<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 541 to 555.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march-bulletin-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2015-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/freedom-of-expression-in-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gsma-research-outputs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/february-2015-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance">
    <title>Mastering the Art of Keeping Indians Under Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance</link>
    <description>
        &lt;b&gt;In its first year in office, the National Democratic Alliance government has been notably silent on the large-scale surveillance projects it has inherited. This ended last week amidst reports the government is hastening to complete the Central Monitoring System (CMS) within the year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://thewire.in/2015/05/30/mastering-the-art-of-keeping-indians-under-surveillance-2756/"&gt;the Wire&lt;/a&gt; on May 30, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a statement to the Rajya Sabha in 2009, Gurudas Kamat, the  erstwhile United Progressive Alliance’s junior communications minister,  said the CMS was a project to enable direct state access to all  communications on mobile phones, landlines, and the Internet in India.  He meant the government was building ‘backdoors’, or capitalising on  existing ones, to enable state authorities to intercept any  communication at will, besides collecting large amounts of metadata,  without having to rely on private communications carriers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not new. Legally sanctioned backdoors have existed in Europe  and the USA since the early 1990s to enable direct state interception of  private communications. But the laws of those countries also subject  state surveillance to a strong regime of state accountability,  individual freedoms, and privacy. This regime may not be completely  robust, as Edward Snowden’s revelations have shown, but at least it  exists on paper. The CMS is not illegal by itself, but it is coloured by  the compromised foundation of Indian surveillance law upon which it is  built.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance and social control&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is a technological project. But technology does not exist in  isolation; it is contextualised by law, society, politics, and history.  Surveillance and the CMS must be seen in the same contexts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The great sociologist Max Weber claimed the modern state could not  exist without monopolising violence. It seems clear the state also  entertains the equal desire to monopolise communications technologies.  The state has historically shaped the way in which information is  transmitted, received, and intercepted. From the telegraph and radio to  telephones and the Internet, the state has constantly endeavoured to  control communications technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law is the vehicle of this control. When the first telegraph line was  laid down in India, its implications for social control were instantly  realised; so the law swiftly responded by creating a state monopoly over  the telegraph. The telegraph played a significant role in thwarting the  Revolt of 1857, even as Indians attempted to destroy the line; so the  state consolidated its control over the technology to obviate future  contests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This controlling impulse was exercised over radio and telephones,  which are also government monopolies, and is expressed through the  state’s surveillance prerogative. On the other hand, because of its open  and decentralised architecture, the Internet presents the single  greatest threat to the state’s communications monopoly and dilutes its  ability to control society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interception in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The power to intercept communications arises with the regulation of  telegraphy. The first two laws governing telegraphs, in 1854 and 1860,  granted the government powers to take possession of telegraphs “on the  occurrence of any public emergency”. In 1876, the third telegraph law  expanded this threshold to include “the interest of public safety”.  These are vague phrases and their interpretation was deliberately left  to the government’s discretion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This unclear formulation was replicated in the Indian Telegraph Act  of 1885, the fourth law on the subject, which is currently in force  today. The 1885 law included a specific power to wiretap. Incredibly,  this colonial surveillance provision survived untouched for 87 years  even as countries across the world balanced their surveillance powers  with democratic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Constitution requires all deprivations of free speech to  conform to any of nine grounds listed in Article 19(2). Public  emergencies and public safety are not listed. So Indira Gandhi amended  the wiretapping provision in 1972 to insert five grounds copied from  Article 19(2). However, the original unclear language on public  emergencies and public safety remained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indira Gandhi’s amendment was ironic because one year earlier she had  overseen the enactment of the Defence and Internal Security of India  Act, 1971 (DISA), which gave the government fresh powers to wiretap.  These powers were not subject to even the minimal protections of the  Telegraph Act. When the Emergency was imposed in 1975, Gandhi’s  government bypassed her earlier amendment and, through the DISA Rules,  instituted the most intensive period of surveillance in Indian history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although DISA was repealed, the tradition of having parallel  surveillance powers for fictitious emergencies continues to flourish.  Wiretapping powers are also found in the Maharashtra Control of  Organised Crime Act, 1999 which has been copied by Karnataka, Andhra  Pradesh, Arunachal Pradesh, and Gujarat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Procedural weaknesses&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, the Telegraph Act with its 1972 amendment continued to  weather criticism through the 1980s. The wiretapping power was largely  exercised free of procedural safeguards such as the requirements to  exhaust other less intrusive means of investigation, minimise  information collection, limit the sharing of information, ensure  accountability, and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This changed in 1996 when the Supreme Court, on a challenge brought  by PUCL, ordered the government to create a minimally fair procedure.  The government fell in line in 1999, and a new rule, 419A, was put into  the Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the United States, where a wiretap can only be ordered by a  judge when she decides the state has legally made its case for the  requested interception, an Indian wiretap is sanctioned by a bureaucrat  or police officer. Unlike the United Kingdom, which also grants  wiretapping powers to bureaucrats but subjects them to two additional  safeguards including an independent auditor and a judicial tribunal, an  Indian wiretap is only reviewed by a committee of the original  bureaucrat’s colleagues. Unlike most of the world which restricts this  power to grave crime or serious security needs, an Indian wiretap can  even be obtained by the income tax department.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A certainly creates procedure, but it lacks crucial  safeguards that impugn its credibility. Worse, the contours of rule 419A  were copied in 2009 to create flawed procedures to intercept the  content of Internet communications and collect metadata. Unlike rule  419A, these new rules issued under sections 69(2) and 69B(3) of the  Information Technology Act 2000 have not been constitutionally  scrutinised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Three steps to tap&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite its monopoly, the state does not own the infrastructure of  telephones. It is dependent on telecommunications carriers to physically  perform the wiretap. Indian wiretaps take place in three steps: a  bureaucrat authorises the wiretap; a law enforcement officer serves the  authorisation on a carrier; and, the carrier performs the tap and  returns the information to the law enforcement officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many moving parts in this process, and so there are leaks.  Some leaks are cynically motivated such as Amar Singh’s lewd  conversations in 2011. But others serve a public purpose: Niira Radia’s  conversations were allegedly leaked by a whistleblower to reveal serious  governmental culpability. Ironically, leaks have created accountability  where the law has failed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS will prevent leaks by installing servers on the transmission  infrastructure of carriers to divert communications to regional  monitoring centres. Regional centres, in turn, will relay communications  to a centralised monitoring centre where they will be analysed, mined,  and stored. Carriers will no longer perform wiretaps; and, since this  obviates their costs of compliance, they are willing participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its annual report of 2012, the Centre for the Development of  Telematics (C-DOT), a state-owned R&amp;amp;D centre tasked with designing  and creating the CMS, claimed the system would intercept 3G video, ILD,  SMS, and ISDN PRI communications made through landlines or mobile phones  – both GSM and CDMA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are unclear reports of an expansion to intercept Internet data,  such as emails and browsing details, as well as instant messaging  services; but these remain unconfirmed. There is also a potential  overlap with another secretive Internet surveillance programme being  developed by the Defence R&amp;amp;D Organisation called NETRA, no details  of which are public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Culmination of surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its present state, Indian surveillance law is unable to bear the  weight of the CMS project, and must be vastly strengthened to protect  privacy and accountability before the state is given direct access to  communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there is a larger way to understand the CMS in the context of  Indian surveillance. Christopher Bayly, the noted colonial historian,  writes that when the British set about establishing a surveillance  apparatus in colonised India, they came up against an established system  of indigenous intelligence gathering. Colonial rule was at its most  vulnerable at this point of intersection between foreign surveillance  and indigenous knowledge, and the meeting of the two was riven by  suspicion. So the colonial state simply co-opted the interface by  creating institutions to acquire local knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is also an attempt to co-opt the interface between government  and the purveyors of communications; because if the state cannot  control communications, it cannot control society. Seen in this light,  the CMS represents the natural culmination of the progression of Indian  surveillance. No challenge against it that does not question the  construction of the modern Indian state will be successful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance'&gt;https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T12:26:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india">
    <title>The Four Parts of Privacy in India</title>
    <link>https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india</link>
    <description>
        &lt;b&gt;Privacy enjoys an abundance of meanings. It is claimed in diverse situations every day by everyone against other people, society and the state.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Traditionally traced to classical liberalism’s public/private divide, there are now several theoretical conceptions of privacy that collaborate and sometimes contend. Indian privacy law is evolving in response to four types of privacy claims: against the press, against state surveillance, for decisional autonomy, and in relation to personal information. The Indian Supreme Court has selectively borrowed competing foreign privacy norms, primarily American, to create an unconvincing pastiche of privacy law in India. These developments are undermined by a lack of theoretical clarity and the continuing tension between individual freedoms and communitarian values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was published in &lt;i&gt;Economic &amp;amp; Political Weekly&lt;/i&gt;, 50(22), 30 May 2015. &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/four-parts-of-privacy.pdf" class="internal-link"&gt;Download the full article here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india'&gt;https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T13:04:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider">
    <title>Your phone is a surveillance device, your ISP a surveillance provider…: Pranesh Prakash</title>
    <link>https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider</link>
    <description>
        &lt;b&gt;“In India there is no special privilege for journalists over ordinary citizens,” Pranesh Prakash, Policy Director at the Centre for Internet and Society began at the workshop entitled ‘Digital Security for Journalists’ organised by the Mumbai Press Club and the Centre for Internet and Society. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was &lt;a class="external-link" href="http://www.mxmindia.com/2015/05/your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider-and-facebook-and-google-are-spyware-pranesh-prakash/"&gt;published by mxmindia.com&lt;/a&gt; on May 27, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“Even if you don’t care about your own security/privacy, think about you sources. Your sources want privacy,” Prakash said as he began the workshop on how to assess security threats, how to protect sources and how to prevent your ISP from leaking out information. With the growth of the internet since the 1980s, we know we can’t trust everyone; police stations, governments, all engage in surveillance of some sort, he pointed out. Prakash went on to explain the ‘Threat Model’, wherein journalists ought to ask questions like what are you protecting, who are you protecting yourself against, what do you hope to achieve and to what lengths are you willing to go? All of the measures you are going to take to protect your source are going to be inconvenient. Security is always at the cost of convenience he reiterated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data threat can be intercepted at two levels, Prakash explained; data in transit and data at rest. The important question to ask is which you wish to secure, because the means to secure both are very different.Emails being sent to someone can be intercepted by an outside source in transit. It is easier to secure you own data on your computer, but an email is so much more difficult to secure because there are multiple points where the information is stored. Targeted surveillance is much more difficult to protect yourself against than mass surveillance.&lt;br /&gt;&lt;br /&gt;For WiFi, password protected networks form an encryption, one more barrier to protect you. However, a WEP encrypted network is easy to break through. You need at least a WPAII to be secure enough. Airport networks usually ask for a password after connecting to the WiFi. That too is easy to see through. Avoid using these networks for sensitive work.&lt;br /&gt;&lt;br /&gt; One must keep in mind who they want to secure the data from; whether from a casual threat or an Intelligence Agency like the National Security Agency (NSA), National Technical Research Organisation (NTRO) or Intelligence Bureau (IB).Mass surveillance or non-targeted surveillance is not legal in India. However. the NTRO engages in mass surveillance, for which it was criticised in a Mint article, following which they shifted only to the national borders for surveillance. It is also possible for the NSA to tamper with your laptop before delivery.The NSA’s ANT catalogue has been working on a technology that has a device that can fit within the connector that connects to your keyboards and it can last there years and years without detection. Hence Prakash suggests that if a journalist is working on a sensitive story that if leaked could cause a ruckus, he/she would be safer buying a new computer and paying for it in hard cash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The more important a source is, the less you must use your phone, Prakash pointed out. Phones leak information time and again, information of time and location. The NSA uses it, the police use it. If you are meeting with someone and you both have your phone, then information that you have met is transmitted. Even without GPS it can track your location, when you receive/send a call/message, as your mobile network needs to access the cell tower you are around in order to reach you.&lt;br /&gt;&lt;br /&gt;Encrypted emails still leak identities. If the police look into an encrypted email, they will still know who you are communicating with. Background information you are doing on a story can also give away a lot you don’t want to be given away. Even with an encrypted email, they have access to your location, IP address, the sender and the receiver of the email, time stamp, Mac id and IMEI.&lt;br /&gt;&lt;br /&gt;End-to-end encryption is the way out here.This means that no one in the middle, including the company can read the emails you send from your company server. End-to-end encryption is the most inconvenient. End-to-end encryption means that you and the party concerned need to come up with a code that the other party needs to be able to decrypt. The software both parties use also needs to be compatible.&lt;br /&gt;&lt;br /&gt;“I recommend using WhatsApp over Viber and Line, Skype over other alternatives and Twitter is also safe, but never use Facebook for sensitive conversations that you don’t want to get out,” Prakash said. WhatsApp is safer than normal text messaging he points out. Prakash recommended an app called Conversations to use for messaging on your phone. It is safer than both normal SMSing and WhatsApp. An SMS leaks metadata, he explains, that’s why it is preferable to use data or apps that use the internet.&lt;br /&gt;&lt;br /&gt;In the 2G network space, only Airtel and Docomo use at least a weak encryption.All the rest use no encryption. Anyone can snoop in on your conversations. Instead one must use data-enabled apps for calling like RedPhone, he suggested. This is a great way to protect your source.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most people are known to repeat passwords for various accounts. Never repeat a password, Prakash advised. Maintain different passwords for all your accounts. It is the safest. And if you are unable to remember them all, then use password managementsoftware like LastPass or KeyPass. These enable you to key in and store all your passwords in one place and you only have to remember the password to your LastPass/KeyPass account. But if you forget your master password, then there is no way to recover all your other passwords.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session concluded with Prakash working hands-on with the journalists, helping them to download the required software on their laptops and mobile phones. This knowledge is vital for all journalists in order to protect themselves and their sources when doing a high profile, sensitive story, Prakash said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider'&gt;https://cis-india.org/internet-governance/news/mxmindia-may-27-2015-dyanne-coelho-your-phone-is-a-surveillance-device-your-isp-a-surveillance-provider&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-06-17T14:53:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india">
    <title>Paper-thin Safeguards and Mass Surveillance in India</title>
    <link>https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india</link>
    <description>
        &lt;b&gt;The Indian government's new mass surveillance systems present new threats to the right to privacy. Mass interception of communication, keyword searches and easy access to particular users' data suggest that state is moving  towards unfettered large-scale monitoring of communication. This is particularly ominous given that our privacy safeguards remain inadequate even for targeted surveillance and its more familiar pitfalls.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This need for better safeguards was made apparent when the Gujarat government illegally placed a young  woman  under surveillance  for obviously illegitimate purposes, demonstrating that the current system is prone to egregious misuse.  While the lack of proper safeguards is problematic even in the context of targeted surveillance, it threatens the health of our democracy in the context of mass surveillance. The proliferation of mass surveillance means that vast amounts of data are collected easily using information technology, and lie relatively unprotected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This paper examines the right to privacy and surveillance in India, in an effort to highlight more clearly the problems that are likely to emerge with mass surveillance of communication by the Indian Government. It does this by teasing out Indian privacy rights jurisprudence and the concerns underpinning it, by considering its utility in the context of mass surveillance and then explaining the kind of harm that might result if mass surveillance continues unchecked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first part of this paper threads together the evolution of Indian constitutional principles on privacy in the context of communication surveillance as well as search and seizure. It covers discussions of privacy in the context of our fundamental rights by the draftspersons of our constitution, and then moves on to the ways in which the Supreme Court of India has been reading the right to privacy into the constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second part of this paper discusses the difference between mass surveillance and targeted surveillance, and international human rights principles that attempt to mitigate the ill effects of mass surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The concluding part of the paper discusses mass surveillance in India, and makes a case for expanding our existing privacy safeguards to protect the right to privacy in a meaningful manner in face of state surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf" class="external-link"&gt;Download the paper here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india'&gt;https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-06-20T10:17:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march-bulletin-2015">
    <title>March 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/march-bulletin-2015</link>
    <description>
