<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 661 to 675.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/habeas-data-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/habeas-data-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/guest-post-before-cyber-norms-let2019s-talk-about-disanalogy-and-disintermediation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gsma-research-outputs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/growing-cyberspace-controls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/grants-apg-proposals-2014-2015-round2-the-centre-for-internet-and-society-impact-report-form"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/scrub-the-internet-clean"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/govt-to-monitor-facebook-twitter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/govt-and-blackberry"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/files/habeas-data-india.pdf">
    <title>Habeas Data in India</title>
    <link>https://cis-india.org/internet-governance/files/habeas-data-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/habeas-data-india.pdf'&gt;https://cis-india.org/internet-governance/files/habeas-data-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-12-10T03:58:58Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/habeas-data-in-india">
    <title>Habeas Data in India</title>
    <link>https://cis-india.org/internet-governance/blog/habeas-data-in-india</link>
    <description>
        &lt;b&gt;Habeas Data is a latin word which can be loosely translated to mean “have the data”. The right has been primarily conceptualized, designed, ratified, and implemented by various  nation-states in the background of a shared common history of decades of torture, terror, and other repressive practices under military juntas and other fascist regimes.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/habeas-data-india.pdf/view"&gt;&lt;b&gt;Download the Paper&lt;/b&gt;&lt;/a&gt; (PDF)&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The writ of habeas data was a distinct response to these recent histories which provided individuals with basic rights to access personal information collected by the state (and sometimes byprivate agencies of a public nature) and to challenge and correct such data, requiring the state to safeguard the privacy and accuracy of people's personal data.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The origins of Habeas Data are traced back, unsurprisingly, to the European legal regime since Europe is considered as the fountainhead of modern data protection laws. The inspiration for Habeas Data is often considered to be the Council of Europe's 108th Convention on Data Protection of 1981.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;The purpose of the Convention was to secure the privacy of individuals regarding the automated processing of personal data. For this purpose, individuals were granted several rights including a right to access their personal data held in an automated database.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another source or inspiration behind Habeas Data is considered to be the German legal system where a constitutional right to information self-determination was created by the German Constitutional Tribunal by interpretation of the existing rights of human dignity and personality. This is a right to know what type of data is stored on manual and automatic databases about an individual, and it implies that there must be transparency on the gathering and processing of such data.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Habeas Data is essentially a right or mechanism for an individual complaint presented to a constitutional court, to protect the image, privacy, honour, information self-determination and freedom of information of a person. &lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Habeas Data complaint can be filed by any citizen against any register to find out what information is held about his or her person. That person can request the rectification, update or even the destruction of the personal data held, it does not matter most of the times if the register is private or public.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Habeas Data in different jurisdictions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Habeas Data does not have any one specific definition and has different characteristics in different jurisdictions. Therefore, in order to better understand the right, it will be useful to describe the scope of Habeas Data as it has been incorporated in certain jurisdictions in order to better understand what the right entails:&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Brazil&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Constitution of Brazil grants its citizens the right to get a habeas data “a. to assure knowledge of personal information about the petitioner contained in records or data banks of government agencies or entities of a public character; b. to correct data whenever the petitioner prefers not to do so through confidential judicial or administrative proceedings;&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The place or tribunal where the Habeas Data action is to be filed changes depending on who is it presented against, which creates a complicated system of venues. Both the Brazilian constitution and the 1997 law stipulate that the court will be:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Superior Federal Tribunal for actions against the President, both chambers of Congress and itself;&lt;/li&gt;
&lt;li&gt;The Superior Justice Tribunal for actions against Ministers or itself;&lt;/li&gt;
&lt;li&gt;The regional federal judges for actions against federal authorities;&lt;/li&gt;
&lt;li&gt;State tribunals according to each state law;&lt;/li&gt;
