTABLE.  WERE NOT ACCEPTABLE IN THE PAST AND REMAIN UNACCEPTABLE TODAY, IN THAT THEY ARE AN AFFRONTMENT AGAINST THE VERY NATURE OF THE INTERNET AS A DEMOCRATIC, FREE, AND PLURALISTIC PLATFORM.
&lt;br /&gt;&amp;gt;THE INTERNET WE WANT IS ONLY POSSIBLE IN A SCENARIO WHERE HUMAN RIGHTS ARE RESPECTED.  PARTICULARLY THE RIGHT TO PRIVACY AND TO ONE'S FREEDOM OF EXPRESSION.
&lt;br /&gt;&amp;gt;ACCORDINGLY, IN MY ADDRESS TO THE 68TH GENERAL ASSEMBLY OF THE UNITED NATIONS, I PUT FORTH A PROPOSAL TO TACKLE SUCH PRACTICES.  I THEN PROPOSED A DISCUSSION ON ESTABLISHING A GLOBAL CIVIL FRAMEWORK FOR INTERNET GOVERNANCE AND USE, AS WELL AS MEASURES TO ENSURE ACTUAL PROTECTION OF DATA THAT TRAVELS THROUGH THE INTERNET.
&lt;br /&gt;&amp;gt;ALSO, WORKING TOGETHER WITH GERMAN CHANCELLOR ANGELA MERKEL WE SUBMITTED TO THE UNITED NATIONS A DRAFT RESOLUTION ON THE RIGHT TO PRIVACY IN THE DIGITAL AGE.
&lt;br /&gt;&amp;gt;BY CONSENSUS, THE RESOLUTION WAS PASSED AS PROPOSED AND WE ALSO PASSED A CALL FOR STATES TO DISCONTINUE ANY ARBITRARY OR ILLEGAL COLLECTION OF PERSONAL DATA AND TO ENFORCE USERS' RIGHTS TO PRIVACY.
&lt;br /&gt;&amp;gt;I SHOULD ACTUALLY STRESS THE FACT THAT THE SAME RIGHTS THAT PEOPLE ARE ENTITLED TO OFFLINE OR IN THE OFFLINE WORLD SHOULD BE LIKEWISE PROTECTED ON THE ONLINE WORLD.
&lt;br /&gt;&amp;gt;THIS MEETING TODAY, NETMUNDIAL, PROVIDES FURTHER MOMENTUM TO THAT EFFORT.  THIS MEETING ALSO LIVES UP TO A GLOBAL YEARNING AS WE PROPOSE CHANGES IN THE CURRENT STATE OF AFFAIRS AND FOR AN ONGOING CONSISTENT STRENGTHENING OF FREEDOM OF EXPRESSION ON THE INTERNET AS WELL AS EFFORTS TO ULTIMATELY PROTECT BASIC HUMAN RIGHTS, AS IS THE CASE OF ONE'S RIGHT TO PRIVACY.  AND WITHOUT THE SHADOW OF A DOUBT, THAT IS ALSO THE CASE OF ONE'S RIGHT TO PROPER TREATMENT OF WEB-BASED DISCUSSIONS IN A RESPECTFUL FASHION, TO ENSURE ITS OPEN, DEMOCRATIC NATURE.  WE HAVE ALL TO SAO PAULO, THEREFORE, WITH A SHARED PURPOSE, THE PURPOSE OF ENHANCING AND DEMOCRATIZING INTERNET GOVERNANCE BY MEANS OF CONSENSUS BUILDING.  AND I MEAN CONSENSUS AROUND PRINCIPLES, AND ON A ROADMAP TO BE DEVELOPED FOR ITS FUTURE EVOLUTION.
&lt;br /&gt;&amp;gt;A POINT I'D LIKE TO MAKE PLAIN AND CLEAR IS THAT THE IDEA HERE IS NOT, OF COURSE, TO REPLACE FOR THE COUNTLESS FORA OUT THERE THAT ALREADY ADDRESS THE TOPIC OR THE MATTER AT HAND TODAY.  THE IDEA, RATHER, IS TO LEND A NEW MOMENTUM TO THE ONGOING DISCUSSIONS IN A MUCH NEEDED SENSE OF URGENCY.
&lt;br /&gt;&amp;gt;WE, THEREFORE, WORK FROM TWO PREMISES OR KEY ASSUMPTIONS.
&lt;br /&gt;&amp;gt;THE FIRST SUCH PREMISE IS THAT WE ALL WANT TO PROTECT THE INTERNET AS A SPACE, AVAILABLE TO ALL, AS A SHARED ASSET, AND AS SUCH, TRULY HERITAGE OF HUMANKIND, MORE THAN SIMPLY A WORK TOOL AND WAY BEYOND ITS WELL-KNOWN CONTRIBUTION FOR ECONOMIC GROWTH, PROVIDED, OF COURSE, THAT IT BE INCREASINGLY INCLUSIVE AND THE FACT IS THAT THE INTERNET HAS ENABLED THE CONSTANT REINVENTION OF THE WAY PEOPLE AND INSTITUTIONS INTERACT, PRODUCE CULTURE, AND ORGANIZE THEMSELVES, EVEN POLITICALLY.
&lt;br /&gt;&amp;gt;AN OPEN AND DECENT NETWORK ARCHITECTURE FAVORS GREATER ACCESS TO KNOWLEDGE.  IT HELPS MAKE COMMUNICATIONS MORE DEMOCRATIC AND ALSO FOSTERS CONSTANT INNOVATION.  THESE BASIC FEATURES ARE THE FEATURES THAT WE WANT AND THAT SHOULD BE PRESERVED UNDER ANY CIRCUMSTANCES, AND IN ANY SCENARIO, IN ORDER TO ULTIMATELY GUARANTEE THE FUTURE OF THE INTERNET AND, THUS, BOOST ITS TRANSFORMATIVE EFFECTS FOR AND IN SOCIETIES.
&lt;br /&gt;&amp;gt;THE SECOND PREMISE OR ASSUMPTION IS THE DESIRE WE ALL SHARE TO INCORPORATE AN INCREASINGLY BROADER AUDIENCE INTO THIS PROCESS.
&lt;br /&gt;&amp;gt;OUR COMMITMENT TO AN OPEN AND INCLUSIVE DEBATE HAS GUIDED THE EFFORTS TO ORGANIZE THIS MEETING IN SAO PAULO TODAY.  ALL DIFFERENT WALKS OF LIFE HAVE TAKEN PART IN ITS PREPARATION AND ARE DULY REPRESENTED IN THIS PLANE HALL TODAY.
&lt;br /&gt;&amp;gt;WE ARE TALKING ABOUT THOUSANDS OF PARTICIPANTS FROM ALL OVER THE WORLD WHO ARE JOINED BY VIRTUAL CONNECTIONS IN SEVERAL DIFFERENT POINTS OF THE PLANET.
&lt;br /&gt;&amp;gt;THE TOPICS TO BE DISCUSSED HAVE BEEN THE SUBJECT OF BROAD AND PRIOR INTERNATIONAL PUBLIC CONSULTATION AND HAVE RECEIVED INPUTS FROM PLAYERS OR STAKEHOLDERS LOCATED IN SEVERAL DIFFERENT COUNTRIES AND IN DIFFERENT GEOGRAPHIES.
&lt;br /&gt;&amp;gt;THESE PROPOSALS IN TURN, OR INPUTS, HAVE SERVED AS THE FOUNDATION TO DEVELOP A DRAFT DOCUMENT, THE DRAFT DOCUMENT TO BE DISCUSSED AND FURTHER ENHANCED HERE IN THE NEXT FEW DAYS.
&lt;br /&gt;&amp;gt;I WOULD LIKE TO WELCOME THE WORK CONDUCTED BY THE EXECUTIVE METRIC SECTORAL COMMUNITY AS WELL AS THE HIGH-LEVEL MULTISTAKEHOLDER COMMITTEE FOR THIS JOINT EFFORT.
&lt;br /&gt;&amp;gt;THE INTEREST OF BRAZILIANS IN THE INTERNET IS REFLECTED ON THE SUBSTANTIAL PARTICIPATION OF BRAZILIAN NATIONALS IN THE DOMESTIC PUBLIC CAPTION AS FACILITATED BY THE.BR PORTAL.  AT THIS TIME, CIVIL SOCIETY IS ORGANIZED IN THIS FORUM, THE SO-CALLED NETmundial ARENA, WHICH IS THE BRAZILIAN LOCUS FOR ACCESS TO TODAY'S SESSIONS.
&lt;br /&gt;&amp;gt;MAY I REMIND ALL THE LADIES AND GENTLEMEN AND FRIENDS ATTENDING THIS SESSION THAT BRAZIL ADVOCATES THAT INTERNET GOVERNANCE SHOULD BE MULTISTAKEHOLDER, MULTILATERAL, DEMOCRATIC, AND TRANSPARENT IN NATURE.
&lt;br /&gt;&amp;gt;IT IS OUR VIEW THAT THE MULTISTAKEHOLDER MODEL IS THE BEST WAY TO EXERCISE INTERNET GOVERNANCE.
&lt;br /&gt;&amp;gt;VERY MUCH IN ACCORDANCE WITH THAT VIEW, OUR LOCAL GOVERNANCE SYSTEM WHICH HAS BEEN IN OPERATION FOR 20 YEARS HAS RELIED ON ACTUAL PARTICIPATION OF REPRESENTATIVES FROM CIVIL SOCIETY, MEMBERS OF ACADEMIA, THE BUSINESS COMMUNITY, AND THE GOVERNMENT AT LARGE AT THE INTERNET GOVERNANCE -- OR AT THE INTERNET MANAGEMENT COMMITTEE.
&lt;br /&gt;&amp;gt;FULLY IN LINE WITH WHAT I JUST SAID, I ALSO ATTACH A GREAT DEAL OF IMPORTANCE TO THE MULTILATERAL PERSPECTIVE, ACCORDING TO WHICH GOVERNMENT PARTICIPATION SHOULD OCCUR ON AN EQUAL FOOTING AMONG GOVERNMENTS IN SUCH A WAY AS TO ENSURE THAT NO COUNTRY WILL HAVE OR BEAR GREATER WEIGHT VIS-A-VIS OTHER COUNTRIES.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&amp;gt;&amp;gt;H.E. DILMA ROUSSEFF:  OUR ADVOCACY OF THE MULTILATERAL MODEL IS THE NATIONAL CONSEQUENCE OF AN ELEMENTARY PRINCIPLE THAT SHOULD GOVERN TODAY'S INTERNATIONAL RELATIONS AS ENSHRINED IN THE BRAZILIAN FEDERAL CONSTITUTION.  I'M TALKING ABOUT EQUALITY AMONG STATES.
&lt;br /&gt;&amp;gt;WE, THEREFORE, SEE NO OPPOSITION WHATSOEVER BETWEEN MULTI- -- OR THE MULTILATERAL AND THE MULTISTAKEHOLDER NATURE OF THE INTERNET.  ACTUALLY, THE OPPOSITE OF THAT WOULD BE A ONE-SIDED UNILATERAL INTERNET WHICH IS UNTENABLE.
&lt;br /&gt;&amp;gt;AN INTERNET THAT IS ULTIMATELY SUBJECT TO INTERGOVERNMENTAL ARRANGEMENTS THAT EXCLUDE OTHER SECTORS OF SOCIETY IS NOT DEMOCRATIC.
&lt;br /&gt;&amp;gt;MULTISTAKEHOLDER ARRANGEMENTS THAT ARE IN TURN SUBJECT TO OVERSIGHT BY ONE OR FEW STATES ARE NOT ACCEPTABLE EITHER.
&lt;br /&gt;&amp;gt;WE TRULY WANT TO MAKE RELATIONS BETWEEN GOVERNMENTS AND SOCIETIES MORE DEMOCRATIC, AS WELL AS THE RELATIONS AMONG GOVERNMENTS.  WE WANT MORE, NOT LESS, DEMOCRACY.
&lt;br /&gt;&amp;gt;THE TASK OF PROVIDING A GLOBAL DONATION TO THE ORGANIZATIONS THAT ARE CURRENTLY RESPONSIBLE FOR CENTRAL FUNCTIONS OF THE INTERNET IS NOT ONLY NECESSARY, BUT ALSO AN UN-POSTPONABLE TASK.
&lt;br /&gt;&amp;gt;THE COMPLEXITY OF THE TRANSITION AT HAND, WHICH ON THE ONE HAND INVOLVES JURISDICTIONAL COMPETENCE, AS WELL AS ACCOUNTABILITY AND AN AGREEMENT WITH MULTIPLE STAKEHOLDERS, DOES NOT, NEVERTHELESS, MAKE IT LESS URGENT A TASK.
&lt;br /&gt;&amp;gt;THAT IS WHY I'D LIKE TO AGAIN WELCOME THE RECENTLY VOICED INTENTION OF THE UNITED STATES GOVERNMENT TO REPLACE ITS INSTITUTIONAL LINKAGE WITH THE AUTHORITY FOR -- OR WITH THE INTERNET AUTHORITY FOR NUMBER ASSIGNMENT, IANA, AND THE INTERNET CORPORATION FOR NAMES AND NUMBER ASSIGNMENTS, ICANN, BY A GLOBAL MANAGEMENT OF THESE INSTITUTIONS FROM NOW ONWARDS, A NEW INSTRUMENTAL AND LEGAL ARRANGEMENT OF THE ISDN UNDER THE RESPONSIBILITY OF IANA AND ICANN SHOULD BE BUILT IN SUCH A WAY AS TO INCLUDE BROAD-RANGING INVOLVEMENT OF ALL SECTORS THAT HAVE AN INTEREST IN THE MATTER WAY BEYOND THE TRADITIONAL STAKEHOLDERS OR PLAYERS.
&lt;br /&gt;&amp;gt;EACH SECTOR, OF COURSE, PERFORMS DIFFERENT ROLES BASED ON LIKEWISE DIFFERENTIATED RESPONSIBILITIES.
&lt;br /&gt;&amp;gt;THE OPERATIONAL MANAGEMENT OF THE INTERNET SHOULD CONTINUE BEING LED BY ITS TECHNICAL COMMUNITY.  MAY I, AT THIS POINT, VOICE MY PUBLIC RECOGNITION -- AND THIS IS ON BEHALF OF MY GOVERNMENT -- TO THESE PEOPLE WHO DEVOTE THEIR TIME AND ENERGY ON A DAY-TO-DAY BASIS TO KEEPING THE INTERNET AS AN OPEN, STABLE, AND SECURE PLATFORM, A KEY EFFORT WHICH REMAINS LARGELY INVISIBLE IN THE EYES OF MOST OF US END USERS.
&lt;br /&gt;&amp;gt;MATTERS PERTAINING TO SOVEREIGNTY SUCH AS CYBERCRIME, BREACH OF RIGHTS, ECONOMIC ISSUES OR TRANSNATIONAL ECONOMIC ISSUES, AND THREATS OF CYBER-ATTACKS ARE THE PRIMARY RESPONSIBILITY OF STATES.