        &lt;b&gt;Newsletter for the month of March.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We are happy to share with you the third issue of the CIS newsletter (March 2015). The past editions of the newsletter can be accessed at	&lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;In a landmark judgement upholding the freedom of expression, the Supreme Court of India on March 24, 2015 struck down a provision (Section 66 A of the IT Act) which provided the power to arrest anyone for posting offensive comments online. Geetha Hariharan in her	&lt;a href="http://cis-india.org/internet-governance/blog/no-more-66a"&gt;blog post&lt;/a&gt; captures the happenings which led to the court ruling.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS in partnership with Privacy International is doing the GSMA project that seeks to understand different legal and regulatory aspects of security and surveillance in India. The research outputs published thus far are now online in a	&lt;a href="http://cis-india.org/internet-governance/blog/gsma-research-outputs"&gt;consolidated blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;CIS as part of its RAW programme is inviting abstracts for essays that explore what it means to study Internet(s) in India today.&lt;/li&gt;
&lt;li&gt;CIS is pleased to announce that the Researchers at Work (RAW) programme is supporting a new collaborative publishing project led by T.A.J. Residency / SKE Projects and or-bits.com. The first volume of the series titled	&lt;a href="http://cis-india.org/raw/announcing-silicon-plateau-01"&gt;'Silicon Plateau'&lt;/a&gt; will feature contributions by a group of well-known artists, 	researchers, and writers.&lt;/li&gt;
&lt;li&gt;Sumandro Chattapadhyay's paper titled	&lt;a href="http://cis-india.org/raw/whose-open-data-community-is-it-abstract"&gt;'Whose Open Data Community is it?&lt;/a&gt; Reflections on the Open Data Ecosystem in 	India' has been accepted for presentation at the Open Data Research Symposium to be held during the 3rd International Open Data Conference in Ottawa, 	Canada, on May 28-29 2015.&lt;/li&gt;
&lt;li&gt;CIS has been invited to contribute two sections to the Asia Internet History - Third Decade (2001 - 2010) book edited by Dr. Kilnam Chon. The 	sections will discuss the activities and experiences of civil society organisations in Asia and India, respectively, in national, regional, and global 	Internet governance processes. 	&lt;a href="http://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-and-india-outlines"&gt; Draft outlines of the sections are shared here &lt;/a&gt; . Comments and suggestions are invited. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS has prepared an		&lt;a href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Proposal_form"&gt;open proposal&lt;/a&gt; to 		the Wikimedia Foundation to support its annual plan with USD 208,603. &lt;/li&gt;
&lt;li&gt; CIS has prepared a 		&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_July_2015_-_June_2016"&gt; draft work plan for the period July 2015 to June 2016 &lt;/a&gt; . This work plan consists of 18 programs across 6 verticals.&lt;/li&gt;
&lt;li&gt;On December 24, 2015, Bharti Airtel, one of India's largest telecom players, announced the introduction of a new 'VOIP' usage policy for its mobile 	users. Tarun Krishnakumar &lt;a href="http://cis-india.org/telecom/blog/trai-ing-times-the-story-so-far"&gt;analyses the developments in a blog post&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; In his 		&lt;a href="http://cis-india.org/telecom/blog/business-standard-opinion-article-shyam-ponappa-march-4-2015-railway-takeaways-for-digital-india"&gt; monthly column published in the Business Standard &lt;/a&gt; on March 4, 2015, Shyam Ponappa writes "systems and methods for access through elements that provide connectivity - spectrum, fibre-optic cable, 		coaxial cable, or "twisted-pairs" for ADSL - must be devised in an integrated manner and made available at low cost.&lt;/li&gt;
&lt;li&gt;NVDA team as part of its project on developing text-to-speech software in 15 Indian languages has published key updates of&lt;a href="http://cis-india.org/accessibility/blog/report-on-the-progress-in-bengali-language-testing"&gt;Bengali&lt;/a&gt; and	&lt;a href="http://cis-india.org/accessibility/blog/report-on-progress-in-assamese-language-testing"&gt;Assamese&lt;/a&gt; language testing.&lt;/li&gt;
&lt;li&gt;In the year 2013 Nehaa Chaudhari had worked on a module on IP Rights for UNESCO's Open Access Curriculum. The 	&lt;a href="http://cis-india.org/a2k/blogs/unesco-nehaa-chaudhari-march-19-2015-communication-and-information-resources-news-and-in-focus-articles-unesco-open-access-curriculum-is-now-online"&gt; module was published &lt;/a&gt; recently and is available under the CC-BY-SA 3.0 IGO license. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Rohini Lakshané in a &lt;a href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt;blog post&lt;/a&gt; chronicles information about big-ticket lawsuits pertaining to mobile technology patents filed in India. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Vacancies at CIS&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is seeking applications for these posts:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/jobs/vacancy-for-assistant-project-manager"&gt;Assistant Project Manager&lt;/a&gt; : To assist the Project Manager on all tasks relating to the organization of the Fourth Global Congress on Intellectual Property and the Public 		Interest, which will take place in New Delhi from December 15-17, 2015. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/jobs/internship-application"&gt;Internship&lt;/a&gt; : CIS is providing opportunities for students enrolled in graduate programmes to undertake internship at its offices in Bangalore and Delhi. Eligible 		candidates are welcome to participate in our internship programme. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;---------------------------------------------- 	&lt;a href="http://cis-india.org/accessibility"&gt; &lt;br /&gt; Accessibility and Inclusion &lt;/a&gt; &lt;br /&gt; ---------------------------------------------- 	&lt;br /&gt; Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is being printed. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Updates&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/march-nvda-e-speak-report.pdf"&gt;March 2015 Report&lt;/a&gt; (Suman Dogra; March 31, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Language Testing Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-progress-in-assamese-language-testing"&gt;Assamese Language&lt;/a&gt; (Nirmita Narasimhan; March 23, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/report-on-the-progress-in-bengali-language-testing"&gt;Bengali Language&lt;/a&gt; (Nirmita Narasimhan; March 24, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-basic-computing-with-nvda-and-e-speak-in-hindi"&gt;&lt;b&gt; &lt;/b&gt;Report on Training on the Use of eSpeak in Hindi with NVDA &lt;/a&gt; (Organized by NVDA team; Dr. Shakuntala Mishra National Rehabilitation University, Lucknow; March 16 - 29, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt; ----------------------------------------------------------- 	&lt;br /&gt; As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the Pervasive Technologies project, Rohini Lakshané has written a blog entry that chronicles information on big-ticket lawsuits pertaining 	to mobile technology patents filed in India. As part of broader Access to Knowledge work UNESCO published a module on Intellectual Property Rights, 	Copyright and Alternative to a Strict Copyright Regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Module Units&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/unesco-nehaa-chaudhari-march-19-2015-communication-and-information-resources-news-and-in-focus-articles-unesco-open-access-curriculum-is-now-online"&gt; Intellectual Property Rights - Open Access for Researchers &lt;/a&gt; (Nehaa Chaudhari; March 19, 2015, UNESCO). Nehaa worked on a module on Intellectual Property Rights for United Nations Educational, Scientific and 		Cultural Organization (UNESCO)'s Open Access Curriculum (Curriculum for Researchers) as part of a project for the Commonwealth Educational Media Centre 		for Asia. UNESCO published the module this year. Nehaa Chaudhari and Varun Baliga were among the Module preparation team. Nehaa Chaudhari was the 		writer for Units 1, 2 and 3: Understanding Intellectual Property Rights, Copyright and Alternative to a Strict Copyright Regime. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/a2k/blogs/mobile-app-developer-series-terms-of-agreement-iv"&gt;&lt;b&gt; &lt;/b&gt;Mobile App Developer Series: Terms of Agreement - Part IV &lt;/a&gt; (Samantha Cassar; March 23, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt; Compilation of Mobile Phone Patent Litigation Cases in India &lt;/a&gt; (Rohini Lakshané; March 15, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/interviews-with-app-developers-open-source-community-and-contradictions-iii"&gt; Interviews with App Developers: Open Source, Community, and Contradictions - Part III &lt;/a&gt; (Samantha Cassar; March 24, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/interviews-with-app-developers-name-of-the-game-part-iv"&gt; Interviews with App Developers: Name of the Game - Part IV &lt;/a&gt; (Samantha Cassar; March 24, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt; &lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/a2k/news/conference-on-standards-setting-organisations-and-frand"&gt;&lt;b&gt; &lt;/b&gt;Conference on Standards Setting Organisations (SSOs) and FRAND &lt;/a&gt; (Organized by MHRD Chair on Intellectual Property Rights, Centre for Intellectual Property Rights and Advocacy (CIPRA), National Law School of India 		University, Bangalore, in association with Intel Technology India Pvt. Ltd.; Bangalore; March 21-22, 2015). Rohini Lakshané participated in this 		event. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/news/fourth-ipr-researchers-confluence"&gt;4th IPR Researchers Confluence&lt;/a&gt; (Organized by Shailesh J. Mehta School of Management, Indian Institute of Technology Bombay, Mumbai and National Institute of Industrial Engineering, 		Mumbai with support from Ministry of Human Resource Development, New Delhi; March 27 - 28, 2015). Maggie Huang presented intermediary findings of the 		research entitled "India's Music Copyright Management in the Age of Music Streaming". &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/a2k/news/economic-times-evelyn-fok-shonali-advani-march-20-2015-the-perils-of-not-protecting-intellectual-property-for-new-ventures"&gt;&lt;b&gt; &lt;/b&gt;The perils of not protecting intellectual property for new ventures &lt;/a&gt; (Evelyn Fok and Shonali Advani; Economic Times; March 20, 2015). Sunil Abraham gave his inputs. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Proposal_form"&gt;&lt;b&gt; &lt;/b&gt;Open Proposal for Funding &lt;/a&gt; : CIS has prepared an open proposal for funding for about USD 208,603 from the Wikimedia Foundation. CIS is inviting comments on the proposal. CIS is 		proposing to contribute to the qualitative and quantitative growth of 12 Wikimedia projects across 9 Indian languages and associated communities, in 		addition to providing need based support to other Indic communities. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_July_2015_-_June_2016"&gt;Access to Knowledge Work Plan&lt;/a&gt; : CIS has prepared the India Access to Knowledge work plan (July 2015 to June 2016). The work plan consists of 18 programs across 6 verticals. These 		include eight programs in five language areas, two community strengthening initiatives, five stand-alone Wikimedia projects, creating movement 		resources, publicity, research and documentation, and general support and service to the movement. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Train_the_Trainer_Program/2015"&gt;Train the Trainer Program&lt;/a&gt; (CEO Centre; Dodda Gubbi; Bangalore; February 26 - March 1; 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/openness/blog/hindustani-language-we-are-wikipedia"&gt;Hindustani Language: We Are Wikipedia&lt;/a&gt; (Syed Muzamiluddin; March 27, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/openness/blog/second-national-language-conference-bhubaneswar"&gt;2nd National Language Conference, Bhubaneswar&lt;/a&gt; (Organized by Institute of Odia Studies and Research; Institute of Physics, Bhubaneswar; March 30 - April 2, 2015). Subhashish Panigrahi presented a 		paper in Odia language in this conference as part of a panel discussion related to Odia language computing. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/train-the-trainer-event-report-march-2-2015-udayavani-report"&gt;Train the Trainer&lt;/a&gt; (Udayavani; March 2, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/the-hindu-ravi-prasad-kamila-more-articles-for-tulu-wikipedia"&gt;More articles for Tulu Wikipedia&lt;/a&gt; (The Hindu; March 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/medianama-march-13-2015-sneha-johari-goi-body-national-mission-for-manuscripts-has-digitised-3-million-manuscripts"&gt; GoI body National Mission for Manuscripts has digitised 3 million manuscripts &lt;/a&gt; (Sneha Johari; Medianama; March 13, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/the-telegraph-march-29-2015-bangla-wiki-turns-ten"&gt;Bangla Wiki turns 10&lt;/a&gt; (Sudeshna Banerjee, Showli Chakraborty and Abhinanda Datta; The Telegraph; March 29, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/openness/news/womens-history-month-india-2015"&gt;Women's History Month - India&lt;/a&gt; (Organized by CIS-A2K and Wikimedia India; India, March 2015). March 8 is International Women's Day, and to celebrate this women in India organized 		edit-a-thons and meetups to create and expand articles of importance to women in Wikipedia in English and various Indian languages. Online events were 		organized for these Wikipedias: 		&lt;a href="https://bn.wikipedia.org/wiki/%E0%A6%89%E0%A6%87%E0%A6%95%E0%A6%BF%E0%A6%AA%E0%A6%BF%E0%A6%A1%E0%A6%BF%E0%A6%AF%E0%A6%BC%E0%A6%BE:%E0%A6%85%E0%A6%A8%E0%A6%B2%E0%A6%BE%E0%A6%87%E0%A6%A8_%E0%A6%8F%E0%A6%A1%E0%A6%BF%E0%A6%9F%E0%A6%BE%E0%A6%A5%E0%A6%A8/%E0%A7%A8%E0%A7%A6%E0%A7%A7%E0%A7%AB/%E0%A6%86%E0%A6%A8%E0%A7%8D%E0%A6%A4%E0%A6%B0%E0%A7%8D%E0%A6%9C%E0%A6%BE%E0%A6%A4%E0%A6%BF%E0%A6%95_%E0%A6%A8%E0%A6%BE%E0%A6%B0%E0%A7%80_%E0%A6%A6%E0%A6%BF%E0%A6%AC%E0%A6%B8"&gt; Bengali &lt;/a&gt; , 		&lt;a href="https://pa.wikipedia.org/wiki/%E0%A8%B5%E0%A8%BF%E0%A8%95%E0%A9%80%E0%A8%AA%E0%A9%80%E0%A8%A1%E0%A9%80%E0%A8%86:%E0%A8%95%E0%A9%8C%E0%A8%AE%E0%A8%BE%E0%A8%82%E0%A8%A4%E0%A8%B0%E0%A9%80_%E0%A8%87%E0%A8%B8%E0%A8%A4%E0%A8%B0%E0%A9%80_%E0%A8%A6%E0%A8%BF%E0%A8%B9%E0%A8%BE%E0%A9%9C%E0%A8%BE_2015_%E0%A8%90%E0%A8%A1%E0%A9%80%E0%A8%9F%E0%A8%BE%E0%A8%A5%E0%A8%A8"&gt; Punjabi &lt;/a&gt; , 		&lt;a href="https://or.wikipedia.org/w/index.php?title=%E0%AC%89%E0%AC%87%E0%AC%95%E0%AC%BF%E0%AC%AA%E0%AC%BF%E0%AC%A1%E0%AC%BC%E0%AC%BF%E0%AC%86:%E0%AC%86%E0%AC%A8%E0%AD%8D%E0%AC%A4%E0%AC%B0%E0%AD%8D%E0%AC%9C%E0%AC%BE%E0%AC%A4%E0%AC%BF%E0%AC%95_%E0%AC%AE%E0%AC%B9%E0%AC%BF%E0%AC%B3%E0%AC%BE_%E0%AC%A6%E0%AC%BF%E0%AC%AC%E0%AC%B8_%E0%AD%A8%E0%AD%A6%E0%AD%A7%E0%AD%AB_%E0%AC%97%E0%AC%A3-%E0%AC%B8%E0%AC%AE%E0%AD%8D%E0%AC%AA%E0%AC%BE%E0%AC%A6%E0%AC%A8%E0%AC%BE&amp;amp;redirect=no"&gt; Odia &lt;/a&gt; , 		&lt;a href="https://mr.wikipedia.org/wiki/%E0%A4%B5%E0%A4%BF%E0%A4%95%E0%A4%BF%E0%A4%AA%E0%A5%80%E0%A4%A1%E0%A4%BF%E0%A4%AF%E0%A4%BE:%E0%A4%AE%E0%A4%B9%E0%A4%BF%E0%A4%B2%E0%A4%BE_%E0%A4%B8%E0%A4%82%E0%A4%AA%E0%A4%BE%E0%A4%A6%E0%A4%A8%E0%A5%87%E0%A4%A5%E0%A5%89%E0%A4%A8-_%E0%A5%A8%E0%A5%A6%E0%A5%A7%E0%A5%AB#.E0.A4.B8.E0.A4.B9.E0.A4.AD.E0.A4.BE.E0.A4.97.E0.A5.80_.E0.A4.B9.E0.A5.8B.E0.A4.A3.E0.A4.BE.E0.A4.B0.E0.A5.8D.E0.A4.AF.E0.A4.BE_.E0.A4.AE.E0.A4.B9.E0.A4.BF.E0.A4.B2.E0.A4.BE_.E0.A4.B8.E0.A4.A6.E0.A4.B8.E0.A5.8D.E0.A4.AF.E0.A4.BE.E0.A4.82.E0.A4.A8.E0.A5.80"&gt; Marathi &lt;/a&gt; , 		&lt;a href="https://kn.wikipedia.org/wiki/%E0%B2%B5%E0%B2%BF%E0%B2%95%E0%B2%BF%E0%B2%AA%E0%B3%80%E0%B2%A1%E0%B2%BF%E0%B2%AF:%E0%B2%AF%E0%B3%8B%E0%B2%9C%E0%B2%A8%E0%B3%86/%E0%B2%AE%E0%B2%B9%E0%B2%BF%E0%B2%B3%E0%B2%BE_%E0%B2%A6%E0%B2%BF%E0%B2%A8%E0%B2%BE%E0%B2%9A%E0%B2%B0%E0%B2%A3%E0%B3%86_%E0%B2%AE%E0%B2%A4%E0%B3%8D%E0%B2%A4%E0%B3%81_%E0%B2%AE%E0%B2%B9%E0%B2%BF%E0%B2%B3%E0%B2%BE_%E0%B2%A4%E0%B2%BF%E0%B2%82%E0%B2%97%E0%B2%B3%E0%B3%81_%E0%B2%B2%E0%B3%87%E0%B2%96%E0%B2%A8_%E0%B2%AF%E0%B3%8B%E0%B2%9C%E0%B2%A8%E0%B3%86"&gt; Kannada &lt;/a&gt; and 		&lt;a href="https://ml.wikipedia.org/wiki/%E0%B4%B5%E0%B4%BF%E0%B4%95%E0%B5%8D%E0%B4%95%E0%B4%BF%E0%B4%AA%E0%B5%80%E0%B4%A1%E0%B4%BF%E0%B4%AF:%E0%B4%B5%E0%B4%A8%E0%B4%BF%E0%B4%A4%E0%B4%BE%E0%B4%A6%E0%B4%BF%E0%B4%A8_%E0%B4%A4%E0%B4%BF%E0%B4%B0%E0%B5%81%E0%B4%A4%E0%B5%8D%E0%B4%A4%E0%B5%BD_%E0%B4%AF%E0%B4%9C%E0%B5%8D%E0%B4%9E%E0%B4%82-2015"&gt; Malayalam &lt;/a&gt; . &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/openness/news/idg-news-service-march-29-2015-john-riberio-india-backs-open-source-software-for-e-governance-projects"&gt;&lt;b&gt; &lt;/b&gt;India backs open source software for e-governance projects &lt;/a&gt; (originally published by IDG News Service was mirrored on the website of&lt;a href="http://www.cio.com/article/2903513/india-backs-open-source-software-for-egovernance-projects.html"&gt;CIO&lt;/a&gt; and		&lt;a href="http://www.pcworld.com/article/2903512/india-backs-open-source-software-for-egovernance-projects.html"&gt;PC World&lt;/a&gt;; March 29, 2015). Sunil 		Abraham gave his inputs. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt; ----------------------------------------------- 	&lt;br /&gt; As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and 	International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur 	Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Freedom of Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's Apex Court in a landmark decision struck down section 66A of the IT Act. The judgment provided great relief for advocates of freedom of speech on 	the Internet. The development attracted lots of media coverage to which CIS gave its inputs:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion"&gt;&lt;b&gt; &lt;/b&gt;Internet censorship will continue in opaque fashion &lt;/a&gt; (Sunil Abraham; The Times of India; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/bangalore-mirror-vidushi-marda-march-25-2015-historic-day-for-freedom-of-speech-and-expression-in-india"&gt; Historic day for freedom of speech and expression in India &lt;/a&gt; (Vidushi Marda; Bangalore Mirror; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/global-voices-march-25-2014-subhashish-panigrahi-indias-supreme-court-axes-online-censorship-law-but-challenges-remain"&gt; India's Supreme Court Axes Online Censorship Law, But Challenges Remain &lt;/a&gt; (Subhashish Panigrahi; Global Voices Online; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really"&gt; Big win for freedom of speech. Really? &lt;/a&gt; (Sunil Abraham; Bangalore Mirror; March 29, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/times-of-india-march-29-2015-pranesh-prakash-three-reasons-why-66a-is-momentous"&gt; Three reasons why 66A verdict is momentous &lt;/a&gt; (Pranesh Prakash; The Times of India; March 29, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt;&lt;b&gt; &lt;/b&gt;What Does Facebook's Transparency Report Tell Us About the Indian Government's Record on Free Expression &amp;amp; Privacy? &lt;/a&gt; (Pranesh Prakash; March 17, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/no-more-66a"&gt;No more 66A!&lt;/a&gt; (Geetha Hariharan; March 24, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;· Requests to ICANN: CIS sent ICANN six requests to ICANN regarding ICANN's expenditure on travels and meetings, granular revenue, cyber-attacks on 	ICANN, ICANN's implementation of the NETmundial principles, complaints under the Ombudsman process, and information regarding revenues received from gTLD auctions. These were prepared by Geetha Hariharan:&lt;a href="http://cis-india.org/internet-governance/blog/didp-request-7-globalisation-advisory-groups"&gt;DIDP Request #7: Globalisation Advisory Groups&lt;/a&gt; and	&lt;a href="http://cis-india.org/internet-governance/blog/didp-request-8-organogram"&gt;DIDP Request #8: ICANN Organogram&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/news/tech-law-forum-at-nalsar"&gt;Tech Law Form @ NALSAR&lt;/a&gt; (Organized by NALSAR University of Law, Hyderabad; March 7 and 8, 2015). Geetha Hariharan participated as a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/roundtable-on-icann-accountability"&gt;Roundtable on ICANN Accountability&lt;/a&gt; (Organized by Department of Electronics and Information Technology (DeitY), National Internet Exchange of India and Centre for Communication 		Governance, National Law University, Delhi; March 13, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Outputs&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS in collaboration with Privacy International, UK as part of GSMA project is conducting research to understand different legal and regulatory aspects of 	security and surveillance in India. The following outputs have been published: Indian Law and the Necessary Proportionate Principles (Elonnai Hickok), 	&lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf"&gt; Security, Surveillance and Data Sharing Schemes and Bodies in India &lt;/a&gt; (Maria Xynou and Elonnai Hickok), 	&lt;a href="http://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf"&gt; Export and Import of Security Technologies in India: QA &lt;/a&gt; (Elonnai Hickok), &lt;a href="http://cis-india.org/internet-governance/blog/regulation-of-cctvs-in-india.pdf"&gt;Regulation of CCTV's in India&lt;/a&gt; (Elonnai 	Hickok), Mutual Legal Assistance Treaties (MLATs) and 	&lt;a href="http://cis-india.org/internet-governance/blog/mlats-and-cross-border-sharing-of-information-in-india.pdf"&gt; Cross Border Sharing of Information in India &lt;/a&gt; (Maria Xynou and Elonnai Hickok),	&lt;a href="http://cis-india.org/internet-governance/blog/composition-of-service-providers-in-india.pdf"&gt;Composition of Service Providers in India&lt;/a&gt; (Lovisha Aggarwal), 	&lt;a href="http://cis-india.org/internet-governance/blog/surveillance-and-security-industry-in-india.pdf"&gt; The Surveillance and Security Industry in India - An Analysis of Indian Security Expos &lt;/a&gt; (Divij Joshi), 	&lt;a href="http://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf"&gt; An Analysis of News Items and Cases on Surveillance and Digital Evidence in India &lt;/a&gt; (Lovisha Aggarwal), 	&lt;a href="http://cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf"&gt; Policy Recommendations for Surveillance Law in India and an Analysis of Legal Provisions on Surveillance in India and the Necessary &amp;amp; Proportionate 		Principles &lt;/a&gt; (Maria Xynou), &lt;a href="http://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf"&gt;The Surveillance Industry in India&lt;/a&gt; (Maria 	Xynou), and 	&lt;a href="http://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf"&gt; State of Cyber Security and Surveillance in India: A Review of the Legal Landscape &lt;/a&gt; (Elonnai Hickok).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things"&gt;Cybersecurity and the Internet of Things&lt;/a&gt; (Organized by US Consulate Chennai, Cyber Security &amp;amp; Privacy Foundation and CIS; Hotel Atria, Palace Road, Bangalore; March 19, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/news/connecting-the-dots-options-for-future-action"&gt;&lt;b&gt; &lt;/b&gt;CONNECTing the Dots: Options for Future Action &lt;/a&gt; (Organized by UNESCO; March 3 - 4, 2015; Paris). Elonnai Hickok participated in the event. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/vox-pol-workshop-on-the-role-of-social-media-and-internet-companies-in-responding-to-violent-online-extremism-5-6-march-budapest"&gt; Vox Pol Workshop on the Role of Social Media and Internet Companies in Responding to Violent Online Extremism &lt;/a&gt; (Organized by VOX-Pol network; March 5-6, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;br /&gt; ---------------------------------&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/times-of-india-march-6-2015-uploaded-and-blocked-a-daylong-battle-rages-on-web-over-bbc-documentary"&gt; Uploaded and blocked, a daylong battle rages on the web over BBC documentary &lt;/a&gt; (Kim Arora; The Times of India; March 6, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/economic-times-march-17-2015-neha-alawadhi-india-tops-list-of-content-restrictions-requests-says-facebook"&gt; India tops list of content restrictions requests, says Facebook &lt;/a&gt; (Neha Alawadhi; Economic Times; March 17, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/business-insider-march-17-2015-if-you-thought-india-is-a-country-where-freedom-of-speech-and-expression-are-fundamental-rights-think-twice"&gt; If you thought India is a country where freedom of speech and expression are fundamental rights, think twice! &lt;/a&gt; (Business Insider; March 17, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis"&gt;Live Chat: Aadhaar: An identity crisis?&lt;/a&gt; (Hindu; March 17, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/tele-analysis-gyana-ranjan-swain-delhi-govt-sets-up-wifi-task-force"&gt; Delhi Govt Sets Up WiFi Task Force &lt;/a&gt; (Originally published by Press Trust of India; TeleAnalysis; March 18, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/scroll-mridula-chari-march-19-2015-indias-plan-to-offer-citizens-digital-lockers-poses-a-privacy-threat-say-experts"&gt; India's plan to offer citizens digital lockers poses a privacy threat, say experts &lt;/a&gt; (Scroll.in; March 19, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/governance-now-march-23-2015-ankita-lahiri-internet-becomes-vernacular-with-relaunch-of-e-bhasha"&gt; Internet becomes vernacular with relaunch of e-bhasha &lt;/a&gt; (Ankita Lahiri; Governance Now; March 23, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/wall-street-journal-niharika-mandhana-march-24-2015-indian-supreme-court-overturns-law-barring-hate-speech-online"&gt; Indian Supreme Court Overturns Law Barring 'Offensive Messages' Online &lt;/a&gt; (Niharika Mandhana; Wall Street Journal; March 24, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/huffington-post-indrani-basu-betwa-sharma-march-24-2015-supreme-court-strikes-down-section-66a-of-it-act"&gt; Supreme Court Strikes Down Section 66A Of IT Act &lt;/a&gt; (Indrani Basu and Betwa Sharma; Huffington Post; March 24, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/bbc-march-24-2015-indias-section-66-a-scrapped"&gt; India's section 66A scrapped: Win for free speech &lt;/a&gt; (Prasanto K. Roy; BBC; March 24, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/voice-of-america-march-24-2015-anjana-pascricha-indias-online-freedom-advocates-hail-court-ruling-on-free-speech"&gt; India's Online Freedom Advocates Hail Court Ruling on Free Speech &lt;/a&gt; (Anjana Pasricha; Voice of America; March 24, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-hindu-march-24-2015-live-chat-win-for-free-speech"&gt;Live Chat: Win for Free Speech&lt;/a&gt; (Hindu; March 24, 2015). Geetha Hariharan participated in the live chat. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/washington-post-annie-gowen-march-24-2015-indias-sc-strikes-down-law-that-led-to-fb-arrests"&gt; India's Supreme Court strikes down law that led to Facebook arrests &lt;/a&gt; (Annie Gowen; Washington Post; March 24, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/new-indian-express-march-25-2015-parina-dhilla-netizens-rejoice-over-sc-ruling-to-keep-the-net-free"&gt; Netizens Rejoice Over SC Ruling to Keep the Net Free &lt;/a&gt; (Parina Dhilla; New Indian Express; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-hindu-march-25-2015-a-safe-internet-and-a-free-internet-can-co-exist"&gt; 'A safe Internet and a free Internet can co-exist' &lt;/a&gt; (Hindu; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/bloomberg-bna-march-25-2015-madhur-singh-india-high-court-no-takedown-requests-on-social-sites-without-court-govt-order"&gt; India High Court: No Takedown Requests On Social Sites Without Court, Gov't Order &lt;/a&gt; (Madhur Singh; Bloomberg BNA; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-star-march-25-2015-annie-gowen-indias-supreme-court-strikes-down-law-that-led-to-arrests-over-facebook-posts"&gt; India's Supreme Court strikes down law that led to arrests over Facebook posts &lt;/a&gt; (Annie Gowen; Star.com; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-hindu-march-25-2015-what-the-experts-said-on-live-chat"&gt; What the experts said on live chat &lt;/a&gt; (Hindu; March 25, 2015). Geetha Hariharan was one of the panelists. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/ndtv-nida-najar-and-suhasini-raj-march-25-2015-indian-court-strikes-down-section-of-law-punishing-offensive-posts"&gt; Indian Court Strikes Down Section of Law Punishing Offensive Posts &lt;/a&gt; (Nida Najar and Suhasini Raj; NDTV; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act"&gt; IT Leaders, Lawyers Welcome SC Ruling on 66A of the IT Act &lt;/a&gt; (Cio.in; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-march-25-2015-vishakha-saxena-i-dare-you-i-double-dare-you"&gt; I dare you, I double dare you: Social media celebrates Sec 66A verdict &lt;/a&gt; (Vishakha Saxena; Hindustan Times; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/boston-globe-march-25-2015-annie-gowen-ruling-in-india-shields-web-posts"&gt; Ruling in India shields Web posts &lt;/a&gt; (Originally published by Washington Post and mirrored in Boston Globe; March 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/digital-news-asia-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-internet"&gt; The noose tightens on freedom of speech on the Internet &lt;/a&gt; (Gabey Goh; Digital New Asia; March 26, 2015). This was also mirrored in Malaymail Online. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/open-magazine-march-27-2015-kumar-anshuman-section-66a-delete"&gt;SECTION 66A: DELETE&lt;/a&gt; (Kumar Anshuman; Open Magazine; March 27, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/livemint-dhamini-ratnam-march-28-2015-sc-has-set-a-high-threshold-for-tolerance"&gt; SC has set a high threshold for tolerance: Lawrence Liang &lt;/a&gt; (Dhamini Ratnam; Livemint; March 28, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-week-march-28-2015-soni-mishra-66a-dead-long-live-66a"&gt;66A DEAD. LONG LIVE 66A!&lt;/a&gt; (Soni Mishra; The Week; March 28, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/cpj-march-28-2015-sumit-galhotra-indias-landmark-online-speech-ruling-is-step-toward-greater-press-freedom"&gt; India's landmark online speech ruling is step toward greater press freedom &lt;/a&gt; (Sumit Galhotra; CPJ; March 28, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/times-of-india-march-30-2015-kim-arora-you-can-still-get-into-trouble-for-online-posts"&gt; You can still get into trouble for online posts: Digital law experts &lt;/a&gt; (Kim Arora; The Times of India; March 30, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-citizen-march-31-2015-marianne-de-nazareth-smack-the-trolls"&gt;'Smack' the Trolls!&lt;/a&gt; (Marianne De Nazareth; Citizen; March 31, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt; -------------------------------- 	&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/raw/call-for-essays-studying-internet-in-india"&gt;Call for Essays: Studying Internet in India&lt;/a&gt; : CIS is inviting abstracts for essays that explore what it means to study Internet(s) in India today, the many experiences of Internet(s) in India; its histories and archaeologies; how we use it to read, write, create, relate, learn, and share. Please send abstracts (200 words) to		&lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/raw/announcing-silicon-plateau-01"&gt;Announcing Silicon Plateau #01&lt;/a&gt; : The RAW programme is supporting a new collaborative publishing project led by T.A.J. Residency / SKE Projects and or-bits.com. The first volume of 		the series titled 'Silicon Plateau' will feature contributions by a group of artists, researchers, and writers, including IOCOSE, Tara Kelton, Anil 		Menon, Sunita Prasad, Achal Prabhala and Sreshta Rit Premnath, along with contextual writing and documentation material. Here is an excerpt from the 		editorial note written by Marialaura Ghidini, the co-editor of the volume. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/raw/whose-open-data-community-is-it-abstract"&gt;Whose Open Data Community is it? - Accepted Abstract&lt;/a&gt; (Sumandro Chattapadhyay; March 31, 2015). The paper 'Whose Open Data Community is it? Reflections on the Open Data Ecosystem in India' has been 		accepted for presentation at the Open Data Research Symposium to be held during the 		&lt;a href="http://www.opengovpartnership.org/blog/erik-waddell/2015/02/02/3rd-international-open-data-conference-iodc"&gt; 3rd International Open Data Conference &lt;/a&gt; in Ottawa, Canada, on May 28-29 2015. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/raw/digital-activism-in-asia-reader-announcement"&gt;Digital Activism in Asia Reader&lt;/a&gt; (Organized by CIS; Bangalore; March 6-7, 2015). The project is a collaborative effort of CIS and the Centre for Digital Cultures, Leuphana University, 		Germany, which aims to bring together local knowledge, debates and conversations around Digital Activism in Asia. The Digital Activism in Asia Reader 		is expected to be published by the &lt;a href="http://cdc.leuphana.com/structure/hybrid-publishing-lab/" target="_blank"&gt;Hybrid Publishing Lab&lt;/a&gt; in 		mid-2015. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/raw/figures-of-learning-the-reader"&gt;Figures of Learning: The Reader&lt;/a&gt; (P.P.Sneha; March 24, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-and-india-outlines"&gt; Civil Society Organisations and Internet Governance in Asia and India - Section Outlines &lt;/a&gt; : CIS has been invited to contribute two sections to the Asia Internet History - Third Decade (2001-2010) book edited by Dr. Kilnam Chon. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt; -------------------------------- 	&lt;br /&gt; CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Op-ed&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/telecom/blog/business-standard-opinion-article-shyam-ponappa-march-4-2015-railway-takeaways-for-digital-india"&gt;&lt;b&gt; &lt;/b&gt;Railway Takeaways for Digital India &lt;/a&gt; (Shyam Ponappa; Business Standard and Organizing India Blogspot; March 4, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/telecom/blog/trai-ing-times-the-story-so-far"&gt;TRAI-ing Times: The Story So Far&lt;/a&gt; (Tarun Krishnakumar; March 19, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt; --------------------------------- 	&lt;br /&gt; The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and 	improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at	&lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march-bulletin-2015'&gt;https://cis-india.org/about/newsletters/march-bulletin-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-05-12T01:36:18Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2015-bulletin">
    <title>April 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2015-bulletin</link>
    <description>
        &lt;b&gt;Newsletter for the month of April below.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We are happy to share with you the fourth issue of the Centre for Internet and Society (CIS) newsletter (April 2015). The past editions of the newsletter 	can be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;------------------------------- 	&lt;br /&gt; Highlights 	&lt;br /&gt; -------------------------------&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS received 35 engaging abstracts in response to the call for essays on 'Studying Internet in India'. The final essays will be published from June 	onwards. The ten selected abstracts can be read at 	&lt;a href="http://cis-india.org/raw/studying-internet-in-india-selected-abstracts/"&gt; http://cis-india.org/raw/studying-internet-in-india-selected-abstracts/ &lt;/a&gt; . &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS submitted its &lt;a href="http://cis-india.org/accessibility/blog/comments-to-gigw"&gt;comments to the National Informatics Centre&lt;/a&gt; on April 30, 2015 		bringing to notice the negligible progress on the front for making Indian government websites conform to the notified standards, and gave 		recommendations to take the initiatives forward. &lt;/li&gt;
&lt;li&gt; Nehaa Chaudhari has prepared a		&lt;a href="http://cis-india.org/a2k/blogs/national-ipr-policy-series-rti-requests-by-cis-to-dipp-dipp-responses"&gt;consolidated report&lt;/a&gt; that tracks the 		development of India's National IPR Policy and the requests by CIS to the Department of Industrial Policy and Promotion under the RTI Act and responses 		elicited from the Department. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Institute of Odia Studies and Research organised	&lt;a href="http://cis-india.org/openness/blog/second-national-language-conference-bhubaneswar"&gt;2nd National Language Conference&lt;/a&gt; beginning on March 30, 	2015 and ending on April 2, 2015 at the Institute of Physics, Bhubaneswar. This conference was organised in collaboration with the Department of Tourism 	and Culture. Subhashish Panigrahi presented a paper in Odia language in this conference as part of a panel discussion related to Odia language computing. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Sunil Abraham's article titled 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a"&gt; "Shreya Singhal and 66A" &lt;/a&gt; was published in Economic and Political Weekly Vol-L No.15. Vidushi Marda helped in doing the research. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Sunil Abraham in an article in DNA titled " 	&lt;a href="http://cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality"&gt; Multiple Aspects Need to be Addressed as the Clamour Grows for Network Neutrality &lt;/a&gt; " tells readers that there are four violations of Network Neutrality that are considered particularly egregious. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Jyoti Panday prepared an 		&lt;a href="http://cis-india.org/internet-governance/blog/sc-judgment-in-shreya-singhal-what-it-means-for-intermediary-liability"&gt; analysis of the Supreme Court judgement &lt;/a&gt; in Shreya Singhal and what it does for intermediary liability in India.&lt;/li&gt;
&lt;li&gt;In February 2015, CIS had requested DeitY under RTI Act to provide information clarifying the procedures for blocking in India. The	&lt;a href="http://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015"&gt;response elicited from DeitY has been published&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS sent a 		&lt;a href="http://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services"&gt; joint response to the TRAI Consultation Paper on Regulatory Framework for Over-the-top (OTT) services &lt;/a&gt; with scholars from Indian Institute of Management, Ahmedabad. The response was sent on March 27, 2015. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Vacancies at CIS&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is seeking applications for:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/jobs/internship-application"&gt;Internship&lt;/a&gt; : CIS is providing opportunities for students enrolled in graduate programmes to undertake internship at its offices in Bangalore and Delhi. Eligible 		candidates are welcome to participate in our internship programme. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;---------------------------------------------- 	&lt;a href="http://cis-india.org/accessibility"&gt; &lt;br /&gt; Accessibility and Inclusion &lt;/a&gt; &lt;br /&gt; ---------------------------------------------- 	&lt;br /&gt; Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is being printed. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Monthly Updates&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/nvda-e-speak-april-2015-report.pdf"&gt;April 2015 Report&lt;/a&gt; (Suman Dogra; April 30, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Language Testing Reports&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-basic-computing-with-nvda-and-e-speak-in-hindi"&gt;Hindi Language&lt;/a&gt; (Nirmita Narasimhan; April 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-basic-computing-with-use-of-nvda-e-speak-gujarati"&gt;Gujarati Language&lt;/a&gt; (Nirmita Narasimhan; April 16, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-basic-computing-with-use-of-nvda-and-e-speak-in-oriya"&gt;Oriya Language&lt;/a&gt; (Nirmita Narasimhan; April 30, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Submission&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/comments-to-gigw"&gt;Comments to the GIGW&lt;/a&gt; (Nirmita Narasimhan; April 30, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt; ----------------------------------------------------------- 	&lt;br /&gt; As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market"&gt; Methodology: Patent Landscaping in the Indian Mobile Device Market &lt;/a&gt; (Rohini Lakshané; November 10, 2014). 		&lt;i&gt; The list of standards and specifications found in sub-USD-100 Internet-enabled mobile phones sold in India" (Annexure 2 in the post) has been 			updated &lt;/i&gt; . &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/conference-on-standards-settings-organizations-sso-and-frand-nlsiu"&gt; Conference on Standards Settings Organizations (SSO) and FRAND, NLSIU &lt;/a&gt; (Rohini Lakshané; April 5, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/national-ipr-policy-series-rti-requests-by-cis-to-dipp-dipp-responses"&gt; National IPR Policy Series: RTI Requests by CIS to DIPP + DIPP Responses &lt;/a&gt; (Nehaa Chaudhari; April 15, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/pervasive-technologies-project-working-document-series-literature-review-on-ipr-in-mobile-app-development"&gt; Pervasive Technologies Project Working Document Series: Literature Review on IPR in Mobile app development &lt;/a&gt; (Anubha Sinha; April 29, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Media Coverage&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave inputs for the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/news/the-times-of-india-april-10-2015-evelyn-fok-and-varun-aggarwal-one-reason-startups-are-moving-out-of-india"&gt; One reason startups are moving out of India &lt;/a&gt; (Evelyn Fok and Varun Aggarwal; The Times of India; April 10, 2015). This was also mirrored in 		&lt;a href="http://cis-india.org/a2k/news/economic-times-april-10-2015-evelyn-fok-varun-aggarwal-better-intellectual-property-values-luring-indian-startups-abroad"&gt; Economic Times &lt;/a&gt; . &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/news/iam-media-jack-ellis-april-28-2015-indian-businesses-crave-ip-certainty-but-better-patent-values-are-tempting-them-overseas"&gt; Indian businesses crave IP certainty, but better patent values are tempting them overseas &lt;/a&gt; (IAM Magazine; April 28, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Participation in Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/second-national-language-conference-bhubaneswar"&gt;2nd National Language Conference, Bhubaneswar&lt;/a&gt; (Organized by Institute of Odia Studies and Research; Institute of Physics; Bhubaneswar; March 30 - April 2, 2015). This conference was organised in 		collaboration with the Department of Tourism and Culture. Subhashish Panigrahi presented a paper in Odia language in this conference as part of a panel 		discussion related to Odia language computing. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/hindustani-language-we-are-wikipedia"&gt;Hindustani Language: We Are Wikipedia&lt;/a&gt; (Syed Muzamiluddin; April 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/odia-language-paper-presented-at-second-national-language-seminar"&gt; ଓଡ଼ିଆ ଭାଷା ପାଇଁ ଡିଜିଟାଲ 			ଅସୁବିଧା &lt;/a&gt; (Subhashish Panigrahi; April 15, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/wikipedia-campus-at-oxford-college"&gt;Wikipedia Campus at Oxford College&lt;/a&gt; (Subhashish Panigrahi; April 28, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# News and Media Coverage&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/the-telepgrah-april-6-2015-anwesha-ambaly-odia-waits-for-google-translate-debut-nine-indian-languages-available"&gt; Odia waits for Google Translate debut - Nine Indian languages available &lt;/a&gt; (Anwesha Ambaly; Telegraph; April 6, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/bangalore-mirror-apurva-venkat-april-18-2015-now-you-can-search-google-in-kannada-in-your-handwriting"&gt; Now you can search Google in Kannada, in your handwriting &lt;/a&gt; (Apurva Venkat; Bangalore Mirror; April 18, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Event Co-organized&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/events/nasa-international-open-data-challenge-2015"&gt;NASA International Open Data Challenge 2015&lt;/a&gt; (Co-organized by CIS and Team Indus; Bangalore; April 11-12, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt; ----------------------------------------------- 	&lt;br /&gt; As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and 	International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur 	Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Freedom of Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India's Apex Court in a landmark decision struck down section 66A of the IT Act. The judgment provided great relief for advocates of freedom of speech on 	the Internet. The development attracted lots of media coverage to which CIS gave its inputs:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Articles&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a"&gt; Shreya Singhal and 66A &lt;/a&gt; (Sunil Abraham; Economic and Political Weekly Vol-L No.15; April 11, 2015). Vidushi Marda helped in doing the research. &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/ndtv-t-vishnu-vardhan-dont-do-nothing-take-a-stand-on-net-neutrality"&gt; Don't Do Nothing. Take a Stand on Net Neutrality. &lt;/a&gt; (T. Vishnu Vardhan; NDTV; April 13, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality"&gt; Multiple Aspects Need to be Addressed as the Clamour Grows for Network Neutrality &lt;/a&gt; (Sunil Abraham; DNA; April 16, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-week-april-18-2015-geetha-hariharan-hazards-of-non-neutral-internet"&gt; The Hazards of a Non-neutral Internet &lt;/a&gt; (Geetha Hariharan; April 18, 2015). A modified version of the blog entry was published as an article titled " 		&lt;a href="http://week.manoramaonline.com/cgi-bin/MMonline.dll/portal/ep/theWeekContent.do?programId=1073754899&amp;amp;contentId=18716696"&gt; A must for free speech &lt;/a&gt; " in the Week. