<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 571 to 585.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-october-6-2016-vidushi-marda-internet-democratisation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/budapest-convention-paper.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/intermediary-liability-resources"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/substantive-areas/public-accountability/int-ellectural.-property-right-and-trade"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/insafnational-convention-on-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/publications/it-act"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-october-6-2016-vidushi-marda-internet-democratisation">
    <title>Internet Democratisation: IANA Transition Leaves Much to be Desired</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-october-6-2016-vidushi-marda-internet-democratisation</link>
    <description>
        &lt;b&gt;At best, the IANA transition is symbolic of Washington’s oversight over ICANN coming to an end. It is also symbolic of the empowerment of the global multistakeholder community. In reality, it fails to do either meaningfully.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The article was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/analysis/internet-democratisation-iana-transition-leaves-much-to-be-desired/story-t94hojZjDXqS4LjNSepZlN.html"&gt;Hindustan Times&lt;/a&gt; on October 6, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;img src="https://fortunedotcom.files.wordpress.com/2016/09/605664440.jpg" alt="PardonSnowden.org" /&gt;
&lt;h6&gt; Many suspect Washington’s 2014 announcement of handing over control of the IANA contract to be fuelled by the outcry following Edward Snowden’s revelations of the extent of US government surveillance. Source: AFP&lt;/h6&gt;
&lt;p style="text-align: justify;"&gt;September 30, 2016, marked the expiration of a contract between the US government and the Internet Corporation for Assigned Names and Numbers (ICANN) to carry out the Internet Assigned Numbers Authority (IANA) functions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In simpler, acronym-free terms, Washington’s formal oversight over the Internet’s address book has come to an end with the expiration of this contract, with control now being passed on to the “global multistakeholder community”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ICANN was incorporated in California in 1998 to manage the backbone of the Internet, which included the domain name system (DNS), allocation of IP addresses and root servers. After an agreement with the US National Telecommunications and Information Administration (NTIA), ICANN was tasked with operating the IANA functions, which includes maintenance of the root zone file of the DNS. Over the years Washington has rejected calls to hand over the control of IANA functions, but in March 2014 it announced its intentions to do so and laid down conditions for the handover. Many suspect the driving force behind this announcement to be the outcry following Edward Snowden’s revelations of the extent of US government surveillance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The conditions laid down by the NTIA were met, and the US government accepted the transition proposal, amidst much political pressure and opposition, most notably from Senator Ted Cruz.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This transition is a step in the right direction, but in reality, it changes very little as it fails to address two critical issues: Of jurisdiction and accountability.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Jurisdiction is important while considering the resolution of contractual disputes, application of labour and competition laws, disputes regarding ICANN’s decisions, consumer protection, financial transparency, etc. Many of these questions, although not all, will depend on where ICANN is located. ICANN’s new bylaws mention that it will continue to be incorporated in California, and subject to California law just as it was pre-transition. Having the DNS subject to the laws of a single country can only lend to its fragility. ICANN’s US jurisdiction also means that it is not free from the political pressures from the US Senate and in turn, the toxic effect of American party politics that were made visible in the events leading up to September 30.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another critical issue that the transition does not address is that of ICANN accountability. Post-transition, ICANN’s board will continue to be the ultimate decision-making authority, thus controlling the organisation’s functioning, and ICANN staff will be accountable to the board alone.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To put things in perspective, look at the board’s track record in the recent past. In August, an Independent Review Panel (IRP) found that ICANN’s board had violated ICANN’s own bylaws and had failed to discharge its transparency obligations when it failed to look into staff misbehaviour. Following this, in September, ICANN decided to respond to such allegations of mismanagement, opacity and lack of accountability by launching a review. The review however, would not look into the issues, failures and false claims of the board, but instead focus on the process by which ICANN staff was able to engage in such misbehaviour. This ironically, will be in the form of an internal review that will pass through ICANN staff — the subjects of the investigation — before being taken up to the board.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At best, the transition is symbolic of Washington’s oversight over ICANN coming to an end. It is also symbolic of the empowerment of the global multistakeholder community. In reality, it fails to do either meaningfully.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-october-6-2016-vidushi-marda-internet-democratisation'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-october-6-2016-vidushi-marda-internet-democratisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-03T07:52:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency">
    <title>Internet Censorship, Surveillance, and Corporate Transparency</title>
    <link>https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency</link>
    <description>
        &lt;b&gt;Google’s Dorothy Chou will be in conversation with international experts Annenberg School of Communication, St., Philadelphia, on April 3, 2013, from 4.30 p.m. to 6.00 p.m. Malavika Jayaram is participating in the event as a panelist. The event is organised by Center for Global Communication Studies and Annenberg School for Communication, University of Pennsylvania.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read full details of the event was&lt;a class="external-link" href="http://www.global.asc.upenn.edu/events.html"&gt; published&lt;/a&gt; on the website of Center for Global Communication Studies.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Since mid 2010 Google has been publishing data about the requests it receives from governments to remove content or hand over user data. This regularly updated Transparency Report reveals alarming trends: Government surveillance is on the rise, everywhere. Even worse, a large number of government censorship and surveillance requests are of dubious legality even according to the host countries’ own laws.  In a world where citizens increasingly rely on digital products and services owned and operated by private corporations for their civic and political lives, the implications for human rights and democracy around the world are troubling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dorothy Chou, Senior Policy Analyst who leads Google's efforts to increase transparency about how it responds to government censorship and surveillance demands, will discuss Google's Transparency Report with Rebecca MacKinnon, Senior Fellow at the New America Foundation and an international panel of experts:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Ronald Lemos, &lt;/b&gt;the                                                           Director of                                                           the Center for                                                           Technology and                                                           Society at the Fundação Getúlio Vargas                                                           (FGV) School                                                           of Law in Rio                                                           de Janeiro,                                                           Brazil&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Hu                                                           Yong&lt;/b&gt;,                                                           Associate                                                           Professor,                                                           Peking                                                           University                                                           School of                                                           Journalism and                                                           Communication&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Malavika                                                           Jayaram&lt;/b&gt;,                                                           Fellow, Center                                                           for Internet                                                           and Society,                                                           Bangalore and                                                           Annenberg                                                           CGCS;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; Gregory Asmolov,&lt;/b&gt; PhD Candidate, London School of                                                           Economics;                                                           Global Voices                                                           "RuNet Echo" contributor and Russian                                                           social media                                                           expert.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This event is part of the cross-disciplinary, university-wide “&lt;a href="http://cgcs.asc.upenn.edu/cgi-bin/projects.cgi?id=105&amp;amp;p=main"&gt;New Technologies, Human Rights, and Transparency&lt;/a&gt;”  project funded by the university’s Global Engagement Fund and hosted by  Annenberg’s Center for Global Communications Studies in partnership  with Wharton, PennLaw, Engineering, and the School of Arts and  Sciences.  The project aims to examine the relationship between  government and corporate power in today’s digitally networked world,  bringing together research partners from across the university and  around the world to develop a methodology to evaluate and compare the  policies and practices of Information and Communication Technology (ICT)  companies as they affect Internet users’ freedom expression and privacy  in a human rights context.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency'&gt;https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-25T10:29:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf">
    <title>International Principles on the Application of Human Rights to Communications Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf'&gt;https://cis-india.org/internet-governance/blog/necessary-and-proportionate.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-07-31T09:02:12Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018">
    <title>International Network on Feminist Approaches to Bioethics 2018</title>
    <link>https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018</link>
    <description>
        &lt;b&gt;The event was co-organized by Feminist Approaches to Bioethics and Sama - A Resource Centre for Women and Health and was held at St. John's Medical College in Bangalore between December 3 and 5, 2018. &lt;/b&gt;
        &lt;p&gt;Aayush Rathi and Ambika Tandon participated in the event as speakers. Aayush presented a paper 'Sexual Surveillance and Data Regimes: Development in the Data Economy' co-authored by himself and Ambika.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/fab-congress/"&gt;Download the agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018'&gt;https://cis-india.org/internet-governance/news/international-network-on-feminist-approaches-to-bioethics-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-04T15:46:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention">
    <title>International Cooperation in Cybercrime: The Budapest Convention</title>
    <link>https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention</link>
    <description>
        &lt;b&gt;In today’s increasingly digitized world where an  increasing volume of information is being stored in the digital format, access to data generated by digital technologies and on digital platforms is important in solving crimes online and offline.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/budapest-convention-paper.pdf"&gt;&lt;b&gt;Click to download the file here &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, the global nature of the internet challenges traditional methods of law enforcement by forcing states to cooperate with each other for a greater variety and number of cases than ever before in the past. The challenges associated with accessing data across borders in order to be able to fully investigate crimes which may otherwise have no international connection forces states to think of easier and more efficient ways of international cooperation in criminal investigations. One such mechanism for international cooperation is the Convention on Cybercrime adopted in Budapest (“&lt;/span&gt;&lt;strong&gt;Budapest&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;Convention&lt;/strong&gt;&lt;span&gt;”). Drafted by the Council of Europe along with Canada, Japan, South Africa and the United States of America it is the first and one of the most important multilateral treaties addressing the issue of cybercrime and international cooperation.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Extradition&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 24 of the Budapest Convention deals with the issue of extradition of individuals for offences specified in Articles 2 to 11 of the Convention. Since the Convention allows Parties to prescribe different penalties for the contraventions contained in Articles 2-11, it specifies that extradition cannot be asked for unless the crime committed by the individual carries a maximum punishment of deprivation of liberty for atleast one year.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In order to not complicate issues for Parties which may already have extradition treaties in place, the Convention clearly mentions that in cases where such treaties exist, extradition will be subject to the conditions provided for in such extradition treaties.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although extradition is also subject to the laws of the requested Party, if the laws provide for the existence of an extradition treaty, such a requirement shall be deemed to be satisfied by considering the Convention as the legal basis for the extradition.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Convention also specifies that the offences mentioned in Articles 2 to 11 shall be deemed to be included in existing extradition treaties and Parties shall include them in future extradition treaties to be executed.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention also recognises the principle of "&lt;em&gt;aut dedere aut judicare&lt;/em&gt;" (extradite or prosecute) and provides that if a Party refuses to extradite an offender solely on the basis that it shall not extradite their own citizens,&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; then, if so requested, such Party shall prosecute the offender for the offences alleged in the same manner as if the person had committed a similar offence in the requested Party itself.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Convention also requires the Secretary General of the Council of Europe to maintain an updated register containing the authorities designated by each of the Parties for making or receiving requests for extradition or provisional arrest in the absence of a treaty.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Mutual Assistance Requests&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention imposes an obligation upon the Parties to provide mutual assistance “to the widest extent possible” for investigations or proceedings of criminal offences related to computer systems and data.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Just as in the case of extradition, the mutual assistance to be provided is also subject to the conditions prescribed by the domestic law of the Parties as well as mutual assistance treaties between the Parties.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, it is in cases where no mutual assistance treaties exist between the Parties that the Convention tries to fill the lacuna and provide for a mechanism for mutual assistance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention requires each Party to designate an authority for the purpose of sending and answering mutual assistance requests from other Parties as well as transmitting the same to the relevant authority in their home country. Similar to the case of authorities for extradition, the Secretary General is required to maintain an updated register of the central authorities designated by each Party.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Recognising the fact that admissibility of the evidence obtained through mutual assistance in the domestic courts of the requesting Party is a major concern, the Convention provides that the mutual assistance requests are to be executed in accordance with the procedures prescribed by the requesting Party unless such procedures are incompatible with the laws of the requested Party.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parties are allowed to refuse a request for mutual assistance on the grounds that (i) the domestic laws of the requested party do not allow it to carry out the request;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (ii) the request concerns an offence considered as a political offence by the requested Party;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or (iii) in the opinion of the requested Party such a request is likely to prejudice its sovereignty, security, &lt;em&gt;ordre public &lt;/em&gt;or other essential interests.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The requested Party is also allowed to postpone any action on the request if it thinks that acting on the request would prejudice criminal investigations or proceedings by its own authorities.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In cases where assistance would be refused or postponed, the requested Party may consult with the other Party and consider whether partial or conditional assistance may be provided.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In practice it has been found that though States refuse requests on a number of grounds,&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; some states even refuse cooperation in the event that the case is minor but requires an excessive burden on the requested state.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A case study of a true instance recounted below gives an idea of the effort and resources it may take for a requested state to carry out a mutual assistance request:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In the beginning of 2005, a Norwegian citizen (let’s call him A.T.) attacked a bank in Oslo. He intended to steal money and he did so effectively. During his action, a police officer was killed. A.T. ran away and could not be found in Norway. Some days later, police found and searched his home and computer and discovered that A.T. was the owner of an email account from a provider in the United Kingdom. International co-operation was required from British authorities which asked the provider to put his email account under surveillance. One day, A.T. used his email account to send an email message. In the United Kingdom, police asked the ISP information about the IP address where the communication came from and it was found that it came from Spain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;British and Spanish authorities installed an alert system whose objective was to know, each time that A.T. used his email account, where he was. Thus, each time A.T. used his account, British police obtained the IP address of the computer in the origin of the communication and provided it immediately to Spanish police. Then, Spanish police asked the Spanish ISPs about the owner or user of the IP address. All the connexions were made from cybercafés in Madrid. Even proceeding to that area very quickly, during a long period of time it was not possible to arrive at those places before A.T. was gone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Later, A.T. began to use his email account from a cybercafé in Malaga. This is a smaller town than Madrid and there it was possible to put all the cybercafés from a certain area permanently under physical surveillance. After some days of surveillance, British police announced that A.T. was online, using his email account, and provided the IP address. Very rapidly, the Spanish ISP informed Spanish police from the concrete location of the cybercafé what allowed the officers in the street to identify and arrest A.T. in place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A.T. was extradited to Norway and prosecuted.”&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the above that although the crime occurred in Norway, a lot of work was actually done by the authorities in the United Kingdom and Spain. In a serious case such as this where there was a bank robbery as well as a murder involved, the amount of effort expended by authorities from other states may be appropriate but it is unlikely that the authorities in Britain and Spain would have allocated such resources for a petty crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In sensitive cases where the requests have to be kept secret or confidential for any reason, the requesting Party has to specify that the request should be kept confidential except to the extent required to execute the request (such as disclosure in front of appropriate authorities to obtain the necessary permissions). In case confidentiality cannot be maintained the requested Party shall inform the requesting Party of this fact, which shall then take a decision regarding whether to withdraw the request or not.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; On the other hand the requested Party may also make its supply of information conditional to it being kept confidential and that it not be used in proceedings or investigations other than those stated in the request.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; If the requesting Party cannot comply with these conditions it shall inform the requested Party which will then decide whether to supply the information or not.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the normal course the Convention envisages requests being made and executed through the respective designated central authorities, however it also makes a provision, in urgent cases, for requests being made directly by the judicial authorities or even the Interpol.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Even in non urgent cases, if the authority of the requested Party is able to comply with the request without making use of coercive action, requests may be transmitted directly to the competent authority without the intervention of the central authority.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention clarifies that through these mutual assistance requests a Party may ask another to (i) either search, seize or disclose computer data within its territory,&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (ii) provide real time collection of traffic data with specified communications in its territory;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and (iii) provide real time collection or recording of content data of specified communications.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The provision of mutual assistance specified above has to be in accordance with the domestic laws of the requested Party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The procedure for sending mutual assistance requests under the Convention is usually the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Preparation of a request for mutual assistance by the prosecutor or enforcement agency which is responsible for an investigation.&lt;/li&gt;
&lt;li&gt;Sending the request by the prosecutor or enforcement agency to the Central Authority for verification (and translation, if necessary).&lt;/li&gt;
&lt;li&gt;The Central Authority then submits the request either, (i) to the foreign central authority, or (ii) directly to the requested judicial authority.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The following procedure is then followed in the corresponding receiving Party:&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Receipt of the request by the Central Authority.&lt;/li&gt;
&lt;li&gt;Central Authority then examines the request against formal and legal requirements (and translates it, if necessary).&lt;/li&gt;
&lt;li&gt;Central Authority then transmits the request to the competent prosecutor or enforcement agency to obtain court order (if needed).&lt;/li&gt;
&lt;li&gt;Issuance of a court order (if needed).&lt;/li&gt;
&lt;li&gt;Prosecutor orders law enforcement (e.g. cybercrime unit) to obtain the requested data.&lt;/li&gt;