&lt;br /&gt;&amp;gt;THE TASK AT HAND IS, ABOVE ALL, TO ENSURE THAT STATES WILL HAVE AT THEIR AVAIL THE TOOLS THAT WILL ALLOW THEM TO FULFILL THEIR RESPONSIBILITIES BEFORE THEIR CITIZENS, TO INCLUDE THE GUARANTEE OF FUNDAMENTAL RIGHTS.  RIGHTS WHICH ARE ENSURED OFFLINE SHOULD BE EQUALLY INSURED  ONLINE.
&lt;br /&gt;&amp;gt;THESE RIGHTS THRIVE UNDER THE SHELTER AND NOT IN THE ABSENCE OF THE STATE.
&lt;br /&gt;&amp;gt;IN ORDER FOR THE GLOBAL INTERNET GOVERNANCE TO BE TRULY DEMOCRATIC, MECHANISMS ARE REQUIRED TO ENABLE GREATER PARTICIPATION OF DEVELOPING COUNTRIES IN ALL DIFFERENT SECTORS.
&lt;br /&gt;&amp;gt;THE MATTERS THAT ARE IN THE INTEREST OF THESE COUNTRIES THAT ARE THE HEAVY-DUTY USERS OF THE INTERNET, TOPICS SUCH AS, FOR EXAMPLE, EXPANDING CONNECTIVITY, ACCESSIBILITY, AND THE RESPECT TO DIVERSITY, SHOULD BE CENTRAL ON THE INTERNATIONAL AGENDA.
&lt;br /&gt;&amp;gt;IT IS NOT ENOUGH FOR FORA TO BE OPEN FROM A PURELY FORMAL STANDPOINT.  WE MUST FURTHER IDENTIFY AND REMOVE THE VISIBLE AND INVISIBLE BARRIERS TO ACTUAL PARTICIPATION OF THE ENTIRE POPULATION OF EVERY COUNTRY OR ELSE WE WOULD BE ULTIMATELY RESTRICTING OR LIMITING THE DEMOCRATIC ROLE AND THE SOCIAL AND CULTURAL REACH OF THE INTERNET.
&lt;br /&gt;&amp;gt;THE EFFORT AT HAND FURTHER REQUIRES THAT THE INTERNET GOVERNANCE FORUM BE FURTHER STRENGTHENED AS A DIALOGUE FORUM CAPABLE OF PRODUCING RESULTS AND RECOMMENDATIONS.
&lt;br /&gt;&amp;gt;IT ALSO REQUIRES A COMPREHENSIVE, BROAD-RANGING REVIEW OF THE 10 YEARS FOLLOWING THE SUMMIT -- WORLD SUMMIT MEETING OF INFORMATION SOCIETY AS WELL AS A DEEPER DISCUSSION ON ETHICS AND PRIVACY AT THE UNESCO LEVEL.
&lt;br /&gt;&amp;gt;GIVEN THE ABOVE, MAY I SAY THAT WE ARE STRONG BELIEVERS THAT THE CYBER-SPACE -- AND I'M SURE THAT BELIEF IS SHARED BY ALL OF US -- THE CYBER-SPACE SHOULD BE THE TERRITORY OF TRUST, HUMAN RIGHTS, CITIZENSHIP, COLLABORATION, AND PEACE.
&lt;br /&gt;&amp;gt;TO ACHIEVE THESE OBJECTIVES, WE MUST AGREE ON BASIC PRINCIPLES THAT WILL ULTIMATELY GUIDE INTERNET GOVERNANCE.
&lt;br /&gt;&amp;gt;AS REGARDS PRIVACY, THE RESOLUTION PASSED BY THE UNITED NATIONS ORGANIZATION WAS AN IMPORTANT STEP IN THE RIGHT DIRECTION, BUT WE MUST -- BUT WE STILL HAVE MUCH PROGRESS TO MAKE.
&lt;br /&gt;&amp;gt;ANY DATA COLLECTION OR TREATMENT SHOULD ONLY BE CARRIED OUT WITH FULL AGREEMENT OF THE PARTIES INVOLVED OR AS LEGALLY PROVIDED FOR.
&lt;br /&gt;&amp;gt;HOWEVER, THE DISCUSSION ON PRINCIPLES IS MUCH MORE COMPREHENSIVE.  IT SHOULD -- AND I STRESS IT SHOULD -- INCLUDE UNIVERSAL INTERNET ACCESS, WHICH IS ABSOLUTELY KEY FOR THE WEB TO SERVE AS A TOOL FOR HUMAN AND SOCIAL DEVELOPMENT SO AS TO ULTIMATELY HELP BUILD INCLUSIVE, NONDISCRIMINATORY SOCIETIES.
&lt;br /&gt;&amp;gt;IT SHOULD ALSO INCLUDE FREEDOM OF EXPRESSION AND NET NEUTRALITY AS AN SINE BRAZIL HAS ITS CONTRIBUTIONS TO MAKE FOLLOWING A BROAD RANGING DISCUSSION, DOMESTIC PROCESS THAT HAS ULTIMATELY LED TO THE PASSING OF THE INTERNET CIVIL FRAMEWORK ACT AS PASSED YESTERDAY BY CONGRESS IN WHICH I HAD THE HONOR OF SANCTIONING JUST A FEW MINUTES AGO.  THE  LAW -- AND I MAY QUOTE TIM BERNERS-LEE WHO QUOTED THE LAW AS A PRESIDENT TO THE WEB ON THE OCCASION OF THE 20th -- OR 25th ANNIVERSARY AS SUCH THE LAW CLEARLY SHOWS THE FEASIBILITY AND SUCCESS OF OPEN MULTISECTORIAL DISCUSSIONS AS WELL AS THE INNOVATIVE USE OF THE INTERNET AS PART OF ONGOING DISCUSSIONS AS A TOOL AND A INTERACTIVE DISCUSSION PLATFORM.
&lt;br /&gt;&amp;gt;I THINK IT IS FAIR TO SAY THAT THE PROCESS THAT LED UP TO THE CIVIL FRAMEWORK ACT CAN BE DESCRIBED AS A VIRTUOUS PROCESS IN THAT OUR CIVIL FRAMEWORK, AS IT CURRENTLY STANDS, HAS BEEN EVEN FURTHER APPRECIATED GIVEN THE PROCESS THAT PRECEDED THE EFFORTS TO ESTABLISH IT AS SUCH.
&lt;br /&gt;&amp;gt;MAY I, THEREFORE, CALL TO MIND THAT OUR CIVIL FRAMEWORK ESTABLISHES PRINCIPLES, GUARANTEES AND USER RIGHTS, CLEARLY ASSIGNING DUTIES AND RESPONSIBILITIES OF THE DIFFERENT STAKEHOLDERS AND GOVERNMENT AGENCIES ON AN ONLINE ENVIRONMENT.  AND EQUALLY IMPORTANT, IT ENSHRINES NETWORK NEUTRALITY AS A KEY PRINCIPLE, A MAJOR GAIN WHICH WE WERE ABLE TO MATERIALIZE AS A CONSENSUS IN THE PROCESS.
&lt;br /&gt;&amp;gt;IT ENSHRINES NETWORK NEUTRALITY BY ESTABLISHING THE TELECOMMUNICATIONS COMPANY SHOULD TREAT ANY DATA PACKAGES ON IN A --- FASHION WITH ACCOUNT TO AGENT, DESTINATION, SERVICE, TERMINAL OR APPLICATION.  THE LAW OR FRAMEWORK AS HAS TRULY  ENSHRINED NETWORK NEUTRALITY.  FURTHERMORE, COMPANIES MAY NOT BLOCK, MONITOR, FILTER OR ANALYZE THE CONTENT OF DATA PACKAGES.
&lt;br /&gt;&amp;gt;THE CIVIL FRAMEWORK PROTECTS CITIZENS' PRIVACY IN THE ONLY IN THE RELATION WITH THE  GOVERNMENTS BUT ALSO WITH RELATION WITH THE INTERNET COMPANIES.  COMMUNICATIONS ARE, BY DEFINITION, NON-VIABLE EXCEPT BY A SPECIFIC COURT ORDER TO THAT EFFECT.  THE RECENTLY PASSED LAW FURTHER CONTAINS CLEAR RULES GOVERNING WITHDRAWAL OF CONTENT FROM THE INTERNET.  ALWAYS, OF COURSE, WITH A VIEW TO ENSURING THAT THE APPLICABLE COURT ORDERS BE AVAILABLE.
&lt;br /&gt;&amp;gt;THE CIVIL NETWORK IS AN EXAMPLE OF THE FACT THAT THE INTERNET DEVELOPMENT CANNOT DO IT WITHOUT A DISCUSSION PROCESS AND THE INVOLVEMENT OF NATIONAL STATES.  AS SUCH, IT STANDS AS AN INNOVATIVE BENCHMARK MILESTONES BECAUSE IN ITS DEVELOPMENT PROCESS, WE HEARD THE VOICES OF THE STREETS, THE NETWORKS AND OF DIFFERENT INSTITUTIONS.
&lt;br /&gt;&amp;gt;FOR ALL OF THE ABOVE, IT IS OUR FIRM CONVICTION THAT ON A NETWORK, EACH NODE MATTERS.  THE LARGE NODES SUCH AS THE MEGA PORTALS TO WHICH A SUBSTANTIAL AMOUNT OF WORLD TRAFFIC  CONVERGES AND SMALL NODES ARE EQUALLY IMPORTANT.
&lt;br /&gt;&amp;gt;AT THIS TIME, I WOULD LIKE TO BRING TO THE FORE A KEY FUNDAMENTAL ISSUE AND TALK ABOUT THE FACT THAT THIS COUNTRY HAS TAKEN A MAJOR STEP FORWARD AS PART OF THE ONGOING PROCESS WHEREBY WE NOT ONLY INCLUDE BUT ALSO GUARANTEE A STEADY STREAM OF INCOME TO A SUBSTANTIAL SHARE OF THE POPULATION.
&lt;br /&gt;&amp;gt;INCOME AND ACCESS ARE EQUALLY IMPORTANT.  WE BELIEVE THAT IT IS EQUALLY IMPORTANT TO ENSURE WE HAVE PLACE IN SOCIETY WHERE CITIZENS HAVE THEIR OWN VIEWS AND THEY ARE ABLE TO VOICE THEIR VIEWS FREELY.  HENCE, THE  INVALUABLE DEGREE OF IMPORTANCE WE ATTACH TO THE INTERNET IN OUR SOCIETY.
&lt;br /&gt;&amp;gt;WE ALSO HAVE YET ANOTHER MAJOR ASSET.  I'M TALKING ABOUT  BRAZIL'S ETHNIC CULTURAL, POLITICAL AND RELIGIOUS DIVERSITY.  IT IS OURS TO NOT ONLY RESPECT BUT ALSO PROMOTE AND FOSTER OUR CULTURAL DIVERSITY.  WE DO NOT WISH TO IMPOSE BELIEFS, CUSTOMS, VALUES OR POLITICAL VIEWS ON ANYONE.
&lt;br /&gt;&amp;gt;MAY I PARTICULARLY HIGHLIGHT THE THOUSANDS OF USERS THAT MULTIPLY ON A DAY-TO-DAY BASIS NOT ONLY HERE BUT IN ALL THE DEVELOPING COUNTRIES IN THE OUTSKIRTS OF LARGE URBAN AREAS AND ALSO IN TRADITIONAL COMMUNITIES OUT THERE.  ALL OF THESE NEW USERS ENRICH THE NETWORK WITH NEW ALTERNATIVE IDEAS AND ACCOUNTS OF THE WORLD, NEW WORLD VISIONS.  THESE PEOPLE MAKE THE INTERNET A STRONGER AND MORE UNIVERSAL PLATFORM.
&lt;br /&gt;&amp;gt;AND IT IS ON THEIR BEHALF AND BECAUSE OF THEM, THAT I WOULD LIKE TO AGAIN VOICE MY THANKS TO ALL OF YOU FOR ATTENDING THIS MEETING IN SAO PAULO.  FOR US, THE INTERNET IS A MODERN-DAY PRO EMANCIPATION, PRO TRANSFORMATION TOOL THAT CHANGES SOCIETY.  SWEEPING CHANGES ARE INTRODUCED THROUGH THE INTERNET.  YOU ARE ALL MOST WELCOME.  AND I HOPE YOU WILL ALL COME BACK FOR THE WORLD CUP OF ALL CUPS.  IF NOT, MAKE SURE YOU WATCH IT THROUGH THE INTERNET.  THANK YOU VERY MUCH AGAIN.
&lt;br /&gt;&amp;gt;[APPLAUSE ]
&lt;br /&gt;&amp;gt;&amp;gt;&amp;gt; LADIES AND GENTLEMEN, WE THANK YOU FOR THE PRESENCE OF YOU ALL.  WE CLOSE NOW THIS CEREMONY.