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/sc-judgment-in-shreya-singhal-what-it-means-for-intermediary-liability"&gt; The Supreme Court Judgment in Shreya Singhal and What It Does for Intermediary Liability in India? &lt;/a&gt; (Jyoti Panday; April 11, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015"&gt; DeitY says 143 URLs have been Blocked in 2015; Procedure for Blocking Content Remains Opaque and in Urgent Need of Transparency Measures &lt;/a&gt; (Jyoti Panday; April 29, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/events/freedom-of-expression-in-digital-age"&gt; Freedom of Expression in a Digital Age: Effective Research, Policy Formation &amp;amp; the Development of Regulatory Frameworks in South Asia &lt;/a&gt; (Organized by Center for Global Communication Studies at the Annenberg School for Communication at the University of Pennsylvania, Observer Research 		Foundation and CIS; Observer Research Foundation, New Delhi; April 21, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Participation in Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate"&gt; Financial Express hosts #NetNeutralityDebate: 'Price discrimination can be allowed, but not for the same packet of data' &lt;/a&gt; (New Delhi; April 24, 2015). Pranesh Prakash participated in the discussion. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Participation in Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/privacy-international-network-meeting"&gt;Privacy International Network Meeting&lt;/a&gt; (Organized by Privacy International, UK; April 22 - 23, 2015). Sunil Abraham attended the meeting. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Miscellaneous&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Announcement&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/iigf-recruitment"&gt;IIGF Recruitment&lt;/a&gt; : The National Internet Exchange of India (NIXI) conducted walk-in interviews on May 16, 2015 at NIXI Jasola office, Flat No. 6B, 6th Floor, Uppals M6 		Plaza, New Delhi. NIXI sought candidates to fill the posts of Technology Analyst, Policy Analyst, Research Associate and Executive Assistants. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Participation in Events&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/global-conference-on-cyber-space-2015"&gt;Global Conference on Cyberspace 2015&lt;/a&gt; (Co-organized by Dutch Government, City of the Hague and One Conference; The Hague, Netherlands; April 16 - 17, 2015). Sunil Abraham was a panelist. He 		also participated in an 		&lt;a href="http://cis-india.org/internet-governance/news/reconciling-policy-priorities-of-the-global-north-and-south-implications-for-norms-of-responsible-state-behaviour-in-cyberspace"&gt; expert roundtable conference &lt;/a&gt; . &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/cii-digital-india-summit"&gt;CII Digital India Summit&lt;/a&gt; (Organized by Confederation of Indian Industries; Taj Mahal Hotel and Pragati Maidan, New Delhi; April 21 and 24, 2015). Pranesh Prakash attended the 		summit. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;------------------------------------ 	&lt;br /&gt; &lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;br /&gt; ------------------------------------ 	&lt;br /&gt; CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-citizen-march-31-2015-marianne-de-nazareth-smack-the-trolls"&gt;'Smack' the Trolls!&lt;/a&gt; (Marianne De Nazareth; The Citizen; March 31, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindu-businessline-april-3-2015-sibi-arasu-the-block-heads"&gt;The block heads&lt;/a&gt; (Sibi Arasu; Hindu Businessline; April 3, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country"&gt; Smriti Irani brings back focus on voyeurism prevailing in our country &lt;/a&gt; (Amrita Madhukalya; DNA; April 6, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"&gt; Surveillance rises, privacy retreats &lt;/a&gt; (Namrata Acharya; Business Standard; April 12, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/ibn-live-april-13-2015-people-voice-their-support-for-net-neutrality-say-internet-a-utility-not-a-luxury"&gt; People voice their support for net neutrality, say Internet a utility not a luxury &lt;/a&gt; (IBN Live; April 13, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-times-of-india-april-14-2015-sandhya-soman-and-jayanta-deka-net-neutrality-trai-receives-over-two-lakh-mails"&gt; Net neutrality: Trai receives over 2 lakh mails &lt;/a&gt; (Sandhya Soman and Jayanta Deka; April 14, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/business-standard-surabhi-aggarwal-april-11-2015-net-neutrality-debate-rages-on"&gt; Net neutrality: Debate rages on &lt;/a&gt; (Surabhi Aggarwal; Business Standard; April 11, 2015) &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-hindu-lalatendu-mishra-pradeesh-chandran-april-15-2015-net-neutrality-debate-rages"&gt; Net neutrality debate rages &lt;/a&gt; (Lalatendu Mishra and Pradeesh Chandran; The Hindu; April 15, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-times-of-india-sandhya-soman-april-19-2015-net-neutrality-net-activism-packs-a-punch"&gt; Net neutrality: Net activism packs a punch &lt;/a&gt; (Sandhya Soman; The Times of India; April 19, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/indian-express-april-23-2015-net-neutrality-debate-in-india"&gt; Net Neutrality debate in India: Here are all the arguments you need to know &lt;/a&gt; (Indian Express; April 23, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-hindu-zara-khan-april-25-2015-freedom-struggle"&gt;Freedom struggle 2.0&lt;/a&gt; (Zara Khan; Hindu; April 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-telegraph-april-26-2015-prasun-chaudhuri-cry-you-nasty-trolls"&gt;Cry, you nasty trolls&lt;/a&gt; (Prasun Chaudhari; The Telegraph; April 26, 2015). 		&lt;a href="http://cis-india.org/internet-governance/news/forbes-india-april-29-2015-deepak-ajwani-debojyoti-ghosh-net-neutrality-the-argument-continues"&gt; Net Neutrality: The argument continues &lt;/a&gt; (Deepak Ajwani and Debojyoti Ghosh; Forbes India Magazine; April 29, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt; -------------------------------- 	&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/raw/studying-internet-in-india-selected-abstracts"&gt;Studying Internet in India: Selected Abstracts&lt;/a&gt; - CIS received thirty five engaging abstracts in response to the call for essays on 'Studying Internet in India.' The final essays will be published 		from June onwards. These are the ten selected abstracts: Studying the Internet Discourse in India through the Prism of Human Rights (by Deva Prasad); 		Indic Scripts and the Internet (by Dibyajyoti Ghosh); The Internet in the Indian Judicial Imagination (by Divij Joshi); Dharmasala Networked (by Laird 		Brown); WhatsApp Economy (by Maitrayee Deka); Citizens and their Internet (by Purbasha Auddy); The Many Lives and Sites of Internet in Bhubaneswar (by 		Sailen Routray); Quantity over Quality: Social Media and the New Class System in India (by Sarah McKeever); Governing Speech on the Internet: 		Transforming the Public Sphere through Policymaking (by Smarika Kumar). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt; -------------------------------- 	&lt;br /&gt; CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Submission&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/telecom/blog/joint-response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-services"&gt; Response to TRAI Consultation Paper on Regulatory Framework for Over-the-Top (OTT) Services &lt;/a&gt; (Pranesh Prakash; March 27, 2015). &lt;i&gt;The response was sent in March but mirrored on our website recently&lt;/i&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt; --------------------------------- 	&lt;br /&gt; The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and 	improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at	&lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2015-bulletin'&gt;https://cis-india.org/about/newsletters/april-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-05-31T04:29:24Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats">
    <title>Surveillance rises, privacy retreats</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats</link>
    <description>
        &lt;b&gt;WikiLeaks founder Julian Assange and former US National Security Agency contractor Edward Snowden have, at considerable personal cost, revealed how surveillance has eroded the private space in a world driven by digital technology.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/opinion/surveillance-rises-privacy-retreats-115041200669_1.html"&gt;Business Standard&lt;/a&gt; on April 12, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In India, the extent of surveillance became evident after Union human resource development minister &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smriti+Irani" target="_blank"&gt;Smriti Irani &lt;/a&gt;walked into the trial room of a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Fabindia" target="_blank"&gt;FabIndia &lt;/a&gt;outlet  in Goa last week, only to discover closed-circuit television (CCTV)  cameras pointed towards the trial room. The country woke up to the  porous divide between privacy and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now, senior officials of FabIndia find themselves embroiled in a case of  voyeurism and seven of them have taken interim anticipatory bail from a  district court. They claim the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cctv+Cameras" target="_blank"&gt;CCTV cameras &lt;/a&gt;were in the retail area, not the trial room.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The FabIndia incident might have blown the lid on how flimsily our  privacy is protected but there is no doubt that India is slowly but  surely moving towards a surveillance regime, both in the private and the  public spheres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“After the Snowden episode, there are only two kinds of nations: Ones  that know they are being watched, and others that don’t,” said Pavan  Duggal, an advocate at the  Supreme Court of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the surge in surveillance, there are hardly any specific laws governing this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A few laws&lt;/b&gt;&lt;br /&gt; In 2000, India enacted the Information Technology Act, primarily to  bring e-commerce under legal framework. After the Mumbai terrorist  attack in 2008, the Act was amended, to give the government sweeping  powers for mass surveillance.&lt;br /&gt; &lt;br /&gt; In the context of private surveillance, the 2008 amendment added two definitions: (a) communication device; (b) intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A communication device, according to the law, means cell phones,  personal digital assistance, or a combination of both or any other  device used to communicate, send or transmit any text, video, audio, or  image. An intermediary was defined as any person who, on behalf of  another person, stores or transmits message or provides any service with  respect to that message.&lt;br /&gt; &lt;br /&gt; Rules regarding CCTV surveillance are governed by the IT Act, 2008, as  CCTVs are considered to be communication devices, with computerised  memory. However, the laws in relation to a communication device and  intermediary deal mostly with third-party data sharing.&lt;br /&gt; &lt;br /&gt; “&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Article+21" target="_blank"&gt;Article 21 &lt;/a&gt;of  the Constitution guards the right to privacy as a Fundamental Right. We  do not have an explicit Act in this regard, but Section 43A of the IT  Act, 2000, along with the IT Rules, 2011, protects data privacy in  India,” said Prashant Mali, a cyber law and cyber security lawyer.&lt;br /&gt; &lt;br /&gt; There were no amendments of the laws governing CCTVs.&lt;br /&gt; &lt;br /&gt; However, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Section+66e" target="_blank"&gt;Section 66E &lt;/a&gt;of  the IT Act, states: “Whoever, intentionally or knowingly, captures,  publishes or transmits, the image of a private area of any person,  without his or her consent, under circumstances violating the privacy of  that person, shall be punished with imprisonment, which may extend to  three years, or with a fine not exceeding Rs 2 lakh, or both, with  explanation.”&lt;br /&gt; &lt;br /&gt; “The IT Act is not a privacy enabling law. Hence, the challenges to  privacy in surveillance are not fully addressed in it,” said Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internationally, there are more stringent laws governing CCTV cameras.  For example, in the UK, there is a prescribed code. A person filmed by a  surveillance camera can seek the footage. In the US, too, there are  state-specific laws which prohibit the unauthorised installation or use  of cameras in private places, like restrooms and trial rooms.&lt;br /&gt; &lt;br /&gt; “Privacy laws must be compliant with international practices. Laws  governing CCTVs should be more comprehensive. It should not be specific  to voyeurism,” said Sunil Abraham, the executive director of  Bengaluru-based research organisation, the Centre for Internet and  Society.&lt;br /&gt; &lt;br /&gt; The government has been working on a Privacy (Protection) Bill, which  provides safeguards on personal data of individuals and sets conditions  under which surveillance is allowed. It is expected that the Bill will  lead to the creation of the offices of privacy commissioner and data  protection commissioner. However, it is mostly silent on laws governing  CCTV usage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In India, the concern over enacting privacy laws, implementing them and  our understanding of privacy are low, compared to the global context.  The Privacy Protection Bill, 2013 is pending before Parliament. When  this gets enacted, our laws would be at par with those in the West,”  said Mali. “But doubts remain about their implementation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Government surveillance&lt;/b&gt;&lt;br /&gt; Amendments to the IT Act in 2008 gave the government wide powers of  interception, encryption and blocking. The amendment introduced Section  66A, which made sending “offensive” messages through a computer or any  other communication device, such as a cell phone or a tablet, a  punishable offense.&lt;br /&gt; &lt;br /&gt; The Supreme Court recently struck down the provision as infringing the constitutional right of freedom of speech.&lt;br /&gt; &lt;br /&gt; “Every nation is under the classical dilemma to balance national  security with privacy and freedom of expression. Always, when there is a  conflict between the two, national security wins hands down. However,  apart from international consensus, we need customise national  solutions,” said Duggal.&lt;br /&gt; &lt;br /&gt; Today, some of the biggest government projects based on the powers  vested to it under the IT Act. It has enabled the progression of  surveillance procedures like the Central Monitoring System (CMS) and  National Intelligence Grid (Natgrid), enabled through information on  Aadhar card or unique identification number.&lt;br /&gt; &lt;br /&gt; The CMS gives the government access to records of any mobile to landline  calls, to read private emails, texts, and even browsing history through  telecom operators. Natgrid could make the information available to  nearly 11 central agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is reported that the CMS can monitor close to 900 million people at  one go. There is neither confirmation nor denial from the government,”  said Duggal. However, compared to the US and China, that practice  blanket surveillance, India is still considered a low-surveillance  category nation.&lt;br /&gt; &lt;br /&gt; “India is still low on surveillance. In India, we have targeted  surveillance. At any given point in time, less than 200,000 phone calls  are being intercepted. Not more than a couple of lakh of surveillance  orders are given by both state and central governments,” said Abraham.&lt;br /&gt; &lt;br /&gt; Surely, with so many surveillance devices around,  it is a closely watched world like never before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;SALIENT FEATURES ON PRIVACY IN THE IT ACT, 2008&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Communication Device: Cell phones, personal digital assistance, or  combination of both or any other device used to communicate, send or  transmit any text, video, audio, or image&lt;/li&gt;
&lt;li&gt; Intermediary: Any person, who on behalf of another person, stores or transmits messages or provides any service&lt;/li&gt;
&lt;li&gt; Sections 66A to 66F: Added to Section 66, prescribing punishment  for offences such as sending obscene messages, identity theft, cheating  by impersonation using computer resources, violation of privacy and  cyber terrorism&lt;/li&gt;
&lt;li&gt; Section 69: Amended to give power to the state to issue directions  for interception or monitoring or decryption of any information through  any computer resource&lt;/li&gt;
&lt;li&gt; Sections 69A and B: These grant power to the state to issue  directions for blocking public access of any information through any  computer resource and to authorise to monitor and collect traffic data  or information through any computer resource for cyber security.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats'&gt;https://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-05-02T06:43:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/freedom-of-expression-in-digital-age">
    <title>Freedom of Expression in a Digital Age: Effective Research, Policy Formation &amp; the Development of Regulatory  Frameworks in South Asia</title>
    <link>https://cis-india.org/internet-governance/events/freedom-of-expression-in-digital-age</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society cordially invites you to a panel discussion on Freedom of Expression in a Digital Age. The event organized by Center for Global Communication Studies at the Annenberg School for Communication at the University of Pennsylvania, Observer Research Foundation and the Centre for Internet and Society will be held at Observer Research Foundation on April 21, 2015 from 11.00 a.m. to 6.00 p.m.&lt;/b&gt;
        &lt;p&gt;The discussion will highlight the challenges in promoting and strengthening online freedom of expression and evaluating the application of existing regulatory frameworks in South Asia. &lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-expression-in-digital-age.pdf" class="external-link"&gt;Click to view the invite&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;International Frameworks and Freedom of Expression&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom of expression-an important fundamental right in itself, is also critical for defending and upholding other freedoms and rights. We exercise this 	right in our day-to-day lives, through the exchange of ideas, opinions and information. Understanding the means and structures of communication, and the 	regulation of environments that facilitate such exchange therefore become crucial for those seeking to realize freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom of expression is enshrined in Article 19 of both the&lt;a href="http://www.un.org/en/documents/udhr/"&gt;Universal Declaration of Human Rights (UDHR)&lt;/a&gt; and the	&lt;a href="http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx"&gt;International Covenant on Civil and Political Rights (ICCPR)&lt;/a&gt;. The UDHR holds 	that " 	&lt;i&gt; everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and 		impart information and ideas through any media and regardless of frontiers" &lt;/i&gt; . The ICCPR holds that, " 	&lt;i&gt; everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all 		kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice". &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom of expression has also been enshrined in regional conventions and charters, for example the	&lt;a href="http://conventions.coe.int/treaty/en/treaties/html/005.htm"&gt;European Convention for the Protection of Human Rights and Fundamental Freedoms&lt;/a&gt;, 	the 	&lt;a href="http://www.achpr.org/files/instruments/achpr/banjul_charter.pdf"&gt; American Convention on Human Rights4, and the African Charter on Human and Peoples' Rights ("Banjul Charter") &lt;/a&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The former UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, highlighted in his	&lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf"&gt;2013 report report&lt;/a&gt; that these frameworks are 	applicable to actions that take place online.&lt;a href="https://mail.google.com/mail/u/0/#sdfootnote6sym"&gt;6&lt;/a&gt; While there may be no disagreements on 	freedom of expression as a legal right, it is important to bear in mind that it is not a non-derogable right, and may therefore be limited subject to 	safeguards indicated, for example, in Article 19(3) of the ICCPR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there may be limitations are placed on the exercise of freedom of expression, there is limited clarity on when and how freedom of expression can be 	legitimately circumscribed. There have been attempts by civil society groups to articulate more clearly the specific conditions when freedom of expression 	may be derogated, most notably the 	&lt;a href="http://www1.umn.edu/humanrts/instree/siracusaprinciples.html"&gt; Siracusa Principles on the Limitation and Derogation Provisions in the International Covenant on Civil and Political Rights ("Siracusa Principles" &lt;/a&gt; ), and the 	&lt;a href="http://www.article19.org/data/files/pdfs/standards/joburgprinciples.pdf"&gt; Johannesburg Principles on National Security, Freedom of Expression and Access to Information &lt;/a&gt; ("Johannesburg Principles").&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Freedom of Expression and Communications&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the years, the norms and standards required for freedom of expression in the traditional media world have received much attention. When regulating 	communication, some restrictions upon freedom of expression have been regarded necessary and are enforceable by national or international courts. Such 	restrictions have been defined in international human rights laws and cover issues such as defamation, incitement to violence and hate speech. While these 	restrictions are not affected by the introduction of new means of communication, the proliferation of digital communications does warrant the recognition 	that there are new forms of censorship, unsettled questions of jurisdiction, and the need to develop new norms and standards that can keep pace with the 	myriad forms of expression and information sharing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Communication in the digital age has led to the evolution of the Internet as a medium that has revolutionised largely local capacity for communication into 	a worldwide phenomenon that encompasses everything from personal one-to-one emails, social networks and reaching out to large audiences globally. The 	proliferation of digital technologies has not only fostered unprecedented access to information; the very environment stands transformed by the 	introduction of new kinds of information from voice, sound, image, text and code, that are accessible on a range of devices and across several types of 	technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These networks and services democratized communication by lowering barriers to access and creating new space for publishing and peer-to-peer collaboration. 	