&lt;li&gt;Data obtained is examined against the MLA request, which may entail translation or&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;using a specialist in the language.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The information is then transmitted to requesting State via MLA channels.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In practice, the MLA process has generally been found to be inefficient and this inefficiency is even more pronounced with respect to electronic evidence. The general response times range from six months to two years and many requests (and consequently) investigations are often abandoned.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Further, the lack of awareness regarding procedure and applicable legislation of the requested State lead to formal requirements not being met. Requests are often incomplete or too broad; do not meet legal thresholds or the dual criminality requirement.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Preservation Requests&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Budapest Convention recognises the fact that computer data is highly volatile and may be deleted, altered or moved, rendering it impossible to trace a crime to its perpetrator or destroying critical proof of guilt. The Convention therefore envisioned the concept of preservation orders which is a limited, provisional measure intended to take place much more rapidly than the execution of a traditional mutual assistance. Thus the Convention gives the Parties the legal ability to obtain the expeditious preservation of data stored in the territory of another (requested) Party, so that the data is not altered, removed or deleted during the time taken to prepare, transmit and execute a request for mutual assistance to obtain the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention therefore provides that a Party may request another Party to obtain the expeditious preservation of specified computer data in respect of which such Party intends to submit a mutual assistance request. Once such a request is received the other Party has to take all appropriate measures to ensure compliance with such a request. The Convention also specifies that dual criminality is not a condition to comply with such requests for preservation of data since these are considered to be less intrusive than other measures such as seizure, etc.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However in cases where parties have a dual criminality requirement for providing mutual assistance they may refuse a preservation request on the ground that at the time of providing the data the dual criminality condition would not be met, although in regard to the offences covered under Articles 2 to 11 of the Convention, the requirement of dual criminality will be deemed to have been satisfied.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In addition to dual criminality a preservation request may also be refused on the grounds that (i) the offence alleged is a political offence; and (ii) execution of the request would likely to prejudice the sovereignty, security, &lt;em&gt;ordre public &lt;/em&gt;or other essential interests of the requested Party.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case the requested Party feels that preservation will not ensure the future availability of the data or will otherwise prejudice the investigation, it shall promptly inform the requesting Party which shall then take a decision as to whether to ask for the preservation irrespective.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Preservation of the data pursuant to a request will be for a minimum period of 60 days and upon receipt of a mutual assistance request will continue to be preserved till a decision is taken on the mutual assistance request.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; If the requested Party finds out in the course of executing the preservation request that the data has been transmitted through a third state or the requesting Party itself, it has a duty to inform the requesting Party of such facts as well as provide it with sufficient traffic data in order for it to be able to identify the service provider in the other state.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Jurisdiction and Access to Stored Data &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem of accessing data across international borders stems from the international law principle which provides that the authority to enforce (an action) on the territory of another State is permitted only if the latter provides consent for such behaviour. States that do not acquire such consent may therefore be acting contrary to the principle of non-intervention and may be in violation of the sovereignty of the other State.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Convention specifies two situations in which a Party may access computer data stored in another Party’s jurisdiction; (i) when such data is publicly available; and (ii) when the Party has accessed such data located in another state through a computer system located in its own territory provided it has obtained the “lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system”.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These are two fairly obvious situations where a state should be allowed to use the computer data without asking another state, infact if a state was required to take the permission of the state in the territory of which the data was physically located even in these situations, then it would likely delay a large number of regular investigations where the data would otherwise be available but could not be legally used unless the other country provided it under the terms of the Convention or some other legal instrument. At the time of drafting the Convention it appears that Parties could not agree upon any other situations where it would be universally acceptable for a state to unilaterally access data located in another state, however it must be noted that other situations for unilaterally accessing data are neither authorized, nor precluded.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the language of the Budapest Convention stopped shy of addressing other situations law enforcement agencies had been engaged in unilateral access to data stored in other jurisdictions on an uncertain legal basis risking the privacy rights of individuals raising concerns regarding national sovereignty.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It was to address this problem that the Cybercrime Committee established the “ad-hoc sub-group of the T-CY on jurisdiction and transborder access to data and data flows” (the “Transborder Group”) in November 2011 which came out with a Guidance Note clarigying the legal position under Article 32.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Guidance Note # 3 on Article 32 by the Cybercrime Committee specifies that Article 32(b) would not cover situations where the data is not stored in another Party or where it is uncertain where the data is located. A Party is also not allowed to use Article 32(b) to obtain disclosure of data that is stored domestically. Since the Convention neither authorizes nor precludes other situations, therefore if it is unknown or uncertain that data is stored in another Party, Parties may need to evaluate themselves the legitimacy of a search or other type of access in the light of domestic law, relevant international law principles or considerations of international relations.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Budapest Convention does not require notification to the other Party but parties are free to notify the other Party if they deem it appropriate.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The “voluntary and lawful consent” of the person means that the consent must be obtained without force or deception. Giving consent in order to avoid or reduce criminal charges would also constitute lawful and voluntary consent. If cooperation in a criminal investigation requires explicit consent in a Party, this requirement would not be fulfilled by agreeing to the general terms and conditions of an online service, even if the terms and conditions indicate that data would be shared with criminal justice authorities.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The person who is lawfully authorized to give consent is unlikely to include service providers with respect to their users’ data. This is because normally service providers would only be holders of the data, they would not own or control the data and therefore cannot give valid consent to share the data.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Guidance Note also specifies that with respect to the location of the person providing access or consent, while the standard assumption is that the person would be physically located in the requesting Party however there may be other situations, “It is conceivable that the physical or legal person is located in the territory of the requesting law enforcement authority when agreeing to disclose or actually providing access, or only when agreeing to disclose but not when providing access, or the person is located in the country where the data is stored when agreeing to disclose and/or providing access. The person may also be physically located in a third country when agreeing to cooperate or when actually providing access. If the person is a legal person (such as a private sector entity), this person may be represented in the territory of the requesting law enforcement authority, the territory hosting the data or even a third country at the same time.” Parties are also required to take into account the fact that third Parties may object (and some even consider it a criminal offence) if a person physically located in their territory is directly approached by a foreign law enforcement authority to seek his or her cooperation.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Production Order&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A similar problem arises in case of Article 18 of the Convention which requires Parties to put in place procedural provisions to compel a person in their territory to provide specified stored computer data, or a service provider offering services in their territory to submit subscriber information.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It must be noted here, that the data in question must be already stored or existing data, which implies that this provision does not cover data that has not yet come into existence such as traffic data or content data related to future communications.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Since the term used in this provision is that the data must be within the “possession or control” of the person or the service provider, therefore this provision is also capable of being used to access data stored in the territory of a third party as long as the data is within the possession and control of the person on whom the Production Order has been served. In this regard it must be noted that the Article makes a distinction between computer data and subscriber information and specifies that computer data can only be asked for from a person (including a service provider) located within the territory of the ordering Party even if the data is stored in the territory of a third Party.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However subscriber information&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; can be ordered only from a service provider even if the service provider is not located within the territory of the ordering Party as long as it is offering its services in the territory of that Party and the subscriber information relates to the service offered in the ordering Party’s territory.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the power under Article 18 is a domestic power which potentially can be used to access subscriber data located in another State, the use of this Article may raise complicated jurisdictional issues. This combined with the growth of cloud computing and remote data storage also raises concerns regarding privacy and data protection, the jurisdictional basis pertaining to services offered without the service provider being established in that territory, as well as access to data stored in foreign jurisdictions or in unknown or multiple locations “within the cloud”.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Even though some of these issues require further discussions and a more nuanced treatment, the Cybercrime Committee felt the need to issue a Guidance Note to Article 18 in order to avoid some of the confusion regarding the implementation of this provision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 18(1)(b) may include a situation where a service provider is located in one jurisdiction, but stores the data in another jurisdiction. Data may also be mirrored in several jurisdictions or move between jurisdictions without the knowledge or control of the subscriber. In this regard the Guidance Note points out that legal regimes increasingly recognize that, both in the criminal justice sphere and in the privacy and data protection sphere, the location of the data is not the determining factor for establishing jurisdiction.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Guidance Note further tries to clarify the term “offering services in its territory” by saying that Parties may consider that a service provider is offering services if: (i) the service provider enables people in the territory of the Party to subscribe to its services (and does not, for example, block access to such services); and (ii) the service provider has established a real and substantial connection that Party. Relevant factors to determine whether such a connection has been established include “the extent to which a service provider orients its activities toward such subscribers (for example, by providing local advertising or advertising in the language of the territory of the Party), makes use of the subscriber information (or associated traffic data) in the course of its activities, interacts with subscribers in the Party, and may otherwise be considered established in the territory of a Party”.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A service provider will not be presumed to be offering services within the territory of a Party just because it uses a domain name or email address connected to that country.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Guidance Note provides a very elegant tabular illustration of its requirements to serve a valid Production Order on a service provider:&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn56"&gt;[56]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;&lt;strong&gt;PRODUCTION ORDER CAN BE SERVED&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;IF&lt;/p&gt;
&lt;p&gt;The criminal justice authority has jurisdiction over the offence&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;AND&lt;/p&gt;
&lt;p&gt;The service provider is in possession or control of the subscriber information&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;AND&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;The service provider is in the territory of the Party&lt;/p&gt;
&lt;p&gt;(&lt;em&gt;Article 18(1)(a)&lt;/em&gt;)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Or&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A Party considers that a service provider is “offering its services in the territory of the Party” when, for example:&lt;/p&gt;
&lt;p&gt;- the service provider enables persons in the territory of the Party to subscribe to its services (and does not, for example, block access to such services);&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;- the service provider has established a real and substantial connection to a Party. Relevant factors include the extent to which a service provider orients its activities toward such subscribers (for example, by providing local advertising or advertising in the language of the territory of the Party), makes use of the subscriber information (or associated traffic data) in the course of its activities, interacts with subscribers in the Party, and may otherwise be considered established in the territory of a Party.&lt;/p&gt;
&lt;p&gt;(&lt;em&gt;Article 18(1)(b)&lt;/em&gt;)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="3"&gt;
&lt;p align="center"&gt;AND&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;the subscriber information to be submitted is relating to services of a provider offered in the territory of the Party.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The existing processes for accessing data across international borders, whether through MLATs or through the mechanism established under the Budapest Convention are clearly too slow to be a satisfactory long term solution. It is precisely for that reason that the Cybercrime Committee has suggested alternatives to the existing mechanism such as granting access to data without consent in certain specific emergency situations;&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; or access to data stored in another country through a computer in its own territory provided the credentials for such access are obtained through lawful investigative activities.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Another option suggested by the Cybercrime Committee is to look beyond the principle of territoriality, specially in light of the recent developments in cloud computing where the location of the data may not be certain or data may be located in multiple locations,&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; and look at a connecting legal factor as an alternative such as the “power of disposal”. This option implies that even if the location of the data cannot be determined it can be connected to the person having the power to “alter, delete, suppress or render unusable as well as the right to exclude other from access and any usage whatsoever”.&lt;/span&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Language of Requests&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was found from practice that the question of the language in which the mutual assistance requests were made was a big issue in most States since it created problems such as delays due to translations, costly translations, quality of translations, etc. The Cybercrime Committee therefore suggested that an additional protocol be added to the Budapest Convention to stipulate that requests sent by Parties should be accepted in English atleast in urgent cases since most States accepted a request in English.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Due to these problems associated with the language of assistance requests, the Cybercrime Convention Committee has already released a provisional draft Additional Protocol to address the issue of language of mutual assistance requests for public comments.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;24/7 Network&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parties are required to designate a point of contact available on a twenty-four hour, seven-day-a week basis, in order to ensure the provision of immediate assistance for the purpose of investigations or proceedings concerning criminal offences related to computer systems and data, or for the collection of evidence, in electronic form, of a criminal offence. The point of contact for each Party is required to have the capacity to carry out communications with the points of contact for any other Party on an expedited basis. It is the duty of the Parties to ensure that trained and properly equipped personnel are available in order to facilitate the operation of the network.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Parties recognized that establishment of this network is among the most important means provided by the Convention of ensuring that Parties can respond effectively to the law enforcement challenges posed by computer-or computer-related crimes.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In practice however it has been found that in a number of Parties there seems to be a disconnect between the 24/7 point of contact and the MLA request authorities leading to situations where the contact points may not be informed about whether preservation requests are followed up by MLA authorities or not.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Drawbacks and Improvements&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Budapest Convention, whilst being the most comprehensive and widely accepted document on international cooperation in the field of cybercrime, has its own share of limitations and drawbacks. Some of the major limitations which can be gleaned from the discussion above (and potential recommendations for the same) are listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;span&gt;Weakness and Delays in Mutual Assistance:&lt;/span&gt;&lt;/em&gt; In practice it has been found that though States refuse requests on a number of grounds,&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; some states even refuse cooperation in the event that the case is minor but requires an excessive burden on the requested state. Further, the delays associated with the mutual assistance process are another major hurdle, and are perhaps the reason by police-to-police cooperation for the sharing of data related to cybercrime and e-evidence is much more frequent than mutual legal assistance.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The lack of regulatory and legal awareness often leads to procedural lapses due to which requests do not meet legal thresholds. More training, more information on requirements to be met and standardised and multilingual templates for requests may be a useful tool to address this concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;span&gt;Access to data stored outside the territory:&lt;/span&gt;&lt;/em&gt; Access to data located in another country without consent of the authorities in that country poses another challenge. The age of cloud computing with processes of data duplication and delocalisation of data have added a new dimension to this problem.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn68"&gt;&lt;sup&gt;&lt;sup&gt;[68]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is precisely for that reason that the Cybercrime Committee has suggested alternatives to the existing mechanism such as granting access to data without consent in certain specific emergency situations;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn69"&gt;&lt;sup&gt;&lt;sup&gt;[69]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or access to data stored in another country through a computer in its own territory provided the credentials for such access are obtained through lawful investigative activities.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn70"&gt;&lt;sup&gt;&lt;sup&gt;[70]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Another option suggested by the Cybercrime Committee is to look beyond the principle of territoriality and look at a connecting legal factor as an alternative such as the “power of disposal”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;span&gt;Language of requests:&lt;/span&gt;&lt;/em&gt; Language of requests create a number of problems such as delays due to translations, cost of translations, quality of translations, etc. Due to these problems, the Cybercrime Convention Committee has already released for public comment, a provisional draft Additional Protocol to address the issue.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn71"&gt;&lt;sup&gt;&lt;sup&gt;[71]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;span&gt;Bypassing of 24/7 points of contact:&lt;/span&gt;&lt;/em&gt; Although 24/7 points have been set up in most States, it has been found that there is often a disconnect between the 24/7 point of contact and the MLA request authorities leading to situations where the contact points may not be informed about whether preservation requests are followed up by MLA authorities or not.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn72"&gt;&lt;sup&gt;&lt;sup&gt;[72]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;India and the Budapest Convention &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although countries outside the European Union have the option on signing the Budapest Convention and getting onboard the international cooperation mechanism envisaged therein, India has so far refrained from signing the Budapest Convention. The reasons for this refusal appear to be as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;India did not participate in the drafting of the treaty and therefore should not sign. This concern, while valid is not a consistent foreign policy stand that India has taken for all treaties, since India has signed other treaties, where it had no hand in the initial drafting and negotiations.&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn73"&gt;[73]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;Article 32(b) of the Budapest Convention involves tricky issues of national sovereignty since it allows for cross border access to data without the consent of the other party. Although, as discussed above, the Guidance Note on Article 32 clarified this issue to an extent, it appears that arguments have been raised in some quarters of the government that the options provided by Article 32 are too limited and additional means may be needed to deal with cross border data access.&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn74" style="text-align: justify; "&gt;[74]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;The mutual legal assistance framework under the Convention is not effective enough and the promise of cooperation is not firm enough since States can refuse to cooperate on a number of grounds.&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn75" style="text-align: justify; "&gt;[75]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;It is a criminal justice treaty and does not cover state actors; further the states from which most attacks affecting India are likely to emanate are not signatories to the Convention either.&lt;sup&gt;&lt;sup&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn76" style="text-align: justify; "&gt;[76]&lt;/a&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;Instead of joining the Budapest Convention, India should work for and promote a treaty at the UN level.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn77" style="text-align: justify; "&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Although in January 2018 there were a number of news reports indicating that India is seriously considering signing the Budapest Convention and joining the international cooperation mechanism under it, there have been no updates on the status of this proposal.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Budapest Convention has faced a number of challenges over the years as far as provisions regarding international cooperation are concerned. These include delays in getting responses from other states, requests not being responded to due to various reasons (language, costs, etc.), requests being overridden by mutual agreements, etc. The only other alternative which is the MLAT system is no better due to delays in providing access to requested data.&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftn79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This however does not mean that international cooperation through the Budapest Convention is always late and inefficient, as was evident from the example of the Norwegian bank robber-murderer given above. There is no doubt that the current mechanisms are woefully inadequate to deal with the challenges of cyber crime and even regular crimes (specially in the financial sector) which may involve examination of electronic evidence. However that does not mean the end of the road for the Budapest Convention, one has to recognize the fact that it is the pre-eminent document on international cooperation on electronic evidence with 62 State Parties as well as another 10 Observer States. Any mechanism which offers a solution to the thorny issues of international cooperation in the field of cyber crime would require most of the nations of the world to sign up to it; till such time that happens, expanding the scope of the Budapest Convention to address atleast some of the issues discussed above by leveraging the work already done by the Cybercrime Committee through various reports and Guidance Notes (some of which have been referenced in this paper itself) may be a good option as this could be an incentive for non signatories to become parties to a better and more efficient Budapest Convention providing a more robust international cooperation regime.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 304.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(1)(a). Except in cases where a different minimum threshold has been provided by a mutual arrangement, in which case such other minimum threshold shall be applied.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(5).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(3).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(2).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 251.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(6).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 24(7).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 25(1).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 25(4).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(2).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(3) read with para 267 of the Explanatory Note to the Budapest Convention.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 25(4).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(4)(a).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(4)(b).