&lt;br /&gt;&amp;gt;
&lt;br /&gt;&amp;gt;
&lt;br /&gt;&amp;gt;  &lt;br /&gt;&amp;gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/netmundial-transcript-archive'&gt;https://cis-india.org/internet-governance/blog/netmundial-transcript-archive&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-04-23T14:31:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-mundial-day-2">
    <title>NETmundial Day 2</title>
    <link>https://cis-india.org/internet-governance/blog/net-mundial-day-2</link>
    <description>
        &lt;b&gt;Fadi Chehade, the ICANN boss, closed NETmundial 2014 with these words "In Africa we say if you want to go first, go alone, but if you want to go far, go together." He should have added: And if you want to go nowhere, go multi-stakeholder.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For           all the talk of an inclusive global meeting, there was exactly         &lt;span&gt;&lt;a href="http://ajantriks.github.io/netmundial/map_no_contrib_govt.html"&gt;one                   governmental                   submission from the African continent&lt;/a&gt;&lt;/span&gt;,           and it was from Tunisia; and the overall rate of submissions           from Africa and West Asia were &lt;a href="http://ajantriks.github.io/netmundial/map_no_contrib.html"&gt;generally             very low&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The outcome document perfectly reflects the gloss that the "multi-stakeholder" model was designed to achieve: an outcome that is celebrated by businesses (and by all embedded institutions like ICANN) for being harmless, met with relief by governments for not upsetting the status quo, all of it lit up in the holy glow of "consensus" from civil society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course there was no consensus. Civil society groups who organised on Day 0 put up their &lt;a href="http://pastebin.com/3uK9KbR0%20"&gt;position&lt;/a&gt;: the shocking omission of a strong case for net neutrality, ambiguous language on surveillance, weak defences of free expression and privacy. All valid points. But it's striking that civil society takes such a pliant position towards authority: other than exactly two spirited protests (one against the data retention in Marco Civil, and the other against the NSA's mass surveillance program) there was no confrontation, no provocation, no passionate action that would give civil society the force it needs to win. If we were to compare this to other international struggles, the gay rights battle, or its successor, the AIDS medicines movement, for instance - what a difference there is. People fought to crush with powerful, forceful action. Only after huge victories with public and media sympathy, and only after turning themselves into equals of the corporations and governments they were fighting, did they allow themselves to sit down at the table and negotiate nicely. Internet governance fora are marked by politeness and passivity, and perhaps - however sad - it's no wonder that the least powerful groups in these fora always come away disappointed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's also surprising that there is no language in the outcome document that explicitly addresses the censorious threat posed by the global expansion of a sovereign application of copyright, as seen most vividly in the proposed &lt;a href="http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA"&gt;SOPA/PIPA&lt;/a&gt; legislation in the United States. The outcome document has language that seems to more or less reflect the &lt;a href="http://bestbits.net/netmundial-proposals/"&gt;civil society proposal&lt;/a&gt;, and it's possible that a generous interpretation of the language could mean that it opposes the selective, restrictive and damaging application of what the intellectual property industries want to accomplish on the Internet. But it's puzzling that the language isn't stronger or more explicit, and even more puzzling that civil society doesn't seem to want to fight for such language.&lt;/p&gt;
&lt;p&gt;This seems like an appropriate time to end the multi-stakeholder diaries. &lt;a href="http://ajantriks.github.io/netmundial/track_multistakeholder.html"&gt;Hasn't the word been used enough?&lt;/a&gt; Here is one last instalment. We thank the kind folks who gave us their time.&lt;/p&gt;
&lt;p&gt;Q: What does "multi-stakeholder" mean? What is "multi-stakeholderism"?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A large part of the discourse prior to the NETmundial conference has been centered around the issue of what is the best structural system to regulate a global network – this has commonly been portrayed as a choice between a multistakeholder system – which broadly speaking, aims to place ‘all stakeholders’ on equal footing – against multilateralism – a recognized concept in International law / the Comity of Nation States, where a nation state is recognized as the representative of its citizens, making decisions on their behalf and in their interests.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;In our opinion, the issue is not about the dichotomy between multilateralism and multistakeholderism; it is about what functions or issues can legitimately be dealt with through each of the processes in terms of adequately protecting civil liberties and other public interest principles – including the appropriate enforcement of norms. For instance, how do you deal with something like cyber warfare without the consent of states? Similarly, how do we address regulatory issues such as determining (and possibly subsidizing) costs of access, or indeed to protect a right of a country against unilateral disconnection?&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;.....The crux of the matter rests in deciding which is the best governance ‘basket’ to include a particular issue within – taken from both a substantive and enforcement perspective. The challenge is trying to demarcate issues to ensure that each is dealt with effectively by placing it in an appropriate bucket.&lt;/i&gt; &lt;i&gt;(The full post can be accessed &lt;/i&gt;&lt;a href="http://www.knowledgecommons.in/brasil/en/multilateral-and-multistakeholder-responsibilities/"&gt;here&lt;/a&gt;&lt;i&gt;).&lt;/i&gt;&lt;br /&gt;&lt;b&gt;Rishab Bailey&lt;/b&gt; from the Society for Knowledge Commons (India)&lt;/p&gt;
&lt;p class="PreformattedText" style="text-align: justify; "&gt;&lt;i&gt;If I would have signed the campaign &lt;/i&gt;&lt;a href="http://wepromise.eu/"&gt;http://wepromise.eu&lt;/a&gt;&lt;i&gt; as a candidate to the European Parliament I would have made it an election promise to defend "the principle of multistakeholderism".&lt;/i&gt;&lt;/p&gt;
&lt;p class="PreformattedText" style="text-align: justify; "&gt;&lt;i&gt;That means that I "support free, open, bottom-up, and multi-stakeholder models of coordinating the Internet resources and standards - names, numbers, addresses etc" and that I "support measures which seek to ensure the capacity of representative civil society to participate in multi-stakeholder forums." Further, I "oppose any attempts by corporate, governmental or intergovernmental agencies to take control of Internet governance."&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;My very rudimentary personal view is basically that it's a bad idea to institutionalise conflicting competences.&lt;/i&gt;&lt;br /&gt;&lt;b&gt;Erik Josefsson&lt;/b&gt;, Adviser on Internet policies for the Greens/EFA group in the European Parliament&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;And so it &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;ends&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-mundial-day-2'&gt;https://cis-india.org/internet-governance/blog/net-mundial-day-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>achal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-04-25T04:58:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-mundial-day-1">
    <title>NETmundial Day 1</title>
    <link>https://cis-india.org/internet-governance/blog/net-mundial-day-1</link>
    <description>
        &lt;b&gt;Brazilian President Dilma Rousseff's speech at the opening of NETmundial in São Paulo was refreshingly free of the UN-speak that characterised virtually every single other presentation this morning. The experience of sitting for five hours in a room where the word "multi-stakeholder" is repeated at the rate of five mentions per minute is not for the faint-hearted; it almost makes you wish for more of the straight-talking tough-love of people like Swedish Foreign Minister Carl Bildt.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Surveillance was mentioned by a few brave souls. Two peaceful, silent - and rather effective - protests broke out during the opening speeches; one, against the data retention clause in Brazil's otherwise path-breaking and brand-new law for civil rights on the Internet, Marco Civil, and another for honouring US NSA whistleblower Edward Snowden and urging &lt;a href="https://twitter.com/Lhunthendrix/status/458975285049053184/photo/1"&gt;action against surveillance&lt;/a&gt;. Sadly for Brazilian civil society, the Marco Civil protestations went unheard, and Rousseff signed the bill into law in full.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were lots of speeches. Lots. If you missed them, here's a handy &lt;a href="http://ajantriks.github.io/netmundial/word_freq_org_type.html"&gt;visualisation&lt;/a&gt; you can use to catch up quickly: just add some prepositions and conjunctions, and you'll have a perfectly anodyne and universally acceptable bureaucrat/politician keynote address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The afternoon was given over to assimilating previously received comments on the &lt;a href="http://document.netmundial.br/"&gt;outcome&lt;/a&gt; document and adding new ones from people in the room. Much contention, much continuity, lots of hard work, lots of nitpicking (some of it even useful) and lots of ambiguity; after more consultation - the slog goes on until tomorrow afternoon - the outcome document will be laid to rest. Lunch was excellent: there's a reason the Grand Hyatt São Paulo costs as much as it does.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our quest to plumb the depths of multi-stakeholderism continued: we thank the kind folks who gave us their time and allowed us to record them.&lt;/p&gt;
&lt;p&gt;Q: What does "multi-stakeholder" mean? What is "multi-stakeholderism"?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Multi-stakeholderism to me is the ability to engage with every stakeholder and have them in the room, and have them understand that it is not an equal opportunity for all. I also understand that civil society and academia will never be at the same place as business, which has far more resources, or governments, which have the sovereign right to make laws, or even the technical community, which is often missing from the policy dialogue. There are three things which are important to me: (1) Will I be able to make interventions not just in the dialogue but in the decision making process? For me, that is key. (2) Do I have recourse in a process which might be multilateral or inter-governmental - do I have recourse when international treaties are  ratified or signed, because they become binding national laws? and (3) What is it that happens to dissent in a process that is not multi-stakeholder? I think even the ITU (the International Telecommunications Union) has taken cognizance of multi-stakeholderism. So it's not new, but it's also not old or accepted, which is why we contest it. We will never have equal stakeholders. And who gets to represent the stakeholder communities? I don't think power imbalances get resolved, and I think it's a deeply flawed process. It's not perfect. But what worries me is the alternative. So give me a better alternative.&lt;/i&gt;&lt;br /&gt;&lt;b&gt;Subi Chaturvedi&lt;/b&gt;, Media for Change/ Lady Shriram College  (India)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Simply put, multi means many components, and stakeholders are people who have the stakes. So multi-stakeholder means many people who are informed to take the process forward. The process is still on: it's evolving. The idea is that everyone who has an interest should bring it forward, and the dialogue must be balanced. Proof of concept is important - it's not about taking a dogmatic position but a scientific position. Business is concerned about the justification around return on investment.&lt;/i&gt;&lt;br /&gt;&lt;b&gt;Jimson Olufuye&lt;/b&gt;, Africa ICT Alliance (Nigeria)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Everyone who has a stake in the use and operation of the Internet should have a stake in the way it is managed. I think we shouldn't be considering this as a power game - it's not winner takes all. Decision making should be as much as possible consensual, where no one has a veto power.&lt;/i&gt;&lt;br /&gt;&lt;b&gt;Getachew Engida&lt;/b&gt;, Deputy Director-General, UNESCO (France)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;It is very simple. I think people are complicating matters. It's not a power game. The Internet is fundamentally a global network of interconnected computers. People have become not only consumers of information but providers of information, so the stakes in the media/ICT world are massive. Unprecedented. Therefore, around major issues confronting the Internet, decision making should be as participatory as possible.&lt;/i&gt;&lt;br /&gt;&lt;b&gt;Indrajit Banerjee&lt;/b&gt;, Director, UNESCO (France)&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Additional Links&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=0KemK8YbHrI"&gt;Watch Brazilian President Dilma Rousseff's speech at the opening of NETmundial&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow Swedish foreign minister Carl Bildt on &lt;a class="external-link" href="https://twitter.com/wikileaks/status/458996103162376193"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-mundial-day-1'&gt;https://cis-india.org/internet-governance/blog/net-mundial-day-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>achal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-04-24T09:02:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-mundial-day-0">
    <title>NETmundial Day 0</title>
    <link>https://cis-india.org/internet-governance/blog/net-mundial-day-0</link>
    <description>
        &lt;b&gt;Day O of NETmundial began at Arena NetMundial, an alternative-ish, Brazilian counterpart to the official "multistakeholder" meeting being organised at the very expensive Grand Hyatt. Arena NETmundial began today and will extend until the last day of  NETmundial; it's being organised at the very democratic Centro Cultural São Paulo - free to all, no registration required - and offers space for a whole host of organised and spontaneous activity.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Every evening is capped by a music performance, and the opening act was a stand-out two-hour visual extravaganza by Tom Zé, Tropicalia's most avant-garde exponent. Lula (Luiz Inácio Lula da Silva, the previous President of Brazil) was supposed to join us at 7 p.m. today to discuss Marco Civil da Internet - the Brazilian bill for "civil rights" on the Internet - but was a no show.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No matter: Marco Civil was passed into law by the Senate at about 8 p.m. this evening, and President Dilma Rousseff (who reportedly willed this meeting into being) is expected to sign her assent to it tomorrow morning at the opening of NETmundial, which she is scheduled to attend. (While the global press around Marco Civil is unanimously positive and upbeat, it's worth noting that there is one problematic provision — the issue of data retention — that many folks from &lt;a href="https://www.eff.org/deeplinks/2012/11/brazilian-internet-bill-threatens-freedom-expression"&gt;Brazilian civil society&lt;/a&gt; see as a &lt;a href="https://blog.mozilla.org/netpolicy/2014/03/26/marco-civil-a-groundbreaking-although-not-perfect-victory-for-brazilian-internet-users/"&gt;huge loss&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A host of &lt;a href="http://bestbits.net/events/netmundial-coordination/"&gt;civil society groups&lt;/a&gt; spent the day at Arena NETmundial figuring out how to stage a coordinated, detailed and forceful response to what many saw as &lt;a href="http://document.netmundial.br/"&gt;watered-down text&lt;/a&gt; from the NETmundial organisers. (Several corporate representatives and some academics also saw it as watered-down, but from another direction).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several puzzling aspects to the shape NETmundial has assumed. What began as a response to the Snowden leaks — the unprecedented scale of the US government sponsored, NSA-executed surveillance — has become a meeting that strangely doesn't have all that much to say about surveillance, perhaps thanks to the various partners roped in to manage the process. There is little that references the bitter &lt;a href="http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA"&gt;SOPA/PIPA&lt;/a&gt; battles of two years ago, and not much in the NETmundial outcome document that addresses the manner in which a sovereign state has outrageously sought to export its national application of copyright onto the global Internet landscape. The civil society meeting produced language to address both these situations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps the most confounding aspect of this meeting is the manner in which the word "multistakeholder" is thrown about by people of every political stripe. Seemingly, if there is one thing that most everyone, from governments to businesses to civil society activists at NETmundial agree on, it is that multistakeholderism has an essential place in the future of Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That being as it is, I asked a bunch of people what their interpretation of the term was, and many agreed to be recorded. Their answers were surprising, to say the least.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is what they said:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Q: What does "multi-stakeholder" mean? What is "multi-stakeholderism"?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;I think multistakeholderism is a kind of democracy, which means, in the public policy area, other than the critical internet resources, usually only governments make public policy. They sometimes consult with other stakeholders, but it is not usually open or transparent and it is very selective. They only choose the experts they like. I think "multistakeholder" is useful in comparison with an inter-governmental or governmental process. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Byoungil Oh&lt;/b&gt; from the Korean Progressive Network Jinbonet&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Multistakeholderism is a mechanism to ensure that people who are affected or have the potential to be affected by a policy or a technical decision get to have a say in the decision, in the process, or in coming to a decision, so that their rights &lt;/i&gt;— &lt;i&gt;the rights of the affected people — are assured. I think there should be some sort of equity, currently the way multistakeholderism is being carried out is that certain stakeholders carry much higher weight and I think that is something that needs to be addressed.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;YoungEum Lee&lt;/b&gt; from Korea National Open University (Korea)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;If multistakeholderism is a form of institutionalising participatory democracy, then it's good. But public policy decision making is only something that the representatives of people can do. For me, that's sacrosanct. When you're taking in views, in consultation, multistakeholderism works. But public policy decision-making, at a global level, has to be a multilateral process. However, it has to be embedded into a huge amount of public consultations, transparencies, accountabilities, etc., which could be a multistakeholder system. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Parminder Jeet Singh&lt;/b&gt; from IT for Change (ITFC) (India)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;I hate with a passion the concept of multistakeholderism. For me, how it can make sense is by recognising there are multiple stakeholders. And they’re not fixed. But issues affect different people in different ways and these people need to be involved in decision making processes. It's an approach that can potentially democratise processes by identifying who is affected by those processes and making sure they participate in them. But turning them into an -ism which is undifferentiated, which doesn't recognise conflict, power, voice, and that there are differences, makes it meaningless and also possibly dangerous.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Anriette Esterhuysen&lt;/b&gt; from the Association for Progressive Communications (APC) (South Africa)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This multistakeholderism thing I think is bullshit. We now a have a clear picture of technology as a whole being turned against its users, being turned into a tool for oppression, for control. And when you look at the most important struggles of the 20th century, whether women's rights or civil rights or gay rights, it never happened with a total global consensus. This is an illusion. What we need is to affirm that we citizens have the right to decide. We are the only stakeholders here, because we are the co-owners of the Internet as a public good.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jérémie Zimmermann&lt;/b&gt;, co-founder of La Quadrature du Net (France)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Everyone has to participate, and everyone has to decide what is the future of the Internet. I think that we need to improve our networks. There is no real answer here: for me it is very difficult to think of the kind of discussion we will have, but I know that my voice is probably useful for others who are in a similar situation to me. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pilar Saenz&lt;/b&gt; from the Karisma Foundation (Colombia)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Multistakeholderism means that we are going to smash the patriarchy. Ask me what the colour blue means?&lt;/i&gt; [Ok: What does the colour blue mean?] &lt;i&gt;The colour blue means we are going to smash the patriarchy.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jacob Appelbaum&lt;/b&gt;, journalist, activist and core member of the TOR Project (USA/Germany)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Ultimately rights are embedded in laws. But when it comes to an international framework, in the current Internet governance model, nothing is based in law, including the domain name system. So the whole structure of international Internet governance is divorced from international law, and that's why, when you talk of a multistakeholder model, what you are really saying is that the market will finally determine what happens. No stakeholder is going to operate against its own interest whether it be governments or corporations. We need an international legal framework, from which the powers - or rights - of Internet governance emerge. Without that you're leaving it to the market. In reality, even today, what we have is a private-sector-led multistakeholder model. &lt;/i&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Prabir Purkayastha&lt;/b&gt; from Knowledge Commons and the JustNet Coalition (India)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;What does multistakeholderism mean? Listen, I'm a brown person from a developing country, and I'm female.&lt;/i&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Anonymous&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-mundial-day-0'&gt;https://cis-india.org/internet-governance/blog/net-mundial-day-0&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>achal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-04-23T10:58:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/netizen-report">
    <title>Netizen Report: Transparency Edition</title>
    <link>https://cis-india.org/news/netizen-report</link>
    <description>
        &lt;b&gt;Global Voices Online has carried a feature story, "Netizen Report: Transparency Edition". We at CIS had filed an RTI application about website blocking. This is reflected in this article by Rebecca MacKinnon which was posted online on 7 November 2011.&lt;/b&gt;
        
&lt;p&gt;Here at Global Voices Advocacy we believe that transparency by governments and companies about how and when censorship and surveillance takes place is a base-line requirement if the Internet is ever to be governed in a manner that is compatible with free expression, dissent, and citizens' right to organize and assemble. Thus we applaud Google's latest &lt;a class="external-link" href="http://www.google.com/transparencyreport/"&gt;Transparency Report &lt;/a&gt;- the company's fourth such report detailing government requests for user data and content removal, as well as the traffic flows (or lack thereof) to Google webistes across the world since July 2009. The new data for &lt;a class="external-link" href="http://www.google.com/transparencyreport/governmentrequests/#2011-06"&gt;January-June 2011 &lt;/a&gt;contains more detail than in the past, including data on how Google responded to the requests and whether they were honored. The data comes with a list of caveats including that automated content removal is not logged and that some data cannot be released due to local law. Nonetheless, we hope that Google's data will provide an interesting snap shot of the state of Internet affairs and the data could be used to hold governments accountable to their censorship activities. We believe that if all Internet companies disclosed similar data, the world would be further on its way to being a better place. Many articles have been written analyzing the data. A few of them include:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;TechPresident: &lt;a class="external-link" href="http://techpresident.com/blog-entry/google-data-shows-government-internet-surveillance-far-outstrips-wiretap-requests"&gt;Google Data Shows Government Internet Surveillance Far Outstrips Wiretap Requests&lt;/a&gt;&lt;/li&gt;&lt;li&gt;WIRED: &lt;a class="external-link" href="http://www.wired.com/threatlevel/2011/10/google-data-requests"&gt;U.S. Requests for Google User Data Spike 29 Percent in Six Months&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Huffington Post:The 13 Countries That Request The Most User Data From Google&lt;/li&gt;&lt;li&gt;CNet: &lt;a class="external-link" href="http://www.huffingtonpost.com/2011/11/01/google-user-data-countries-requests_n_1070313.html"&gt;Google: Governments seek more about you than ever&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Adding to the publicly available data about censorship around the world, the Open Net Initiative has &lt;a class="external-link" href="http://opennet.net/blog/2011/11/oni-summarized-global-internet-filtering-data-now-available-download"&gt;released its research data on global Internet filtering&lt;/a&gt;, covering seventy-four countries.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Thuggery&lt;/strong&gt;: Read the latest news on GVA about bloggers jailed in Egypt, Syria, and Kuwait and spread the word.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Surveillance&lt;/strong&gt;: As &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/10/10/bluecoat-us-technology-surveilling-syrian-citizens-online/"&gt;GVA&lt;/a&gt; and others have recently reported, 13 Internet filtering devices produced by the California-based company Blue Coat have made their way to &lt;strong&gt;Syria&lt;/strong&gt;.&amp;nbsp;&lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970203687504577001911398596328.html"&gt; According to the Wall Street Journal&lt;/a&gt;, Blue Coat executives say that the company will not sell the devices to countries that are under embargo by the United States, and that the devices found in Syria had been sold to a dealer who claimed they were destined for Iraq.&lt;/p&gt;
&lt;p&gt;The Wall Street Journal has had several other items related to the role of companies in global surveillance, including a report on how China's Huawei &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204644504576651503577823210.html"&gt;has been peddling &lt;/a&gt;its mobile phone tracking and censoring equipment to &lt;strong&gt;Iran&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, Research in Motion &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052970204505304577001592335138870.html#ixzz1cxcl5IIg"&gt;has set up a facility &lt;/a&gt;in Mumbai to help the Indian government carry out lawful surveillance of its BlackBerry services including the messenger chat service, but the WSJ reports that India still has no method to intercept and decode BlackBerry enterprise email.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;Russia&lt;/strong&gt;, bloggers' influence &lt;a class="external-link" href="http://www.rferl.org/content/russian_bloggers_gain_prominence_kremlin_takes_notice/24357352.html"&gt;has apparently made the Kremlin nervous&lt;/a&gt;. Reporters Without Borders has condemned plans by the Russian government to deploy new software to track “extremist” content on the web, highlighting concerns about an over-broad definition of “extremist,” and the arbitrary and disproportionate approach to punishment and sanctions against websites. For more on the Russian Internet be sure to follow Global Voices' &lt;a class="external-link" href="http://globalvoicesonline.org/-/special/runet-echo/"&gt;Runet Echo Project&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Moving on the &lt;strong&gt;United States&lt;/strong&gt;, The Guardian has a &lt;a class="external-link" href="http://www.guardian.co.uk/technology/2011/nov/01/governments-hacking-techniques-surveillance"&gt;fascinating report &lt;/a&gt;on the super-secret Intelligence Support Systems World Americas conference held recently in Washington DC, at which surveillance professionals shared the latest surveillance technologies and innovations that they don't want you to know about. Hacktivist and friend of GVA &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2009/12/14/interview-with-jacob-appelbaum-from-tor/"&gt;Jacob Appelbaum &lt;/a&gt;managed to get in, but was thrown out.&lt;/p&gt;
&lt;p&gt;On a more positive note in the &lt;strong&gt;United States&lt;/strong&gt;, the Washington Post reports that since 2009 many Internet companies &lt;a class="external-link" href="http://www.washingtonpost.com/world/national-security/fbi-going-to-court-more-often-to-get-personal-internet-usage-data/2011/10/25/gIQAM7s2GM_story.html?wpisrc=nl_headlines"&gt;have been more assertive &lt;/a&gt;about challenging “national security letters” from the FBI requesting information about users.&lt;/p&gt;
&lt;p&gt;The Guardian reports that Civil liberties and privacy groups in the &lt;strong&gt;United Kingdom&lt;/strong&gt; &lt;a class="external-link" href="http://www.guardian.co.uk/uk/2011/oct/30/metropolitan-police-mobile-phone-surveillance"&gt;have raised concerns &lt;/a&gt;about the deployment by the London Metropolitan Police of a "covert &lt;a class="external-link" href="http://www.guardian.co.uk/uk/surveillance"&gt;surveillance&lt;/a&gt; technology that can masquerade as a mobile phone network, transmitting a signal that allows authorities to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.techdirt.com/articles/20111021/11554216450/eu-politician-wants-internet-surveillance-built-into-every-operating-system.shtml"&gt;Techdirt reports &lt;/a&gt;on the &lt;strong&gt;European Union&lt;/strong&gt;'s desire to have a “black box' built in to operating systems that would store a record of all of the computer's internet usage. The EU argues that this ability would be useful in cracking down on child pornography.&amp;nbsp; The system that the EU is looking at as a possible candidate for role of ‘black box' is called LogBox. &lt;a class="external-link" href="http://www.fabioghioni.net/blog/2011/10/20/internet-e-l%E2%80%99arbitrio-assoluto-sui-dati-dei-service-provider-presentata-al-parlamento-l%E2%80%99iniziativa-per-un-sistema-di-controllo-sotto-garante/"&gt;The developer of LogBox &lt;/a&gt;claims that the device is for preserving the freedoms and privacy of internet users, although Techdirt points out the fact that this device does little to ‘protect' the privacy of online users, it in fact, would make anonymous actions on the internet much more difficult and would provide governments and law enforcement a huge set of data on every internet user.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Censorship&lt;/strong&gt;: The chief executives of &lt;strong&gt;China&lt;/strong&gt;'s 39 top Internet, telecom, and computer companies &lt;a class="external-link" href="http://www.ft.com/cms/s/09d9a5ba-0886-11e1-9fe8-00144feabdc0,Authorised=false.html?_i_location=http%3A%2F%2Fwww.ft.com%2Fcms%2Fs%2F0%2F09d9a5ba-0886-11e1-9fe8-00144feabdc0.html&amp;amp;_i_referer=http%3A%2F%2Fadvocacy.globalvoicesonline.org%2F2011%2F11%2F07%2Fnetizenreport-transparency%2F#axzz1cxn3nQD5"&gt;have agreed to &lt;/a&gt;“strengthen self-control, self-restraint and strict self-discipline” in order to “contain the tendency of spreading online rumours, pornography, fraud and other illegal, harmful information on the internet.” The move comes amidst a &lt;a class="external-link" href="http://www.voanews.com/english/news/asia/China-to-Tighten-Controls-on-Internet-Social-Media-133062308.html"&gt;broader crackdown &lt;/a&gt;on &lt;a class="external-link" href="http://www.nytimes.com/2011/10/27/world/asia/china-imposes-new-limits-on-entertainment-and-bloggers.html?_r=1"&gt;the Internet and social media&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In &lt;strong&gt;India&lt;/strong&gt;, the Bangalore-based Centre for Internet and Society &lt;a href="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking" class="external-link"&gt;submitted a right to information request &lt;/a&gt;to the government's Department of Information Technology, asking for more information about website blocking. Based on &lt;a href="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="external-link"&gt;DIT's response &lt;/a&gt;the Centre observes that “The data provided by the government seemingly conflicts with the data released by the likes of Google." Their conclusion: "Either the DIT is not providing us all the relevant information on blocking, or is not following the law."&lt;/p&gt;
&lt;p&gt;Courts in &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.19/belgium-isp-blocking-pirate-bay"&gt;&lt;strong&gt;Belgium&lt;/strong&gt;&lt;/a&gt; and&lt;a class="external-link" href="https://torrentfreak.com/finnish-isp-ordered-to-block-the-pirate-bay-111026/"&gt; &lt;strong&gt;Finland&lt;/strong&gt; &lt;/a&gt;have ordered ISPs to block the Pirate Bay.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;U.S.&lt;/strong&gt; House Judiciary Committee has recently proposed a&lt;a class="external-link" href="http://judiciary.house.gov/hearings/pdf/112%20HR%203261.pdf"&gt; bill &lt;/a&gt;aimed at protecting intellectual property online that some critics describe as the &lt;a class="external-link" href="http://censorshipinamerica.com/2011/10/26/internet-censorship-protect-ip-renamed-e-parasites-act-would-create-the-great-firewall-of-america/"&gt;beginning of a "Great Firewall of America"&lt;/a&gt;.&lt;a class="external-link" href="https://www.eff.org/deeplinks/2011/10/disastrous-ip-legislation-back-%E2%80%93-and-it%E2%80%99s-worse-ever"&gt; The Electronic Frontier Foundation &lt;/a&gt;and others have detailed the bill's problems, including lack of due process, near certainty of over-blocking and abuse, imposition of excessive liability on Internet intermediaries, global legitimization of DNS censorship and potential fragmentation of the Internet, among other things. It is considered even worse than its evil fraternal twin in the Senate, the &lt;a class="external-link" href="https://secure.wikimedia.org/wikipedia/en/wiki/Protect_IP_Act"&gt;PROTECT IP Act &lt;/a&gt;which is also opposed by many tech companies and non-profit groups. Despite such opposition, the bill draws relatively &lt;a class="external-link" href="http://opinion.latimes.com/opinionla/2011/10/technology-a-bipartisan-attempt-to-regulate-the-internet.html"&gt;broad support from lawmakers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Net Neutrality: South Africa&lt;/strong&gt;n technology journalist Jan Vermeulen ran the &lt;a class="external-link" href="http://mybroadband.co.za/news/broadband/36728-how-much-does-your-isp-shape-your-downloads.html"&gt;M-Lab's Glasnost Test on South African ISP's&lt;/a&gt; to see whether their stated bandwith shaping policies match up with reality.&lt;/p&gt;