Bypassing traditional gatekeepers of other forms of media, users can take on the role of writers, broadcasters or publishers on the Internet thus creating 	limitless possibilities for producing, sharing and exchanging all kinds of content. From this view, the Internet has sprung up as a globally accessible 	means of communication that is free from traditional restraints on free speech and expression. However, there are other unintended consequences that the 	Internet has had on both forms of power and control in the regulation of content, as online content has become increasingly contested, enclosed in a 	nationalized sphere challenging the free flow of information and freedom of expression.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Freedom of Expression in South Asia&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a network of networks, the internet has no overarching jurisdiction and with no single entity governing the totality of the internet, there exists a 	jurisdictional vacuum over content on the web. Further, there are no means of regulating content internationally or even a broad consensus on the norms 	that should be applied for restricting freedom of expression either on traditional or modern media. This has led to adverse consequences such as states 	adopting arbitrary actions and standards or companies exercising private censorship with content online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;South Asia has an important role in global development, with its share of the world's largest working-age population, a quarter of the world's middle-class 	consumers, the largest number of poor and undernourished in the world, and several fragile states of global geopolitical importance. With inclusive growth, 	South Asia has the potential to change the global order and communications and technology continue to play a critical role in realising the region's 	potential. Unfortunately, the history of colonial rule, authoritarian governments and a turbulent geo-political landscape have resulted in a tendency to 	over-regulate speech. Governments have construed the advent of the Internet as a challenge to their authority and their anxiousness to restrict use of the 	medium by citizens has resulted in often regressive and sometimes draconian laws such as Myanmar's Electronic Transactions Law, India's IT Act and 	Pakistan's Prevention of Electronic Crimes Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the Internet expands and provides greater access, it also places censorship and surveillance capacities in the hands of states and corporations. It is 	therefore crucial that there exist strong protections of the right to freedom of expression that balance state powers and citizen rights. While the 	Internet has thrown up its own set of challenges such as hate speech, the verbal online abuse of women and the use of the Internet to spread rumours of 	violence, the regulation of content is a question that is far from being settled and needs our urgent attention. What role can and should the law play? 	When is it justified for the government to intervene? What can be expected from intermediaries, such as social networks and ISPs? And what can users do to 	protect the right to free speech - their own and that of others?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Balancing freedom of expression with other rights is further complicated by the challenges of fast paced and changing regulatory environment. By 	highlighting these challenges and questioning the application of existing frameworks we aim to contribute to further promoting and strengthening the right 	to freedom of expression, in India and beyond.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Introduction to panel and conference:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the context in which the Centre for Internet and Society, the Observer Research Foundation, the University of Pennsylvania's Internet Policy 	Observatory, and the Programme for Comparative Media Law and Policy at Oxford University are coming together to organise an event under the title 'Freedom 	of Expression in a Digital Age'. The event is a discussion and deliberation on 'Effective Research, Policy Formation, &amp;amp; the Development of Regulatory 	Frameworks in South Asia', aimed at bringing together policymakers, researchers, experts and civil society in discussing some of the most crucial issues in 	this space. The event would seek to look at past experiences, look at current realities and look ahead to how things could be made better in the South 	Asian context. The program agenda includes&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;Freedom of Expression in a Digital Age' 					&lt;br /&gt; Effective Research, Policy Formation, &amp;amp; the Development of Regulatory Frameworks in South Asia&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;&lt;b&gt;Program Agenda and Article Submission Tracks &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Learnings from the past &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Current Realities &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Looking ahead &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11:00 - 1:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1:00 - 2:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;2:00 - 4:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4:00- 4:15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;4:15-6:00&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Welcome and Introductions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Welcome and Introductions&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Welcome and Introductions&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Overview of existing policies and regulatory models and their impact on FoEx online including the implementation of these models across 					South Asia&lt;/p&gt;
&lt;/td&gt;
&lt;td rowspan="5"&gt;
&lt;p align="center"&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;How FoEx is being enabled online in different jurisdications and sectors of society across South Asia&lt;/p&gt;
&lt;/td&gt;
&lt;td rowspan="5"&gt;
&lt;p&gt;Coffee break&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Challenges associated with formulating a standard, harmonized, and adaptable regulation that is applicable to multiple digital platforms, 					both at the national and international level and possible solutions&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;FoEx as defined in jurisdictions across South Asia and as compared to international standards&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Ways in which FoEx is, or may be, curtailed online&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Ways forward to bridge existing gaps between policy formation and policy implementation with respect to FOEX online&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Emerging technologies, markets, services and platforms and how they have shaped FoEx across South Asia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Online FoEx and the present need to balance it against other digital rights in jurisdictions across South Asia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Exploration of emerging regulatory questions such as whether online speech should be regulated in the same manner as offline speech or, if 					there are there are particular forms of online speech that are difficult to regulate such as defamation, hate speech, if there are 					effective models of remedy for violation of FOEX online&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Impact of challenges on FoEx online such as barriers of entry, access, accessibility, cost, liability, policies and enforcement mechanisms 					differing across platforms across South Asia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The impact of jurisdiction, multi-national platforms, and domestic regulation on FOEX online&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Ways in which civil society can impact and influence the development and implementation of Internet regulation&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Research techniques that have been applied to the issue and have been effective in different political contexts across South Asia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Role and responsibility of intermediaries in regulating online speech as per governmental standards via content policies, terms of service, 					and other practices across South Asia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Exploration of the future role and interplay of technology and policy in enabling FOEX online&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Q&amp;amp;A&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Q&amp;amp;A&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Q&amp;amp;A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;About the Organisers&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Center for Global Communication Studies&lt;b&gt; at the Annenberg School for Communication at the University of Pennsylvania&lt;/b&gt;-has created the	&lt;b&gt; Internet Policy Observatory (IPO)&lt;/b&gt; to research the dynamic technological and political contexts in which these Internet governance debates 	take place. The IPO serves as a platform for informing relevant communities of activists, academics, and policy makers, and for displaying collected data 	and analysis. The Observatory encourages and sponsors research and studies ongoing events, key decisions and proposals, on Internet policy. The IPO seeks 	to deepen understanding of the evolution of mechanisms and processes that affect domestic Internet policies in key jurisdictions and the legal, political, 	economic, international and social factors that influence the implementation, or non-implementation, of such policies.The IPO also seeks to understand the 	relationship between national efforts and international policy formations and the role of civil society in domestic Internet policy processes and control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The&lt;b&gt; Centre for Internet and Society (CIS)&lt;/b&gt;-is a non-profit research organization working to explore, understand and affect the shape and 	form of the Internet and its relationship with the political, cultural, and social milieu of our times. CIS' multidisciplinary research, intervention and 	collaboration engages with policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and 	IPR reform, openness (including open government data, free/open source software, open standards, open access to scholarly literature, open educational 	resources, and open video). CIS also engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The&lt;b&gt; Observer Research Foundation (ORF)&lt;/b&gt;- is India's premier independent public policy think tank and is engaged in developing and 	discussing policy alternatives on a wide range of issues of national and international significance. The fundamental objective of ORF is to influence the formulation of policies for building a strong and prosperous India in a globalised world. It hosts India's largest annual cyber conference -	&lt;b&gt;&lt;i&gt;CyFy: the India Conference on Cyber Security and Internet Governance&lt;/i&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/freedom-of-expression-in-digital-age'&gt;https://cis-india.org/internet-governance/events/freedom-of-expression-in-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-12T03:53:04Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country">
    <title>Smriti Irani brings back focus on voyeurism prevailing in our country</title>
    <link>https://cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country</link>
    <description>
        &lt;b&gt;The case of Union minister Smriti Irani finding a CCTV camera at Goa's Fab India has again brought back the focus on digital voyeurism and how a critical issue like surveillance can be exploited. Irani's case comes days after a woman found a mobile phone strapped to a changing room door of a Van Heusen store in Lajpat Nagar's Central market, a popular shopping hub.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amrita Madhukalya was &lt;a class="external-link" href="http://www.dnaindia.com/india/report-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-our-country-2075010"&gt;published in DNA&lt;/a&gt; on April 6, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Bangalore girl Sumitra (name changed) remembers the day in 2009 she saw a  camera when trying on a skirt at Palika Bazaar. "I looked around the  tiny changing room and saw a camera with a dipping red light. I quickly  rushed out and accused the shopkeeper. But, Palika is not a place of  great repute, and my friend who was accompanying me asked me to forget  the matter," she says, and that's what she did. She was a degree student  at Delhi University, and being relatively unaware of the city, decided  to keep mum. "But look at what has happened: if they can film a Union  minister at a Fab India store, they will film anyone. We need stringent  action."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case of Union minister &lt;a href="http://www.dnaindia.com/topic/smriti-irani"&gt;Smriti Irani&lt;/a&gt; finding a CCTV camera at Goa's Fab India has again brought back the focus on digital &lt;a href="http://www.dnaindia.com/topic/voyeurism"&gt;voyeurism&lt;/a&gt; and how a critical issue like surveillance can be exploited. Irani's  case comes days after a woman found a mobile phone strapped to a  changing room door of a Van Heusen store in Lajpat Nagar's Central  market, a popular shopping hub.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the first cases of digital voyeurism was reported in Pune in  2003 when a peon in an establishment at Sahakar Nagar installed a web  camera in a changing room. In 2005, landowner Mohan Kulkarni from Navi  Peth was arrested for filming women tenants. In 2007, two MMS clips from  the changing rooms of a renowned departmental store in Kolkata started  making the rounds. In one, a girl was shown changing clothes while in  the other a couple was shown having sex. Then a year later, shop  assistant Sunil Kumar Jha was found filming women in a clothes store  from below the trial room door in Kolkata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Debarati Halder, advocate and founder of the Centre for Cyber Victim  Counselling, feels that had it not been a politician like Irani, the  case would not have been highlighted at all. "People would have brushed  off the incident had it been another woman. It is hard to escape the  amount of negative publicity a case like this garners," she says. This  is reflected in the case of a woman who was filmed in a leading store in  Mumbai and was scared to approach the police, as she and her father did  not want to go through the "legal hassles" of the case. The woman spoke  of her story to a journalist of a leading daily and the ensuing report  eventually led to the arrest of the shop assistant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber security expert Pranesh Prakash says that digital voyeurism is a  huge problem in India and elsewhere. "There is a mismatch between  privacy protection provided in the IT Act against non-consensual sharing  of certain forms of sexual images, and the utter disregard for privacy  in other parts of the law. Given that cybercafes have often been places  where users are secretly filmed, the law should seek to crack down on  such invasions of privacy. Instead, the law doesn't prohibit that, and  in fact the Cybercafe Rules, encourage cybercafe owners to photograph  all users, including minors. The rules say that untrustworthy cybercafe  owners keep these records for a minimum period of one year, but there is  no maximum period," says Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 66E of the Information Technology Act, 2000, amended in 2008,  deals with digital voyeurism. And section 354 (C) of the Indian Penal  Code (IPC) deals with voyeurism in general.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, there are many loopholes. "When the footage is shot by a  government-run establishment, then the clause of surveillance is a  cover, like in an MMS of Delhi Metro (where a couple was shown making  out)."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country'&gt;https://cis-india.org/internet-governance/news/dna-april-6-2015-amrita-madhukalya-smriti-irani-brings-back-focus-on-voyeurism-prevailing-in-the-country&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-08T00:59:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gsma-research-outputs">
    <title>GSMA Research Outputs</title>
    <link>https://cis-india.org/internet-governance/blog/gsma-research-outputs</link>
    <description>
        &lt;b&gt;This is a collection of research under our GSMA project that we have undertaken in collaboration with Privacy International. The research has sought to understand different legal and regulatory aspects of security and surveillance in India and consists of blog entries and reports. Any feedback or comment is welcome. &lt;/b&gt;
        &lt;h3&gt;Indian Law and the Necessary Proportionate Principles&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The presentation shows that there are no comprehensive provisions for the principles of legitimate aim, competent judicial authority, proportionality, transparency, etc. whereas these are partially present for the principles of legality, necessity, adequacy, public oversight, safeguards for international cooperation, etc. The presentation also looks at the Indian intelligence agencies and shows us that there are nine agencies authorized to intercept communications along with at least eleven additional agencies. It further dwelves into the establishment and structure of Indian intelligence agencies and whom they report to, the sharing of information internationally as well as nationally. It shows us that India has MLAT agreements with 36 countries and request to CBI can be initiated informally or formally through court order. It then lists out the various regulatory and important bodies responsible for national security. Some cases of unlawful interception / leaks have been discussed along with examples of arrests based on digital evidence. The various government schemes, the telecommunication companies in India, telecom licenses requirements, government developed security and surveillance solutions, private security companies, security expos, export, import and selling of security and surveillance equipment, and the way forward are also discussed.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Security, Surveillance and Data Sharing Schemes and Bodies in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following the 2008 Mumbai terrorist attacks, India had implemented a wide range of data sharing and surveillance schemes. Though developed under different governments the purpose of these schemes has been to increase public safety and security by tackling crime and terrorism. As such, two data sharing schemes have been proposed - the National Intelligence Grid (NATGRID) and the Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS), as well as several surveillance systems, such as the Lawful Intercept and Monitoring (LIM) system, the Network Traffic Analysis system (NETRA), state Internet Monitoring Systems and the Central Monitoring System (CMS). This chapter details the various schemes and provides policy recommendations for their improvement, with regards to the protection of the right to privacy and other human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Export and Import of Security Technologies in India: QA&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The write-up examines in question-answer format the standards regulating the export of technologies that can be used for surveillance purposes, the department and legislation that governs exports and imports of security technologies in India, the procedure for obtaining an export licence for the export of SCOMET items, what is ITC (HS) and why is it important, and examples of ITC codes for technologies that can facilitate security or surveillance. The research finds answers to all these queries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Regulation of CCTV’s in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In light of the increasing use and installation of CCTV’s in cities across India, and the role that CCTVs play in the Home Ministry's plans for implementing "Mega Policing Cities", this blog seeks to review various attempts to regulate the use of CCTV's in India, review international best practices, and provide preliminary recommendations for the regulation of CCTV's in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/regulation-of-cctvs-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Mutual Legal Assistance Treaties (MLATs) and Cross Border Sharing of Information in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is unclear the exact process that intelligence agencies in India share information with other agencies internationally. India is a member of Interpol and the Central Bureau of Investigation, which is a Federal/Central investigating agency functioning under the Central Government, Department of Personnel &amp;amp; Training is designated as the National Central Bureau of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/mlats-and-cross-border-sharing-of-information-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Composition of Service Providers in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Telecom, at present, is one of the fastest-growing industries in India. As of January 2014, according to the Telecom Regulatory Authority of India (TRAI) there are 922 million wireless and over the wire subscribers in India, and 56.90 million broadband subscribers including wired, wireless and wimax subscribers. India’s overall wireless teledensity was quoted as having 893.31million subscribers, with a 0.79% (7.02 million) monthly addition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/composition-of-service-providers-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Surveillance and Security Industry in India - An Analysis of Indian Security Expos&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ‘Spy Files’, a series of documents released by whistleblower website WikiLeaks over the last few years, exposed the tremendous growth of the private surveillance industry across the world – a multi-billion dollar industry thriving on increasing governmental and private capabilities for mass surveillance of individuals. These documents showed how mass surveillance is increasingly made possible through new technologies developed by private players, often exploiting the framework of nascent but burgeoning information and communication technologies like the internet and communication satellites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-and-security-industry-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;An Analysis of News Items and Cases on Surveillance and Digital Evidence in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a technologically advanced era, with preponderance of electronic communications in both professional and social interactions and the ability to store such information in digital form, digital evidence has gained significance in civil as well as criminal litigation in India. In order to match the pace with the progressive technology, the Indian Courts have embarked on placing more and more reliance on the digital evidence and a portion of such digital evidence is obtained through electronic surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Policy Recommendations for Surveillance Law in India and an Analysis of  Legal Provisions on Surveillance in India and the Necessary &amp;amp;  Proportionate Principles&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Government of India has created a legal framework which supports the carrying out of surveillance by authorities through its various laws and license agreements for service providers. The Centre for Internet and Society (CIS) acknowledges that lawful, warranted, targeted surveillance can potentially be a useful tool in aiding law enforcement agencies in tackling crime and terrorism. However, current Indian laws and license agreements appear to overextend the Government's surveillance capabilities in certain cases, while inadequately safeguarding individuals' right to privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Surveillance Industry in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India has the world's second largest population, an expanding middle class and undoubtedly a huge market which attracts international investors. Some of the world's largest corporations have offices in India, such as Google Incorporated and BlackBerry Limited. In the Information Age, the market revolves around data and companies which produce technologies capable of mining such data are on the rise. Simultaneously, companies selling surveillance technologies appear to be on the peak too, especially since the global War on Terror requires law enforcement agencies around the world to be equipped with the latest surveillance gear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;State of Cyber Security and Surveillance in India: A Review of the Legal Landscape&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;The issue of cyber security and surveillance, especially unauthorised surveillance, though traditionally unprioritised, has recently gained much traction due to the increasing number of news reports regarding various instances of unauthorised surveillance and cyber crimes. In the case of unauthorised surveillance, more than the frequency of the instances, it is their sheer magnitude that has shocked civil society and especially civil rights groups. In the background of this ever increasing concern regarding surveillance as well as increasing concerns regarding cyber security due to the increased pervasiveness of technology in our society, this paper tries to discuss the legal and regulatory landscape regarding surveillance as well as cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gsma-research-outputs'&gt;https://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>GSMA Research</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-06T14:18:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy">