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(5).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(6).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Some of the grounds listed by Parties for refusal are: (i) grounds listed in Article 27 of the Convention, (ii) the request does not meet formal or other requirements, (iii) the request is motivated by race, religion, sexual orientation, political opinion or similar, (iv) the request concerns a political or military offence, (v) Cooperation may lead to torture or death penalty, (vi) Granting the request would prejudice sovereignty, security, public order or national interest or other essential interests, (vii) the person has already been punished or acquitted or pardoned for the same offence “&lt;em&gt;Ne bis in idem&lt;/em&gt;”, (viii) the investigation would impose an excessive burden on the requested State or create practical difficulties, (ix) Granting the request would interfere in an ongoing investigation (in which case the execution of the request may be postponed). Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 34.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 34.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Pedro Verdelho, &lt;em&gt;Discussion Paper: The effectiveness of international cooperation against cybercrime: examples of good practice&lt;/em&gt;, 2008, pg. 5, &lt;a href="https://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/T-CY/DOC-567study4-Version7_en.PDF"&gt;https://www.coe.int/t/dg1/legalcooperation/economiccrime/cybercrime/T-CY/DOC-567study4-Version7_en.PDF&lt;/a&gt;, accessed on March 28, 2019.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(8).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, disclosure of the material to the defence and the judicial authorities is an implicit exception to this rule. Further the ability to use the material in a trial (which is generally a public proceeding) is also a recognised exception to the right to limit usage of the material. &lt;em&gt;See&lt;/em&gt; para 278 of the the Explanatory Note to the Budapest Convention.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 28.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(9)(a) and (b).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 27(9)(d) read with para 274 of the Explanatory Note to the Budapest Convention.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 31.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 33.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 34.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 37.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 123.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Ibid&lt;/em&gt; at 124.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(3) read with para 285 of the Explanatory Note to the Budapest Convention.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(4).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(5).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(6).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 29(7).&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 30.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Anna-Maria Osula, &lt;em&gt;Accessing Extraterritorially Located Data: Options for States&lt;/em&gt;,   &lt;a href="http://ccdcoe.eu/uploads/2018/10/Accessing-extraterritorially-located-data-options-for-States_Anna-Maria_Osula.pdf"&gt;http://ccdcoe.eu/uploads/2018/10/Accessing-extraterritorially-located-data-options-for-States_Anna-Maria_Osula.pdf&lt;/a&gt;, accessed on March 28, 2019.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 32.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 293.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee, Report of the Transborder Group, &lt;em&gt;Transborder access and jurisdiction: What are the options?&lt;/em&gt;, December 2012, para 310.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.2.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.3.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.4.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.6.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note # 3, Transborder access to data (Article 32), para 3.8.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 18.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 170.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 173.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Defined in Article 18(3) as “any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which can be established:&lt;/p&gt;
&lt;p&gt;a. the type of communication service used, the technical provisions taken thereto and the period of service;&lt;/p&gt;
&lt;p&gt;b. the subscriber’s identity, postal or geographic address, telephone and other access number, billing and payment information, available on the basis of the service agreement or arrangement;&lt;/p&gt;
&lt;p&gt;c. any other information on the site of the installation of communication equipment, available on the basis of the service agreement or arrangement.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 173.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note #10, Production orders for subscriber information (Article 18 Budapest Convention), at pg.3.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note #10, Production orders for subscriber information (Article 18 Budapest Convention), para 3.5 at pg. 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note #10, Production orders for subscriber information (Article 18 Budapest Convention), para 3.6 at pg. 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Id.&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Guidance Note #10, Production orders for subscriber information (Article 18 Budapest Convention), para 3.8 at pg. 9.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Situations such as preventions of imminent danger, physical harm, the escape of a suspect or similar situations including risk of destruction of relevant evidence.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee, Subgroup on Transborder Access, (Draft) Elements of an Additional Protocol to the Budapest Convention on Cybercrime Regarding Transborder Access to Data, April 2013, pg. 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee Cloud Evidence Group, &lt;em&gt;Criminal justice access to data in the cloud: challenges (Discussion paper)&lt;/em&gt;, May 2015, pgs 10-14.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee, Subgroup on Transborder Access, (Draft) Elements of an Additional Protocol to the Budapest Convention on Cybercrime Regarding Transborder Access to Data, April 9, 2013, pg. 50.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 35.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.coe.int/en/web/cybercrime/-/towards-a-protocol-to-the-budapest-convention-further-consultatio-1"&gt;https://www.coe.int/en/web/cybercrime/-/towards-a-protocol-to-the-budapest-convention-further-consultatio-1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Convention on Cybercrime&lt;/em&gt;, 23 November 2001, Article 35.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Explanatory Report to the Convention on Cybercrime, Para 304, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;, para 298.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 86.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Some of the grounds listed by Parties for refusal are: (i) grounds listed in Article 27 of the Convention, (ii) the request does not meet formal or other requirements, (iii) the request is motivated by race, religion, sexual orientation, political opinion or similar, (iv) the request concerns a political or military offence, (v) Cooperation may lead to torture or death penalty, (vi) Granting the request would prejudice sovereignty, security, public order or national interest or other essential interests, (vii) the person has already been punished or acquitted or pardoned for the same offence “&lt;em&gt;Ne bis in idem&lt;/em&gt;”, (viii) the investigation would impose an excessive burden on the requested State or create practical difficulties, (ix) Granting the request would interfere in an ongoing investigation (in which case the execution of the request may be postponed). Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 34.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref68"&gt;&lt;sup&gt;&lt;sup&gt;[68]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Giovanni Buttarelli, &lt;em&gt;Fundamental Legal Principles for a Balanced Approach&lt;/em&gt;, Selected papers and contributions from the International Conference on “Cybercrime: Global Phenomenon and its Challenges”, Courmayeur Mont Blanc, Italy available at &lt;a href="http://ispac.cnpds.org/download.php?fld=pub_files&amp;amp;f=ispacottobre2012bassa.pdf"&gt;ispac.cnpds.org/download.php?fld=pub_files&amp;amp;f=ispacottobre2012bassa.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref69"&gt;&lt;sup&gt;&lt;sup&gt;[69]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Situations such as preventions of imminent danger, physical harm, the escape of a suspect or similar situations including risk of destruction of relevant evidence.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref70"&gt;&lt;sup&gt;&lt;sup&gt;[70]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, Cybercrime Convention Committee, Subgroup on Transborder Access, (Draft) Elements of an Additional Protocol to the Budapest Convention on Cybercrime Regarding Transborder Access to Data, April 2013, pg. 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref71"&gt;&lt;sup&gt;&lt;sup&gt;[71]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.coe.int/en/web/cybercrime/-/towards-a-protocol-to-the-budapest-convention-further-consultatio-1"&gt;https://www.coe.int/en/web/cybercrime/-/towards-a-protocol-to-the-budapest-convention-further-consultatio-1&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref72"&gt;&lt;sup&gt;&lt;sup&gt;[72]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Council of Europe, &lt;em&gt;Cybercrime Convention&lt;/em&gt; &lt;em&gt;Committee assessment&lt;/em&gt; &lt;em&gt;report: The mutual legal assistance provisions of the Budapest Convention on Cybercrime&lt;/em&gt;, December 2014, pg. 86.&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref73"&gt;&lt;sup&gt;&lt;sup&gt;[73]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Dr. Anja Kovaks, &lt;em&gt;India and the Budapest Convention - To Sign or not? Considerations for Indian Stakeholders&lt;/em&gt;, available at &lt;a href="https://internetdemocracy.in/reports/india-and-the-budapest-convention-to-sign-or-not-considerations-for-indian-stakeholders/"&gt;https://internetdemocracy.in/reports/india-and-the-budapest-convention-to-sign-or-not-considerations-for-indian-stakeholders/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref74"&gt;&lt;sup&gt;&lt;sup&gt;[74]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alexander Seger, &lt;em&gt;India and the Budapest Convention: Why not?&lt;/em&gt;, Digital Debates: The CyFy Journal, Vol III, available at &lt;a href="https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/"&gt;https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref75"&gt;&lt;sup&gt;&lt;sup&gt;[75]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Id&lt;/em&gt;&lt;em&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref76"&gt;&lt;sup&gt;&lt;sup&gt;[76]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Id.&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref77"&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;em&gt;Id.&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://indianexpress.com/article/india/home-ministry-pitches-for-budapest-convention-on-cyber-security-rajnath-singh-5029314/"&gt;https://indianexpress.com/article/india/home-ministry-pitches-for-budapest-convention-on-cyber-security-rajnath-singh-5029314/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///E:/Editorial/2019/Website/Budapest%20Convention%20paper.docx#_ftnref79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Elonnai Hickok and Vipul Kharbanda, &lt;em&gt;Cross Border Cooperation on Criminal Matters - A perspective from India&lt;/em&gt;, available at &lt;a href="https://cis-india.org/internet-governance/blog/cross-border-cooperation-on-criminal-matters"&gt;https://cis-india.org/internet-governance/blog/cross-border-cooperation-on-criminal-matters&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention'&gt;https://cis-india.org/internet-governance/blog/vipul-kharbanda-april-29-2019-international-cooperation-in-cybercrime-the-budapest-convention&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>International Cooperation</dc:subject>
    
    
        <dc:subject>Budapest Convention</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>MLAT</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Crime</dc:subject>
    

   <dc:date>2019-04-29T22:35:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/budapest-convention-paper.pdf">
    <title>International Cooperation in Cybercrime</title>
    <link>https://cis-india.org/internet-governance/files/budapest-convention-paper.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/budapest-convention-paper.pdf'&gt;https://cis-india.org/internet-governance/files/budapest-convention-paper.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-04-29T22:34:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf">
    <title>Intermediary Liability Rules 2018.pdf</title>
    <link>https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf'&gt;https://cis-india.org/internet-governance/resources/Intermediary%20Liability%20Rules%202018.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>karan</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-02-07T07:32:23Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/intermediary-liability-resources">
    <title>Intermediary Liability Resources</title>
    <link>https://cis-india.org/internet-governance/blog/intermediary-liability-resources</link>
    <description>
        &lt;b&gt;We bring you a list of intermediary resources as part of research on internet governance. This blog post will be updated on an ongoing basis.&lt;/b&gt;
        &lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Shielding the Messengers: Protecting Platforms for Expression and Innovation. &lt;/b&gt;The Centre for Democracy and Technology. December 2012, available at: &lt;a href="https://www.cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf"&gt;https://www.cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf&lt;/a&gt;: This paper analyses the impact that intermediary liability regimes have on freedom of expression, privacy, and innovation. In doing so, the paper highlights different models of intermediary liability regimes, reviews different technological means of restricting access to content, and provides recommendations for intermediary liability regimes and provides alternative ways of addressing illegal content online.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Internet Intermediaries: Dilemma of Liability:&lt;/b&gt; Article 19. 2013, available at: &lt;a href="http://www.article19.org/data/files/Intermediaries_ENGLISH.pdf"&gt;http://www.article19.org/data/files/Intermediaries_ENGLISH.pdf:&lt;/a&gt;This Policy Document reviews different components of intermediary liability and highlights the challenges and risks that current models of liability have to online freedom of expression. Relying on international standards for freedom of expression and comparative law,  the document includes recommendations and alternative models that provide stronger protection for freedom of expression. The key recommendation in the document include: web hosting providers or hosts should be immune from liability to third party content if they have not modified  the content, privatised enforcement should not be a model and removal orders should come only from courts or adjudicatory bodies, the model of notice to notice should replace notice and takedown regimes, in cases of alleged serious criminality clear conditions should be in place and defined.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Comparative Analysis of the National Approaches to the Liability of Internet Intermediaries:&lt;/b&gt; Prepared by Daniel Seng for WIPO, available at http://www.wipo.int/export/sites/www/copyright/en/doc/liability_of_internet_intermediaries.pdf:This Report reviews the intermediary liability regimes and associated laws in place across fifteen different contexts with a focus on civil copyright liability for internet intermediaries. The Report seeks to find similarities and differences across the regimes studied and highlight  principles and components in different that can be used in international treaties and instruments, upcoming policies, and court decisions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Freedom of Expression, Indirect Censorship, &amp;amp; Liability for Internet Intermediaries.&lt;/b&gt; The Electronic Frontier Foundation. February 2011, available at: &lt;a href="http://infojustice.org/download/tpp/tpp-civil-society/EFF%20presentation%20ISPs%20and%20Freedom%20of%20Expression.pdf"&gt;http://infojustice.org/download/tpp/tpp-civil-society/EFF%20presentation%20ISPs%20and%20Freedom%20of%20Expression.pdf&lt;/a&gt;:This presentation was created for the Trans-Pacific Partnership Stakeholder Forum in Chile and highlights that for freedom of expression to be protected, clear legal protections for internet intermediaries are needed and advocates for a regime that provides blanket immunity to intermediaries or is based on judicial takedown notices.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Study on the Liability of Internet Intermediaries. Contracted by the European Commission.&lt;/b&gt; 2007, available at: &lt;a href="http://ec.europa.eu/internal_market/e-commerce/docs/study/liability/final_report_en.pdf"&gt;http://ec.europa.eu/internal_market/e-commerce/docs/study/liability/final_report_en.pdf&lt;/a&gt;. This Report provides insight on the application of the intermediary liability sections of the EU e-commerce directive  and studies the impact of the regulations under the Directive on the functioning of intermediary information society services. To achieve this objective, the study identifies relavant case law across member states, calls out and evaluates developing trends across Member States, and draws conclusions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Internet Intermediary Liability: Identifying Best Practices for Africa.&lt;/b&gt; Nicolo Zingales for the Association for Progressive Communications,  available at: &lt;a href="https://www.apc.org/en/system/files/APCInternetIntermediaryLiability_BestPracticesAfrica_20131125.pdf"&gt;https://www.apc.org/en/system/files/APCInternetIntermediaryLiability_BestPracticesAfrica_20131125.pdf&lt;/a&gt;: This background paper seeks to identify challenges and opportunities in addressing intermediary liability for countries in the African Union and recommend safeguards that can be included in emerging intermediary liability regimes in the context of human rights. The paper also reviews different models of intermediary liability and discusses the limitations, scope, and modes of operation of each model. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Liability of Internet Intermediaries in Nigeria, Kenya, South Africa, and Uganda&lt;/b&gt;: An uncertain terrain. Association for Progressive Communications. October 2012, available at: &lt;a href="http://www.academia.edu/2484536/The_liability_of_internet_intermediaries_in_Nigeria_Kenya_South_Africa_and_Uganda_An_uncertain_terrain"&gt;http://www.academia.edu/2484536/The_liability_of_internet_intermediaries_in_Nigeria_Kenya_South_Africa_and_Uganda_An_uncertain_terrain&lt;/a&gt;:This Report reviews intermediary liability in Nigeria, Kenya, South Africa and Uganda – providing background to the political context, relevant legislation, and present challenges . In doing so, the Report provides insight into how intermediary liability has changed in recent years in these contexts and explores past and present debates on intermediary liability. The Report concludes with recommendations for stakeholders affected by intermediary liability. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Fragmentation of intermediary liability in the UK&lt;/b&gt;. Daithi Mac Sithigh. 2013, available at: &lt;a href="http://jiplp.oxfordjournals.org/content/8/7/521.full.pdf?keytype=ref&amp;amp;ijkey=zuL8aFSzKJqkozT"&gt;http://jiplp.oxfordjournals.org/content/8/7/521.full.pdf?keytype=ref&amp;amp;ijkey=zuL8aFSzKJqkozT&lt;/a&gt;. This article looks at the application of the Electronic Commerce Directive across Europe and argues that it is being intermixed and subsequently replaced with provisions from national legislation  and provisions of law from area specific legislation. Thus, the article argues that systems for intermediary liability are diving into multiple systems – for example for content related to copyright intermediaries are being placed with new responsibilities while for content related to defamation, there is a reducing in the liability that intermediaries are held to. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Regimes of Legal Liability for Online Intermediaries: an Overview&lt;/b&gt;. OECD, available at:  &lt;a href="http://www.oecd.org/sti/ieconomy/45509050.pdf"&gt;http://www.oecd.org/sti/ieconomy/45509050.pdf&lt;/a&gt;. This article provides an overview of different intermediary liability regimes  including EU and US. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; Closing the Gap: Indian Online Intermediaries and a Liability System Not Yet Fit for Purpose&lt;/b&gt;. GNI. 2014, available at: &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf"&gt;http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf&lt;/a&gt;.  This Report argues that the provisions of the Information Technology Act 2000 are not adequate to deal with ICT innovations , and argues that the current liability regime in India is hurting the Indian internet economy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Intermediary Liability in India&lt;/b&gt;. Centre for Internet and Society. 2011, available at: &lt;a href="https://cis-india.org/internet-governance/intermediary-liability-in-india.pdf"&gt;http://cis-india.org/internet-governance/intermediary-liability-in-india.pdf&lt;/a&gt;. This report reviews and ‘tests’  the effect of the Indian intermediary liability on freedom of expression. The report concludes that the present regime in India has a chilling effect on free expression and offers recommendations on how the Indian regime can be amended to protect this right. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Liability of Internet Service providers and the exercise of the freedom of expression in Latin America have been explored in detail through the course of this research paper by Claudio Ruiz Gallardo and J. Carlos Lara Galvez. The paper explores the efficacy and the implementation of proposals to put digital communication channels under the oversight of certain State sponsored institutions in varying degrees. The potential consequence of legal intervention in media and digital platforms, on the development of individual rights and freedoms has been addressed through the course of this study. The paper tries to arrive at relevant conclusions with respect to the enforcement of penalties that seek to redress the liability of communication intermediaries and the mechanism that may be used to oversee the balance between the interests at stake as well as take comparative experiences into account. The paper also analyses the liability of technical facilitators of communications while at the same time attempting to define a threshold beyond which the interference into the working of these intermediaries may constitute an offence of the infringement of the privacy of users. Ultimately, it aims to derive a balance between the necessity for intervention, the right of the users who communicate via the internet and interests of the economic actors who may be responsible for the service: &lt;a class="external-link" href="http://www.palermo.edu/cele/pdf/english/Internet-Free-of-Censorship/02-Liability_Internet_Service_Providers_exercise_freedom_expression_Latin_America_Ruiz_Gallardo_Lara_Galvez.pdf"&gt;http://www.palermo.edu/cele/pdf/english/Internet-Free-of-Censorship/02-Liability_Internet_Service_Providers_exercise_freedom_expression_Latin_America_Ruiz_Gallardo_Lara_Galvez.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="https://crm.apc.org/civicrm/mailing/view?reset=1&amp;amp;id=191"&gt;Click to read the newsletter&lt;/a&gt; from the Association of Progressive Communications. The summaries for the reports can be found below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet Intermediaries: The Dilemma of Liability in Africa. APC News, May 2014, available at: &lt;a href="http://www.apc.org/en/node/19279/"&gt;http://www.apc.org/en/node/19279/&lt;/a&gt;. This report summarizes the challenges facing internet content regulators in Africa, and the effects of these regulations on the state of the internet in Africa. Many African countries do not protect intermediaries from potential liability, so some intermediaries are too afraid to transmit or host content on the internet in those countries. The report calls for a universal rights protection for internet intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APC’s Frequently Asked Questions on Internet Intermediary Liability:  APC, May 2014, available at: &lt;a href="http://www.apc.org/en/node/19291/"&gt;http://www.apc.org/en/node/19291/&lt;/a&gt;. This report addresses common questions pertaining to internet intermediaries, which are entities which provide services that enable people to use the internet, from network providers to search engines to comments sections on blogs. Specifically, the report outlines different models of intermediary liability, defining two main models. The “Generalist” model intermediary liability is judged according to the general rules of civil and criminal law, while the “Safe Harbour” model protects intermediaries with a legal safe zone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Developments in South Africa: APC News, May 2014, available at: &lt;a href="http://www.apc.org/en/news/intermediary-liability-new-developments-south-afri"&gt;http://www.apc.org/en/news/intermediary-liability-new-developments-south-afri&lt;/a&gt;. This interview with researchers Alex Comninos and Andrew Rens goes into detail about the challenges of intermediary in South Africa. The researchers discuss the balance that needs to be struck between insulating intermediaries from a fear of liability and protecting women’s rights in an environment that is having trouble dealing with violence against women. They also discuss South Africa’s three strikes policy for those who pirate material.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Preventing Hate Speech Online In Kenya: APCNews, May 2014, available at: &lt;a href="http://www.apc.org/en/news/intermediary-liability-preventing-hate-speech-onli"&gt;http://www.apc.org/en/news/intermediary-liability-preventing-hate-speech-onli&lt;/a&gt;. This interview with Grace Githaiga investigates the uncertain fate of internet intermediaries under Kenya’s new regime. The new government has mandated everyone to register their SIM cards, and indicated that it was monitoring text messages and flagging those that were deemed risky. This has led to a reduction in the amount of hate speech via text messages. Many intermediaries, such as newspaper comments sections, have established rules on how readers should post on their platforms. Githaiga goes on to discuss the issue of surveillance and the lack of a data protection law in Kenya, which she sees as the most pressing internet issue in Kenya.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Laws in Uganda Make Internet Providers More Vulnerable to Liability and State Intervention: APCNews, May 2014, available at: &lt;a href="http://www.apc.org/en/news/new-laws-uganda-make-internet-providers-more-vulne"&gt;http://www.apc.org/en/news/new-laws-uganda-make-internet-providers-more-vulne&lt;/a&gt;. In an interview, Lilian Nalwoga discusses Uganda’s recent anti-pornography law that can send intermediaries to prison. The Anti-Pornography Act of 2014 criminalizes any sort of association with any form of pornography, and targets ISPs, content providers, and developers, making them liable for content that goes through their systems. This makes being an intermediary extremely risky in Uganda. The other issue with the law is a vague definition of pornography. Nalwoga also explains the Anti-Homosexuality Act of 2014 bans any promotion or recognition of homosexual relations, and the monitoring technology the government is using to enforce these laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Laws Affecting Intermediary Liability in Nigeria: APCNews, May 2014, available at: &lt;a href="http://www.apc.org/en/news/new-laws-affecting-intermediary-liability-nigeria"&gt;http://www.apc.org/en/news/new-laws-affecting-intermediary-liability-nigeria&lt;/a&gt;. Gbenga Sesan, executive director of Paradigm Initiative Nigeria, expounds on the latest trends in Nigerian intermediary liability. The Nigerian Communications Commission has a new law that mandates ISPs store users data for at least here years, and wants to make content hosts responsible for what users do on their networks. Additionally, in Nigeria, internet users register with their real name and prove that you are the person who is registration. Sesan goes on to discuss the lack of safe harbor provisions for intermediaries and the remaining freedom of anonymity on social networks in Nigeria.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet Policies That Affect Africans: APC News, May 2014, available at: &lt;a href="http://www.apc.org/en/news/intermediary-liability-internet-policies-affect-af"&gt;http://www.apc.org/en/news/intermediary-liability-internet-policies-affect-af&lt;/a&gt;. The Associsation for Progressive Communcations interviews researcher Nicolo Zingales about the trend among African governments establishing further regulations to control the flow of information on the internet and hold intermediaries liable for content they circulate. Zingales criticizes intermediary liability for “creating a system of adverse incentives for free speech.” He goes on to offer examples of intermediaries and explain the concept of “safe harbor” legislative frameworks. Asked to identify best and worst practices in Africa, he highlights South Africa’s safe harbor as a good practice, and mentions the registration of users via ID cards as a worst practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Towards Internet Intermediary Responsibility: Carly Nyst, November 2013, available at: &lt;a href="http://www.genderit.org/feminist-talk/towards-internet-intermediary-responsibility"&gt;http://www.genderit.org/feminist-talk/towards-internet-intermediary-responsibility&lt;/a&gt;. Nyst argues for a middle ground between competing goals in internet regulation in Africa. Achieving one goal, of protecting free speech through internet intermediaries seems at odds with the goal of protecting women’s rights and limiting hate speech, because one demands intermediaries be protected in a legal safe harbor and the other requires intermediaries be vigilant and police their content. Nyst’s solution is not intermediary liability but &lt;i&gt;responsibility&lt;/i&gt;, a role defined by empowerment, and establishing an intermediary responsibility to promote positive gender attitudes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/intermediary-liability-resources'&gt;https://cis-india.org/internet-governance/blog/intermediary-liability-resources&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-03T06:45:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data">