&lt;p&gt;The growth of bandwidth intensive internet applications in South Korea has made Net Neutrality &lt;a class="external-link" href="http://koreajoongangdaily.joinsmsn.com/news/article/Article.aspx?aid=2943014"&gt;an important issue there&lt;/a&gt;. &lt;strong&gt;South Korea&lt;/strong&gt;n ISP's are reporting that it is becoming increasingly difficult to maintain neutral practices with content. The three largest telecommunications companies in Korea are worried by the rise of &lt;a class="external-link" href="http://www.samsung.com/us/smarttv/index.html?cid=ppc_smt_goo_Smart+TV+-+Awareness_Smart+TV_smart+tv&amp;amp;K_CLICKID=5b86c4c9-6936-eac8-bbe5-00004db65f45"&gt;Smart TV's&lt;/a&gt;, which use Internet connections as opposed to traditional cable or satellite links to provide content. The ISP's want to charge companies varying amounts depending on the type and amount of content sent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Internet Governance&lt;/strong&gt;: ICANN held its &lt;a class="external-link" href="http://dakar42.icann.org/"&gt;42nd public meeting in Dakar, Senegal &lt;/a&gt;late last month. Wendy Seltzer &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/05/icann-why-the-registrar-accreditation-agreement-matters-for-free-speech/"&gt;reported here on GVA &lt;/a&gt;why the seemingly arcane debates about domain name registrar accreditation is important. Konstantinos Komaitis, an active member of ICANN's &lt;a class="external-link" href="https://community.icann.org/display/gnsononcomstake/Home"&gt;Non-Commercial Stakeholder Group &lt;/a&gt;(Global Voices is also a member),&lt;a class="external-link" href="http://www.komaitis.org/1/post/2011/10/icann-41-the-fight-over-multistakeholderism.html"&gt; describes the struggle &lt;/a&gt;that is taking place took place between governments and other ICANN stakeholders over whether some stakeholders are more equal than others within ICANN's multi-stakeholder governance model.&amp;nbsp; Kieren McCarthy at dotNext also has an&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/24/governments-registrars-fight"&gt; in-depth report and analysis &lt;/a&gt;on the clash between governments and registrars over law enforcement regarding domain names. Over at the Internet Governance Project Milton Mueller &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/11/6/4934244.html"&gt;takes an in-depth look &lt;/a&gt;at the politics surrounding the Non-Commercial Stakeholder Group and related constituencies, and the fight for civil society representation at ICANN.&lt;/p&gt;
&lt;p&gt;India has &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/article2604526.ece"&gt;published a formal proposal &lt;/a&gt;to put the UN in charge of overseeing Internet governance. For different analyses by three Internet governance wonks see&lt;a class="external-link" href="http://news.dot-nxt.com/2011/10/27/india-proposes-government-control-internet"&gt; Kieren McCarthy&lt;/a&gt;, &lt;a class="external-link" href="http://blog.internetgovernance.org/blog/_archives/2011/10/29/4929042.html"&gt;Milton Mueller&lt;/a&gt;, and &lt;a class="external-link" href="http://igfwatch.org/discussion-board/indias-proposal-for-a-un-committee-for-internet-related-policies-cirp#mlYafW43YceAy1o6AicM_g"&gt;Jeremy Malcolm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The International Telecommunications Union has approved a new protocol for relaying biometric information. The protocol is intended to enable doctors to communicate data about patients safely and is geared towards developing countries where the access to medical care in rural areas is poor and communication between clinics and doctors would provide better patient care. You can read the full &lt;a class="external-link" href="http://www.itu.int/ITU-T/newslog/Using+Telecommunication+To+Transfer+Biometric+Information.aspx"&gt;press release here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Netizen Power&lt;/strong&gt;: Lee Yoo Eun at Global Voices reports that the October 26th Seoul mayoral election was swayed by the use of twitter. Read the &lt;a class="external-link" href="http://globalvoicesonline.org/2011/10/27/south-korea-tweeting-elections-against-all-odds/"&gt;full article here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;African entrepreneur Herman Chinery-Hesse gave a speech at the Tech 4 Africa conference highlighting what the rise of Internet Communication Technologies has done for Africa.&amp;nbsp; A synopsis of his talk can be found on the Tech4Africa.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sovereigns of Cyberspace&lt;/strong&gt;: Facebook has introduced a &lt;a class="external-link" href="https://threatpost.com/en_us/blogs/facebook-testing-guardian-angels-feature-getting-locked-accounts-102811"&gt;new “guardian angel” feature &lt;/a&gt;to help users restore locked accounts.&lt;/p&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://www.edri.org/edrigram/number9.21/austrian-big-brother-awards-2011"&gt;13th Austrian Big Brother Awards &lt;/a&gt;were held on October 25th in Vienna. “Winners” included the CEO of Telekom Austria, the Ministers of Interior and Justice, and the head of the anti-terror police unit. Mark Zuckerberg received the “lifelong menace” award and a “Defender of Liberty” award went to the creators of the “&lt;a class="external-link" href="http://europe-v-facebook.org/"&gt;Europe versus Facebook&lt;/a&gt;” campaign.&lt;/p&gt;
&lt;p&gt;The&lt;a class="external-link" href="https://www.rightscon.org/"&gt; Silicon Valley Human Rights Conference &lt;/a&gt;was held in San Francisco in late October (see GVA's report, Jillian York's report, and The Economist's) and released the &lt;a class="external-link" href="http://www.rightscon.org/2011/10/silicon-valley-human-rights-standards/"&gt;Silicon Valley Standard&lt;/a&gt;, a set of 15 principles that technology companies should follow in order to protect human rights.&lt;/p&gt;
&lt;p&gt;China's Weibo &lt;a class="external-link" href="http://technode.com/2011/10/30/sina-weibo-launching-english-version-soon-with-the-partnership-of-flipboard-and-instagram/"&gt;plans to launch an English version &lt;/a&gt;in partnership with Flipboard and Instagram. Will they agree to follow the Silicon Valley Standard?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Security Alert&lt;/strong&gt;: The security researcher Barnaby Jack has found it possible to conduct a &lt;a class="external-link" href="http://www.infosecurity-magazine.com/view/21601/barnaby-jack-hacks-diabetes-insulin-pump-live-at-hacker-halted/"&gt;blind attack on insulin pumps&lt;/a&gt;.&amp;nbsp; While there have been no reports of anyone being harmed by such an attack, this highlights how far behind security technologies are when it comes to wireless devices that are embedded in critical infrastructure and medicine.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Publications&lt;/strong&gt;:&lt;a class="external-link" href="http://themonkeycage.org/blog/2011/10/22/digital-cameras-reduce-electoral-corruption/"&gt; Digital Cameras Reduce Electoral Corruption &lt;/a&gt;by Michael Callen and James Long.&lt;/p&gt;
&lt;p&gt;Events: Check out this &lt;a class="external-link" href="https://www.google.com/calendar/embed?src=openinternetdigest%40gmail.com&amp;amp;ctz=America/New_York"&gt;handy calendar of Internet-related events&lt;/a&gt; around the world, courtesy of Internews!&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Access Contested: Security, Identity, and Resistance in Asian Cyberspace&lt;/em&gt;, by the OpenNet Initiative, to be officially released in December. Part I of the book (including a chapter by yours truly) can be read online or downloaded &lt;a class="external-link" href="http://citizenlab.org/2011/09/access-contested-is-now-available/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note: This report was compiled with considerable help from Ted Eby and Weiping Li.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Read the original article &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2011/11/07/netizenreport-transparency/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/netizen-report'&gt;https://cis-india.org/news/netizen-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-09T04:31:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-voices-february-11-2016-netizen-report">
    <title>Netizen Report: The EU Wrestles With Facebook Over Privacy   </title>
    <link>https://cis-india.org/internet-governance/news/global-voices-february-11-2016-netizen-report</link>
    <description>
        &lt;b&gt;Global Voices Advocacy's Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights around the world. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post published in Global Voices on February 11, 2016 quotes Pranesh Prakash and Subhashish Panigrahi.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the latest development in the negotiations between the United States and European Union over data transfer rules, Reuters reports France’s data protection authority gave Facebook&lt;a href="http://www.reuters.com/article/us-facebook-france-privacy-idUSKCN0VH1U1"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;three months to stop tracking&lt;/span&gt;&lt;/a&gt; non-users’ Web activity without their consent, and ordered Facebook to cease some transfers of personal data to the United States or face fines. In response, Facebook asserted it does not use the now-defunct&lt;a href="https://en.wikipedia.org/wiki/International_Safe_Harbor_Privacy_Principles"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Safe Harbor&lt;/span&gt;&lt;/a&gt; agreement to move data to the United States and instead has set up alternative legal structures to keep its data transfers in line with EU law. Despite this, Facebook was forced last year to&lt;a href="http://venturebeat.com/2016/02/08/french-data-privacy-regulator-to-facebook-you-have-3-months-to-stop-tracking-non-users/"&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;stop tracking Belgian non-users&lt;/span&gt;&lt;/a&gt; after it was taken to court by the Belgian regulator. Last week, the United States and European Union agreed upon a new legal framework to replace Safe Harbor, but as it is not yet operational, several European data protection authorities are still deciding whether data transfers should be restricted.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Big Blow for Facebook’s Free Basics&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Indian regulators &lt;a href="http://inbministry.blogspot.in/2016/02/telecom-regulatory-authority-of-india.html"&gt;&lt;span&gt;officially banned “differential pricing”&lt;/span&gt;&lt;/a&gt;or discriminatory tariffs placed on data services depending on their content. This means that Internet users in India are guaranteed equal access to any website they want, regardless of how they connect to the Internet, &lt;a href="https://advox.globalvoices.org/2016/02/09/a-good-day-for-the-internet-everywhere-india-bans-differential-data-pricing/"&gt;&lt;span&gt;ays Global Voices’ Subhashish Panigrahi&lt;/span&gt;&lt;/a&gt;. The decision is a particular blow to Facebook’s Free Basics application, which uses differential pricing mechanisms to make accessing Facebook, WhatsApp and a limited number of other websites free to users who do not pay for mobile data plans. Though Facebook promotes the program as a means to increasing digital access, it has come under backlash in India and a number of other countries. Internet policy expert &lt;a href="https://twitter.com/pranesh/status/696732814083907584?ref_src=twsrc%5Etfw"&gt;&lt;span&gt;Pranesh Prakash emphasized&lt;/span&gt;&lt;/a&gt;that though the ruling is a win for open access in India, these efforts must continue until India is truly and equally connected.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Google’s new scheme to combat online extremism &lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In an effort to combat groups like ISIS that recruit online, Google has launched a&lt;a href="http://www.theguardian.com/uk-news/2016/feb/02/google-pilot-extremist-anti-radicalisation-information"&gt;&lt;span&gt;pilot scheme&lt;/span&gt;&lt;/a&gt;to point users who search for extremist terms toward anti-radicalization links. It announced the new effort on February 2 at a&lt;a href="http://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/home-affairs-committee/countering-extremism/oral/28376.html"&gt;&lt;span&gt; meeting&lt;/span&gt;&lt;/a&gt; with the U.K. Home Affairs Select Committee on Countering Extremism. Representatives of Twitter and Facebook were also challenged by members of Parliament on their role in combatting the spread of terrorist material. Twitter&lt;a href="http://www.nytimes.com/2016/02/06/technology/twitter-account-suspensions-terrorism.html"&gt;&lt;span&gt; announced&lt;/span&gt;&lt;/a&gt;that it had suspended 125,000 accounts associated with extremism since mid-2015 in response to pressure from the US government. However, as the New York Times’ Mike Isaac notes, “these companies must walk a fine line between bearing responsibility for their platforms and avoiding becoming the arbiter of what constitutes free speech.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;What’s going to happen to Ukraine’s database of ‘explicit content’?&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Ukrainian censorship body, National Expert Commission for Protection of Public Morality, dissolved last year, but its&lt;a href="https://globalvoices.org/2016/02/05/ukrainian-censors-explicit-content-database-is-up-for-grabs/"&gt;&lt;span&gt; legacy lives on&lt;/span&gt;&lt;/a&gt; as a database of “explicit content” that no one in the government seems to know what to do with. The database includes a sizeable amount of content “containing elements of sexual nature and erotica,” but the commission was also well known for its &lt;a href="http://www.mediaite.com/tv/ukraine-govt-wants-to-ban-spongebob-promotes-homosexuality/"&gt;&lt;span&gt;attempt to ban&lt;/span&gt;&lt;/a&gt; Spongebob Squarepants, Shrek, and Teletubbies. Users have suggested the team responsible for dissolving the commission make the content more widely available, so they can see where taxpayers’ money went.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;How to protect yourself from government hacking&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Hacking human rights workers, journalists, and NGOs has become &lt;a href="https://www.amnesty.org/en/latest/campaigns/2016/01/brief-history-of-government-hacking-human-rights-organizations/"&gt;&lt;span&gt;common practice &lt;/span&gt;&lt;/a&gt;for governments around the world, according to Amnesty International’s Morgan Marquis-Boire and Electronic Frontier Foundation’s Eva Galperin. In a post for Amnesty International, the two provide a brief history of government hacking and give suggestions for NGOs and human rights organizations to protect themselves.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Taking on Russia’s invasive surveillance &lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Two Russian Internet service providers are taking the Federal Security Service to court to&lt;a href="https://advox.globalvoices.org/2016/02/03/isps-take-kremlin-to-court-over-online-surveillance/"&gt;&lt;span&gt; challenge the surveillance system&lt;/span&gt;&lt;/a&gt; employed by Russian federal police to spy on Internet use. ISPs play a critical role in making surveillance possible, by installing expensive equipment that provides police access—making this case a significant affront to Russia’s invasive surveillance apparatus.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;strong&gt;Telegram in Iran&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Messaging app Telegram’s &lt;a href="http://www.theguardian.com/world/2016/feb/08/telegram-the-instant-messaging-app-freeing-up-iranians-conversations?CMP=share_btn_tw"&gt;&lt;span&gt;growing influence&lt;/span&gt;&lt;/a&gt; is being characterized as a major factor in the dissemination and spread of information leading up to Iran’s Feb. 26 parliamentary elections, but &lt;a href="https://globalvoices.org/2015/08/28/is-telegrams-compliance-with-iran-compromising-the-digital-security-of-its-users/"&gt;&lt;span&gt; the platform&lt;/span&gt;&lt;/a&gt;’s susceptibility to state manipulation is also becoming more apparent. After the arrest of former BBC journalist Bahman Doroshafaei, the government&lt;a href="https://motherboard.vice.com/read/iran-telegram-account-bbc-journalist"&gt;&lt;span&gt; took over his Telegram account&lt;/span&gt;&lt;/a&gt; and started to message his contacts. Some believe this was an effort to extract sensitive information or to distribute spyware. Fatemeh Shams, a friend of Doroshafaei, posted the following warning to her Facebook account:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;Someone has been talking to me for two hours from Bahman's hacked Telegram account and now is chatting with my friends with my account..If anyone messaged you on Telegram [from my account] please ignore it. I've lost access to my account.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;Mahsa Alimardani, &lt;/strong&gt;&lt;a href="https://advocacy.globalvoicesonline.org/author/ellery-roberts-biddle/"&gt;&lt;strong&gt;&lt;span&gt;Ellery Roberts Biddle&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;, Hae-in Lim and&lt;/strong&gt;&lt;a href="https://advocacy.globalvoicesonline.org/author/sarahbmyers/"&gt;&lt;strong&gt;&lt;span&gt; Sarah Myers West&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;contributed to this report.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-voices-february-11-2016-netizen-report'&gt;https://cis-india.org/internet-governance/news/global-voices-february-11-2016-netizen-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-02-27T07:39:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hardnewsmedia-august-10-2015-abeer-kapoor-net-neutrality-india-is-a-keybattle-ground">
    <title>Net Neutrality: India is a Keybattle Ground</title>
    <link>https://cis-india.org/internet-governance/news/hardnewsmedia-august-10-2015-abeer-kapoor-net-neutrality-india-is-a-keybattle-ground</link>
    <description>
        &lt;b&gt;Hardnews talks to Sunil Abraham, the executive director of the Centre for Internet and Society (CIS), about the future of the Internet in India.&lt;/b&gt;