    <title>Security, Governments and Data: Technology and Policy </title>
    <link>https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy</link>
    <description>
        &lt;b&gt;On January 8, 2015, the Centre for Internet and Society, in collaboration with the Observer research foundation, hosted the day long conference "Security, Governments, and Data: Technology and Policy"  The conference discussed a range of topics including internet governance, surveillance, privacy, and cyber security. &lt;/b&gt;
        &lt;p&gt;The full report written and compiled by Lovisha Aggarwal and Nehaa Chaudhari and edited by Elonnai Hickok &lt;a href="https://cis-india.org/internet-governance/blog/security-governments-data-technology-policy.pdf" class="internal-link"&gt;can be accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The conference was focused on the technologies, policies, and practices around cyber security and surveillance. The conference reached out to a number of key stakeholders including civil society, industry, law enforcement, government, and academia and explored the present scenario in India to reflect on ways forward. The conference was a part of CIS’s work around privacy and surveillance, supported by Privacy International.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Welcome Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The welcome address opened with a reference to a document circulated by CIS in 2014 which contained hypothetical scenarios of potential threats to Indian cyber security. This document highlighted the complexity of cyber security and the challenges that governments face in defending their digital borders. When talking about cyber security it is important that certain principles are upheld and security is not pursued only for the sake of security. This approach allows for security to be designed and to support other rights such as the right of access, the right to freedom of expression, and the right to privacy. Indeed, the generation, use, and protection of communications data by the private sector and the government are a predominant theme across the globe today. This cannot be truer for India, as India hosts the third largest population on the internet in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the welcome, a brief introduction to the Centre for Internet and Society was given. It was noted that CIS is a 6.5 half year old organization that is comprised of lawyers, mathematicians, sociologists, and computer scientists and works across multiple focus areas including accessibility, internet governance, telecom, openness, and access to knowledge. CIS began researching privacy and surveillance in 2010, and has recently begun to expand their research into cyber security. The purpose of this is to understand the relationship between privacy, surveillance, and security and is the beginning of a learning process for CIS. In 2013 CIS undertook a process to attempt to evolve a legal regime to intelligently and adequately deal with privacy in India. Industry specific requirements are key in the Indian context and this process was meant to try and evolve a consensus on what a privacy law in India should look like by bringing together key stakeholders for roundtables. CIS is now in the final stages of preparing individual legal proposals that will be sent to the Government – to hopefully have an informed Privacy Law in India. This event represents CIS’s first attempt to have a simultaneous dialogue on surveillance, cyber security, and privacy. As part of this event and research CIS is trying to understand the technology and market involved in surveillance and cyber security as these are important factors in the development of policy and law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy'&gt;https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-04T05:59:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/february-2015-bulletin">
    <title>February 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/february-2015-bulletin</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is my distinct pleasure to share with you the second issue of the CIS newsletter (February 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, I joined the Centre for Internet and Society (CIS) as the Research Director. I have been fortunate to periodically work with CIS in 	various capacities since mid-2012, mostly focusing on the topics of open data, open access, and visual exploration of data. Most importantly perhaps for my 	present responsibilities, for the last year or so, I have been in communication with various projects teams at CIS and supported their efforts through 	workshops on research methodologies, and by discussing and co-designing their research questions and approaches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the Research Director, I look forward to take these works forward, along with leading the Researchers at Work (RAW) programme, which has been shaped by 	Prof. Nishant Shah to host an exciting range of critical research initiatives into how the Internet and digital technologies reconfigure social processes 	and structures, and vice versa. Please keep an eye on the newsletter for further updates from the RAW programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our sincere apologies for the delay in sending out this month's newsletter. We will soon be back in our usual rhythm. The past editions of the newsletter 	can be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sumandro Chattapadhyay 	&lt;br /&gt; Email: &lt;a href="mailto:sumandro@cis-india.org"&gt;sumandro@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Forbes India in an article titled "	&lt;a href="http://forbesindia.com/article/special/minds-that-%28should%29-matter/39289/2"&gt;Minds that (should) matter&lt;/a&gt;" names Sunil Abraham as one of the Thinkers who best explain a rapidly-changing India to the world (and the world to India).	&lt;i&gt;Errata: This story was shared in the last newsletter but with an error, which is now rectified.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;NVDA team organized three workshops during the month for training participants on using eSpeak with NVDA software. The languages covered were&lt;a href="https://cis-india.org/accessibility/blog/report-on-training-of-use-of-e-speak-punjabi-nvda"&gt;Punjabi&lt;/a&gt;,&lt;a href="https://cis-india.org/accessibility/blog/report-on-training-in-use-of-e-speak-oriya-with-nvda"&gt;Oriya&lt;/a&gt; and	&lt;a href="https://cis-india.org/accessibility/blog/training-on-use-of-espeak-hindi-nvda"&gt;Hindi&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The Department of Industrial Policy and Promotion (DIPP), Government of India invited comments on the First Draft of India's National IPR Policy. 	&lt;a href="https://cis-india.org/a2k/blogs/national-ipr-policy-series-cis-comments-to-the-first-draft-of-the-national-ip-policy"&gt; CIS sent its comments &lt;/a&gt; . CIS commended the DIPP for this initiative and appreciated the opportunity to provide comments on the National IPR Policy. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS sent out 		&lt;a href="https://cis-india.org/a2k/blogs/rti-requests-dipp-details-on-constitution-and-working-of-ipr-think-tank"&gt; three different Right to Information (RTI) requests &lt;/a&gt; to find out more details about the constitution and working of the IPR Think Tank to draft the first national IPR Policy. &lt;/li&gt;
&lt;li&gt; Anubha Sinha 		&lt;a href="https://cis-india.org/a2k/blogs/academia-and-civil-society-submit-critical-comments-to-dipp-on-draft-national-ipr-policy"&gt; analyses the submission &lt;/a&gt; to the DIPP by Academia and Civil Society on the draft National IPR Policy from a public interest perspective. &lt;/li&gt;
&lt;li&gt; In an &lt;a href="https://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;Open Letter to the Prime Minister of India&lt;/a&gt;, CIS requests 		the Government of India to initiate the formation of a patent pool of critical mobile technologies and a five per cent compulsory license.&lt;/li&gt;
&lt;li&gt;CIS's Access to Knowledge team (CIS-A2K) in collaboration with the Centre for Indian Languages (CILHE) at TISS, Mumbai	&lt;a href="https://cis-india.org/openness/blog/developing-open-knowledge-digital-resources-in-indian-languages"&gt;conducted a two-day workshop&lt;/a&gt; at 	English and Foreign Languages University (EFLU) at Hyderabad on January 28 - 29, 2015. Tejaswini Niranjana captures the developments in a blog post. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Subhashish Panigrahi wrote an		&lt;a href="https://cis-india.org/openness/blog/our-endangered-languages"&gt;op-ed on the endangered languages in India&lt;/a&gt;. This was published by 		Odia daily Samaja on February 21 which is celebrated as the International Mother Language Day. &lt;/li&gt;
&lt;li&gt; CIS-A2K team conducted the "		&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Train_the_Trainer_Program/2015"&gt;Train the Trainer Program&lt;/a&gt;" (TTT 2015) at 		CEO Centre, Dodda Gubbi, Bangalore. About 25 delegates attended the programme. &lt;/li&gt;
&lt;li&gt; CIS has 		&lt;a href="https://cis-india.org/internet-governance/blog/cis-joins-worldwide-campaign-to-discover-depth-of-gchq-illegal-spying"&gt; joined an international campaign &lt;/a&gt; to allow anyone in the world to request whether Britain's intelligence agency GCHQ has illegally spied on them.&lt;/li&gt;
&lt;li&gt;On January 30, 2015, Associated Chambers of Commerce &amp;amp; Industry of India (ASSOCHAM) held a consultation on Internet governance. A committee was 	set up to draft a report on Internet governance, with a focus on issues relevant to India. CIS is represented on the committee, and has provided its 	&lt;a href="https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham"&gt; preliminary comments to ASSOCHAM &lt;/a&gt; . &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; As part of		&lt;a href="https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions"&gt;CIS's inquiry into 'Network Neutrality'&lt;/a&gt; in 		the developing world a set of definitions of the term from different sources was collected and published as a blog post. &lt;/li&gt;
&lt;li&gt; Namita A. Malhotra in a &lt;a href="https://cis-india.org/raw/figures-of-learning-the-pornographer"&gt;blog entry&lt;/a&gt; examines the figure of the 		pornographer, as a mixed media figure entrenched in various networks of knowledge production, circulation and consumption. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion &lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is being printed. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/nvda-e-speak-report-february-2015.pdf"&gt;February 2015 Report&lt;/a&gt; (Suman Dogra; February 28, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/training-on-use-of-espeak-hindi-nvda"&gt;&lt;b&gt; &lt;/b&gt;Joint Report on Training of the Use of eSpeak in Hindi with NVDA &lt;/a&gt; (Organized by NVDA team; National Association for the Blind, New Delhi, February 5 - 6, 2015 and Blind Relief Association, Delhi, February 13 - 14, 		2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/report-on-training-in-use-of-e-speak-oriya-with-nvda"&gt; Report on Training in the use of eSpeak Oriya with NVDA &lt;/a&gt; (Organized by NVDA team; Orissa Association for the Blind, Bhubaneswar; February 8 - 10, 2015). Thirty six delegates attended the workshop. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/report-on-training-of-use-of-e-speak-punjabi-nvda"&gt; Training of the use of eSpeak Punjabi with NVDA &lt;/a&gt; (Organized by NVDA team; Asha Kiran Training Institute, Chandigarh; February 20-21, 2015). The workshop was inaugurated by Shri Tilak Raj, Director, 		Ministry of Social Justice and Empowerment, Government of Punjab. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the Pervasive Technologies project, Rohini Lakshané wrote an Open Letter to India's Prime Minister, Shri Narendra Modi for creation of a 	patent pool of critical mobile technologies. And as part of broader Access to Knowledge work CIS submitted comments to DIPP on the National IP Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/national-ipr-policy-series-cis-comments-to-the-first-draft-of-the-national-ip-policy"&gt; National IPR Policy Series: CIS Comments to the First Draft of the National IP Policy &lt;/a&gt; (Nehaa Chaudhari, Pranesh Prakash and Anubha Sinha; February 4, 2015). Varnika Chawla assisted the team. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/rti-requests-dipp-details-on-constitution-and-working-of-ipr-think-tank"&gt; RTI Requests - DIPP: Details on constitution and working of IPR Think Tank &lt;/a&gt; (Nehaa Chaudhari; February 9, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;Open Letter to Prime Minister Modi&lt;/a&gt; (Rohini Lakshané; February 10, 2015). Copies of the open letter were sent to various ministers. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/academia-and-civil-society-submit-critical-comments-to-dipp-on-draft-national-ipr-policy"&gt; Academia and Civil Society submit critical comments to DIPP on draft National IPR Policy &lt;/a&gt; (Anubha Sinha; February 16, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/india-at-leisure"&gt;India at Leisure: Media, Culture and Consumption in the New Economy&lt;/a&gt; (Organized by Jamia University; January 8 - 10, 2015). Maggie Huang attended the event and presented a paper titled "The Future of Music Streaming: 		Business Practices and Copyright Management in India". The paper was co-authored by Maggie and Amba Kak. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Op-ed&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/our-endangered-languages"&gt;Our Endangered Languages&lt;/a&gt; (Subhashish Panigrahi; February 21, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/a-wikipedia-presentation-at-goa"&gt;A Wikipedia Presentation at BITS, Goa&lt;/a&gt; (Radhakrishna Arvapally; February 9, 2015). Arvapally was a guest blogger. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/developing-open-knowledge-digital-resources-in-indian-languages"&gt; Developing Open Knowledge Digital Resources in Indian Languages &lt;/a&gt; (Tejaswini Niranjana; February 20, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/telugu-wikipedia-winter-camp-at-andhra-loyola-college"&gt; Telugu Wikipedia Winter Camp at Andhra Loyola College &lt;/a&gt; (Rahmanuddin Shaik; February 26, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/openness/events/train-the-trainer-program"&gt;Train the Trainer&lt;/a&gt; (Organized by CIS-A2K; CEO Centre, Dodda Gubbi, Bangalore; February 26 - March 1, 2015). Rohini Lakshané took a session on GLAM. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/the-hindu-february-16-2015-ad-rangarajan-more-online-free-content-in-telugu-wikipedia-soon"&gt; More online free content in Telugu Wikipedia soon &lt;/a&gt; (A.D.Rangarajan; Hindu, February 16, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/opensource-feburary-18-2015-jen-wike-huger-cultural-knowledge-needs-to-be-more-open"&gt; Cultural knowledge needs to be more open &lt;/a&gt; (Jen Wike Huger; OpenSource.com; February 18, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/andhra-jyothy-february-16-2015-online-free-content-in-telugu-wikipedia"&gt; Online Free Content in Telugu Wikipedia &lt;/a&gt; (Andhra Jyothy; February 19, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/news/opensource-2015-award-winners"&gt;2015 Opensource.com Community Awards&lt;/a&gt; : Every year, Opensource.com awards people from our community who have excelled in contributing and sharing stories about open source. Subhashish 		Panigrahi from the CIS-A2K team won the award under the category 'People's Choice Awards'. &lt;/li&gt;
&lt;li&gt; CIS-A2K team also &lt;a href="http://stats.wikimedia.org/EN/TablesWikipediaTE.htm"&gt;published the Telugu Wikipedia Stats tables&lt;/a&gt;. Most metrics have been 		collected from a partial dump (aka stub dump), which contains all revisions of every article, meta data, but no page content. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/how-the-first-time-face-to-face-interaction-helped-india-hindi-wikipedia-community"&gt;&lt;b&gt; &lt;/b&gt;Hindi Wiki Community Baithak &lt;/a&gt; (Organized by Wikipedia Community; February 14 - 15, 2015). Subhashish Panigrahi attended the event. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/international-conclave-odia-language"&gt;An International Conclave of Odia Language&lt;/a&gt; (Organized by the Intellects; February 20 - 21, 2015; Constitutional Club, Rafi Marg, New Delhi). Subhashish Panigrahi participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/news/region-open-data-workshop-2015"&gt;Regional Open Data Agenda-Setting Workshop 2015&lt;/a&gt; (Organized by Open Data Lab, Jakarta Web Foundation; Jakarta; February 4 - 6, 2015). Sunil Abraham was a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/washington-meeting-on-open-data-principles"&gt;Washington Meet on Open Data&lt;/a&gt; (Organized by World Bank; Washington; February 20 - 21, 2015). Sunil Abraham was a speaker and made a presentation on Open Data. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and 	International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur 	Foundation) is on studying the restrictions placed on freedom of expression online by the Indian goverTnment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"&gt;&lt;b&gt; &lt;/b&gt;The Surveillance Industry in India - An Analysis of Indian Security Expos &lt;/a&gt; (Divij Joshi; February 19, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/rti-requests-to-bsnl-mtnl-regarding-security-equipment"&gt; Right to Information (RTI) Requests to BSNL and MTNL Regarding Security Equipment &lt;/a&gt; (Maria Xynou; February 25, 2015). CIS had sent RTI requests to MTNL and BSNL in July 2013. MTNL responded recently whereas BSNL has yet to reply. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcements&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;CIS joins Worldwide Campaign to Discover Depth of GCHQ's Illegal Spying (Elonnai Hickok; February 28, 2015). Individuals who wish to take part in 	this process can sign up at &lt;a href="https://www.privacyinternational.org/illegalspying"&gt;https://www.privacyinternational.org/illegalspying&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Prof. Peng Hwa Ang from Nanyang Technology University visited CIS recently. He had a series of interactions with several researchers at CIS and has 	prepared a &lt;a href="https://cis-india.org/internet-governance/blog/peng-hwa-trip-report.pdf"&gt;brief visit report&lt;/a&gt;. Impressed with the research 	work of CIS he had discussions with CIS on possible collaborations including publication in more academic journals, collaboration with academic 	institutions in research projects in Privacy / Data Protection and other areas of Internet Governance. He also discussed on the possible areas where he 	could contribute to CIS including conduction of training session on writing for academic journals.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Freedom of Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;Requests to ICANN: CIS sent ICANN six requests to ICANN regarding ICANN's expenditure on travels and meetings, granular revenue, cyber-attacks on 	ICANN, ICANN's implementation of the NETmundial principles, complaints under the Ombudsman process, and information regarding revenues received from gTLD 	auctions. These were prepared by Geetha Hariharan: 	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-1-icanns-expenditures-on-travel-meetings"&gt; DIDP Request #1: ICANN's Expenditures on "Travel &amp;amp; Meetings" &lt;/a&gt; ; &lt;a href="https://cis-india.org/internet-governance/blog/didp-request-2"&gt;DIDP Request #2: Granular Revenue/Income Statements from ICANN&lt;/a&gt;;	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-3-cyber-attacks-on-icann"&gt;DIDP Request #3: Cyber-attacks on ICANN&lt;/a&gt;; 	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-4-icann-and-the-netmundial-principles"&gt; DIDP Request #4: ICANN and the NETmundial Principles &lt;/a&gt; ; 	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-5-the-ombudsman-and-icanns-misleading-response-to-our-request-1"&gt; DIDP Request #5: The Ombudsman and ICANN's Misleading Response to Our Request &lt;/a&gt; ; and	&lt;a href="https://cis-india.org/internet-governance/blog/didp-request-6-revenues-from-gtld-auctions"&gt;DIDP Request #6: Revenues from gTLD auction&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/collection-of-net-neutrality-definitions"&gt;Collection of Net Neutrality Definitions&lt;/a&gt; (Tarun Krishnakumar; February 8, 2015). The definitions were compiled by Manoj Kurbet, Maitreya Subramaniam and Tarun Krishnakumar under the guidance 		of Sunil Abraham. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/icann-accountability-iana-transition-and-open-questions"&gt; ICANN accountability, IANA transition and open questions &lt;/a&gt; (Geetha Hariharan; February 6, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/where-does-icann2019s-money-come-from-we-asked-they-don2019t-know"&gt; Where Does ICANN's Money Come From? We Asked; They Don't Know &lt;/a&gt; (Geetha Hariharan; February 9, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/preliminary-submission-on-internet-governance-issues-to-assocham"&gt; Preliminary Submission on "Internet Governance Issues" to the Associated Chambers of Commerce &amp;amp; Industry of India &lt;/a&gt; (Geetha Hariharan; February 12, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Miscellaneous&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women"&gt; A Selection of Tweets on How to Make Crowdmaps Effectual for Mapping Violence against Women &lt;/a&gt; (Rohini Lakshané; February 19, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/reply-to-rti-applications-with-respect-to-foreign-contractors-and-vendors-of-it-and-telecommunication-enterprises"&gt; Reply to RTI Applications filed with respect to Foreign Contractors and Vendors of IT and Telecommunication Enterprises &lt;/a&gt; (Lovisha Aggarwal; February 25, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/events/digital-security-workshop-for-journalists"&gt;&lt;b&gt; &lt;/b&gt;Digital Security Workshop for Journalists &lt;/a&gt; (Organized by CIS and Mumbai Press Club; Mumbai Press Club, Azad Maidan, Mumbai; February 7, 2015). Rohini Lakshané conducted the workshop as part 		of the Cyber Stewards project. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things"&gt;&lt;b&gt; &lt;/b&gt;Cybersecurity and the Internet of Things &lt;/a&gt; (Organized by US Consulate Chennai, Cyber Security &amp;amp; Privacy Foundation and CIS; Hotel Atria, Palace Road, Bangalore; March 19, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection"&gt;&lt;b&gt; &lt;/b&gt;Winter School on Privacy, Surveillance and Data Protection &lt;/a&gt; (Organized by the Centre for Communication Governance (CCG) in collaboration with the UNESCO Chair on Freedom of Communication and Information at the University of Hamburg and the Hans Bredow; Delhi; January 19 - 23, 2015). Bhairav Acharya was a facilitator.		&lt;i&gt;Errata: This was wrongly mentioned in the last newsletter. We have corrected this&lt;/i&gt;. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/net-gain-working-together-for-stronger-digital-society"&gt; NetGain: Working Together for a Stronger Digital Society &lt;/a&gt; (Organized by Ford Foundation; February 11 - 12, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;br /&gt; --------------------------------- 	&lt;br /&gt; CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/pc-world-john-riberio-february-10-2015-facebook-offers-free-but-limited-access-to-the-internet-in-india"&gt; Facebook offers free but limited access to the Internet in India &lt;/a&gt; (PC World; February 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/livemint-february-10-2015-moulishree-srivastava-govt-may-turn-to-supercomputing-for-better-use-of-aadhaar-database"&gt; Govt may turn to supercomputing for better use of Aadhaar database &lt;/a&gt; (Moulishree Srivastava; Livemint; February 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online"&gt; Analytics to help govt read public mood online &lt;/a&gt; (Surabhi Talwar; Business Standard; February 10, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/hindu-lalatendu-mishra-sriram-srinivasan-february-11-2015-hindu-facebook-launches-internet-org-in-india"&gt; Facebook launches Internet.org in India &lt;/a&gt; (Lalatendu Mishra and Sriram Srinivasan; Hindu; February 11, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/india-today-february-25-2015-sahil-mohan-gupta-google-war-on-nude-photos-goes-against-user-rights"&gt; Google's war on nude photos goes against user rights &lt;/a&gt; (Sahil Mohan Gupta; India Today; February 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked"&gt; Hacking of SIM card by spy agencies raises fears of sensitive documents being leaked &lt;/a&gt; (PK Jayadevan and Neha Alawadhi; Economic Times; February 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/economic-times-harsimran-julka-february-25-2015-delhi-government-in-consultation-with-centre-to-block-ubers-internet-address"&gt; Delhi government in consultation with Centre to block Uber's Internet address &lt;/a&gt; (Harsimran Julka; Economic Times; February 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/livemint-shreeja-sen-february-26-2015-sc-reserves-judgment-in-cases-against-section-66a"&gt; SC reserves judgement in cases against Section 66A &lt;/a&gt; (Shreeja Sen; Livemint; February 26, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Innovative Infrastructures for Research and Pedagogy in Interdisciplinary Social Sciences and Humanities (Co-organized by Centre for Study of 	Culture and Society and CIS, Bangalore): The RAW programme organized a consultation to discuss and conceptualise an upcoming project. The project will be 	hosted by the RAW programme. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/raw/figures-of-learning-the-pornographer"&gt;Figures of Learning: The Pornographer&lt;/a&gt; (Namita A. Malhotra; February 28, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and 	improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at	&lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/february-2015-bulletin'&gt;https://cis-india.org/about/newsletters/february-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-30T16:09:05Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis">
    <title>Live Chat: Aadhaar: An identity crisis? </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis</link>
    <description>
        &lt;b&gt;The Aadhaar card is not compulsory for citizens and "no person should be denied any benefits or ‘suffer’ for not having the Aadhaar cards issued by Unique Identification Authority of India," the Supreme Court ruled on Monday. &lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The live chat was &lt;a class="external-link" href="http://www.thehindu.com/news/national/the-debate-around-aadhaar-card/article7003376.ece"&gt;published in the Hindu&lt;/a&gt; on March 17, 2015. Sunil Abraham took part in the discussions.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Four years after Aadhaar was launched – and touted as a panacea to  access social services and subsidies – its users continue to be dogged  by an array of problems ranging from technical glitches to procedural  delays. And those who do not have an Aadhaar card find themselves  quizzed by government authorities.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;The Hindu&lt;/i&gt;’s Tamil Nadu edition today &lt;a href="http://www.thehindu.com/news/cities/chennai/issues-in-obtaining-aadhaar-from-glitches-to-lack-of-forms/article7000268.ece" target="_self"&gt;highlighted the challenges&lt;/a&gt; ordinary citizens - both those who have cards and those who do not –  face, be it from non-availability of application forms or glitches in  the biometrics process.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;We will be hosting a live chat on Aadhaar at 5 pm today. You can pose  questions and share your views with Sunil Abraham, Executive Director of  Bangalore-based research organisation, Centre for Internet and Society;  K. Gopinath, Professor at the Computer Science and Automation  Department at the Indian Institute of Science (IISc) and The Hindu’s K.  Venkatraman.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Anon &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;What could have happened such that the current government, who were once  in the opposition, were members of the parliamentary committee that  strongly opposed UIDAI, now suddenly wants to use it everywhere? What  could have transpired such that the PM got so convinced that it would  help its citizens more than it could potentially harm?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham: &lt;/b&gt;Usually the party that is in power is  pro-surveillance and anti-censorship and the opposition is pro-privacy  and pro-free speech. After the elections - if the parties swap positions  as a result of the mandate - then they usually also swap positions on  surveillance and censorship. This phenomenon is not specific to India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; The leakage in the current models is very high. Hence, the attraction.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The issue earlier was whether there was some costs to the use of sw  (esp. proprietary) from outside the country. Probably, these have been  addressed.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Saurabh &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar was supposed to be a good 2 factor authentication mechanism, what happens to it now ?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; Aadhaar architecture was designed to allow for  multiple authentication factors. Unfortunately biometrics is a poor  authentication factor since it cannot be revoked. Any two-factor  authentication scheme where one factor is biometrics is in reality only a  one-factor scheme. Pin code as with credit cards and debit cards would  have been much more secure for authentication.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; It will continue to be relevant, but is unlikely to be mandatory for quite some time.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; Real-time 2-factor auth (biometrics, signatures) are not easy, esp over Internet, and would require a much longer rollout&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Saurabh &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I did not get Aadhar for myself or my family. Does this mean, I will not have to as yet.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; As per the UIDAI - Aadhaar is not mandatory. Also  according to the latest remarks from the Supreme Court - Aadhaar should  not be made mandatory without enabling law. But many state and central  government agencies have ignored the comments made by the SC and have  made Aadhaar mandatory for various programmes and schemes.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu:&lt;/b&gt; Is Aadhaar virtually redundant now following the SC order? Nothing more than an expensive experiment?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath: &lt;/b&gt;I think it will be used as an addl auth mechanism  (just like elec./ph. receipts). May be once the technology is demo'ed  properly (it has not been done seriously anywhere else), it will be  taken up again.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Abubacker &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I am an NRI and need to have Aadhaar Card? How to obtain Appointmet - I am from Tuticorin, Tamil Nadu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; Your family member or representative living in  Tuticorin may apply for Aadhaar through the local body. It may be  possible to get a date for recording biometrics. However, you have to  come down here for recording biometric details.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Kishore J &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why is Govt. not able to legalize the Aadhar, I'm assuming the only  reason Supreme court keeps blocking it is because its not a law passed  by Parliament ?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; SC goes by the constitution. If there is some concern someone is being "excluded", they will block it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham: &lt;/b&gt;The NIA bill was proposed in parliament and then  referred to a Standing Committee. Our summary and detailed feedback to  the Bill is available here: http://cis-india.org/intern... The Standing  Committee harshly criticized the Bill. See:  http://164.100.47.134/lsscommittee/Finance/42%20Report.pdf After which  the Bill has not been reworked by the UIDAI or the Planning Commission  /Niti Aayog for re-presentation to the Parliament.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; No - it is not just an expensive experiment. It is  much more dangerous - it is what security experts call a Honey Pot. A  centralized repository of biometrics harvested from residents of India.  These biometrics can be used to authenticate transactions in the UIDAI  database and other services. If there is a breach - then this huge  collection of authentication factors will end us in the hands of  criminal elements or some foreign state.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From vaz &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhar is a joke, i have so many IDs and i cannot get any benefits out  of it, it is simply wasting time, if Govt really want mandate make it  easy for people, i pay taxes and Govt should treat me like one , i can  not waste my time standing in queues to get that card, get me time slot  and don't waste my time.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; This is because the process of registration has  been outsourced to private agencies. These private agencies have futher  outsourced to others and so on and so forth. Consequently, there is very  poor management and quality control by these agencies. If indeed  corruption was a priority - we should have tackled high-ticket  corruption first. We could have had biometric registration just for only  the politicians and bureaucrats. We could use biometric authentication  with them to create a non-repudiable audit trail of subsidies flowing  from the Centre to the Panchayat. Unfortunately, we tried to register  everybody simultaneously and that has resulted in poor quality of  biometrics and demographic data. We have visited some of the  registration centre and have seen the reality on the ground.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Guest &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I have been threatened by Gas Agency people if i don't link Aadhar to  Bank Account, won't be given a refilling cylinder.Is this a right one?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; There is an option for getting DBT even without  Aadhaar. The bank account and the gas agency consumer account can be  linked without Aadhar. Please check www.mylpg.in for knowing how to  apply for DBT registration without Aadhaar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu: &lt;/b&gt;Your views Prof Gopinath? Do you see it as a biometrics Honey Pot too?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath: &lt;/b&gt;From a security pov, it is certainly risky. It needs  really robust technologies before one can think of rolling out. For  example, we have "denial of service" attacks. ie, a service can be shut  out by random bombardment of msgs. Most curr large scale systems are  designed to handle it but some cannot handle it if large numbers  collude. This only prevents access to service but other attacks can  exfiltrate (take out) data, modify data, etc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu:&lt;/b&gt; And Mr. Venkataramanan, your thoughts?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From kuldeep singh chauhan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;We need a strong law for data security. Aadhar is collecting data but  there is no provision except some provisions of IT Act and IPC for data  security.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; Yes, the legislation is weak or unnecessarily vague  (eg. the IT2000 act) or too broad in scope. I think what we need is a  citizen's charter for data access, security and privacy. Also, what  needs to be done when systems do not work!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; There are two interpretations of Sec. 43A of the  IT Act. Acccording to most experts it only applies to Body Corporates in  other words it does not apply to the Government when it plays the role  of a data controller. According to an order issued by the IT Secy of  Maharastra [the court of first instance for 43A of ITA] -this section  will also apply to the Government. But beyond that order we have no  clarity on this question.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Pavan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;With no privacy laws, isn't it a bad idea to store citizen's data in a  database? We all know how inept our government is in ensuring any  security/privacy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; With or without laws. Centralized approaches to  identity/authentication management are much more fragile and vulnerable  compared to decentralized options. The Internet is secured by digital  signatures - there is no centralized repository of all these signatures.  Therefore there is no centralized point of failure for the Internet. If  the Aadhaar project was based on Smart Cards instead of Biometrics -  then just like the Internet it would be robust without a central point  of failure. http://cis-india.org/intern...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K. Gopinath:&lt;/b&gt; Storing all info in a single place is a big security  risk. It needs very robust technologies (such as replication and  "secret sharing protocols") that work inspite of failures. These have  been done here and there but doing it on a large scale requires care.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Kunal Soni &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;SC Adhar card recommendations, ok Got it! But what about the banks for  example SBI who ask for adhar cards stating its the bank's rule? Who's  going to answer the question as they would never listen to common man  and they never did.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Sandeep &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Hi,May be it is a strong message, but what exactly is the need to  make/introduce the Adhaar card, which is not recognizable worldwide? Why  dont we make our passport smart enough and reduce it to a chip as in  Europe. This will also enable everyone to get enrolled in our  administrative system. Basically, we are only repeating the entire  process with no international recognition.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Krishna Rao &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Need to make it mandatory in the lines of SSN in US. Else it would be  very difficult to manage and ensure the subsidies and benefits reach the  really deserved section.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Ramesh &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is a great concept it all information like property purchases, tax  returns, ration card, pf, esi, bank accounts , rail, air tickets are all  linked. will reduce corrupt practice considerably. It should be the  main identity of an Indian&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From arun &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Sunil what are the privacy safeguards that are in place currently  regarding protection of information collected by the government and  private agencies designated for this?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; Do you mean legal or technical?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;K Venkataramanan:&lt;/b&gt; @The Hindu: Yes, there are serious privacy  issues involved in a centralised database. However, their is a  counter-view that this is no different from any other data base  available in the hands of the government such as the one relating to  PAN. The main concern of those worried about the privacy problem in  Aadhaar is that data collection is done by private agencies, and details  such as biometric data could be misused&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;The Hindu:&lt;/b&gt; Sunil, a question for you from arun&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Pawan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Govt should give it legal recognition and give legal guarantee about the  usage and storage of the data... After that there would be no concern  related to identity security or enforcing it on the people.. People  would trust it and come forward to register for it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham:&lt;/b&gt; Legal recognition and guarantees are not  sufficient. You cannot use the law to fix poor technology design. The  security of the Internet is not a function of good law. It is a function  of good technological design.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Comment From Pappan &lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;the so called Europe, US an other developed countries already have  Social security numbers, why cant we just look at it like that?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Social Security Number are an additional identifier. The  database just contains a collection of identifiers. If that database is  compromised the information cannot be used to authenticate transactions.  This is very unlike the UIDAI centralized database which is a  collection of authentication factors. Think of it as a database filled  with the passwords of all Indian residents.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: @Kunal Soni - SBI can't insist on it as of now. The  person who issued any circular to that effect may be hauled up in court&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I have two questions. First, why is the honourable supreme court strking  down aadhar, on what grounds? Second, how can the government come  around those objections and allay the courts fears/objections? The  informed panelists may please give their opinions too. Thank you&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: There are 3 sets of petitioners who are being heard by  the SC in the combined case. Some of them associated with the right are  arguing that the UID is a threat to national security as it legitimizes  illegal immigrants. Those associated with the left are arguing that it  is a violation of the right to privacy. Still other who are ex-officers  from the armed forces are arguing that the project is mired in corrupt  practices.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The Court has not struck down Aadhaar. It has only  passed interim orders protecting the access to services of those who  have not yet had them.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aashish Gupta&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar was supposed to usher in portability of benefits. That is, you  could migrate to a different state and still get the benefit you  deserved.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: The Aadhaar database only contains information that  identifies you and also allow you to authenticate against that database.  It does not indicate eligibility for various schemes/subsidies. The  migration across State level eligibility lists has to be done by the  State. It is not a functionality provided by the UIDAI.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ramesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Supreme Court should have suggested a better option instead of coming  down heavily on the Aadhar Card. The card will straight eliminate  multiple rations cards and voter ids.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: The previous technology adopted by the NDA government -  smart cards or SCOSTA [for the MNIC]. This technology option is free  from many of the flaws of UIDAI's current design.