    <title>Intelligence agencies will not have open access to Aadhaar data: UIDAI chief </title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data</link>
    <description>
        &lt;b&gt;Intelligence agencies will not have free access to Aadhaar data, a top government official said on Thursday, looking to assuage fears of abuse of personal information.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/intelligence-agencies-will-not-have-open-access-to-aadhaar-data-uidai-chief/story-cAp5EEWA83IGRbbtGfMorN.html"&gt;published in the Hindustan Times&lt;/a&gt; on October 20, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI), which issued identity cards to 1.07 billion Indians, last month &lt;span class="st_readmore_sp"&gt;&lt;a href="http://www.hindustantimes.com/india-news/govt-to-keep-aadhar-record-for-7-years-activists-worried/story-jSY820Ee1ZnQNLL5vuWMOI.html" shape="rect" title="www.hindustantimes.com"&gt;decided to retain data&lt;/a&gt; &lt;/span&gt; related to the verification of Aadhaar-enabled transactions for seven years, leading to security concerns over data safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As reported by HT on Monday, privacy experts expressed concerns that  transaction data retained for so long could be accessed by the security  establishment for surveillance on individuals without sufficient  grounds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This fear is completely misplaced,” ABP Pandey, UIDAI’s chief executive officer told HT in an interview.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security agencies can access the data only in case of national security after they get the nod of an oversight committee headed by the cabinet secretary. This committee has to clear every order made by the designated joint secretary-level officer before the information is shared, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“You cannot have any legal protection stronger than this,” Pandey added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar transaction data is not only protected by the most powerful, contemporary law to restrict access but also by strong cryptography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Even if someone attempts, the 2048-bit encryption is so strong that it will take them millions of computers and billions of years to decrypt the data,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A vocal critic of Aadhaar’s design, Sunil Abraham of the Centre for Internet and Society (CIS) suggested he wouldn’t rely too much on the legal framework. “You cannot put a legal band-aid on a broken technological solution. You need to get privacy and security right by design,” the director of the Bengaluru-based research body said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham said the problem could have been averted if the UIDAI did not store the data in a centralised form. Instead, it could have used its digital signature to sign proof of authentication that could be stored by the authenticating agency and the citizen on a smart card.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-20-2016-intelligence-agencies-will-not-have-open-access-to-aadhaar-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-21T01:32:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/substantive-areas/public-accountability/int-ellectural.-property-right-and-trade">
    <title>Intellectual Property Rights and Trade</title>
    <link>https://cis-india.org/about/substantive-areas/public-accountability/int-ellectural.-property-right-and-trade</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;h3&gt;Context&lt;/h3&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p align="justify"&gt;Increasing expansion,
	propertisation and commoditisation of intellectual property rights,
	leading to a loss of balance that IPRs are meant to reflect.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Increasing instances
	where IPRs policies and practices conflict with&amp;nbsp;innovation,
	equitable access, and freedom of speech.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Unrealistic and
	inappropriate application of traditional notions of IP to the
	digital world, where content and medium are often distinct, leading
	to transitory RAM copies being considered copies, etc.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Increasing tensions
	between IP and propagation of materials over the Internet,
	criminalization of every-day actions of ordinary citizens.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Increasing tendency
	of IP protectionists to call upon access and copy restriction
	technologies to intermediate digital consumption of IP, displacing
	notions of fair dealings, exceptions and limitations etc.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Lack of transparency
	in international negotiations on IP enforcement, and increasing
	pressures on developing countries to sign IP treaties by using
	strong-arm tactics (often as a precondition to trade).&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Uncritical (or unwilling) adoption
	of maximalist IP regimes by developing nations as part of asymmetric
	negotiation for market access or subsidies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Lack of critical
	understanding of the role IPR plays in different stages of an
	industry’s or nation's growth, and an unwillingness to look at
	deteriorative effects of IPR, such as chilling of technological
	advancement especially in industries with the incremental
	advancement model&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Unwillingness of
	governments and industry to explore questions of “negative IP”
	spaces.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Lack of understanding
	in judges, lawmakers, and the general public of the meaning, purpose
	and impact of intellectual property rights.&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3 align="justify"&gt;Research Agenda&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p align="justify"&gt;Questioning and
	re-imagination of the philosophical underpinnings of IPRs, to make
	them more consistent with a framework of equitable access to
	knowledge, more in line with actual practices of cultural
	production, and less restrictive of free speech.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Analysing the
	differences between digital and non-digital frameworks from the
	viewpoint of copyright, and examining the need and possibilities for
	a nuanced approach to “copying” in a world where everything is a
	copy.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Studying the forms of
	traditional knowledge protection being adopted by various countries,
	and especially the use of technology in doing so.&amp;nbsp;
	Understanding the tensions between access to knowledge commons and
	protection of traditional knowledge and traditional cultural
	expressions.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Questioning the
	dominant IPR regime from a constitutional perspective of free
	speech, and seeing if there is any additional protection to be
	gained from that constitutional right.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Questioning the
	dominant IPR regime from the constitutional perspective of
	competition law and supporting the research agenda of competition
	commissions in developing countries.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Questioning the
	dominant IPR regime from the constitutional perspective of tax law
	and documenting the systemic avoidance of taxation by IP
	rights-holders.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Contributing to the
	research agenda of activists interested in a WIPO treaty on minimum
	exceptions and limitations to copyright law especially from the
	perspective of disabled, aged and illiterate citizens.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Monitoring the IP
	policies in various states (both written, like the TK policy in
	Kerala, and otherwise) and analysing them to see if they promote
	equitable access and innovation.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Researching issues
	rising from “common carrier” status for ISPs and online service
	providers in order to mitigate ISP liability, surveillance,
	bandwidth shaping, etc.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Collecting
	information on negative IP spaces, to understand what leads to such
	fundamentally different approaches to innovation, and raising
	questions as to whether such spaces (e.g., the fashion industry) are
	actually embracing IP.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Monitoring, analysing
	and articulating civil society responses to bilateral and
	multi-lateral trade agreements that would affect access to knowledge
	in developing countries.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Unpacking and
	analysing the Bayh-Dole model being adopted by various countries
	(and under consideration in India), to see whether it spurs
	innovation or results in public funds being used to enrich private
	parties.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;Exploring issues of
	IP rights in personal data, such as that held in various networking
	sites, etc.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;Copyright
	and Free Speech (Uma Suthersenan et al., eds., 2005)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;EFF’s
	IP section. http://www.eff.org/issues/intellectual-property&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Yochai
	Benkler, The Wealth of Networks (2006)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Jonathan
	Zittrain, The Future of the Internet and How to Stop It (2008)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Chris
	Anderson, The Long Tail&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Jack
	Goldsmith &amp;amp; Tim Wu, Who Controls the Internet?&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Madhavi
	Sunder, IP3, 59 Stanford L. Rev. 257 (2006)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Rethinking
	Commodification (Martha M. Ertman &amp;amp; Joan C. Williams eds., 2005)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Yochai
	Benkler, Siren Songs and Amish Children: Autonomy, Information, and
	Law, 76 New York U. L. Rev. 23 (2001)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Wendy
	J. Gordon, Copyright Norms and the Problem of Private Censorship, in
	Copyright and Free Speech: Comparative and International Analyses
	(Jonathan Griffiths &amp;amp; Uma Suthersanen, eds., 2005)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Yochai
	Benkler, &lt;em&gt;Free as the
	Air to Common Use: First Amendment Constraints on Enclosure of the
	Public Domain&lt;/em&gt;, 74
	New York U. L. Rev. 354 (1999)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Neil
	Weinstock Netanel, Copyright and a Democratic Civil Society, 106
	Yale L.J. 283 (1996)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Margaret
	Jane Radin &amp;amp; Madhavi Sunder, &lt;em&gt;Foreword:
	The Subject and Object of Commodification&lt;/em&gt;,
	in Rethinking Commodification (Martha M. Ertman &amp;amp; Joan C.
	Williams eds., 2005)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Mark
	Rose, Authors and Owners: The Invention of Copyright 12 (1994)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Madhavi
	Sunder, The Invention of Traditional Knowledge  (U.C. Davis Legal
	Studies Research Paper  No. 75, 2006),
	http://papers.ssrn.com/sol3/papers.cfm?abstract_id=890657&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/substantive-areas/public-accountability/int-ellectural.-property-right-and-trade'&gt;https://cis-india.org/about/substantive-areas/public-accountability/int-ellectural.-property-right-and-trade&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>royson</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2008-09-21T14:57:53Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report">
    <title>Institute on Internet &amp; Society: Event Report</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report</link>
    <description>
        &lt;b&gt;The Institute on Internet and Society organized by the Centre for Internet and Society (CIS) with grant supported by the Ford Foundation took place from June 8 to 14, 2013 at the Golden Palms Resort in Bangalore.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;A total of 20 participants spent the seven days in a residential institute, learning about the fundamental technologies of the Internet and topics on which CIS has expertise on such as Accessibility, Openness, Privacy, Digital Natives and Internet Governance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants belonged to various stakeholder groups and it provided a common forum (first of its kind in India) to discuss and share ideas. Twenty-four expert speakers from various domains came to share their knowledge and speak about their work, so as to encourage activity in the field and supply resources from which participants could learn to increase their accessibility, range and funding possibilities, as well as network with the speakers and amongst themselves.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Institute has triggered a&amp;nbsp; number of follow-up events — those that the participants organized themselves with the help of CIS staff, including Crypto Parties in Bangalore, Delhi and Mumbai, that taught netizens to keep their online communication private. In addition to that, the CIS Access2Knowledge (A2K) team could rope in eight new Wikipedians who will contribute to Wikipedia in Indic languages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The day wise talks and activities that took place are listed below:&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 1: June 8, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The seven day residential Institute began on Saturday, the 8th of June with a warm welcome by Dr. Ravina Aggarwal and Dr. Nirmita Narasimhan. They outlined the purpose of the residential institute and briefly went over the topics which would get covered over the week long duration. This was followed by each of the participants introducing themselves briefly and also stating their expectations from the Institute, why they were attending the same and what they hope to get at the end.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Session 1: History of the Internet&lt;/h3&gt;
&lt;p&gt;(by Pranesh Prakash and Bernadette Längle)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Pranesh.png/@@images/539b71f7-111a-4700-a90b-17cbdb5589bc.png" alt="" class="image-inline" title="Pranesh Prakash" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Above is a picture of Pranesh Prakash &lt;br /&gt;speaking about the History of the Internet during &lt;br /&gt;the first session on Day 1.&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;The Institute proceedings kicked off with the first session, &lt;strong&gt;History of the Internet&lt;/strong&gt; by Pranesh Prakash and Bernadette Längle. Participants learned where the Internet originally came from and how it is organized, as well as different technologies surrounding the Internet. Pranesh Prakash and Bernadette Längle set the start point of the Internet in the late 50's when the Russians send the first satellite in space (Sputnik) and the US founded the DARPA(&lt;em&gt;Defense Advanced Research Projects Agency&lt;/em&gt;), a research agency that was tasked with creating new technologies for military use. DARPA is credited with development of many technologies which have had a major effect on the world, including computer networking, as well as NLS, which was both the first hypertext system, and an important precursor to the contemporary ubiquitous graphical user interface (GUI). A few years later the first four computers were connected to a network.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;After the Network Control Protocol (NCP, later replaced by the TCP/IP)  was invented in 1970, the first applications were made: email  (connecting people), telnet (connecting computers) and the file  transport protocol (FTP) (connecting information) — all of these are  still in use today. Participants were surprised to learn that the Web,  most commonly used today, known to be invented by one single person in  the 90's, actually existed for a long time prior to the '90s.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/p4iFqDnhNZI" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Domestic Bodies and Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Pranesh Prakash)&lt;br /&gt;After lunch, Pranesh Prakash led the second session about Domestic Bodies and Mechanisms and he started with some of the problems associated with the Domestic Regulatory Bodies:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Lack of coherence and consistency in Internet related policies&lt;/li&gt;
&lt;li&gt;Rather than co-operating, the different agencies compete with each other.&lt;/li&gt;
&lt;li&gt;Communication with the public is of different degrees and openness of different agencies varies.&lt;/li&gt;&lt;/ol&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Department of Electronics and Information Technology (DEITY), is one of the most important public agencies &amp;amp; the CERT-in focuses on issues like malware and content regulation. There is also the STQC (Standard Setting and Quality Setting Body).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The work of these organizations is to govern the Internet, bring about better privacy policies and ensure freedom of speech.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Other governing bodies include DOT (Department of Telecommunications) which governs the telecom and internet policies of India. In India, certain content regulation takes place under a notification as part of the IT Act, 2003.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;TRAI (Telecom Regulatory Authority of India) also looks into the tariff, interconnections and quality of telecom sector, spectrum regulation and so on.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The USOF (Universal Service Obligation Fund) seeks to provide funds for setting up telecom services in rural areas.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ministry of Information and Broadcasting (MIB) has been extending copyright restrictions to online publications.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VIDEO&lt;br /&gt;&lt;/h3&gt;
&lt;iframe src="//www.youtube.com/embed/e0VlI12fODE" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 3: Emerging trends in Internet usage in India&lt;/h3&gt;
&lt;p&gt;(by Nandini C and Vir Kamal Chopra)&lt;br /&gt;&lt;strong&gt;Emerging Trends in Internet Usage with specific focus on BSNL offerings&lt;/strong&gt; (by Vir Kamal Chopra)&lt;br /&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;In 1995, the VSNL provided internet in 4 metros of India, by 1998 DOT had provided internet in 42 cities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Some of the facilities internet provides include Tele-education, Tele-medicine, mobile banking, payment of bills via mobile internet, etc.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; BSNL has got maximum broadband market share in India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Present Scenario, there are 900 million mobiles in India, 430 million wireless connections with capability to access data.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The total broadband connections are 15 million in country, 10 million provided by BSNL.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Total internet users are 120 million with a growth rate of 30%.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Public access is not only about network intermediaries but about info-mediaries who understand internet.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; BSNL lost Rs 18,000 crores from 3G license.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G to 3G shifting is not seamless and leads to lot of packet loss, and 3G coverage is not as extensive as 2G. Thus 3G is not efficient however; the government has made a lot of money from selling 3G licenses.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Future trends include technology trends for internet access, optical fiber technologies, fiber to the curb, fibre to the home, metro Ethernet, etc. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet has created an online Public sphere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; In 2000 Parliament passed the Information Technology Act 2000 and the dot.com boom is seen.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Making internet access meaningful in the Indian Context&lt;/strong&gt; (by Nandini.C) &lt;br /&gt;(&lt;a class="external-link" href="http://internet-institute.in/repository/womens-access-to-the-internet"&gt;Click to see the presentation slides&lt;/a&gt;)&lt;br /&gt;Some of the salient points discussed were: &lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Status of internet access today sees&amp;nbsp;low level of overall penetration of internet, high rate of household mobile penetration and&amp;nbsp;huge rural-urban divide in internet access.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Relationship b/w women and internet in India&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 8.4% of women in India have access to internet in India and 43% of women using internet in India perceived it as being an important part of their life.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Some area of concerns include ensuring adequate access of internet for the women, entrenched patriarchies, contextual relevance, the imaginary of ‘public access’.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The importance of an existing strong social support network, ITC itself cannot open up economic/social empowerment opportunities for women&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; ICT-enabled micro-enterprises may also force the burden of double work on women, who undertake both productive activities for the micro-enterprise and re/productive activities for the household.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The Internet today has created an online public sphere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Countering the threat of online violence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Censorship and content regulation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Women’s rights and the spaces of internet governance.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Arbitrary censorship and self-regulation by the corporate and slide towards an illusory freedom; state is used as a bogeyman by corporate to create an online culture that is suitable to the corporate values.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/CUaGZh5nNR4" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify;"&gt;&lt;strong&gt;﻿Activity&lt;/strong&gt;&lt;br /&gt;Day 1 featured an interesting activity called the Creative Handshake. The goal of the game was to teach the participants the concept of "Handshake" in Internet terms and why it is important to make sure that integrity of data transferred is maintained.&lt;/div&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 2: June 9, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The focus of the second day was more on the nuts and bolts behind the working of the Internet by Dr. Nadeem Akhtar, Wireless Technologies and a case-study in Air Jaldi by Michael Ginguld, Collaborative Knowledge base building by Vishnu Vardhan and Affordable Devices on the Internet by Ravikiran Annaswamy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points of each of the talks are listed below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: How Internet Works&lt;/h3&gt;
&lt;p&gt;(by Nadeem Akhtar)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/how-internet-works"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Internet structure and hierarchy:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Data Networks comprise of set of nodes, connected by transmission links, for exchange of data between nodes. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Some of the key principles which underpin data networks include digital transmission, multiplexing and data forwarding/routing.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Data networks through ownership include public and private networks.&lt;/li&gt;