        &lt;p id="stcpDiv" style="text-align: justify; "&gt;The article by Abeer Kapoor was &lt;a class="external-link" href="http://www.hardnewsmedia.com/2015/08/net-neutrality-india-keybattle-ground"&gt;published in Hardnews&lt;/a&gt; on August 10, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;There are competing definitions of net neutrality. What do you think an Indian definition of net neutrality should be?&lt;/b&gt;&lt;br /&gt;It should be driven by an empirical  understanding of the harms and benefits for Indian consumers. Any  regulation should be based on evidence of harm. Forbearance should be  the first option for any regulator. The second option is mandating  transparency. The third option, as (Managing Director of the World  Dialogue on Regulation for Network Economies Programme) William Melody  says, should be raising competition before we consider other more  intrusive regulatory measures such as price regulation, mandatory  registration and licensing, etc. Telling network administrators how to  run their networks should be the very last option we consider. Ideally,  the Competition Commission of India should have started an investigation  into the competition harms emerging from network neutrality violations.  There are other harms emerging from network neutrality violations, such  as free speech harms, diversity harms, innovation harms and privacy  harms. These residual elements should have been the focus of the TRAI  (Telecom Regulatory Authority of India) consultation paper process, the  DoT (Department of Telecommunications) panel process and the  consultations of the parliamentary standing committee.&lt;/span&gt;&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;There  are certain rights that are essential, like privacy. How do you think  the right to privacy will play into the definition of Indian net  neutrality?&lt;/b&gt;&lt;br /&gt;Deep packet inspection – which is a  method that is used to manage Internet traffic and walled garden access  via mobile applications – causes significant privacy harms and gives  rise to a range of security vulnerabilities. These cannot be directly  addressed in network neutrality policy. On privacy and security, it is  not clear that the Indian situation is different from the global trend,  so it is unlikely that we will have an India-specific privacy language  in our network neutrality policy.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Privacy harms caused by network  neutrality violations have to be addressed by enacting the privacy bill  into law. The Department of Personnel and Training (DoPT) has been  working on this Bill for the last five or six years. The latest draft  has implemented the recommendations of the Justice AP Shah Committee.  The last leak of the privacy Bill revealed that the DoPT has included  the nine principles identified by the &lt;span&gt;&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Shah Committee Report on Privacy&lt;/a&gt;&lt;/span&gt;.  We hope that the government will introduce this Bill at the earliest.  Section 43A of the IT Act may also need to be amended to address all the  nine privacy principles.&lt;/span&gt;&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;The  report drafted by DoT on net neutrality is ambiguous and almost  reluctant to take a stand. What are the key points of this report?&lt;/b&gt;&lt;br /&gt;The &lt;span&gt;&lt;a href="https://mygov.in/sites/default/files/master_image/Net_Neutrality_Committee_report.pdf"&gt;DoT panel report&lt;/a&gt; &lt;/span&gt;does  take a stand. It clearly identifies network neutrality as a policy  goal. Unfortunately, the panel did not provide its own definition of  network neutrality, but instead quoted a definition submitted by civil  society activists who testified before it without explicitly adopting  it. The panel report examines zero rating and legitimate traffic  management in quite a bit of detail and does prescribe some regulatory  decision trees to the policymakers. When it comes to specialised  services and walled gardens there could have been more detailed and  specific recommendations. The biggest disappointment in the report is  the call for licensing of those OTT (Over the Top) service providers  that provide equivalent services to those provided by telcos. While the  need to address regulatory arbitrage from the perspective of privacy and  surveillance law may be virtuous, it may not be technically feasible to  do so, especially if there is end-to-end encryption. Also, regulatory  arbitrage could be addressed by reducing regulations for telcos rather  than increasing them for &lt;/span&gt;&lt;span&gt;OTT providers.&lt;/span&gt;&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Do you think licensing and regulation of OTT services such as Google and WhatsApp are a necessity?&lt;/b&gt;&lt;br /&gt;It is a myth that they exist in a  regulatory vacuum. Many regulations do apply to them and a few of them  do comply with Indian authorities on issues like speech regulation,  legal interception and also data access. With competition law and  taxation there is very little compliance. The trouble is not that there  are regulatory vacuums, but rather that these services operate from  foreign jurisdictions. Without offices, servers and human resources  within the Indian jurisdiction it is very difficult for the courts to  implement their orders, and for law enforcement to ensure compliance  with Indian laws. This jurisdictional challenge affects most developing  countries and not just India, and can only be solved by harmonising  procedural and substantive law across jurisdictions, through the spread  of soft norms, development of self-regulatory mechanisms using the  multi-stakeholder models and through the creation of international law  through various multilateral and pluri-lateral bodies.&lt;/span&gt;&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;The report reduces the neutrality debate to ‘access.’ Do you think this approach is reductive?&lt;/b&gt;&lt;br /&gt;Access is very important in the  Indian context so I don’t see how that is reductive. Many observers  believe that the next round in the war for network neutrality will  happen in the global South. India is a key battleground – what happens  here will have global impact and implications. Network neutrality  policies need to consider free speech, privacy, competition, diversity  and innovation goals of the markets they seek to regulate. If we are not  being doctrinaire about network neutrality we could adopt what  (Professor of Internet &amp;amp; Media Law at the University of  Sussex) Chris Marsden calls forward-looking “positive net neutrality”  wherein “higher QoS (Quality of Service) for higher prices should be  offered on fair, reasonable and non-discriminatory [FRAND] terms to all  comers”. FRAND, according to Prof. Marsden, is well understood by the  telcos and ISPs (Internet Service Providers) as it is the basis of  common carriage. This understanding of network neutrality allows for  technical and business model innovation by ISPs and telcos without the  associated harms. There are zero-rating services being launched  by Mozilla, Jaana, Mavin and others that are attempting to do this. I do  not believe that they violate network neutrality principles, unlike  Airtel Zero or Internet.org.&lt;/span&gt;&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;While  this report attempts to arrive at a middle ground between the TSPs and  the OTTs, how is this going to reflect in the government’s ‘Digital  India’ programme?&lt;/b&gt;&lt;br /&gt;We know we have a policy solution  when all stakeholders are equally unhappy. But we also need an elegant  solution that is easy to implement. Scholars like (Associate Professor  of Computer Science at Columbia University) Vishal Mishra have a  theoretical solution based on the Shapley Value, that assumes a  multi-sided market model, but this may not work in real life. Professor  V. Sridhar of the International Institute of Information Technology,  Bengaluru (IIITB) has a very elegant idea of setting a ceiling and floor  for price and speed and also for insisting on a minimum QoS of the  whole of the Internet. These ideas I have not heard in the American and  European debate around network neutrality. I remain hopeful that the  Indian middle ground will be qualitatively different, given that the  structure and constraints of the Indian telecom sector are very  different from that in developed countries. Ensuring network neutrality  is essential to the success of Digital India. Unfortunately, the Digital  India plans that we have heard so far don’t make this &lt;/span&gt;&lt;span&gt;explicitly clear.&lt;/span&gt;&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;The  Internet was never meant to be monetised. Do you think that private  players are eating into a public good that is absolutely necessary for  development?&lt;/b&gt;&lt;br /&gt;I have never heard that statement before. &lt;a href="http://www.hardnewsmedia.com/2011/06/3992"&gt;&lt;span&gt;The Internet&lt;/span&gt;, &lt;span&gt;after its early history, has been completely built using private capital&lt;/span&gt;&lt;/a&gt;.  The public Internet has always been monetised. Collectively, the  individual entrepreneurs and enterprises that build and run the  components of the Internet have created a common public good – which is  the globally interconnected network. But the motivation for private  capital behind maintaining and building their corner or component of  this network has also been profit maximisation.&lt;/span&gt;&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;What has contributed to the growing need to regulate and administer the Internet?&lt;/b&gt;&lt;br /&gt;Technical advancements and business  model innovations have resulted in both benefits and harms and therefore  there could be a rationale for regulation. But more regulation per se  is not a virtue and does not serve the interest of citizens and  consumers. Expanding the regulatory scope of government infinitely will  only result in failure, given the limited capacity and resources of the  State. Therefore, whenever the State enters a new area of regulation it  should ideally stop regulating in another area. In other words, there is  no clear case that the regulation of the Internet is needed to keep  growing exponentially – as evolving technologies may require specific  regulation – if the resultant harms cannot be addressed using existing  law. In most cases, traditional law is sufficient to deal with crimes  and offences online.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;This story is from the print issue of Hardnews: August 2015&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hardnewsmedia-august-10-2015-abeer-kapoor-net-neutrality-india-is-a-keybattle-ground'&gt;https://cis-india.org/internet-governance/news/hardnewsmedia-august-10-2015-abeer-kapoor-net-neutrality-india-is-a-keybattle-ground&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-20T07:08:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/himal-south-asian-laxmi-murthy-net-nanny-meets-muscular-law">
    <title>Net nanny meets muscular law</title>
    <link>https://cis-india.org/internet-governance/news/himal-south-asian-laxmi-murthy-net-nanny-meets-muscular-law</link>
    <description>
        &lt;b&gt;India’s new human-trafficking bill could criminalise sex workers and curtail free speech.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Laxmi Murthy was published in &lt;a class="external-link" href="http://himalmag.com/net-nanny-meets-muscular-law-india-trafficking-of-persons-bill-2018/"&gt;Himal South Asian&lt;/a&gt; on September 26, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When conservative morality is armed with the law and prejudice is  given legal validity, the state is transformed into a wet nurse cum  security guard. The Trafficking of Persons (Prevention, Protection and  Rehabilitation) Bill 2018, passed on 26 July in the lower house of the  Indian Parliament, represents a growing trend of increased state  surveillance and control, and a carceral approach to dealing with  non-compliance with overbroad and vague laws laced with prudery.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Trafficking in persons, as defined by the United Nations, is “the  recruitment, transportation, transfer, harbouring or receipt of persons”  by coercion, deception or the abuse of power or position for the  purpose of exploitation. Human trafficking is considered to be a form of  modern-day slavery and is outlawed in most countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the ratification of the United Nations Convention for the  Suppression of the Traffic in Persons and of the Exploitation of the  Prostitution of Others in 1949, India enacted the Suppression of Immoral  Traffic in Women and Girls Act 1956. However, nowhere was trafficking  clearly defined in the law. The acronym of this law, SITA, seemingly  deliberately modelled after Sita, the chaste wife of Rama from the epic  Ramayana, reinforced the moralism already codified into law. Moving from  suppression to prevention of ‘immoral’ trafficking took three decades,  but the Immoral Traffic (Prevention) Act (ITPA), as the act was renamed  in 1986, continued to prioritise morality over human rights, focusing  its attention on raiding brothels and “rescuing and rehabilitating” sex  workers, whether or not they wanted such intervention. Though sex work  is not illegal per se in India – with some notable exceptions with  respect to soliciting in public places – the ITPA views consensual adult  sex work as a misnomer and approaches all women in sex work as victims  in need of rescue. This ultimately criminalises even consenting adult  sex workers by treating solicitation, brothel ownership and procurement  as criminal activity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the 2018 trafficking bill has been drafted with this  very mindset, and goes on to widen the scope to cover “aggravated” forms  of trafficking, including trafficking for the purpose of forced labour,  begging, trafficking by administering chemical substance or hormones  for early sexual maturity among other things. It also includes in its  ambit trafficking for the purpose of surrogacy, at a time when questions  around commercial surrogacy and consent of surrogates have yet to be  settled in Indian law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bill also aims to unify existing criminal law provisions on  trafficking. The definition of trafficking in the Indian law is drawn  primarily from Section 370 of the Indian Penal Code (IPC), which  includes ‘any act’ of physical exploitation, sexual exploitation,  slavery or practices similar to slavery and servitude. Trafficking under  this bill also includes begging and domestic work. However, critics of  the bill, including a collective of sex-worker-rights groups and  organisations working with bonded labour, children and adolescents under  the banner of the Coalition for an Inclusive Approach on the  Trafficking Bill, say that the bill, with its criminalised approach,  will further stigmatise sex workers, transgender persons and beggars.  The supposed ‘victims’ of trafficking would, therefore, be forcibly  rescued, rehabilitated and repatriated, and denied their chosen  residence as well as their means of livelihood. The elaborate  anti-trafficking bureaucracy to be set up at district, state and  national levels seems unwieldy and without representation of the  communities it purports to protect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cross-purposes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The anti-trafficking bill embodies a constitutional conundrum: in  attempting to fulfil the mandate under Article 23 of the Constitution –  to protect persons from exploitation inherent in human trafficking – it  can potentially violate fundamental freedoms, in particular, the freedom  of speech and expression, a core protection guaranteed by Article 19.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Section 39 (2) of the bill, “Whoever solicits or  publicises electronically, taking or distributing obscene photographs or  videos or providing materials or soliciting or guiding tourists or  using agents or any other form which &lt;i&gt;may&lt;/i&gt; lead to the trafficking of a person &lt;i&gt;shall&lt;/i&gt; be punished (emphasis added)”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision, while intending to criminalise online soliciting,  casts a wide net and prescribes penalties – rigorous imprisonment for a  term of five to ten years and a fine between INR 50,000 (USD 700) and  INR 100,000 (USD 1400) – for vaguely defined acts which may lead to  trafficking. It is not necessary, as per this provision, to prove a  direct causal link between these acts – such as distributing obscene  photographs or providing materials – and the actual crime of  trafficking. Such a broad brush is highly problematic and violates  well-established tenets of criminal jurisprudence which require criminal  intention (&lt;i&gt;mens rea&lt;/i&gt;) along with the actual criminal act (&lt;i&gt;actus reus&lt;/i&gt;).  That is, a criminal act must be accompanied by a criminal intention.  Without any burden to prove a causal link, anything deemed to  potentially lead to trafficking can be proscribed – for example, any  artistic work, academic publication or cinematic representation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sexually explicit content – text, audio and visual – has evoked  deeply contentious opinions right from the time of the Kamasutra and the  erotic sculptures of the Khajuraho temples. There is no one single  position on pornography or obscenity among feminists, despite their  shared concern about enhancing women’s rights and stopping exploitation.  On the one hand, American feminist Robin Morgan’s famous pronouncement  back in 1974, that pornography is the theory and rape is the practice,  implying that pornography was directly responsible for violence and  sexual abuse of women, influenced early feminists the world over, and  continues to hold sway among sections of women’s rights advocates.  However, while images undoubtedly impact on the human psyche, the causal  links between pornography and rape are not established firmly enough to  warrant censorship and bans. On the other hand, sex-positive feminists  who celebrate varied expressions of sexual desire, especially female  sexuality, advocates of feminist pornography (which is not seen as a  contradiction in terms), adult entertainers and sex workers have  practiced and theorised sexual desire and its many manifestations in  ways that are undergirded by consent, respect, agency and autonomy, but  not necessarily confined to contemporary social mores. Conversations  around sexuality and desire have moved beyond criminalisation of what is  considered deviant, but echoes of these conversations do not seem to  have been heard in the corridors of the Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the prevalent moral disapproval of pornography and adult  entertainment, the phrase “taking or distributing obscene photographs or  videos or providing materials” can easily be misinterpreted as leading  to trafficking. The word ‘obscene’ is itself too subjective and  culturally loaded a term to withstand rigorous legal scrutiny. It is a  no-brainer that deciding what is aesthetically pleasing erotica and what  is unacceptable pornography is in the eye of the beholder and is,  therefore, subjective. Where there is no requirement to prove intention,  or &lt;i&gt;mens rea&lt;/i&gt;, any image or video deemed to be obscene can be  censored. This could bring into its ambit online material, articles,  literature, magazines as well as artists and their work, and consenting  adult sexual interactions in the digital space including adult dating  apps like Tinder or OkCupid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was only as recently as 2014 that India’s Supreme Court jettisoned  the archaic Hicklin Test, which was developed in an 1868 case in  England to determine whether specific material could “deprave and  corrupt those whose minds are open to such influences”. This outdated  standard was applied, for instance, in the landmark case of &lt;i&gt;Udeshi v State of Maharashtra&lt;/i&gt; in 1964 to uphold the ban on the D H Lawrence classic &lt;i&gt;Lady Chatterley’s Lover&lt;/i&gt; and to convict Ranjit Udeshi, a bookseller, under Section 292 of the IPC for distributing “obscene” material.