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Mrigesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why is Aadhaar needed? I am for a middle class or for the elite class?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Geetha&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Has the government (or concerned agencies/departments) formulated any  policy on using the Aadhar information collected? For instance, what  agency can use the information, under what conditions, with whose  approval, for what limited purposes? Is this policy publicly available?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: No. Anyone who is approved by the UIDAI as a legitimate  can use the KYC API. Absolutely anyone can use the Authentication API.  There is no policy on what data collection/retention practices must be  adhered to by the users of both these APIs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Arun Jayapal&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Has the government ever considered/analyzed a way to link the existing  resources (such as ration card, DL, passport, voter id, etc.,) and not  have come up with a completely new system (aadhaar). Is this not an  absolute waste of time and resources?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Yes, you are absolutely right. The government should have  used biometrics as a means to dedup an existing high value database  like the Electoral Rolls or more importantly the PAN Card database. That  would have been better RoI for our anti-corruption Rupee.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: @Ramesh The Court has come down heavily on only  officials who insist on Aadhar for delivery of services when there are  clear orders that it should not be mandatory&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From George J&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I'm an NRI. I presently work and live in a country where the first order  of business on landing/Birth is to register one self and get a unique  ID number and ID. This the case for expats as well as residents be they  foreigners or Citizens. The registration process includes collection of  Biometric data. This single No and Id is used for everything from Bank  Accounts to School Admissions. It is good that India is doing something  similar. It is high time people with multiple ration cards, Passports  and the like are weeded out and provided a single verifiable identity.  Data Security is of essence and necessary safeguards are available.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Could you name the country? And can you use biometrics  your country to authenticate transactions in a centralized database for  all sorts of transactions? If yes, then the technology design in your  country is as poor as in ours and it is only a question of time when the  centralized database leaks.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aashish Gupta&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Apart from the Honey Pot, Aadhaar does not serve its primary purpose:  tackling corruption. Most pilots of Aadhaar have crash landed, and as a  result, state governments have created their own simpler systems to  tackle corruption.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: See: http://www.thehindu.com/opi... If the authentication  match is not working [1:1 match]. Then basically the dedup will not  work [1:n] match. That is why they are doing demographic dedup before  biometric dedup - because they know that the biometric dedup is  fallible.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Balu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A citizenship card , backed with a strond database is a must for every  citixen . Some serious thoughts should be done in this matter at the  earliest , instead of wasting time and money on different schemes .&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: We should use decentralized Internet scale technologies  based on open standards that are already proven. If we had used smart  cards based on SCOSTA or EMV standard we would be in a much better  place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From PRASHANTH&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Has the government (or concerned agencies/departments) formulated any  policy on using the Aadhar information collected? For instance, what  agency can use the information, under what conditions, with whose  approval, for what limited purposes? Is this policy publicly available?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From vikash&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;supreme court should not have to push such legal hurdles given that the  750 million card has already been generated.A lot of money has been  investad in the project&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Saket&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aaadhar card is full of errors. At the place where I got registered  person was issuing it in a hurry which creates lots of typing errors in  DOB and Place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aashish Gupta&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The supreme court has not struck down aadhaar, it has said that aadhaar  cannot be mandatory. This is to make sure that people who do not have an  aadhaar card do not miss out on their entitlements.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ramesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar should be made mandatory with necessary safeguards. Unless there  is an ultimatum and time frame to get the card it will never be  implemented. Even now many do not know where to get it done.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Aadharam&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Could you clarify whether this is an interim order or a final order on  Aadhar? Is there scope for a retraction/shift on the Supreme Court's  part?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Onkar Tiwari&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why supreme court doesnt understand Adhar is necessary? it can curb  corruption. it wll reduce corruption specially in manrega where people  enters fake details and grab the money.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: It is only an interim order. The Court will,  hopefully, resolve the questions raised by the petitioners about privacy  and data security issues&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From George J&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I have taken Aadhar Card. The procedure asks the applicant themselves to  verify the data entered for typing mistakes etc. before being uploaded,  in fact where I registered they had asked for a sign off on the final  data on a printout. So how errors can creep in is beyond me. However the  photography equipment and skill of the data entry operator leave much  to be desired as the mug shot is not very kind to me!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There should be a guide line which need to be followed as it is in the  hands of private partners who are also ask for bribe from the poor  people for the aadhar and they have no other option to pay for it as  they thought that this only can help them to get the govt. facilities  and subsidies.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: @Onkar Tiwari, It is up to the government to convince  the court that Aadhaar will help curb corruption, and how. The Court is  unlikely to stop the use of technology to improve delivery of services  and curb corruption.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From v subrahmanian&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;help line over phone and the email correspondence is total waste.. they  themselves are helpless. Any query has never been replied to the  caller's satisfaction. Getting them on line itself is a challenge. It's  so complex. Of course, every eligible citizen of this complex country  must have the identity card. Why not if it is done through employer in  case of organized salaried employees?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ramakrishna Rao&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Hi !! I request the panelists to kindly sum up in few 4 or 5 points the  reasons/grounds on which the parliamentary committee has rejected the  aadhar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The agencies who are collecting data for Aadhar Card are not doing good.  The aadhar card is full with many kind of errors including Name and  DOB.. Even a person is able to register twice under this scheme.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Mr. Venkataramanan would you like to respond to Ramakrishna Rao?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@K Gopinath - how robust is the de-duplication UID claims to have. And  in real time transactions, is it possible to authenticate n request  without 'false positives' or 'negatives'?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K. Gopinath: Dedup claims assume “good” conditions. For example, a  farmhand may have rough skin, etc that may make the fingerprints  problematic. 1% errors have been reported in the past. Real time txns: I  think the current Aadhar is not geared for it. The connectivity is not  there. Also, with fingerprint technologies, the ability to check large  number of fingerprints for a match is not good enough. It has never been  scaled to the extent that is being planned.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sandeep&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Still not sure if Aadhaar then other ID cards not needed ? Or Still all  along with Aadhaar ? then what is meaning of Aadhaar ? Only for LPG  connection? Why not govt making Aadhaar is mandatory in all other fields  as well , As Govt spent huge money for Aadhaar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@ Sunil - How plausible is the idea that govt can use UID data to profile public?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sushubh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I for one is very happy that at least the Supreme Court is not falling  for this privacy infringing scam. People defending this card here on  this platform needs to read more about it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Govt. created panic among public regarding adhaar. Public is highly  annoyed with the way the government is handling this adhaar project.  Only court reprimands,govt. backtracks as far as the adhaar is  concerned. It is high time for govt. to have serious insight into this.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The parliamentary committee on Finance had objected to  the UID being extended to non-citizens on the ground that it may end up  in illegal immigrants getting Aadhaar numbers.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It had also questioned the rollout ofthe scheme before legislation was  passed. It had objected to its implementation without regard to its  consequences.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Srinivasa&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I believe Nandan Nilkeni had mentioned certain very good examples of the  system flagging duplicates. So I assume the system is robust. We need  to make it mandatory for all services delivery and have suitable policy  and technology to protect data.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: I don't think we can go by the assurance of someone no  longer associated with the project. It is not persons that keep us safe  it is proper technology and law.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Welcome back Sunil! Lots of questions await you&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The committee had said UIDAI had no conceptual  clarity, no proper assessment of the costs involved, and that it could  end up in the hands of private agencies, that the technology was  untested and the UID may not meet the objectives for which it was  conceived&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Sorry I was logged out.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There was a recent news in The Hindu about linking of Adhar cards to  election voter ID cards in Andhra Pradesh. Do you think that adopting  such moves by every state result in mandating the procedure eventually?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;First Passport then PAN , voter id and now adahar, in any country there  is only passport and SSN, why india needs so many identity cards&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K. Gopinath: The PAN database has been problematic just as the voter id.  Hence, every technology cycle, a new system is usually attempted that  attempts to be "better" than the before. However, this requires care  which is not in good supply in the govt where the "lowest" bidder wins  or outsourcing happens.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: We have Prof Gopinatha back too. Sorry about that technical glitch.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Deepak Vasudevan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Why are different apex agencies managing Aadhar like UIDAI, Census and  NPR? There should be one root (apex) body and others should report onto  it.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Yes. The division of work between UIDAI and NPR is not very clear and has added to the confusion.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: The parliamentary standing committee, too pointed out the overlap of functions involving UIDAI and NPR&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: There was this question for you earlier on the thread @K  Gopinath - how robust is the de-duplication UID claims to have. And in  real time transactions, is it possible to authenticate n request without  'false positives' or 'negatives'?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K. Gopinath: Dedup claims assume “good” conditions. For example, a  farmhand may have rough skin, etc that may make the fingerprints  problematic. 1% errors have been reported in the past. Real time txns: I  think the current Aadhar is not geared for it. The connectivity is not  there. Also, with fingerprint technologies, the ability to check large  number of fingerprints for a match is not good enough. It has never been  scaled to the extent that is being planned.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;When Union Of India aimed to greater transparency... these are the road  blocks they get... If Aadhar is not mandatory... then make Voter ID, PAN  Card, Ration card also not mandatory in their respective Govt  Businesses ... make self declaration as mandatory .. lets go to the  stone age in this Information age. Instead SC should direct the center  to come up with procedure to accommodate legitimate citizens of India  into the scheme in a time bound manner and frame policies to avoid  misuse of the personal data. are we looking the current world  Information age thru the same old glasses... it is time to adopt the  change...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Indeed we need more transparency. But privacy protections  must be inversely proportionate to power and as Julian Assange says  transparency requirements should be directly proportionate to power See:  http://openup2014.org/priva...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;K Venkataramanan: Linking Aadhaar and voter ID cards is also being tried  out in other states It is only one more means of eliminating fake  voters or duplicates, but is unlikely tobe a ground to make Aadhaar  mandatory&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ganesh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Mr.Sunil, The current technology adopted for UIDAI is not good compared to last regime?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Please see my our open letter on this question http://cis-india.org/intern...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Madhavan R&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Just because UPA government bring this, its not good for NDA to object  it.. STOP wasting our money.. Just try to make best out of it..&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Pouring more money into a failed project will not save  it. It has serious technological flaw and without addressing it we are  just making a bad situation worse.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From George J&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Currently all embassy's are collecting biometric data when you apply for  a visa. Most of this collection is done by private parties on behalf of  the respective governments. So if an Indian has travelled abroad the  chances of his Biometric data being available to foreign govts is 99%.  So what is the big scare about this? The need that it should be secure  and should not be misused is sacrosanct. with the kind of revelations  that have been made about mass eavesdropping I think people should get  used to living in glass houses!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Pappan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Sunil, please clarify about your comment on technology inadequecy&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Yuvaraj&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I strongly support Adhaar card implemenataion. intially they may face  challeneges but for the long run its very effective mechanism to monitor  every thing&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Monitoring everything means you monitor nothing. The  bigger the haystack the harder it is to find the needle. Good  surveillance practices means targetting survelliance not en masse data  collection.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It is heard that privacy of citizens is at stake with adhaar card. can panelists respond to this?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: I have dealt with your question here: http://www.business-standar...&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Srinivasa&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;That comparison of the two standards (SCOSTA and Aadhar) made  interesting reading. Why not a system where you collect biometrics and  iris and then issue a SCOSTA card? the biometrics and iris can be used  to remove duplicates and maintain a clean registry by failing the  duplicate SCOSTA cards. And all further transactions will only need a  card based access.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Loganathan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This is one the worst move by any government in the center to remember.  With no motive for the card, they introduced just to add to the loss in  exchequer and there is no benefit out of it. Many have wrong data  entered against their name and totally the waste one of all&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sabari Arasu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I am aware of someone who is not Indian citizen got Aadhar card for  himself and his family. This scares me a lot as anyone(read  Bangaladheshis, Sri Lankans, Pakintanis, etc..) can get Aadhar card. Is  there a measure taken by Government to identify these issues?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: This is possible because the technology [biometrics]  cannot verify citizenship. Even worse biometrics can be imported from  foreign countries and can be used to create resident ghosts. This is  because the technology cannot even verify if the person in India. We  will need surveillance cameras at every point of registration to take  care of this possible fraud.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Chandra Sekhar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Aadhaar card was a huge opportunity for the government to improve the  efficiency of governance.It was a challenging task and required great  amount accuracy.The way this project was executed is a question mark on  efficiency of governance.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Sunil, Venkatramanan, Gopinath - would you agree that Aadhaar  was an opportunity to improve governance? @chandra sekhar&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Freebee lovers/netas will always oppose when you want to implement some thing which might deny them the benefit.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Any evidence to backup this statement?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;if the ASDHAAR is nt necessary as per SC then why everywhere it is being preferred identity such as Subsidy, Passport etc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sunil Abraham: Preference is not the same as a mandatory requirement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis'&gt;https://cis-india.org/internet-governance/news/the-hindu-march-17-2015-aadhaar-an-identity-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-03T06:54:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy">
    <title>What Does Facebook's Transparency Report Tell Us About the Indian Government's Record on Free Expression &amp; Privacy?</title>
    <link>https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy</link>
    <description>
        &lt;b&gt;Given India's online population, the number of user data requests made by the Indian government aren't very high, but the number of content restriction requests are not only high on an absolute number, but even on a per-user basis.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Further, Facebook's data shows that India is more successful at getting Facebook to share user data than France or Germany.  Yet, our government complains far more about Facebook's lack of cooperation with Indian authorities than either of those countries do.  I think it unfair for any government to raise such complaints unless that government independently shows to its citizens that it is making legally legitimate requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the Prime Minister of India Shri Narendra Modi has stated that "&lt;a class="external-link" href="http://pmindia.gov.in/en/quest-for-transparency/"&gt;transparency and accountability are the two cornerstones of any pro-people government&lt;/a&gt;", the government ought to publish a transparency report about the requests it makes to Internet companies, and which must, importantly, provide details about how many user data requests actually ended up being used in a criminal case before a court, as well as details of all their content removal requests and the laws under which each request was made.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, &lt;a class="external-link" href="https://govtrequests.facebook.com/"&gt;Facebook's Global Government Requests Report&lt;/a&gt; implicitly showcases governments as the main causes of censorship and surveillance.  This is far from the truth, and it behoves Facebook to also provide more information about private censorship requests that it accedes to, including its blocking of BitTorrent links, it's banning of pseudonymity, and the surveillance it carries out for its advertisers.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy'&gt;https://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Transparency Reports</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-05T05:08:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf">
    <title>State of Cyber Security and Surveillance in India: A Review of the Legal Landscape</title>
    <link>https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf'&gt;https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T03:23:35Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