&lt;li&gt;Data networks through coverage include local area networks (small area), metro area networks (may comprise of a city) and wide area networks (wide geographic area across cities).&lt;/li&gt;
&lt;li&gt;Protocols include:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Open systems interconnection (OSI) model divides a communication system into smaller parts. Each part is referred to as a layer. Similar communication functions are grouped into logical layers.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;OSI model defines the different stages that data must go through to travel from one device to another over a network &amp;amp; this enables a modular approach towards developing complex system functionality i.e. functionality at layer X does not depend on how layer Y is implemented.&lt;/li&gt;&lt;/ol&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Nadeem.png" alt="" class="image-inline" title="Nadeem Akhtar" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Dr. Nadeem Akhtar speaking on the working of the internet on Day 2&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;
&lt;li&gt;Internet networks or connections.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers on the internet and these data routes are hosted by commercial, government, academic and other high-capacity network centers, the internet exchange points and network access points. The internet back bone is decentralized.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Transit Service - Passing information from small ISP to large ISP.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Peering Service - The passing of information between two similar ISP’s os similar size to let network traffic pass.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Three levels of network Tier1, Tier2 and Tier 3. TATA Company is the only Tier 1 Indian Company.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Backhaul- Transport Links which connects access edge networks with the ‘core’ network. The transmitters have to be mounted on a high level. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/8skb7ykF9jI" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 2: Wireless Technologies&lt;/h3&gt;
&lt;p&gt;(by Michael Ginguld)&lt;br /&gt;&lt;a class="external-link" href="http://prezi.com/tjaiatxtz1ch/walking-on-the-wireless-side/"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We are surrounded by electromagnetic radiation&lt;/li&gt;
&lt;li&gt;All about transmission waves and there are both advantages and disadvantages of the same:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Pros: higher reach for lower price, overcomes topographic challenges, lower maintenance, less to damage/lose&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cons: limited resources, maintenance (energy), physical limitations to transfer rates.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Satellite/VSAT is a very small aperture tech: a small satellite dish that connects to a geo-static satellite.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Strength: globally usable, can connect from anywhere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Weakness: signal problems, relatively high installation charge, upstream connection is lower than the downstream, transmitter on satellite is extremely expensive, hence limitation on transmission capacity of the satellite.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; VSATs are not scalable. It is a dead-end tech for usages where data transmission volume is expected to grow.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G Technology for mobile connection.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Limitation in transfer of data, due to technology and encryption limitations but great availability and reasonable price.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;3G Technology has a problem in India; low uptake, leading to low investment, leading to low speed, leading to low uptake. The technology allows for high-speed data transfer but the market condition in India still does not make adequate infrastructural support feasible.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;4G license auction.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A company bought the country-wide 4G license in the auction. Mukesh Ambani bought the company after some days.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The present legislation does not allow for VoIP-based Telco operation but that is expected to change soon.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Wifi technology is wireless technology. It is low cost wireless transfer of data.&amp;nbsp; The Public dissemination of the ranges in which data transfer using the WiFi protocol can take place.&amp;nbsp; It was made public in India in January 2005.&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Limitations: needs line of sight, limit to data transfer.&lt;/li&gt;
&lt;li&gt;Strength: cheap, de-licensed spectrum usage, easily deployable. &lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G spectrum, 3G spectrum and now 4G spectrum all are part of the wireless technology.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Air Jaldi started in Dharamshala; building wifi connection spanning campuses.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Three types of consumer categories: (1) no coverage, (2) under-served, and (3) ‘deserving clients’. #2 is the most common group. #3 are people who should be served but cannot pay fully for the service, hence are cross-subsidised by group #2.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Deployed and managed by local staff, trained by AirJaldi.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Customer premise equipment: Rs. 3-4k.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; User charges: Rs 975 per month for 512 kbps, Rs 1500 per month for 1 mbps.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Content: by and large, AirJaldi brings infrastructure on which content can ride on, teams with various content providers (like e-learning, rural BPOs, local e-banking etc) for the content side. The biggest drivers are local BPO, banking and retail. The next big driver coming up is entertainment.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; WiMax includes 4g spectrum. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/btd4MqOSRe0" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Building Knowledge Bases and Platform via Mass Collaboration on the Internet&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://commons.wikimedia.org/wiki/File:Building_Knowledge_Bases_and_Platforms_via_Mass_Collaboration_on_the_Internet.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;The session started off with some physical activity in the form of "Kasa Kasa Warte, Chan Chan Warte" to break off the lunch induced sleep and a mental activity where the participants were divided into two groups and both the groups were asked to collect information on "Water". One group was left to itself while the other had some expert inputs from Vishnu Vardhan on how to collaborate and organize the data. After the activity, both teams presented the information that they had collected on "Water".&lt;/p&gt;
&lt;p&gt;The benefits of collaborative authoring such as "everyone's voice  is heard", "various inputs leading to a multi-dimensional thinking" etc  were evident as against a single dimensional thought process that was  seen from the group that was un-assisted.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Participant.png/@@images/0bd8de0e-6e85-4100-80c7-070dd046fabf.png" alt="" class="image-inline" title="Participants" /&gt;&lt;br /&gt;&lt;em&gt;Given above is a picture of the participants involved in a group activity&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Salient points discussed during the presentation:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed.&amp;nbsp; Print technology shapes what we consider as knowledge, and hence as knowledge platform &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Techno-sociality of knowledge production&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed.&amp;nbsp; Print technology shapes what we consider as knowledge, and hence as knowledge platform &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Techno-sociality of knowledge production&lt;br /&gt;Examples of knowledge platforms:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Baidu baike &lt;/li&gt;
&lt;li&gt; English wikipedia &lt;/li&gt;
&lt;li&gt; Hudong &lt;/li&gt;
&lt;li&gt;Catawiki &lt;/li&gt;
&lt;li&gt;Wikieducator &lt;/li&gt;
&lt;li&gt;Open street map &lt;/li&gt;
&lt;li&gt;Pad.ma &lt;/li&gt;
&lt;li&gt; Sahapedia &lt;/li&gt;
&lt;li&gt; Internet archive &lt;/li&gt;
&lt;li&gt; Jstor &lt;/li&gt;
&lt;li&gt; Dsal &lt;/li&gt;
&lt;li&gt; Dli&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; In 1994 Cunningham developed the ‘Wiki Wiki Web’ also known as the ‘Ward Wiki’. Basically it is a knowledge platform.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Internet since then has been used for dissemination of information especially in the education sector. Digital Archived have developed over the years which provide information across various platforms like Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The spread of the internet has made possible the building of knowledge bases by seamless and mass collaboration. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt; Generic challenges for Wikipedia&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quality, relevance, consistency of knowledge &lt;/li&gt;
&lt;li&gt;Suitable motivation of the contributors&lt;/li&gt;
&lt;li&gt;Another issue is the scalability&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Some of the problems faced by Indian Wikipedian pages:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Technical infrastructure for Indian languages &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Typing in the regional language &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;OCR: complexity of Indian language scripts&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Various other technical troubles like browser compatibility, font display, etc., which deter new users&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Dearth of quality content available in digital format&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Different standards/formats/generations (gov.in/DLI)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Relative lack of research/academic standards, which is transferred on to Indic wikipedias. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lack of knowledge sharing culture.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Building a mass knowledge platform is the need of the hour.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The platform should be user friendly, easily available and adoptable; offline outreach is key to effective use of online platforms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The programme&amp;nbsp; should have feedback loop key, behavior statistics data, reinvent and replicate the programme, multi-channel awareness, ‘user connect’ programmes.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The people should communicate knowledge sharing objectives, make knowledge sharing fun, appoint ambassadors; virtual volunteer community building looks simple but its complex and leads to failure.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/2cM7CZ2hMeg" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session: 4 Affordable Devices to access the Internet&lt;/h3&gt;
&lt;p&gt;(by Ravikiran Annaswamy)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/MeetMobileInternet.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Ravikiran.png" alt="" class="image-inline" title="Ravikiran Annaswamy" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Ravikiran Annaswamy giving a demo of the low cost Akash tablet&lt;/em&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Overview of Affordable Mobile Phones such as Lava Iris, Karbonn A1, Nokia Asha, etc.&lt;/li&gt;
&lt;li&gt;Overview of Affordable Tablets such as Aakash, Ubislate, Karbonn Smart A34, etc.&lt;/li&gt;
&lt;li&gt; The number of Internet users in India is expected to nearly triple from 125 million in 2011 to 330 million by 2016, says a report by Boston Consulting Group.&lt;/li&gt;
&lt;li&gt; How Internet Penetration impacts society.&lt;/li&gt;
&lt;li&gt; Demo of the devices.&lt;/li&gt;
&lt;li&gt; Need for Mobile Internet&lt;/li&gt;
&lt;li&gt; Sugata Mitra &amp;amp; Arvind Eye Care examples.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/TUcbcFaX-v4" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;hr /&gt;
&lt;h2&gt;Day 3: June 10, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The third day of the Institute focussed on Wired means of accessing the Internet, the technology involved followed by an assignment time where the participants were introduced to 2 topics and asked to work on an assignment. This was followed by a site visit in the afternoon to MapUnity. &lt;strong&gt;MapUnity&lt;/strong&gt; develops technology to tackle social problems and&amp;nbsp;development challenges. Their GIS, MIS and mobile technologies are&amp;nbsp;used mostly by government departments and civil society&amp;nbsp; organisations and in the R&amp;amp;D initiatives of commercial ventures.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: Wired Access Technology&lt;/h3&gt;
&lt;p&gt;(by Dr. Nadeem Akhtar)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/wired-access-nadeem-akhtar"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Wired and Wireless&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Wired:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Separate communication channel for each users&lt;/li&gt;
&lt;li&gt; Low signal attenuation&lt;/li&gt;
&lt;li&gt; No interference&lt;/li&gt;
&lt;li&gt; Fixed point-of-attachment&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Wireless:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Shared medium of communication&lt;/li&gt;
&lt;li&gt; Signal is attenuated by a number of factors&lt;/li&gt;
&lt;li&gt; Interference between adjacent channels&lt;/li&gt;
&lt;li&gt; Points-of-attachment can be changed on-the-fly&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Ethernet:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; A family of computer networking technologies for LANs which was Invented in 1973 and commercially introduced in 1980.&amp;nbsp; The systems communicating over ethernet divide a stream o data into individual packets called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Ethernet, by definition, is a broadcast protocol&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Any signal can be received by all hosts&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Switching enables individual hosts to communicate&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Digital subscriber line (DSL):&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; DSL uses existing telephone lines to transport data to internet subscribers and the term xDSL is used to refer to a number of similar yet competing forms of DSL technologies which includes ADSL, SDSL, HDSL, HDSL-2, G.SHDL, IDSL, and VDSL.&amp;nbsp; DSL service is delivered simultaneously with wired telephone service on the same telephone line and this is possible because DSL uses higher frequency bands for data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Asymmetric DSL (ADSL):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; ADSL is the most commonly installed technology and an&amp;nbsp;ADSL tech can provide maximum downstream speeds of up to 8 mbps.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Modem and router:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Modem is specific to a technology&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Modem is de/modulator, it takes bits coming from one protocol/technology, demodulates it (converts it into original data), and re-modulated the original data to another protocol/technology.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Router allows creation of a local area network, allowing multiple devices to connect to the network and access internet together through the router. It has very high bitrate DSL (VDSL) and goes up to 52 mbps downstream and 16 mbps upstream. The length of the physical connection is limited to 300 meters and the second generation VDSL (CDSL2) provides data rates up to 100 mbps simultaneously in both direction, but maximum available bit rate is still achieved about 300 meters.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Cable:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; Cable broadband uses existing CATV infrastructure to provide high-access internet access; uses channels specifically reserved for data transfer&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Support simultaneous access to broadband and TV programs&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cable access tech is built for one-way transmission; hence some congestion takes place for bi-way data transfer, leading to much lower upstream connection relative to downstream connection for data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Fiber:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; It is a generic term for any broadband network architecture using optical fiber; fiber to the neighborhood; fiber to the curb;&amp;nbsp; the street cabinet is much closer to the user’s premises, typically within 300m, thus allowing ethernet or radio-based connection to the final users; fiber to the basement; fiber to the home (BSNL already providing); fiber to the desktop&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Passive optical networks (PON)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Advantages of fiber:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Immunity to electromagnetic interference.&lt;/li&gt;
&lt;li&gt; Provides very high data rates at long distances.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; When network links run over several 1000s of meters (e.g., metro area networks), fiber significantly outperforms copper.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Replacing at least part of these links with fiber shortens the remaining copper segments and allows them to run much faster.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The data rate of a fiber link is typically limited by the terminal equipment rather than the fiber itself.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Assignment&lt;/strong&gt;&lt;br /&gt;Participants were given two options for an assignment to work on in the coming days and they could choose either one.&lt;/p&gt;
&lt;p&gt;Assignment A&lt;br /&gt;The Universal Service Obligation Fund of India has put out a Call for Proposals under two schemes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mobile Connectivity and ICT related livelihood skills for womens’ SHGs (&lt;a href="http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf%29"&gt;http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf)&lt;/a&gt;, and&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Access to ICTs and ICT enabled services for persons with disabilities in rural India. (&lt;a href="http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf"&gt;http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Your NGO is committed to the task of facilitating access to the Internet&amp;nbsp;for women/ persons with disabilities in rural parts of Kerala and wishes to submit a proposal/ project idea in partnership with a service provider to the USOF.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Assignment B&lt;strong&gt;&lt;br /&gt;You&lt;/strong&gt; are a member of the ancient tribe of Meithis residing in Manipur. Over the years, there is a strong feeling in your community that although the Government has rolled out projects to connect the rural areas throughout India, these have not been successful for your tribe and there is still even a lack of basic fixed telephony, let alone mobile and broadband services. You have hence come to the conclusion that there is a need for focused efforts to target such communities as yours and have decided to submit a concept note to the USOF requesting that ‘ethnic and rural tribal communities’ be specifically included within the mandate of the USOF’s activities by defining them as an ‘underserved community’.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Raveena.png" alt="" class="image-inline" title="Participants in Discussion" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants engaged in a discussion.&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Field Trip - Destination: MapUnity.&lt;/strong&gt; &lt;strong&gt;&lt;br /&gt;MapUnity&lt;/strong&gt; develops technology to tackle social problems and development challenges. Their GIS, MIS and mobile technologies are&amp;nbsp;used&amp;nbsp;mostly by government departments and civil society&amp;nbsp;organisations, and&amp;nbsp;in the R&amp;amp;D initiatives of commercial ventures. MapUnity presented their product offerings to the participants.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYOT%2BQwA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYOT+QwA" style="display:none"&gt;&lt;/embed&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 4: June 11, 2013&lt;/h2&gt;
&lt;h3&gt;Session 1: Universal Access&lt;/h3&gt;
&lt;p&gt;(by Archana Gulati)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/UniversalServiceConceptsandPractices_Archana.G.Gulati.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Archana.png/@@images/a1f18756-20b4-4732-b032-502b59078819.png" alt="" class="image-inline" title="Archana" /&gt;&lt;br /&gt;&lt;br /&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Given above is a picture of Archana Gulati speaking on Universal Access&lt;/em&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;Tuesday revolved around questions of access and openness. The day kicked off with Archana Gulati, a policy expert in access to ICTs for people with disabilities talking on &lt;strong&gt;Universal Access&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Ms. Gulati stressed the importance of ICTs for social development. ICTs are a necessary aid in development structures including education, health and increased citizen participation in national affairs &amp;amp; they provide crucial knowledge inputs into productive activities. However, even with the Telecom boom, there still exists an access gap in India, which cannot be covered by commercially viable systems.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
 &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;This 'actual access gap' exists because of geographic (scattered population, low income, low perceived utility of service, lack of commercial/industrial customers, lack of roads, power, difficult terrain, insurgency), economic (urban poor) and social inequality (gender, disabilities) differences. To achieve Universal Access or Universal Service, additional efforts must be made, so as to include these groups. However, Universal Access and Universal Service, while they may imply the same thing, are very different approaches to deal with the problematic access gap.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Universal service, a term coined by Theodore Vail, president of AT&amp;amp;T in 1906, argued that the government should enforce the usage of only one network. This approach suggests a monopolization of the market and goes against the liberal market principle.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Universal access on the other hand suggests cross-subsidizing the low and no profit service areas by high profit service areas. However, this results in the urban population to get over-charged while the rich rural areas benefit from rural subsidizing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;So how do we enable a fair and inexpensive network to be able to create access for a large number of people equally? &lt;br /&gt;Ms. Archana Gulati went on to introduce the Sanchar Shakti scheme as a contribution to national access in India. It was initiated with the objective of improving rural SHG access skills, knowledge, financial services and markets through mobile connections and involved several stakeholders like NABARD, handset/modem manufacturers, DoT USOF, Mobile VAS Providers, Lead NGOs, Mobile Service Providers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This scheme shows how important is, for the commercial, private and public sector to work together on obtaining accessibility to ITCs.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Free and Open Internet&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Pranesh Prakash) &lt;br /&gt;The following session by Pranesh Prakash on &lt;strong&gt;Free and Open Internet&lt;/strong&gt; showed how the internet can still be a restrictive place which does not allow for internet equality. His talk focussed on the concepts of free and open Internet. Prakash started by stating the Freedom of Speech and Expression Article of the Indian Constitution and in an interactive round it was discussed, how these articles are fundamental for securing other basic human rights. This was demonstrated by an example in which the distribution of food did not proceed equally, as misinformation and restrictions led to an inappropriate hoarding of goods. Therefore, it is important for everyone to have that right. In fact, the Indian constitution formulates Article 19 in a positive way, implying not only everyone should have that right, but that the government must promote the upholding of these rights.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, in the case of Article 66a, the law actually caused a problem with freedom of speech in itself, as it penalizes sending false and offensive messages through communication services. This is a massive impediment on free speech, as outsiders decide upon what is offensive and what is false.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The other side of freedom of speech and expression is censorship. Online, the removal of websites and editing of content often happens quietly and obscures the fact that someone or something is being censored. Unlike book burnings in the past, which were always made a big political spectacle, often websites are simply removed without a trace, or one is faced with a 404 error, when trying to access it. Because of the offensive content law, journals and magazines are quick to remove supposedly offensive content, as it seems more difficult to engage in argument with the people claiming offense. The CIS proposed a counter-law to secure for this to happen less, as freedom of speech includes the freedom to receive that speech.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/SGxYxLEA8OY" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Openness&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Sunil Abraham)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;Next to ensuring freedom of speech and access, the third session of the  day focussed on Openness in terms of Open Source software. Sunil  Abraham, CIS executive director, stated the importance of free software  and open access of data, as they ensure what he called the four freedoms  of internet usage, namely the freedom to use for any purpose, the  freedom to study, to modify and to share (freely or for a fee).  Proprietary software imposes on these freedoms, as it only has  restrictive use and a strong copyright. However, there are alternatives  that have moderate copyrights, or so-called copy centred perspectives,  or even copyleft, including the above mentioned rights into the terms of  the software usage.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Sunil.png/@@images/92ac30ac-90da-4fcd-a0b2-0469aa2ecc75.png" alt="" class="image-inline" title="Sunil Abraham" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Above is a picture of Sunil Abraham speaking on Openness&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;In alignment with Sunil Abraham’s talk Pranesh Prakash criticized copyright law cutting into accessibility rights, as copyright infringements include translation into other languages, audio versions and also integral parts of education. The key is not to have a "one size fits all" copyright solution, as it is impossible to treat twitter content the same as a blockbuster movie. However, the government of India is doing exactly that and needs to interlink questions of access with copyright law.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/vqv7qai5c-s" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 4: Open Content&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Prof. Subbiah Arunachalam)&lt;br /&gt;Prof. Subbiah Arunachalam, who led the next session, discussed &lt;strong&gt;Open Content&lt;/strong&gt;. He had seen during the course of his experience India's poor performance in Science &amp;amp; Technology and outlined the reasons for the same. The lack of access to information essential in scientific research and knowledge production, he said, was the major limiting cause.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/BFJyUTNzYvE" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 5: Quick Talk on Copyright Law and Access&lt;/h3&gt;