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Half a century on, in 2014, Anand Bazaar Patrika, publishers of &lt;i&gt;Sportsworld&lt;/i&gt;,  a magazine which reprinted a nude photograph of tennis champion Boris  Becker and his fiancée, won the case in the apex court which rejected  the Hicklin Test. However, the court adopted a ‘community standards’  test derived from the 1957 &lt;i&gt;Roth v United States&lt;/i&gt; case that  determined what was obscene and was, therefore, unprotected by the First  Amendment to the American Constitution that protects freedom of speech.  The ‘community standards’ test has itself been challenged for its  vagueness, since what is considered to have social importance is itself  variable. In addition, the Supreme Court in the &lt;i&gt;Sportsworld&lt;/i&gt; case allowed the nude photograph because, in the court’s view, it did not have “&lt;i&gt;a tendency to arouse feeling or reveal an overt sexual desire”. The nude photograph of a white-skinned Becker with &lt;/i&gt;his  dark-skinned fiancée was deemed to be in the public interest, as its  intention was to cast a spotlight on racism and apartheid. However, the  justification that the photo did not arouse sexual desire and was,  therefore, acceptable, is both highly subjective and problematic in its  criminalisation of sexual desire, in that it allows – without any  evidence whatsoever – the dangerous possibility of nudity having a  causal effect on violence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Stormy seas and safe harbours&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Trafficking Bill 2018 in its “offences related to media” chapter,  continues in its inexorable march towards criminalisation on the basis  of vague definitions. According to Section 36, a person is said to be  engaged in trafficking of person even if that person “advertises,  publishes, prints, broadcasts or distributes, or causes the  advertisement, publication, printing or broadcast or distribution by any  means, including the use of information technology or any brochure,  flyer or any propaganda material that promotes trafficking of person or  exploitation of a trafficked person in any manner.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, since “promoting trafficking or exploitation” has not been  clearly defined, it makes room for different interpretations of  liability. There is little in this provision that attempts to impose a  clear, rigorous standard of evidence that could demonstrate direct  cause. The Bengaluru-based non-profit Centre for Internet and Society  (CIS) cautions that, under this clause, the likelihood of authors of  adult material, videographers, filmmakers and internet sites being  charged with promoting trafficking or exploitation is quite high, since  the clause might build a legal link between hosting or producing  pornography and trafficking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clamping down on internet freedom on the basis of obscenity is not  new. In July 2015, the government banned 857 websites that it considered  pornographic. This followed the &lt;i&gt;Kamlesh Vaswani&lt;/i&gt; case in the  Supreme Court where the then chief justice of India expressed his  inability to order a ban as it would go against the right to personal  liberty guaranteed in Article 21 of the Constitution. In their  submission challenging the ban, and underlining the subjectivity in  viewing and interpreting content, the Internet Service Providers  Association of India (ISPAI) said, “one man’s pornography is another  man’s high art”, making it impossible for them to ban any sites. The  ISPs were later told that they should ban only sites showing child  pornography, but they submitted that they neither created content nor  owned it and that it was not possible for them to view content before  hosting it. And therein lies one of the most controversial features of  the trafficking bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most pernicious provision of the bill, Section 41 (2), displays a  complete lack of understanding of the manner in which the digital space  functions. The section penalises anyone who “distributes, or sells or  stores, in any form in any electronic or printed form showing incidence  of sexual exploitation, sexual assault, or rape for the purpose of  exploitation or for coercion of the victim or his family members, or for  unlawful gain.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the CIS critique of the bill points out, digital infrastructure  requires third party intermediaries to handle information during  transmission, storage or display. As it is not always desirable or even  practically possible to verify the legality of every bit of data that  gets transferred or stored by the intermediary, the CIS points out, the  law provides ‘safe harbours’ to protect intermediaries from liability,  ensuring that entities that act as architectural requirements and  intermediary platforms are able to operate smoothly and without fear. It  must be noted that users who upload and initiate transfer of  information online, are not always the same parties who are directly  involved in transmission of content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, immunity from liability or a ‘safe harbour’ for  intermediaries involved with transmission or temporary storage of  content is currently provided by Section 79 of the Information  Technology Act 2000 (IT Act), on condition that they: (i) act as a mere  ‘conduit’ and do not initiate the transmission, select the receiver of  the transmission, or select or modify the information contained in the  transmission and (ii) exercise due diligence, which has been defined  under the law. The provision for safe harbours has also been tested in  court, notably in the case of the virtual market Baazee.com (later  acquired by eBay), which had hosted an advertisement for an ‘obscene’  video for two days before it was taken down. The court held that the IT  Act would prevail over the IPC, and the managers could not be held  liable for the content of the advertisement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With Section 59 of the proposed trafficking bill set to override  existing legislation, the provision of safe harbours under the IT Act  will be in jeopardy. Notably, this move to prosecute internet  intermediaries is in keeping with a worldwide trend. In April 2018, the  United States President Donald Trump signed into law two controversial  pieces of legislation aimed to tackle human trafficking online, which  have grave implications for free speech. The US Congress bill, the Fight  Online Sex Trafficking Act (FOSTA), and the Senate bill, the Stop  Enabling Sex Traffickers Act (SESTA), have been welcomed by some as a  victory for victims of sex trafficking. Alarmingly, however, the bills,  better known by their acronyms FOSTA-SESTA, create an exception to the  safe harbour rule, ie Section 230 of the 1996 Communications Decency Act  (CDA). This provision, which is regarded as a landmark protection, says  “no provider or user of an interactive computer service shall be  treated as the publisher or speaker of any information provided by  another information content provider.” For over two decades, in the  spirit of actualising the immense potential of the digital space to  share information, ideas and opinions, this section has provided  immunity for intermediaries, allowing users to freely generate content  without making platforms and ISPs accountable for such content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under FOSTA-SESTA, however, websites are liable to be penalised for  advertisements promoting consensual adult sex work, dating or escort  services (such as Backpage.com or Craigslist) which could be deemed to  promote trafficking. Sex-worker-rights activists in the US posit that  such an unwarranted clampdown on these avenues through which adult sex  workers could safely screen clients and avoid potentially dangerous  situations, is putting them at risk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the protests against the impact of FOSTA-SESTA on the  internet and free expression, parliamentarians in the United Kingdom  seem set to follow a similar regulatory route. An All-Party  Parliamentary Group (APPG) on Prostitution and the Global Sex Trade in  July 2018 called for a ban on “prostitution websites”, by which they  mean virtual advertising sites such as Vivastreet and Adultwork which  host adult advertisements. Anticipating the same fallout as in the US,  Amnesty UK tweeted, “Taking down these platforms will push sex workers  deeper underground exposing them to greater risks of violence,  exploitation and trafficking.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Beyond criminalisation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Interpol, trafficking in human beings is a  multi-billion-dollar international criminal industry, which is usually  carried out for forced labour, sexual exploitation or for harvesting of  tissue, cells and organs. Despite this recognition of the different  motives for trafficking, the crime has largely been linked – in the  popular imagination, media and, unfortunately, even law enforcement – to  sexual exploitation. The thrust of anti-trafficking efforts in India,  post-Independence, set the stage for decades of human-rights violations  in the name of anti-trafficking, using an ineffective law that penalised  victims more than traffickers. The proposed bill, with its  ill-conceived criminalised regime, is likely to do more harm than good,  and give rise to a repressive regime that is not in the interests of  marginalised populations most vulnerable to traffickers. Not only is the  bill unlikely to make any dent in the organised trafficking networks,  but the fallout of its provisions policing the internet is also likely  to hamper freedom of expression and consensual, adult sexual activity  mediated through the digital space.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/himal-south-asian-laxmi-murthy-net-nanny-meets-muscular-law'&gt;https://cis-india.org/internet-governance/news/himal-south-asian-laxmi-murthy-net-nanny-meets-muscular-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-02T05:48:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way">
    <title>Net Freedom Campaign Loses its Way</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way</link>
    <description>
        &lt;b&gt;A recent global meet was a victory for governments and the private sector over civil society interests.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindubusinessline.com/todays-paper/tp-opinion/net-freedom-campaign-loses-its-way/article5994906.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on May 10, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;One word to describe NetMundial: Disappointing! Why? Because despite the promise, human rights on the Internet are still insufficiently protected. Snowden’s revelations starting last June threw the global Internet governance processes into crisis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Things came to a head in October, when Brazil’s President Dilma Rousseff, horrified to learn that she was under NSA surveillance for economic reasons, called for the organisation of a global conference called NetMundial to accelerate Internet governance reform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NetMundial was held in São Paulo on April 23-24 this year. The result was a statement described as “the non-binding outcome of a bottom-up, open, and participatory process involving … governments, private sector, civil society, technical community, and academia from around the world.” In other words — it is international soft law with no enforcement mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement emerges from “broad consensus”, meaning governments such as India, Cuba and Russia and civil society representatives expressed deep dissatisfaction at the closing plenary. Unlike an international binding law, only time will tell whether each member of the different stakeholder groups will regulate itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, not easy, because the outcome document does not specifically prescribe what each stakeholder can or cannot do — it only says what internet governance (IG) should or should not be. And finally, there’s no global consensus yet on the scope of IG. The substantive consensus was disappointing in four important ways:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass surveillance&lt;/b&gt; : Civil society was hoping that the statement would make mass surveillance illegal. After all, global violation of the right to privacy by the US was the &lt;i&gt;raison d'être&lt;/i&gt; of the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the statement legitimised “mass surveillance, interception and collection” as long as it was done in compliance with international human rights law. This was clearly the most disastrous outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to knowledge:&lt;/b&gt; The conference was not supposed to expand intellectual property rights (IPR) or enforcement of these rights. After all, a multilateral forum, WIPO, was meant to address these concerns. But in the days before the conference the rights-holders lobby went into overdrive and civil society was caught unprepared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The end result — “freedom of information and access to information” or right to information in India was qualified “with rights of authors and creators”. The right to information laws across the world, including in India, contains almost a dozen exemptions, including IPR. The only thing to be grateful for is that this limitation did not find its way into the language for freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediary liability:&lt;/b&gt; The language that limits liability for intermediaries basically provides for a private censorship regime without judicial oversight, and without explicit language protecting the rights to freedom of expression and privacy. Even though the private sector chants Hillary Clinton's Internet freedom mantra — they only care for their own bottomlines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Net neutrality:&lt;/b&gt; Even though there was little global consensus, some optimistic sections of civil society were hoping that domestic best practice on network neutrality in Brazil’s Internet Bill of Right — also known as Marco Civil, that was signed into law during the inaugural ceremony of NetMundial — would make it to the statement. Unfortunately, this did not happen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For almost a decade since the debate between the multi-stakeholder and multilateral model started, the multi-stakeholder model had produced absolutely nothing outside ICANN (Internet Corporation for Assigned Names and Numbers, a non-profit body), its technical fraternity and the standard-setting bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The multi-stakeholder model is governance with the participation (and consent — depending on who you ask) of those stakeholders who are governed. In contrast, in the multilateral system, participation is limited to nation-states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil society divisions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inability of multi-stakeholderism to deliver also resulted in the fragmentation of global civil society regulars at Internet Governance Forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in the run-up to NetMundial more divisions began to appear. If we ignore nuances — we could divide them into three groups. One, the ‘outsiders’ who are best exemplified by Jérémie Zimmermann of the La Quadrature du Net. Jérémie ran an online campaign, organised a protest during the conference and did everything he could to prevent NetMundial from being sanctified by civil society consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the ‘process geeks’ — for these individuals and organisations process was more important than principles. Most of them were as deeply invested in the multi-stakeholder model as ICANN and the US government and some who have been riding the ICANN gravy train for years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even worse, some were suspected of being astroturfers bootstrapped by the private sector and the technical community. None of them were willing to rock the boat. For the ‘process geeks’, seeing politicians and bureaucrats queue up like civil society to speak at the mike was the crowning achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the ‘principles geeks’ perhaps best exemplified by the Just Net Coalition who privileged principles over process. Divisions were also beginning to sharpen within the private sector. For example, Neville Roy Singham, CEO of Thoughtworks, agreed more with civil society than he did with other members of the private sector in his interventions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, the ‘outsiders’ couldn't care less about the outcome and will do everything to discredit it, the ‘process geeks’ stood in ovation when the outcome document was read at the closing plenary and the ‘principles geeks’ returned devastated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the multi-stakeholder model to survive it must advance democratic values, not undermine them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This will only happen if there is greater transparency and accountability. Individuals, organisations and consortia that participate in Internet governance processes need to disclose lists of donors including those that sponsor travel to these meetings.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way'&gt;https://cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-27T11:07:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf">
    <title>NCAER Parallel Imports Report</title>
    <link>https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf'&gt;https://cis-india.org/a2k/blogs/ncaer-parallel-imports-report.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-04-01T10:39:46Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report">
    <title>National workshop on Web Accessibility - Thiruvananthapuram (Report)</title>
    <link>https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report</link>
    <description>
        &lt;b&gt;The third National Workshop on Web Accessibility for Web developers was organised by CIS at Thiruvananthapuram in collaboration with SPACE. 