&lt;p&gt;This short session dealt with implications of copyright law on internet access.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Activity&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants were divided into two groups, and they were asked build as huge a network as possible with their personal belongings and present their creations. The participants had good ideas. One&amp;nbsp;group placed their mobiles and laptops into the network to&amp;nbsp;have them as nodes. The other group implemented the re-routing around&amp;nbsp;censorship.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/nSLy1eRAndQ" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Network.png" alt="" class="image-inline" title="Networking" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants in an activity making the longest network possible with their personal belongings&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 5: (June 12, 2013)&lt;/h2&gt;
&lt;h3&gt;Session 1: Privacy on the Internet in India&lt;/h3&gt;
&lt;p&gt;(by Sunil Abraham and Elonnai Hickok)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/privacy-on-the-internet-by-elonnai"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Elonnai.png" title="Elonnai" height="211" width="317" alt="" class="image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;em&gt;Given above is a picture of Elonnai Hickock speaking about privacy&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;The following day, June 12th started off with “Privacy” as the theme. The session Privacy on the Internet in India was led by CIS privacy experts Sunil Abraham and Elonnai Hickock.&lt;/p&gt;
&lt;p&gt;In an exchange of anecdotes, it was made clear how there needs to be a certain degree of state surveillance to secure the citizens safety.&lt;/p&gt;
&lt;p&gt;This can happen through off air interception and active or passive cell phone towers that can track mobile devices.&lt;/p&gt;
&lt;p&gt;However, encryption is an important tool to secure one’s own privacy against cyber espionage.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Off-the Air Interception&lt;/li&gt;
&lt;li&gt; Possible to set up active or passive cell phone tower. &lt;/li&gt;
&lt;li&gt; The signal strength will be strong and everyone looks for it.&lt;/li&gt;
&lt;li&gt; Capacity to identify itself as a service provider. &lt;/li&gt;
&lt;li&gt; Interception can begin with encryption Technology today used by security agencies.&lt;/li&gt;
&lt;li&gt; NTRO- national technical Research Org and Outlook &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/PQWi9hHHSpc" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 2: E-Accessibility&lt;/h3&gt;
&lt;p&gt;(by Nirmita Narasimhan)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/eAccessibility.pdf"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Eaccessibility.png" alt="" class="image-inline" title="E-accessibility" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of Dr. Nirmita Narasimhan speaking on e-accessibility&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The second&lt;strong&gt; &lt;/strong&gt;session was on&lt;strong&gt; “E-Accessibility” &lt;/strong&gt;led by Dr. Nirmita Narasimhan&lt;strong&gt;. &lt;/strong&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Problems arising out of disability&lt;/li&gt;
&lt;li&gt; Accessibility-Infrastructure and ICT&lt;/li&gt;
&lt;li&gt; Assistive technologies for PWD’s.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Reasonable accommodation (not available or cannot be and requires extra effort and putting up an accessible copy up) and universal Design (for both for PWD’s and non-PWD’s).&lt;/li&gt;
&lt;li&gt; Web Content Accessibility is operable and easily understandable. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Accessibility standards include; Daisy (6 types of books including audio and text books) is all about marking up the documents. Really a good way to read but is expensive and time consuming, also need Daisy tools and player to make it work.&lt;/li&gt;
&lt;li&gt; In 1808 the first typewriter was developed to help the blind.&lt;/li&gt;
&lt;li&gt; Considerations involved in Web Accessibility &lt;/li&gt;
&lt;li&gt; Overlap b/w mobile accessibility and web accessibility.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Example- Raku Raku phone captured 60% of market share in Japan. It has many assistive features.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Relay Services has a middle man who passes on the message b/w different PWD’s in many countries, but it is not yet available in India.&lt;/li&gt;
&lt;li&gt; PWD’s communicating with customer care – the issues involved. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Accessibility Policy- very few people are adopting accessible technologies. There is a need to have a strong policy. U.K. and U.S. already have strong policies related to accessible and assistive technology for PWD’s.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;strong&gt; Video&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/vI8mixgTgCM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 3: International Bodies and Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Tulika Pandey and Gaurab Raj Upadhyay)&lt;br /&gt;&lt;strong&gt;Activity&lt;/strong&gt;&lt;br /&gt;Gaurab incorporated an &lt;strong&gt;Activity&lt;/strong&gt; into his talk to enable the students to have a clearer understanding of International Bodies and Mechanisms.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Gaurab.png" alt="" class="image-inline" title="Gaurab" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Gaurab Raj Upadhaya explaining the International Bodies and Mechanisms&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed during his talk were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Definition: “Internet Governance is the development and application by Govt., the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures and programmes which shape the evolution and use of internet.”&lt;/li&gt;
&lt;li&gt;It should be multilateral, transparent and democratic&lt;/li&gt;
&lt;li&gt; Enhanced cooperation means to enable govt…&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Technical issues to keep in mind while talking about internet:&lt;br /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li&gt; Critical internet resources&lt;/li&gt;
&lt;li&gt;Root server locations &lt;/li&gt;
&lt;li&gt; Open Standards (CIS leads the initiative) &lt;/li&gt;
&lt;li&gt; Interoperability &lt;/li&gt;
&lt;li&gt; Search Engines &lt;/li&gt;
&lt;li&gt; Internationalized Domain names (in own script &amp;amp; language) &lt;/li&gt;
&lt;li&gt; Content&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Virtual yet real space&amp;nbsp;and most important question to be understood is that whether, the governance of internet is possible?&lt;/li&gt;
&lt;li&gt; Public Policy- to monitor cross-border data flow, Openness vs Privacy&lt;/li&gt;
&lt;li&gt; India’s Outlook in internet policies-Pillars of Internet which is not fully addressed by the Indian government today. &lt;/li&gt;
&lt;li&gt; Established an Inter- Ministerial Group by including various government departments into the arena.&lt;/li&gt;
&lt;li&gt; Layer 0-7 Names and Numbers&lt;/li&gt;
&lt;li&gt; Layer 8 and above&lt;/li&gt;
&lt;li&gt; Applications and Usage &lt;/li&gt;
&lt;li&gt; Legal business, policy, etc.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Session-4: E-Governance&lt;/h3&gt;
&lt;p&gt;(by Tulika Pandey and Sunil Abraham)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Tulika.png" alt="" class="image-inline" title="Tulika" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Tulika Pandey speaking about e-Governance&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; Making policies in India is difficult because the population is huge and implementation at rural level is difficult.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Bombarded by Techno utopians- who believe in technology’s ability to change lives.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Techno determinants- Corruption solved through technology through open government data. More technology is better, the most sophisticated ones are the best are gross misconceptions.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Bhoomi project tried to deal with corruption at village level. Important policy change made all paper work illegal and digitized the land records etc. every action and request will be logged. But this led to creation of new corruption. Bribes were taken even before data was logged!&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; UID Project (Cobra Post Scam) around 20 public sector and 30 private banks were involved in money laundering scams. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; People who design the systems in Delhi prepare sub-contracts&lt;strong&gt;.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/strong&gt;VIDEO&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/Le3b-kka5Hs" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;hr /&gt;
&lt;h2&gt;Day 6: (June 13, 2013)&lt;/h2&gt;
&lt;h3&gt;Session 1: Critical Perspectives of the Internet&lt;/h3&gt;
&lt;p&gt;(by Dr. Nishant Shah)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/critical-perspectives-of-internet-society-dr-nishant-shah"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;The sixth day of the Institute kicked off with Nishant Shah, director of research at CIS, looking into Critical Perspectives of the Internet.&amp;nbsp; Nishant made a very important distinction between the internet as infrastructure and as social network constructing alternative universes. Nonetheless it was important to stress that technology should not be alienated in the process of this separation but seen as an integral part of it, as the digital is as much part of reality as any other technology and has become essential as a technology of change that it brings about not only in scientific but also in social development. Quoting Michel Foucault, Shah argued that technology becomes influential when it changes life, labour and language, which is why research in the field should involve critical ways of thinking about body, space and community.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Nishant.png/@@images/836aa919-b1aa-4e61-86d2-2e4a6e5fc62f.png" alt="" class="image-inline" title="Nishant Shah" /&gt;&lt;br /&gt;&lt;br /&gt; &lt;em&gt;Above is a picture of Dr. Nishant Shah speaking on Critical Perspectives of the Internet.&lt;/em&gt;  &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The body perception can be perceived through the way bodily agencies change through technology. Technology does not necessarily taint or corrupt the body, but can also be a way to escape its confines. To put it to a point, we are all born into technology and cannot free ourselves from them, as for example pregnancy already starts with nutritional supplements, regulatory diets and exercise and essentially ends with birth technologies that do not necessarily involve only the digital - we must remember, speech is one of the oldest technologies available today.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/HAnwjxLGA-g" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Strategies for Policy Intervention&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Chakshu Roy)&lt;br /&gt;The second session on “Strategies for Policy Intervention” was led by Chakshu Roy. This session dealt with various ways in which policy intervention can be made and the various factors necessary to successfully engage in policy forums.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/B-tiOPu6WaU" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Profile of Internet Service Providers&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Satyen Gupta)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/profile-of-isps-by-satyen-gupta"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/SatyenGupta.png" alt="" class="image-inline" title="Satyen Gupta" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of Satyen Gupta speaking about Internet Service Providers&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Satyen Gupta during his talk on “Profile of Internet Service Providers” discussed the nature, offerings and profile of various ISPs in India, their market share and dynamics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;National Broadband Plans&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Spectrum Issues “Management”&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reality check of Indian ISPs&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Definition &amp;amp; Penetration&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Roadblocks for Broadband in India, Governments Role, Regulation&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Institutional Framework for the Indian Telecom&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Access in India- Technology-Neutrality&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Satellite based DTH Services offer alternate for the Broadband via Receive Only Internet Service (ROIS)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband using DTH for Receive-only Internet&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;VSAT has the potential for significant impact on Broadband Penetration in Remote Areas&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fixed Wireless Access- an important access technology&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Facilitating Radio Spectrum for Broadband Access&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fiscal measures to reduce the cost of access devices, infrastructure and broadband service&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reduction in the cost of connectivity&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;National Internet Exchange of India (NIXI) -National Internet Exchange of India (NIXI) has been set up on recommendation of TRAI by DIT, Government of India to ensure that Internet traffic, originating and destined for India, should be routed within India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Emerging Broadband Services&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Commission for Digital Development (BCDD)-UN Targets for Universal Broadband,2015&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;NOFN India-Existing Fiber Infrastructure and Coverage by Various Service Providers&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;National Telecom Policy (NTP) 2012- Salient Features&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;State of Internet Services and ISPs in India:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;India’s Ranking on Key Broadband Indicators&lt;/li&gt;
&lt;li&gt;Regulator’s Report – Growth of Internet in India&lt;/li&gt;
&lt;li&gt;Internet Subscribers Base &amp;amp; Market share of top 10 ISPs&lt;/li&gt;
&lt;li&gt;Technology trends for Internet/Broadband Access&lt;/li&gt;
&lt;li&gt;Internet/broadband Subscribers for top 10 states&lt;/li&gt;
&lt;li&gt;Tariff Plans for USO funded Broadband&lt;/li&gt;
&lt;li&gt;Contribution of Telcos in Development of Internet Services&lt;/li&gt;
&lt;li&gt;Incumbent’s Role in Growth of Broadband&lt;/li&gt;
&lt;li&gt;Plugging rural missing link- BBNL&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet Subscribers Base &amp;amp; Market share of top 10 ISPs&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/DOSeo-ASOQ8" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 4: Competition in the Market by Helani Galpaya&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Helani Galpaya during her talk on “Competition in the Market” discussed about what competition meant, &lt;em&gt;Herfindahl–Hirschman&lt;/em&gt; Index to measure how competitive a market is, what are the dangers of monopoly markets and the landscape of the Telecom market in India.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Helani.png" alt="" class="image-inline" title="Helani" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Helani Galpaya speaking about Competition in the Market&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 7: (June 14, 2013)&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The final day of the Institute focussed on how the Internet can be used to effect change on society – Activism was the theme.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: Leveraging Internet for activism&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Ananth Guruswamy)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/LeveragingInternetforActivism.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/AnanthGuruswamy.png" alt="" class="image-inline" title="Ananth Guruswamy" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Ananth Guruswamy speaking during the session on leveraging internet for activism&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Digital Activism&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Target Omar Abdullah. It is about an act called Administrative detention Act. One can be detained without act i.e. The Preventive Detention Act. He directly responded to the threat.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Twitter seems to be a place where the political leaders are actually accessible. This kind of access was not possible in day to day life earlier if one was a common man. This phenomenon is developing. Even in Corporate setup writing a mail directly to the CEO seems possible. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Strengths: Wide reach, Freedom of speech, Data collection is made easy, Issues can be tackled swiftly, Global communities, singular identities have lot of power. Eg: 190 Million people stood up against Poverty; this kind of mobilization impossible without internet.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Besides local issues even Global issues are addressed an collection of funds becomes easy. Onion.com once a struggling publication in U.S., but now with a global audience it is thriving and it has a healthy reader base today. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Earth Hour helps people connect across space and time.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Weakness: More popularity, more attention; Traditional/Real Protest has become rare and a threat; There is no real action beyond internet, threat of movement is low, there is no real commitment involved in digital activism and just one click is enough to make one ‘feel good’.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Opportunities: Recruitment of protestors for real protests. Diff. b/w real and virtual blurred; anything that affects the mind space is real. The intersection is interesting.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Threats: Total removal of privacy, Government intervention in private issues and there could be misinterpretation of people’s thoughts by certain people.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Traditional vs Digital activism: Traditional fails to provide results whereas clicking a button is as easy as wearing a badge.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Facebook activism: ‘Like Buttons’, People moving away from reading emails, a shift towards use of facebook; creates a sense of belongingness which the traditional activism failed to achieve.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;India against Corruption: used mobile phone effectively.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Social Media has changed the way protests happen globally and in India, one example is Twitter. Change.org is a website which gives freedom to anybody to start a petition without any external source; Awaaz.org another such petition website.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Green Peace launched a Green peace X which was a runaway success. YouTube is another platform for the masses. People today are more interested in watching rather than reading.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Pakistan in 2007: “Flash protests”; Free Fraizan Movement on Twitter.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Something to keep in mind regarding while launching a campaign online is to think who the audience is and what we want them to do and how will the campaign help our objectives?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How to measure success of a social media campaign?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reach&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Engagement- likes, tweets, comments, etc.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Influence&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Attrition Score&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/PXZE7y1qxlo" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Internet Access Activism&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Parminder Jeet Singh)&lt;br /&gt;The next session on “INTERNET ACCESS” ACTIVISM by Parminder Jeet Singh dealt with how people can contribute to initiatives for improving internet access amongst masses.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/_zyM3_OiUxM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;h3&gt;Session 3: Ensuring Access to the Internet&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by A.K. Bhargava)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/BBNLiis.pdf"&gt;Click to view the presentation&lt;/a&gt;&lt;br /&gt;The last session on “Ensuring Access to the Internet” by A.K. Bhargava discussed strategies to enhance access to the Internet in India with special focus on National Optical Fibre Network.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points discussed were:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Role of Broadband in Nation Building&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy Aspiration of Broadband - How do we meet aspiration?&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Telecom Network Layers‐Gaps in OFC Reach&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; BBNL Interconnection&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; NOFN - Bridging The Gap&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Digital Knowledge Centres (DKCs)&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Architecture of BBNL&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; NOFN Impact&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Societal&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Bridging the digital divide&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Business&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Job creation, indigenous industry growth&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Sectoral&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Improved connectivity, data growth&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Technological&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Differentiators&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/4X3WSn1u3WM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Speaker Presentation Slides&lt;/strong&gt;&lt;br /&gt;All the presentation aids/slide shows barring a few have been uploaded to the website at &lt;a class="external-link" href="http://internet-institute.in/repository"&gt;http://internet-institute.in/repository&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Presentation of Assignments&lt;/strong&gt;&lt;br /&gt;The participants presented their assignments which were given to them to work on the 3rd day. The participants were presented with Wikipedia T-Shirts as a token of appreciation.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Assignments.png" alt="" class="image-inline" title="Assignments" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants presenting their assignments&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participant Feedback&lt;/strong&gt;&lt;br /&gt;All participants were asked to fill a "Session Feedback Form" for each of the sessions and also an "Overall Feedback Form". They were also constantly encouraged to come up with suggestions and inputs on how to make the Institute more interesting.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The key findings from the &lt;strong&gt;Quantitative Feedback&lt;/strong&gt; provided are:&lt;br /&gt;(The figures below are averaged scores (out of 5) provided by participants in the Overall Feedback Forms)&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th&gt;Parameter&lt;/th&gt;
&lt;th&gt;Score (Out of 5)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Relevance of Content&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td style="text-align: justify;"&gt;2&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;Comprehensiveness of Content&lt;/td&gt;
&lt;td&gt;3.44&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Easy to Understand&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.55&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Well Paced&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.33&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Sufficient Breaks&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Duration of Talks&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Mix between Learning &amp;amp; Activities&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The key findings from the &lt;strong&gt;Qualitative Feedback&lt;/strong&gt; provided are:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th&gt;Points observed&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Presentations&lt;/strong&gt; – Participants felt sessions with accompanying slides/aids were most helpful. Some felt that accompanying notes could also be useful for future reference.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Use of Examples/Case Studies&lt;/strong&gt; – Participants felt concepts can be better assimilated if case-studies/examples are used. Some also felt that for the technological advancements discussed, it would have been better had the social/economic impact of the same was discussed too.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Implementation Gaps&lt;/strong&gt;– One participant, who is working at the field level in Kolkata had a specific thing to say about the talk about BSNL and its offerings– Although BSNL has so many options available on paper to connect to the Internet, common service centres in West Bengal are mostly run on Tata Indicom’s network even though the board outside says “BSNL” etc. She felt that the reality is far different from what exists on paper.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Interactive sessions&lt;/strong&gt; were most appreciated than speaker led sessions.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;There were many responses to the question “&lt;strong&gt;How will you apply this new information in the future&lt;/strong&gt;” and it is very encouraging.&amp;nbsp; People have given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, to help file RTIs, to adopt more open source software, sharing with students, advocacy efforts, etc&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;The responses to the question “&lt;strong&gt;What did you learn from the session/workshop that was new?&lt;/strong&gt;” elicited more responses for the following sessions&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Domestic Bodies and Mechanisms&lt;/li&gt;
&lt;li&gt;Case-studies such as Air Jaldi&lt;/li&gt;
&lt;li&gt;Low cost devices in India&lt;/li&gt;
&lt;li&gt;USOF&lt;/li&gt;
&lt;li&gt;Free &amp;amp; Open Internet&lt;/li&gt;
&lt;li&gt;Copyright laws&lt;/li&gt;
&lt;li&gt;Privacy&lt;/li&gt;
&lt;li&gt;Accessibility&lt;/li&gt;
&lt;li&gt;Digital Natives&lt;/li&gt;
&lt;li&gt;ISPs&lt;/li&gt;&lt;/ol&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Field Trip&lt;/strong&gt; – One participant said “&lt;em&gt;One or two of the persons from MapUnity could have made the presentation at the institute venue itself. A visit to an underserved or un-served community with interactions with the people there could also have given a good understanding of on-ground challenges and needs.”&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Follow-up Session&lt;/strong&gt; –One participant had ideas about having a follow-up session “&lt;em&gt;A follow-up call [webinar?] after 6 months to see if any of these concepts were useful would be an interesting exercise to take up”&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Assignment – &lt;/strong&gt;Participants felt that the assignments were good but they needed more time to work on the same.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Other Feedback:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The food and the facilities were enjoyed and appreciated by all.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The remote location of the Golden Palms Resort was a concern for most of the participants.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation Certificates&lt;/strong&gt;&lt;br /&gt;Participation Certificates (template shown below) have been mailed to all the participants in the third week of July 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Certificate.png" alt="" class="image-inline" title="Certificate of Participation" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is the certificate declaring the successful completion of the event&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify;"&gt;Institute Expenses&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;A total of Rs. 19, 91,889 (Rupees nineteen lakhs ninety one thousand eight hundred and eighty nine only) was spent towards organizing and conducting the Internet Institute. A breakup of the Institute Expenditures is given below:&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th style="text-align: left;"&gt;Type of Expense&lt;/th&gt;
&lt;th style="text-align: left;"&gt;Description&lt;/th&gt;
&lt;th style="text-align: right;"&gt;Total&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Venue – Golden Palms Resort&lt;/td&gt;
&lt;td&gt;Accommodation for participants, speakers and food&lt;/td&gt;
&lt;td style="text-align: right;"&gt;12,91,176&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Travel&lt;/td&gt;
&lt;td&gt;Cost of Air tickets&lt;/td&gt;
&lt;td style="text-align: right;"&gt;2,94,515&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Local Travel&lt;/td&gt;
&lt;td&gt;Airport Pickup/Drop, Local City Travel&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,41,001&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Gifts &amp;amp; Printing&lt;/td&gt;
&lt;td&gt;Gifts for speakers and ad hoc document printing charges&lt;/td&gt;
&lt;td style="text-align: right;"&gt;24,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Infrastructure&lt;/td&gt;
&lt;td&gt;Telephony, Audio, Video, Stage&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,05,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Participant Bags&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right;"&gt;10,650&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Reimbursements&lt;/td&gt;
&lt;td&gt;Reimbursements to participants and speakers&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,25,547&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;" colspan="3"&gt;&lt;strong&gt;Total Expenses&lt;/strong&gt;&lt;/td&gt;
&lt;td style="text-align: right;"&gt;19,91,889&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify;"&gt;What the participants had to say&lt;/h3&gt;
&lt;blockquote class="quoted"&gt;Sangh Priya Rahul – “&lt;em&gt;One of my organisation's work is more or less related to empowerment of rural areas so knowledge about USOF will be useful there&lt;/em&gt;&lt;em&gt;.” &lt;/em&gt;(On USOF)&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="quoted"&gt;Rashmi. M – “&lt;em&gt;Makes me more sensitized towards the disabled people.”&lt;/em&gt; (On e-Accessibility)&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="quoted"&gt;Preethi Ayyaluswamy – “&lt;em&gt;Would help me in strategically planning for an online campaign” &lt;/em&gt;(On digital activism).&lt;/blockquote&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Institute was highly engaging and enabled the participants to explore the various facets of Internet &amp;amp; Society. As was evident from the feedback forms, participants had given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, help file RTIs, adopt more open source software, sharing with students, advocacy efforts etc. There was a very high level of expertise amongst speakers at the Institute which was apparent from the participatory discussions and a lot of insightful perspectives were brought forth. There was a common consensus amongst all participants that inclusive growth across all dimensions would take efforts from all stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We hope to learn from the findings of this Institute and work towards a better second Institute.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/GroupPhoto.png" alt="" class="image-inline" title="Group Photo of Participants" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a group picture of all the participants and the organizers&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>srividya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-10-15T06:48:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune">
    <title>Institute for Internet &amp; Society 2014, Pune</title>
    <link>https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune</link>
    <description>
        &lt;b&gt;Last month, activists, journalists, researchers, and members of civil society came together at the 2014 Institute for Internet &amp; Society in Pune, which was hosted by CIS and funded by the Ford Foundation. The Institute was a week long, in which participants heard from speakers from various backgrounds on issues arising out of the intersection of internet and society, such as intellectual property, freedom of expression, and accessibility, to name a few. Below is an official reporting summarizing sessions that took place.&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;iframe frameborder="0" height="500" src="http://www.slideflickr.com/iframe/J3JYk2bm" width="700"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;Day One&lt;/h1&gt;
&lt;p&gt;February 11, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 9.40 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction: Sunil Abraham, &lt;i&gt;Executive Director Centre for Internet and Society&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00 a.m. – 10.15 a.m.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction of Participants&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.15 a.m. – 12.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Internet Governance and Privacy: Sunil Abraham&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.00 p.m. – 12.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.30 p.m. – 1.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Keynote: Bishakha Datta, &lt;i&gt;Filmmaker and Activist, and Board Member, Wikimedia Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.00 p.m. – 2.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Participant Presentations&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea Break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Histories, Bodies and Debates around the Internet:   Nishant Shah, &lt;i&gt;Director-Research, CIS&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This year’s Internet Institute, hosted by the Centre for Internet &amp;amp; Society (CIS), kicked off in Pune to put a start to a week of learnings and discussions surrounding internet usage and its implications on individuals of society. Twenty two attendees from all over India attended this year, from backgrounds of activism, journalism, research and advocacy work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Attendees were welcomed by&lt;b&gt; Dr. Ravina Aggarwal&lt;/b&gt;, Program Officer for Media Rights &amp;amp; Access at the Ford Foundation, the event’s sponsor, who started off the day by introducing the Foundation’s initiatives in pursuit of bridging the digital divide by addressing issues of internet connectivity.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DSC_0050.JPG/image_preview" title="Pune_Sunil" height="243" width="367" alt="Pune_Sunil" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Governance &amp;amp; Privacy&lt;/b&gt;, Sunil Abraham &lt;br /&gt;The Institute’s first session was led by &lt;b&gt;Sunil Abraham&lt;/b&gt;,  Executive Director of CIS, and engaged with issues of internet  governance and privacy with reference to four stories: 1) a dispute  between tweeters from the US and those in South Africa over the use of  hashtag &lt;a href="http://www.thoughtleader.co.za/khayadlanga/2009/11/05/yesterday-a-short-lived-war-broke-out-between-america-and-south-africa/comment-page-1/"&gt;#thingsdarkiesays&lt;/a&gt;, which is said not to be as racially derogatory as it is in the US; 2) Facebook’s contested policies on &lt;a href="http://www.zdnet.com/blog/facebook/facebook-clarifies-breastfeeding-photo-policy/8791"&gt;photos featuring users breastfeeding&lt;/a&gt;, 3) a lawsuit between &lt;a href="http://www.theguardian.com/environment/2010/jul/26/tata-sue-greenpeace-turtle-game"&gt;Tata and Greenpeace&lt;/a&gt; over the organization’s use of Tata’s logo in a video game created for  public criticism of their environmentally-degrading practices, and  lastly, 4) the case of &lt;a href="http://en.wikipedia.org/wiki/Savita_Bhabhi"&gt;Savita Bhabhi&lt;/a&gt;,  an Indian pornographic cartoon character which had been banned by  India’s High Court and which had served as a landmark case in expanding  the statutory laws for what is considered to be pornographic.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Each of these stories has one major thing in common: due to their nature of taking place over the internet, they are not confined to one geographic location and in turn, are addressed at the international level. The way by which an issue as such is to be addressed cuts across State policies and internet intermediary bodies to create quite a messy case in trying to determine who is at fault. Such complexity illustrates how challenging internet governance can be within today’s society that is no longer restricted to national or geographic boundaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil also goes on in explaining the relationship between privacy, transparency, and power, summing it up in a simple formula; &lt;b&gt;privacy protection s&lt;/b&gt;hould have a &lt;i&gt;reverse&lt;/i&gt; relationship to &lt;b&gt;power&lt;/b&gt;—the more the power, the less the privacy one should be entitled to. On the contrary, a &lt;i&gt;direct correlation&lt;/i&gt; goes for &lt;b&gt;power&lt;/b&gt; and &lt;b&gt;transparency&lt;/b&gt;—the more the power, the more transparent a body should be. Instead of thinking about these concepts as a dichotomy, Sunil suggests to see them as absolute rights in themselves—instrumental in policies and necessary to address power imbalances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Web We Want&lt;/b&gt;, Bishakha Datta&lt;br /&gt;The Institute’s kickoff was also joined by Indian filmmaker and activist, &lt;b&gt;Bishakha Datta&lt;/b&gt;, who had delivered the keynote address. Bishakha bridged together notions of freedom of speech, surveillance, and accessibility, while introducing campaigns that work to create an open and universally accessible web, such as the &lt;a href="https://webwewant.org/"&gt;Web We Want&lt;/a&gt; and &lt;a href="http://www.sexualityanddisability.org/"&gt;Sexuality and Disability&lt;/a&gt;. Bishakha stresses how the internet as a space has altered how we experience societal constructs, which can be easily exhibited in how individuals experience Facebook in the occurrence of a death, for example. Bishakha initiated discussion among participants by posing questions such as, “what is our expectation of privacy in this brave new world?” and “what is the society we want?” to encompass the need to think of privacy in a new way with the coming of the endless possibilities the internet brings with it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Histories, Bodies and Debates around the Internet&lt;/b&gt;, Nishant Shah&lt;br /&gt;CIS Research Director, &lt;b&gt;Nishant Shah&lt;/b&gt;, led a session examining internet as a technology more broadly, and our understandings of it in relation to the human body. Nishant proposes the idea that history is a form of technology, as well as time, itself, for which our understanding only comes into being with the aid of technologies of measurement. Although we are inclined to separate technology from the self, Nishant challenges this notion while suggesting that technology is very integral to being human, and defines a “cyborg” as someone who is very intimate with technology. In this way, we are all cyborgs. While making reference to several literary pieces, including Haraway’s &lt;i&gt;Cyborg: Human, Animus, Technology&lt;/i&gt;; Kevin Warwick’s &lt;i&gt;Living Cyborg&lt;/i&gt;; and Watt’s small world theory, Nishant challenges participants’ previous notions of how one is to understand technology in relation to oneself, as well as the networks we find ourselves implicated within.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also brought forth by Nishant, was the fact that the internet as a technology has become integral to our identities, making &lt;i&gt;us&lt;/i&gt; accessible (rather than us solely making the technology accessible) through online forms of documentation. This digital phenomenon in which we tend to document what we know and experience as a means of legitimizing it can be summed in the modern version of an old fable: “If a tree falls in a lonely forest, and nobody tweets it, has it fallen?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant refers to several case studies in which the use of online technologies has created a sense of an extension of the self and one’s personal space; which can then be subject to violation as one can be in the physical form, and to the same emotional and psychological effect—as illustrated within the 1993 occurrence referred to as “&lt;a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace"&gt;A Rape in Cyberspace&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Attendee Participation&lt;/b&gt;&lt;br /&gt;Participants remained engaged and enthusiastic for the duration of the day, bringing forth their personal expertise and experiences. Several participants presented their own research initiatives, which looked at issues women face as journalists and as portrayed by the media; amateur pornography without the consent of the woman; study findings on the understandings of symptoms of internet addiction; as well as studies looking at how students engage with college confession pages on Facebook.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Two&lt;/h1&gt;
&lt;p&gt;February 12, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wireless Technology: Ravikiran Annaswamy, &lt;i&gt;CEO and Co-founder at Teritree   Technologies&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wired Technology: Ravikiran Annaswamy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Network, Threats and Securing Yourself: Kingsley   John, &lt;i&gt;Independent Consultant&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea Break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Practical Lab: Kingsley John&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;4.45 p.m. – 5.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wrap-up: Sunil Abraham&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Day Two of the Institute entailed a  more technical orientation to “internet &amp;amp; society” across sessions.  Participants listened to speakers introduce concepts related to wired  and wireless internet connectivity devices and their networks, along  with the network of internet users and how one may secure him or herself  while “online.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wireless &amp;amp; Wired Technology&lt;/b&gt;, Ravikiran Annaswamy&lt;br /&gt;Senior industry practitioner, &lt;b&gt;Ravikiran Annaswamy&lt;/b&gt; had aimed to enable the Institute’s participants to “understand the  depth and omnipresent of telecom networks” that we find ourselves  implicated within. Ravikiran went through the basics of these  networks—including fixed line-, mobile-, IP-, and Next Generation  IP-networks—as well as the technical structuring of wired and wireless  broadband. Many participants found this session to be particularly  enriching as their projects aimed to provide increased access to  internet connectivity to marginalized areas in India, and had been  without the know-how to go about it.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/5.JPG/image_preview" alt="Pune_Participants" class="image-inline image-inline" title="Pune_Participants" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Network, Threats and Securing Yourself&lt;/b&gt;, Kinglsey John&lt;br /&gt;An instructional session on how to protect oneself was given by &lt;b&gt;Kingsley John&lt;/b&gt;, beginning with a lesson on IP Addresses—what they are and the different generations of such, and how IP addresses fit into a broader internet network. Following, Kingsley demonstrated and explained &lt;a href="http://www.slideshare.net/lupucosmin/encrypting-emails-using-kleopatra-pgp"&gt;email encryption through the use of software, Kleopatra&lt;/a&gt;, and how it may be used to generate keys to &lt;a href="http://thehackernews.com/2014/01/PGP-encryption-Thunderbird-Enigmail_12.html"&gt;encrypt emails through Thunderbird mail client&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Evening Discussion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A handful of participants voluntarily partook in an evening discussion, looking at the role of big players in the global internet network, such as Google and Facebook, how they collect and utilize users’ data, and what sorts of measures can be taken to minimize the collecting of such. Due to the widely varying backgrounds of interest among participants, those coming from this technical orientation towards the internet were able to inform their peers on relevant information and types of software that may be found useful related to minimizing one’s online presence.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Three&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;February 13, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.30 a.m. –   11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Free Software: Prof. G. Nagarjuna, &lt;i&gt;Chairperson, Free Software Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00 a.m. –   11.15 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Open Data: Nisha Thompson, &lt;i&gt;Independent Consultant&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.45 p.m. –   1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Freedom of Expression: Bhairav Acharya, &lt;i&gt;Advocate and Adviser, Centre for Internet   and Society&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Copyright: Nehaa Chaudhari, &lt;i&gt;Program Officer, Centre for Internet and Society&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The third day of the Internet Institute incorporated themes presented by speakers ranging from free software, to freedom of expression, to copyright.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Free Software&lt;/b&gt;, Prof. G. Nagarjuna&lt;br /&gt;Chairman on the Board of Directors for the Free Software Foundation of India, &lt;b&gt;Professor G. Nagarjuna&lt;/b&gt; shared with the Institute’s participants his personal expertise on &lt;b&gt;software freedom&lt;/b&gt;. Nagarjuna mapped for us the network of concepts related to software freedom, beginning with the origins of the &lt;b&gt;copyleft movement&lt;/b&gt;, and also touching upon the art of hacking, the &lt;b&gt;open source movement&lt;/b&gt;, and what role software freedom plays in an interconnected world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nagarjuna looks at the free software movement as a political movement in the digital space highlighting the &lt;a href="http://www.gnu.org/philosophy/free-sw.html"&gt;user’s freedoms&lt;/a&gt; associated to the use, distribution, and modification of software for the greater good for all. This is said to distinguish this movement from that of Open Source—a technical and more practical development-oriented movement. The free software movement is not set out to compromise the fundamental issues for the sake of being practical and in that sense, ubiquitous. Instead, its objective is “not to make everybody &lt;i&gt;use&lt;/i&gt; the software, but to have them understand &lt;i&gt;why&lt;/i&gt; they are using the software,” so that they may become “authentic citizens that can also resonate &lt;i&gt;why &lt;/i&gt;they’re doing what they’re doing. We want them to understand the ethical and political aspects of doing so,” Nagarjuna says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Data&lt;/b&gt;, Nisha Thompson&lt;br /&gt;Participants learned from &lt;b&gt;Nisha Thompson&lt;/b&gt; on Open Data; what it is, its benefits, and how it is involved in central government initiatives and policy, as well as civil society groups—generally for uses such as serving as evidence for decision making and accountability. Nisha explored challenges concerning the use of open data, such as those pertaining to privacy, legitimacy, copyright, and interoperability. The group looked at the &lt;a href="http://www.indiawaterportal.org/"&gt;India Water Portal&lt;/a&gt; as a case study, which makes accessible more than 300 water-related datasets already available in the public space for use from anything from sanitation and agriculture to climate change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Freedom of Expression&lt;/b&gt;, Bhairav Acharya&lt;br /&gt;&lt;b&gt;Bhairav Acharya&lt;/b&gt;, a constitutional lawyer, traced the development of the freedom of speech and expression in India. Beginning with a conceptual understanding of censorship and the practice of censorship by the state, society, and the individual herself, Bhairav examines the limits traditionally placed by a nation-state on the right to free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, modern free speech and censorship law was first formulated by the colonial British government, which broadly imported the common law to India. However, the colonial state also yielded to the religious and communitarian sensitivities of its subjects, resulting in a continuing close link between communalism and free speech in India today. After Independence, the post-colonial Indian state carried forward Raj censorship, but tweaked it to serve to a nation-building and developmental agenda. Nation-building and nationalism are centrifugal forces that attempt to construct a homogenous 'mainstream'; voices from the margins of this mainstream (the geographical, ethnic, and religious peripheries) and of the marginalised within the mainstream (the poor and disadvantaged), are censored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this narrative, Bhairav located and explained the evolution of the law relating to press censorship, defamation, obscenity, and contempt of court. Free speech law applies equally online. Broadly, censorship on the internet must survive the same constitutional scrutiny that is applied to offline censorship; but, as technology develops, the law must innovate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Copyright&lt;/b&gt;, Nehaa Chaudhari&lt;br /&gt;CIS Programme Officer, &lt;b&gt;Nehaa Chaudhari&lt;/b&gt; examined the concept of Copyright as an intellectual property right in discussing its fundamentals, purpose and origins, and Copyright’s intersection with the internet. Nehaa also explained the different exceptions to Copyright, along with its alternatives, such as opposing intellectual property protection regimes, including the Creative Commons and Copyleft. Within this session, Nehaa also introduced several cases in which Copyright came into play with the use of the internet, including Hunter Moore’s “&lt;a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F"&gt;Is Anyone Up&lt;/a&gt;?” website, which had showcased pornographic pictures obtained by submission bringing rise to the phenomenon of “revenge porn.” Instances as such blur the lines of what is commonly referred to as intellectual property, and what specific requirements enables one to own the rights to such.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Four&lt;/h1&gt;
&lt;p&gt;February 14, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;E-Accessibility and Inclusion: Prashant Naik, &lt;i&gt;Union Bank&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Patents: Nehaa Chaudhari&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 2.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fieldwork Assignment&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DSC_0053.JPG/image_preview" alt="Pune_Rohini" class="image-inline" title="Pune_Rohini" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;Day Four of the Internet Institute introduced concepts of  eAccessibilty and Inclusion on the internet for persons with  disabilities, along with patents as an intellectual property right.  Participants were also assigned a fieldwork exercise as a hands-on  activity in which they were to employ what they’ve learned to initiate  conversation with individuals in public spaces and collect primary data  while doing so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;eAccessibility and Inclusion&lt;/b&gt;, Prashant Naik&lt;/p&gt;