&lt;/b&gt;
        
&lt;p&gt;(CIS) and &lt;em&gt;&lt;a href="http://www.space-kerala.org/"&gt;Society for
Promotion of Alternative Computing and Employment&lt;/a&gt;&lt;/em&gt;  (SPACE)
organized a workshop on web accessibility for web developers from the
public and private sector on September 25 to 26, 2009. The workshop
took place at &lt;strong&gt;Christ Nagar International School&lt;/strong&gt;,
Kowdiar, Thiruvananthapuram.&lt;/p&gt;
&lt;h3&gt;About the
Host Organizations&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="https://cis-india.org/"&gt;The Centre for Internet
and Society&lt;/a&gt;&lt;/em&gt; &lt;br /&gt;The Centre for Internet and Society (CIS) is
a Bangalore based non-profit, bringing together a team of
practitioners, theoreticians, researchers and artists to work on the
emerging field of Internet and Society in order to critically engage
with concerns of digital pluralism, public accountability and
pedagogic practices, with particular emphasis on South-South
dialogues and exchange. We focus on areas such as Anonymity/Privacy,
Censorship, Surveillance, Free and Open Source Software, Open
Standards, Open Access, Family, Sexual practices, Addiction,
Intellectual Property Rights and Trade, Piracy, ICT4D, Digital and
Participation Divide and Digital Communities and Movements.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;a href="http://www.space-kerala.org/"&gt;Society For Promotion
of Alternative Computing and Employment&lt;/a&gt;&lt;/em&gt; &lt;br /&gt;Society For
Promotion of Alternative Computing and Employment (SPACE) is a
registered society that has members from academia, the IT industry,
professional societies such as IEEE and Computer Society of India,
and the IT Administration of the Government of Kerala. The vision of
SPACE is to promote the use of Free and Open Source Software (FOSS)
in academics, governance, corporate and individual use, and to
support the use FOSS for employment generation in Kerala. The primary
thrust are of the intervention are:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Promote the use of FOSS in the
	public, private, and governmental sectors as well as for
	personal/home use&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Develop a model for FOSS- based
	employment generation that is appropriate to Kerala's context, by
	identifying appropriate business opportunities and providing support
	services including training and micro business incubation&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Carry out R &amp;amp; D activities for
	the development of essential prototypes that bridge existing gaps in
	software, so as to enable widespread use of FLOSS&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Ensure that Kerala is able to develop sufficient numbers of
	high-quality human resources in the FLOSS domain&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.itmission.kerala.gov.in/"&gt;Kerala
State IT Mission&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Kerala State Information Technology Mission (KSITM) is a Society
registered under the Travancore Cochin Literary Scientific &amp;amp;
Charitable Societies Registration Act. It is an autonomous nodal IT
implementation agency for Department of Information Technology,
Government of Kerala which provides managerial support to various
initiatives of the Department.&lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;About the
Resource Persons&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Rahul Gonsalves&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;Rahul has
been building accessible websites since 2005 (sample work at
&lt;a href="http://rahulgonsalves.com/projects/"&gt;http://rahulgonsalves.com/projects/&lt;/a&gt;
[1] ). He has been activiely involved in promoting web and
accessibility standards. He spoke at the first international
accessibility and technology conference in India, Techshare 2008,
where he made out a case for accessibility and conducted a workshop
on retrofitting accessibility to existing websites, a concern for
most large institutions with an existing online presence (slides
available at
&lt;a href="http://www.barrierbreak.com/events-conference/techshare_presentations2008.php#track3"&gt;http://www.barrierbreak.com/events-conference/techshare_presentations200...&lt;/a&gt;
[2])&lt;/p&gt;
&lt;p&gt;In September 2008, he presented a paper examining ways in
which People with various impairments - both physical and mental -
engage with online content, and demonstrated practical ways in which
authors can make online content accessible at the National Conference
on ICT for Differently Abled People. He is a supporter of the push
for having a national policy for governing electronic accessibility
in India.&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;strong&gt;Srinivasu
Chakravartula&lt;/strong&gt;&lt;br /&gt;Srinivasu Chakravarthula - graduated in
Computer Science and is certified in 'assistive technologies'. He
started his career as Head of the Braille Production Unit at National
Association for the Blind, Bangalore. He then moved on and taught
Computer Science at the Manik Public School, Bidar and also set up
the Computer Training Centre at Hyderabad and Maniknagar, Bidar.&lt;/p&gt;
&lt;p&gt;In the year 2005, he began to specialize in accessibility and
started working for Net Systems Informatics and its subsidiary -
BarrierBreak Technologies, Mumbai. During his stint at Net Systems,
he was instrumental in setting up an accessibility process, imparting
accessibility training to Corporates, creating awareness about
accessibility and assistive technologies. Srinivasu played an
innovative role in organizing Techshare India 2008 - India's 1st
Accessibility and Assistive Technologies Conference and Exhibition.
He was also Program Coordinator for Magazine, a3 that talked about
Ability, Accessibility and Adaptability.&lt;/p&gt;
&lt;p&gt;Srinivasu is currently working for Yahoo! India as Accessibility
Manager and is responsible to lead and evangelize accessibility and
its initiatives across Yahoo! India and South East Asia. He is also a
member of the core committee for Yahoo! Employee Foundation India
(YEFI). Srinivasu is associated with the social sector through the
National Association for the Blind, India; Enable India, Shri Manik
Prabhu Sikshan Samiti and Success World. His hobbies include
blogging, tweeting, listening to classical music, playing chess and
swimming.&lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;Schedule of
the Workshop&lt;/h3&gt;
&lt;h3&gt;Day I&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Introductory Session&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Disability - 5 major types&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;The W3C and the WCAG&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;How people with disabilities use computers&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Group Exercise/Discussion&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Split participants into small
	groups and give them questions/problems to talk about and solve&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Example: If your friend is deaf, how do you make sure that
	she/he understands what a video is about? OR How does someone who
	can't see or hear answer/check their email? OR X lost his hands in a
	car accident. How does he do a Google search?&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Session 1 - &lt;/strong&gt;&lt;strong&gt;Building an Accessible
Website&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Laying Accessible Foundations&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Table-less layouts&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Well-structured markup&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Valid Code&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Lecture/Demonstration of Accessibility Features under
GNU/Linux by Arky&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Lecture/Demonstration of NVDA Screen Reader&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session 2 -&lt;/strong&gt;&lt;strong&gt; Building an Accessible
Website&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Removing Barriers&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Guideline 1 - Perception&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Non-text content&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Audio/Visual content&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Adaptability&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Contrast&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Group Exercise: Guideline 1 - Translate a offline newspaper
into an online one, and ensure that structure and information are
retained when the content is adapted.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Wrap Session - Feedback and Clarifications&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;&lt;em&gt;&lt;/em&gt;Day II&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Lecture/Demonstration of ARIA features on selected websites&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session 3 - &lt;/strong&gt;&lt;strong&gt;Guideline 2&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Operable&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Keyboard Access&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Enough Time&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Seizures&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Navigable&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;LUNCH&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Session 4 - &lt;/strong&gt;&lt;strong&gt;Guideline 3 and 4&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Understandable&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Natural Language&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Predictable&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Input Assistance&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Robust&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Compatible&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Session 5 - &lt;/strong&gt;&lt;strong&gt;Accessibility Testing&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Automated Testing + Tools&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Manual Testing&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Wrap Session - Feedback and Clarifications&lt;/em&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;Participants
List&lt;/h3&gt;
&lt;p&gt;1. Mr. Vibeesh P - Team Leader, Rainconcert&lt;/p&gt;
&lt;p&gt;2. Mr. Sunil S - Computer Programmer, ANERT&lt;/p&gt;
&lt;p&gt;3. Mr. Vineet
Pratap - Parallel Programmer, NIIST&lt;/p&gt;
&lt;p&gt;4. Mr. Binsun N
T - Software
Engineer, Keltron&lt;/p&gt;
&lt;p&gt;5. Mr. M.L.
Antony - Manager (Software/Web Services),
Keltron&lt;/p&gt;
&lt;p&gt;6. Mr. Rojilal M.
L - Programmer, KSEB&lt;/p&gt;
&lt;p&gt;7. Ms. Dhanya
Balakrishnan - Graduate Apprentice, Kerala State
IT Mission&lt;/p&gt;
&lt;p&gt;8. Ms. Indu
Reghunath - Developer, SPACE&lt;/p&gt;
&lt;p&gt;9.
Mr. Jithin Babu B - Web Programmer, Freelance&lt;/p&gt;
&lt;p&gt;10. Mr.
Hareesh Mohan - Developer, SPACE&lt;/p&gt;
&lt;p&gt;11. Mr.
Sujith Sureshan - Developer, SPACE&lt;/p&gt;
&lt;p&gt;12. Mr. Vinu C R - Web
Programmer, IT@School&lt;/p&gt;
&lt;p&gt;13. Mr. Cherian P
Thomas - Programmer, KSEB&lt;/p&gt;
&lt;p&gt;14. Mr. B
Vijayakumar - Programmer, KSEB&lt;/p&gt;
&lt;p&gt;15. Mr. Sunil
Kumar - Governement Employee, Kerala Khadi and
Village Industries Board&lt;/p&gt;
&lt;p&gt;16. Mr. Anil
Kumar - Akshaya, PA-MIS&lt;/p&gt;
&lt;p&gt;17. Mr. Shanavas
Khan - Programmer, Freelance&lt;/p&gt;
&lt;p&gt;18. Ms. Shatti
Raj - Scientist 'C', National Informatics Center&lt;/p&gt;
&lt;p&gt;19. Ms. Rameena
M - Developer, SPACE&lt;/p&gt;
&lt;p&gt;20. Ms.
Gita Brajesh - PSA, National Informatics Center&lt;/p&gt;
&lt;p&gt;21. Ms. Indusekhar M
S - System Analyst, National Informatics Center&lt;/p&gt;
&lt;p&gt;22. Ms. Somi P
Thomas - Scientist 'B', National Informatics
Center&lt;/p&gt;
&lt;p&gt;23. Ms.
Nissy George - System Analyst, National
Informatics Center&lt;/p&gt;
&lt;p&gt;24. Ms. Susy
M - Software Development, National Informatics
Center&lt;/p&gt;
&lt;p&gt;25. Ms. Jisy V
K - Technical Apprentice, Kerala State IT
Mission&lt;/p&gt;
&lt;p&gt;26. Ms. Sandhya Devi
T - Project Associate, IT@School&lt;/p&gt;
&lt;p&gt;27. Ms. Saritha D
R - Project Associate Executive, IT@School&lt;/p&gt;
&lt;p&gt;28. Mr.
Shaik Mohamed - System Analyst, National
Informatics Center&lt;/p&gt;
&lt;p&gt;29. Mr. Shibin Shah K
J - Student, RSCS&lt;/p&gt;
&lt;p&gt;30. Mr. Aneesh
Bhadran - Student. RIT&lt;/p&gt;
&lt;p&gt;31. Mr.
Thomas K S - Assistant Manager, Camputec&lt;/p&gt;
&lt;p&gt;32. Mr. Anil
S - Member, SDS&lt;/p&gt;
&lt;p&gt;33. Mr. John
Panicker - Website Designer&lt;/p&gt;
&lt;p&gt;34. Ms. Teenamol
L - Information Kerala Mission&lt;/p&gt;
&lt;p&gt;35. Mr. Shine A
R - Information Kerala Mission&lt;/p&gt;
&lt;p&gt;36. Mr. Jayahari K V&lt;/p&gt;
&lt;p&gt;37. Mr.
Naveen P L&lt;/p&gt;
&lt;p&gt;38. Mr. Jijo Mathew&lt;/p&gt;
&lt;p&gt;39. Mr. Antony
Rodrugues&lt;/p&gt;
&lt;p&gt;40. Mr. Satheeh S&lt;/p&gt;
&lt;p align="left"&gt;41. Mr. Sajeevan
C - Student, INSIGHT&lt;/p&gt;
&lt;h3 style="text-align: left;"&gt;&lt;strong&gt;Feedback&lt;/strong&gt;&lt;/h3&gt;
&lt;h3&gt;Session I&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt;&lt;em&gt;
&lt;/em&gt;&lt;strong&gt;Building an Accessible Website&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Topics
Covered&lt;em&gt;: Laying
Accessible Foundations, Table-less layouts, Well-structured markup,
Valid Code&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;20&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;16&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;18&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Title&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;:
&lt;/em&gt;&lt;em&gt;&lt;em&gt;&lt;strong&gt;Lecture/Demonstration of Accessibility Features
under GNU/Linux by Arky&lt;/strong&gt;&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Title&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
: &lt;/em&gt;&lt;em&gt;&lt;strong&gt;Lecture/Demonstration of NVDA Screen Reader&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;
&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Session II&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Title
: &lt;/strong&gt;&lt;strong&gt;Building an Accessible Website&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Topics
Covered : &lt;/strong&gt;&lt;strong&gt;&lt;em&gt;Removing
Barriers, Guideline 1 - Perception, Non-text content, Audio/Visual
content, Adaptability, Contrast&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;
&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Session III&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Title&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
:&lt;/em&gt;&lt;strong&gt;Guideline 2&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Topics
Covered&lt;/em&gt;&lt;em&gt;&lt;strong&gt;: &lt;/strong&gt;&lt;/em&gt;&lt;em&gt;&lt;em&gt;Operable,
Keyboard Access, Enough Time, Seizures, Navigable&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;
&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Session IV&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Title
: &lt;/strong&gt;&lt;strong&gt;Guideline 3 and 4&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Topics
Covered : &lt;/strong&gt;&lt;strong&gt;&lt;em&gt;Understandable,
Natural Language, Predictable, Input Assistance, Robust, Compatible &lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;12&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;
Session V&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Title&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
:&lt;/em&gt;&lt;strong&gt;&lt;em&gt;Accessibility Testing&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Topics
Covered&lt;/em&gt;&lt;em&gt;&lt;strong&gt;: &lt;/strong&gt;&lt;/em&gt;&lt;em&gt;&lt;em&gt;Automated
Testing + Tools, Manual Testing&lt;/em&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Content&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Covered Useful Materials&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Practical to my needs and interest&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Well Organized&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Presented at the right level&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;13&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;11&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Use Visual Aids&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Presentation&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Excellent&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Good&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Need Improvement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;Not Applicable&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Knowledge&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;17&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor's Presentation Style&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Covered Materials Clearly&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="left"&gt;Instructor Responded Well to questions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;16&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;
&lt;strong&gt;Workshop Organizers&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;
Ms Nirmita Narsimhan (Programme Manager)&lt;br /&gt;The Centre for Internet and Society&lt;br /&gt;No. D2, 3rd Floor, Sheriff Chambers&lt;br /&gt;14, Cunningham Road, Bangalore,&lt;br /&gt;Karnataka 560052,&lt;br /&gt;India&lt;/p&gt;
&lt;p&gt;
Phone: (+91)-080-4092-6283‎&lt;br /&gt;Fax: (+91)-080-4114-8130&lt;br /&gt;Email: nirmita@cis-india.org&lt;/p&gt;
&lt;p&gt;
Mr. Thomas Abraham (Training Coordinator)&lt;br /&gt;Society for Promotion of Alternative Computing and Employment&lt;br /&gt;C-11, Elankom Gardens,&lt;br /&gt;Vellayambalam, Thiruvananthapuram&lt;br /&gt;Kerala, India&lt;/p&gt;
&lt;p&gt;
Mobile: +91 94964 13317 Office Phone: +91 47123 18997&lt;br /&gt;Email: tomuhs@gmail.com,  contact@space-kerala.org&lt;/p&gt;
&lt;p&gt;
&lt;strong&gt;Consolidated Expenses of Web Accessibility Workshop, Trivandrum&lt;/strong&gt;&lt;/p&gt;
&lt;dl&gt;&lt;dd&gt;
&lt;table class="[object Object]"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Budget Head&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Amount (Rs.)&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Rent of lab and set up&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;15200&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Accomodation&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;4963&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Stationery&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;10285&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Communication&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;507&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Food&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;7535&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Travel&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;6235&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Coordination&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;10000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Total&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;54725&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/dd&gt;&lt;/dl&gt;
&lt;p&gt;
&lt;a href="https://cis-india.org/accessibility/Report%20-%20Space.pdf" class="internal-link" title="Workshop on Web Accessibility - Thiruvananthapuram"&gt;Please click here for the complete report.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report'&gt;https://cis-india.org/accessibility/blog/workshop-thiruvananthapuram-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-17T08:45:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