&lt;b&gt;Prashant Naik&lt;/b&gt; started off the  day with his session on E-Accessibility and Inclusion. Prashant  illustrated the importance of accessibility and what is meant by the  term. Participants learned of assistive technologies for different  disability types and how to create more accessible word and PDF  documents, as well as web pages for users. Prashant demonstrated to  participants what it is like to use a computer as a visually impaired  individual, which provided for an enriching experience.&lt;/td&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Patents&lt;/b&gt;, Nehaa Chaudhari&lt;b&gt;&lt;br /&gt;Nehaa Chaudhari &lt;/b&gt;led a second session at the Internet Institute on intellectual property rights—this one looking at patents particularly and their role within statutory law. Nehaa traced the historical origins of patents before examining the fundamentals of them, and addresses the questions, “Why have patents? And is the present system working for everyone?” Nehaa also introduced notions of the Commons along with the Anticommons, and perspectives within the debate around software patents, as well as different means by which the law can address the exploitation of patents or “patent thickets”—such as through patent pools or compulsory licensing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Fieldwork Assignment&lt;/b&gt;, Groupwork&lt;br /&gt;Participants were split into groups and required to carry out a mini fieldwork assignment in approaching individuals in varying public spaces in Pune in attempts to collect primary data. Questions asked to individuals were to be devised by the group, so long as they pertained to themes examined within the Internet Institute. Areas visited by groups included the Pune Central Mall, MG Road, and FC Road.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Five&lt;/h1&gt;
&lt;p&gt;February 15, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.30 a.m. –   11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;E-Governance: Manu Srivastav, &lt;i&gt;Vice President, eGovernments Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00 a.m. –   11.15 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Market Concerns: Payal Malik, &lt;i&gt;Economic Adviser, Competition Commission of India&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.45 p.m. –   1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Digital Natives: Nishant Shah&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fieldwork Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Day Five of the Internet Institute  brought with it sessions related to themes of e-governance, market  concerns of telecommunications, and so called “Digital Natives.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;eGovernance&lt;/b&gt;, Manu Srivastava&lt;br /&gt;Vice President of the eGovernments Foundation, &lt;b&gt;Manu Srivastava&lt;/b&gt; led a session on eGovernance—the utilization of the internet as a means  of delivering government services communicating with citizens,  businesses, and members of government. Manu examined the complexities of  the eGovernance and barriers to implementation of eGovernance  initiatives. Within discussion, participants examined the nuanced  relationship between the government and citizens with the incorporation  of other governing bodies in an eGovernance system, as well as new  spaces for corruption to take place.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/19.JPG/image_preview" alt="Pune_Chatting" class="image-inline image-inline" title="Pune_Chatting" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Market Concerns&lt;/b&gt;, Payal Malik&lt;br /&gt;&lt;b&gt;Payal Malik&lt;/b&gt;, Advisor of the Economics Division of the Competition Commission of India shared her knowledge on market concerns of the telecommunications industry, and exclaimed the importance of competition issues in such an industry as a tool to create greater good for a greater number of people. She demonstrated this importance by stating that affordability as a product of increased access can only be possible once there is enough investment, which generally only happens in a competitive market. In this way, we must set the conditions to make competition possible, as a tool to achieve certain objectives. Payal also demonstrated the economic benefits of telecommunications by stating that for every 10% increase in broadband penetration, increase in GDP of 1.3%. She also examined the broadband ecosystem in India and touched upon future possibilities of increased broadband penetration, such as for formers and the education sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Digital Natives&lt;/b&gt;, Nishant Shah&lt;br /&gt;&lt;b&gt;Nishant Shah&lt;/b&gt; shed some light on one of the areas that the Centre for Internet &amp;amp; Society looks at within their research scope, this being the “&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Native&lt;/a&gt;.” As referred to by Nishant, the Digital Native is not to categorize a specific type of internet user, but can be said for simply any person who is performing a digital action, while doing away with this false dichotomy of age, location, and geography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant examines varying case studies in which “the digital is empowering natives to not merely be benefactors of change, but agents of change,” from the &lt;a href="http://blog.blanknoise.org/2012/07/i-never-ask-for-it.html"&gt;Blank Noise Project&lt;/a&gt;’s “I NEVER Ask for it…” campaign in efforts to rethink sexual violence, to &lt;a href="http://www.wherethehellismatt.com/"&gt;Matt Harding&lt;/a&gt;’s foolish dancing with groups of individuals from all over the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As occurrences in the digital realm, however, these often political expressions may be rewritten by the network when picked up as a growing phenomenon, in order to make it accessible to online consumers by the masses. In doing so, the expression is removed from its political context and is presented in the form of nothing more than a fad. For this reason, Nishant stresses the need to become aware of the potential of the internet in becoming an “echo-chamber”—in which forms of expression are amplified and mimicked, resulting in a restructuring of the dynamics surrounding the subject—whether it be videos of &lt;a href="http://en.wikipedia.org/wiki/Back_Dorm_Boys"&gt;boys lipsyncing to Backstreet Boys&lt;/a&gt; in their dorm room going viral, or a strong and malicious movement to punish the Chinese girl who had taken a video of her heinously and wickedly killing a kitten after locating her using the &lt;a href="http://en.wikipedia.org/wiki/Human_flesh_search_engine"&gt;Human Flesh Search Engine&lt;/a&gt;.&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Fieldwork Presentations&lt;/b&gt;, Groupwork&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To end off the day, participant groups presented findings collated from the prior evening’s fieldwork exercise, in which they were to ask strangers in various public places of Pune questions pertaining to themes looked at from within this year’s Institute. Participants were divided into four groups and visited Pune’s FC Road, Mahatma Gandhi Road, and Central Mall.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Groups found that the majority of those interviews primarily accessed the phone via the mobile. There was also a common weariness of using the internet and concern for one’s privacy while doing so, especially with uploading photos to Facebook and online financial transactions. People were also generally concerned about using cyber cafes for fear of one’s accounts being hacked. Generally people suspected that so long as conversations are “private” (i.e. in one’s Facebook inbox), so too are they secure. Just as well, those interviewed shared a sense of security with the use of a password.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Six&lt;/h1&gt;
&lt;p&gt;February 16, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wikipedia: Dr. Abhijeet Safai&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Open Access: Muthu Madhan (TBC)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Case Studies Groupwork&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Case Studies Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;As the Institute came closer to its end, participants got the opportunity to hear from speakers on topics pertaining the Wikipedia editing in addition to Open Access to scholarly literature.  Participants also worked together in groups to examine specific case studies referenced in previous sessions, and then presented their conclusions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wikipedia&lt;/b&gt;, Dr. Abhijeet Safai&lt;br /&gt;The Institute was joined by Medical Officer of Clinical Research at Pune’s Symbiosis Centre of Health Care, &lt;b&gt;Dr. Abhijeet Safai&lt;/b&gt;, who led a session on Wikipedia. Having edited over 3700 Wikipedia articles, Dr. Abhijeet was able to bring forth his expertise and familiarity in editing Wikipedia to participants so that they would be able to do the same. Introduced within this session were Wikipedia’s different fundamental pillars and codes of conducts to be complied with by all contributors, along with different features and components of Wikipedia articles that one should be aware of when contributing, such as how to cite sources and discuss the contents of an article with other contributors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Access&lt;/b&gt;, Muthu Madhan&lt;br /&gt;&lt;b&gt;Muthu Madhan&lt;/b&gt; joined the Internet Institute while speaking on Open Access (OA) to scholarly literature. Within his session, Muthu examined the historical context within which the scholarly journal had arisen and how the idea of Open Access began within this space. The presence of Open Access in India and other developing nations was also examined in this session, and the concept of Open Data, introduced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Case Studies&lt;/b&gt;, Groupworks&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/11.JPG/image_preview" alt="Pune_Group2" class="image-inline image-inline" title="Pune_Group2" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/8.JPG/image_preview" alt="Pune_Group" class="image-inline image-inline" title="Pune_Group" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Participants were split up into groups and assigned particular case studies looked at briefly in previous sessions. Case studies included &lt;a href="http://siditty.blogspot.in/2009/11/things-darkies-say.html"&gt;&lt;i&gt;#thingsdarkiessay&lt;/i&gt;&lt;/a&gt;&lt;i&gt;,&lt;/i&gt; a once trending Twitter hashtag in South Africa which had offended many Americans for its use of “darkie” as a derogatory term; the literary novel, &lt;a href="http://en.wikipedia.org/wiki/The_Hindus:_An_Alternative_History"&gt;&lt;i&gt;The Hindus&lt;/i&gt;&lt;/a&gt;, which offers an alternative narrative of Hindu history had been banned in India for obscenity; a case in which several users’ avatars had been controlled by another in a virtual community and forced to perform sexual acts, referred to as &lt;a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace"&gt;&lt;i&gt;A Rape Happened in Cyber Space&lt;/i&gt;&lt;/a&gt;; and lastly, a pornographic submission website, &lt;a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F"&gt;Is Anyone Up?&lt;/a&gt;, for which content was largely derived from “revenge porn.” Each group then presented on the various perspectives surrounding the issue at hand.&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Cyborg&lt;/b&gt;, Nishant Shah&lt;br /&gt;Nishant Shah led an off-agenda session in the evening looking more closely at the notion of the human cyborg. Nishant deconstructs humanity’s relationship to technology, in suggesting that we “think of the human as &lt;i&gt;produced&lt;/i&gt; with the technologies… not who &lt;i&gt;produces&lt;/i&gt; technology.” Nishant explores the Digital Native as an attained identity for those who, because of technology, restructure and reinvent his or her environment—offline as well as online. Among other ideas shared, Nishant refers to works by Haraway on the human cyborg in illustrating our dependency on technology and our need to care for these technologies we depend on.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Seven&lt;/h1&gt;
&lt;p&gt;February 17, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Internet Activism: Laura Stein, &lt;i&gt;Associate Professor, University of Texas &lt;/i&gt;and &lt;i&gt;Fulbright Fellow&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Domestic and International Bodies: Chinmayi Arun, &lt;i&gt;Research Director&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Participant Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Hot Question Challenge&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The last day of the week-long Internet Institute examined concepts of Internet Activism and Domestic and International Bodies. Some participants led presentations on topics of personal familiarity, before a final wrap-up exercise, calling upon individuals to share any new formulations resulting from the Institute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Activism&lt;/b&gt;, Laura Stein&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/17.JPG/image_preview" alt="Pune_Laura" class="image-inline image-inline" title="Pune_Laura" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Associate Professor from the University of Texas, &lt;b&gt;Laura Stein&lt;/b&gt;,  spoke on activism on the internet. Laura examined some grassroots  organizations and movements taking place on the online and the benefits  that the internet brings in facilitating their impact, such as its  associated low costs, accessibility and possibility for anonymity.  Despite the positive effects catalyzed by the internet, Laura stresses  that the “laying field is still unequal, and movements are not simply  transformed by technology.” Some of the websites exemplifying online  activism that were examined within this session includes the &lt;a href="http://www.itgetsbetter.org/"&gt;It Gets Better Project&lt;/a&gt;, which aims to give hope to LGBT youth facing harassment, and the national election watch by the &lt;a href="http://adrindia.org/"&gt;Association for Democratic Reforms&lt;/a&gt;.  Additionally, Laura spoke on public communication policy, comparing  that of the US and India, and how this area of policy may influence  media content and practice.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Domestic and International Bodies&lt;/b&gt;, Chinmayi Arun&lt;br /&gt;As the Internet Institute’s final speaker, Research Director for Communication Governance at National Law University&lt;i&gt; &lt;/i&gt;,&lt;b&gt; Chinmayi Arun&lt;/b&gt;, explores the network of factors that affect one’s behavior on the internet—these including: social norms, the law, the markets, and architecture. In referring to Lawrence Lessig’s &lt;a href="http://en.wikipedia.org/wiki/Pathetic_dot_theory"&gt;pathetic dot theory&lt;/a&gt;, Chinmayi illustrates how individual’s—the pathetic dots in question—are functions of the interactions of these factors, and in this sense, regulated, and stresses the essential need to understand the system, in order to effectively change the dynamics within it. It is worth noting that not all pathetic dots are equal, and Google’s dot, for example, will be drastically bigger than a single user’s, having more leveraging power within the network of internet bodies. Also demonstrated, is the fact that we must acknowledge the need for regulation by the law to some extent, otherwise, the internet would be a black box where anything goes, putting one’s security at risk of violation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hot Question Challenge&lt;/b&gt;&lt;br /&gt;The very last exercise of the Institute entailed participants asking each other questions on demand, relating back to different themes looked at within the last week. Participants had the chance, here, to bridge together concepts across sessions, as well as formulate their own opinions, while posing questions to others that they, themselves, were still curious about.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/DSC_0371.JPG/image_large" alt="Pune_Everyone" class="image-inline image-inline" title="Pune_Everyone" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune'&gt;https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>samantha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-04-07T11:31:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/insafnational-convention-on-crisis">
    <title>INSAF National Convention on Crisis of Capitalism and brazen onslaught on DEMOCRACY </title>
    <link>https://cis-india.org/news/insafnational-convention-on-crisis</link>
    <description>
        &lt;b&gt;Snehashish Ghosh is participating in this event as a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Ever since the Neo-liberal agenda began to unfold 22 years back, the democratic spaces within Indian polity have been squeezing continuously and the present scenario of run up to 2014 elections is reflecting the state of disarray in parliamentary democracy. The mainstream discourse appears to have deliberately failed in bringing out the intrinsic relationship between ‘capitalism’; its ‘crisis’ and ‘democracy’ to the core of analyzing and understanding the present amnesia in political process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The characteristics of crony, fictitious, lumpen and speculative Capital that is on the driving seat of contemporary phase of capitalism are mirrored in the operational levels of parliamentary democracy - from governance to electoral process- in the form of corporate influences on policies and decision making, rampant corruption at the pinnacle of power, control of money and muscle-power in politics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is, therefore, important to bring out the correlation between the ensuing crisis in global capitalism - including in India - and the impending crisis in our democracy - to the fore. The divergence in the requirements of the neo-liberal phase of capitalism and ‘democracy’ as its analogous political system seems to be the key in explaining the despair engulfing Indian polity at present. The attempts to transform ‘Democracies’ into ‘Corporatocracies’ that we see today, also emanate from this despondency alone.&lt;br /&gt;&lt;br /&gt;Last two decades have also seen the institution of ‘State’ posturing itself more and more aggressively against its own people in order to fulfill its obligations to international financial &amp;amp; trade institutions so to serve the interest of global capital. In such a course, it has extensively resorted to adopt the instrument of ‘fabricating’ cases against the voices of opposition to the interests of the global capital.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the instrument of ‘fabrication’ is not new to the ‘State Craft’ but this time it is being used in a targeted and selective manner. Not only the existing criminal laws have been used for this purpose but new laws like UAPA and various state ‘security laws’ were created during this period to meet this requirement.&lt;br /&gt;&lt;br /&gt;The ‘Indian State’ is also proceeding feverishly to create a surveillance state through various means of ‘electronic surveillance’ using cutting edge technologies to track mobile phones, internet usage, emails etc. at home while colluding with U.S. military and security establishment internationally against other nations. The business of creating and sharing of its citizen’s databases (both demographic &amp;amp; biometrics etc) has been promoted by Indian establishment by subverting the Constitution, existing norms of parliamentary democracy and citizens’ rights.&lt;br /&gt;&lt;br /&gt;It is in this context that INSAF has decided to hold its two day National Convention 2013.&lt;/p&gt;
&lt;h3 align="LEFT"&gt;Programme Schedule&lt;/h3&gt;
&lt;p align="LEFT"&gt;&lt;b&gt;Day 1: Crisis of Capitalism and brazen onslaught on DEMOCRACY&lt;/b&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10.00 &lt;br /&gt;10.30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea/Coffee&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 &lt;br /&gt;11.00 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Introduction by Anil Chaudhary&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 &lt;br /&gt;13.00 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Inaugural address by eminent writer and journalist P. Sainath Chaired by Justice Rajinder Sachar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00 &lt;br /&gt;14.30&lt;/td&gt;
&lt;td&gt;Lunch&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.30 &lt;br /&gt; 17.30  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;Panel Discussion:&lt;/p&gt;
Prof. Vibhuti Patel (Director, Centre for Study of Social Exclusion and Inclusive Policy, SNDT Women's University, Mumbai)&lt;br /&gt;Prof. Achin Vanaik (Former Dean of Social Sciences, Delhi University)&lt;br /&gt;Prof. Ramesh Dixit (Lucknow, UP)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Day 2: Surveillance state and perils of DEMOCRACY&lt;/b&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10.00&lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Panel Discussion&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr. Usha Ramanathan (Law researcher and activist, New Delhi)&lt;br /&gt;Prabir Purkayastha (Delhi Science Forum)&lt;br /&gt;Ms. Subi Chaturvedi (Asstt. Prof. of Journalism Communication, Lady Shri Ram College for Women, Delhi Univ. Founder Hon. Managing Trustee, Media For Change)&lt;br /&gt;Snehashish Ghosh (Centre for Internet &amp;amp; Society)&lt;br /&gt;Chaired by Ms. Kalyani Menon-Sen (Feminist activist &amp;amp; researcher)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;br /&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00 &lt;br /&gt;16.30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Panel Discussion: Suppressing dissent: Stifling NGOs via FCRA&lt;br /&gt;Kabir Dixit (Advocate, Supreme Court of India) &lt;br /&gt;Mathew Cherian (Chairperson, Credibility Alliance)&lt;br /&gt;Chaired by Sanjay Parikh (Human Rights activist and Advocate, Supreme Court of India)&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.30&lt;br /&gt;17.00&lt;/td&gt;
&lt;td&gt;Tea/Coffee&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/insafnational-convention-on-crisis'&gt;https://cis-india.org/news/insafnational-convention-on-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T10:18:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse">
    <title>Informational Privacy in India: An Emerging Discourse</title>
    <link>https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse</link>
    <description>
        &lt;b&gt;Centre for Policy Research supported by Omidyar Network organized this event in New Delhi on November 29, 2018. Amber Sinha was a speaker on the first panel on privacy and its tradeoffs.&lt;/b&gt;
        &lt;h3&gt;Concept Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The last few years have seen a formalisation of the right to informational privacy within India’s constitutional framework. While the context to this – the challenge to the validity of the Aadhaar project – has entailed broader issues on delivery of public goods and services, the response to whether an individual can assert control over key informational aspects of her life has become a critical part of our rights jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court verdict in Justice Puttaswamy’s case (2017) unequivocally affirmed this right despite leaving open several important aspects including the permissibility of restrictions on this right, and the level of scrutiny which the judiciary could exercise to safeguard them. What was particularly striking was the judicial reliance on considerable scholarship emerging from India and Indian scholars on important themes pertaining to this right: the differing conceptions of privacy and the role for each of them within India’s constitutional framework; the impact of privacy erosion on citizen-State relationship and private transactions in the commercial realm; surveillance tools and technologies in India; the need for an indigenous data protection law, and much more. The court has picked up on this thread in the second Puttaswamy verdict upholding the constitutional validity of Aadhaar with some important caveats and exceptions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, the Expert Committee headed by retired Justice Srikrishna also convened to come out with a draft personal data protection bill. The centrality of data to both commercial activity and governance purposes has found recognition in this bill. While the present legal regime to regulate data in India can be considered chequered at best with divergent regulations across finance, healthcare, telecom, mobility etc., the new bill aims to create a “big data-ready” framework. It impacts any private enterprise handling personal data by stipulating new internal procedures and strong penalties. The major themes in the bill are new user rights for data principals (individuals) who share their data with data fiduciaries (technology companies); data localisation and crossborder data flows; data protection authority (DPA) and its powers; data fiduciaries and new compliance requirements; and exceptions including law enforcement. Each of these carries major implications for data-driven solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the deliberations of the Committee too, substantial Indian scholarship on the themes listed above have been referenced and relied upon. This is truly a breakout moment for privacy and data protection in India. It is changing the terrain of institutional responses to personal data, technology architectures, and digital trade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Discussion Objectives and Format&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the above background, the Centre for Policy Research conducted a closed-door, invite only discussion on November 29, 2018 on the theme Informational Privacy in India: An Emerging Discourse. This discussion sought to engage with representatives from embassies, chambers of commerce and research funding organisations located in India. It took place from 10.00 to 13.00 hours at the Taj Vivanta Ambassador, Sujan Singh Park off Subramaniam Bharti Marg, New Delhi 110003.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The core objectives driving this workshop were to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Highlight informational privacy debates in India;&lt;/li&gt;
&lt;li&gt;Locate informational privacy within India’s constitutional setting, closely re-examining the Supreme Court verdicts in this regard;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Explore themes such as the notice-and-consent framework, regulatory interventions and structural changes, and other key themes on privacy and data protection in India;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Demystify concepts introduced to strengthen personal data protection, including actor and data categories, and new user rights, and their potential impact on technology design;&lt;/li&gt;
&lt;li&gt;Highlight the ramifications of data localization and cross-border data transfer restrictions, on digital trade and e-commerce;&lt;/li&gt;
&lt;li&gt;Decode the new structural mechanisms proposed to mitigate risks in collection, storage, and processing of personal data;&lt;/li&gt;
&lt;li&gt;Identify the impact of these mechanisms on the functioning of data-driven businesses and the future of data innovation in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/informational-privacy-in-india"&gt;view the agenda&lt;/a&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse'&gt;https://cis-india.org/internet-governance/news/informational-privacy-in-india-an-emerging-discourse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T05:40:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/publications/it-act">
    <title>Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/publications/it-act</link>
    <description>
        &lt;b&gt;The Information Technology Act, 2000 (amended in 2008) is the main statute that governs online behaviour in India, from e-commerce to cybercrimes, Internet surveillance, and intermediary liability.  Thus, understanding that statute is of paramount interest to all Indian 'netizens'.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/publications/it-act'&gt;https://cis-india.org/internet-governance/publications/it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2009-06-15T12:12:00Z</dc:date>
   <dc:type>Folder</dc:type>
   </item>




</rdf:RDF>