&lt;li&gt;State judges for all other cases.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Paraguay&lt;/b&gt;&lt;br /&gt;The Constitution of Paraguay grants a similar right of habeas data in its constitution which states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"All persons may access the information and the data that about themselves, or about their assets, [that] is [obren] in official or private registries of a public character, as well as to know the use made of the same and of their end. [All persons] may request before the competent magistrate the updating, the rectification or the destruction of these, if they were wrong or illegitimately affected their rights."&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Compared to the right granted in Brazil, the text of the Paraguay Constitution specifically recognises that the citizen also has the right to know the use his/her data is being put to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 43 of the Constitution of Argentina grants the right of habeas data, though it has been included under the action of “amparo”,&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;the relevant portion of Article 43 states as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Any person may file an amparo action to find out and to learn the purpose of data about him which is on record in public registries or data banks, or in any private [registers or data banks] whose purpose is to provide information, and in case of falsity or discrimination, to demand the suppression, rectification, confidentiality, or updating of the same. The secrecy of journalistic information sources shall not be affected."&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The version of Habeas Data recognised in Argentina includes most of the protections seen in Brazil and Paraguay, such as the right to access the data, rectify it, update it or destroy it, etc. Nevertheless, the Argentinean constitution also includes certain other features such as the fact that it incorporates the Peruvian idea of confidentiality of data, being interpreted as the prohibition to broadcast or transmit incorrect or false information. Another feature of the Argentinean law is that it specifically excludes the press from the action, which may be considered as reasonable or unreasonable depending upon the context and country in which it is applied.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Venezuela&lt;/b&gt;&lt;br /&gt;Article 28 of the Constitution of Venezuela established the writ of habeas data, which expressly permits access to information stored in official and private registries. It states as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"All individuals have a right to access information and data about themselves and about their property stored in official as well as private registries. Secondly, they are entitled to know the purpose of and the policy behind these registries. Thirdly, they have a right to request, before a competent tribunal, the updating, rectification, or destruction of any database that is inaccurate or that undermines their entitlements. The law shall establish exceptions to these principles. By the same token, any person shall have access to information that is of interest to communities and groups. The secrecy of the sources of newspapers-and of other entities or individuals as defined by law-shall be preserved."&lt;a href="#fn14" name="fr14"&gt;[14] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Venezuelan writ of habeas data expressly provides that individuals "are entitled to know the purpose of and the policy behind these registries." Also, it expresses a right to "updating, rectification, or destruction of any database that is inaccurate or that undermines their entitlements." Article 28 also declares that the “secrecy of the sources of newspapers and of other entities or individuals as defined by law-shall be preserved."&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Philippines&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not as if the remedy of Habeas Data is available only in Latin American jurisdictions, but even in Asia the writ of Habeas Data has been specifically granted by the Supreme Court of the Philippines vide its resolution dated January 22, 2008 which provides that “The writ of habeas data is a remedy available to any person whose right to privacy in life, liberty or security is violated or threatened by an unlawful act or omission of a public official or employee, or of a private individual or entity engaged in the gathering, collecting or storing of data or information regarding the person, family, home and correspondence of the aggrieved party.” According to the Rule on Writ of Habeas Data, the petition is to be filed with the Regional Trial Court where the petitioner or respondent resides, or which has jurisdiction over the place where the data or information is gathered, collected or stored, at the option of the petitioner. The petition may also be filed with the Supreme Court or the Court of Appeals or the Sandiganbayan when the action concerns public data files of government offices.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two major distinctions are immediately visible between the Philippine right and that in the latin jurisdictions discussed above. One is the fact that in countries such as Bazil, Argentina and Paraguay, there does not appear to be a prerequisite to filing such an action asking for the information, whereas in Philippines it seems that such a petition can only be filed only if an individual’s “right to privacy in life, liberty or security is violated or threatened by an unlawful act or omission”. This means that the Philippine concept of habeas data is much more limited in its scope and is available to the citizens only under certain specific conditions. On the other hand the scope of the Philippine right of Habeas Data is much wider in its applicability in the sense that this right is available even against private individual and entities who are “engaged in the gathering, collecting or storing of data or information regarding the person, family, home and correspondence”. In the Latin American jurisdictions discussed above, this writ appears to be available only against either public institutions or private institutions having some public character.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Main features of Habeas Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Thus from the discussion above, the main features of the writ of habeas data, as it is applied in various jurisdictions can be culled out as follows: &lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;It is a right to the individual or citizen to ask for his/her information contained with any data registry;&lt;/li&gt;
&lt;li&gt;It is available only against public (government) entities or employees; or private entities having a public character;&lt;a href="#fn18" name="fr18"&gt;[18] &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Usually it also gives the individuals the right to correct any wrong information contained in the data registry;&lt;/li&gt;
&lt;li&gt;It is a remedy that is usually available by approaching any single judicial forum.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Since the writ of Habeas Data has been established and evolved primarily in Latin American countries, there is not too much literature on it available freely in the English language and that is a serious hurdle in researching this area. For example, this author did not find many article mentioning the scope of the writ of habeas data, for example whether it is an absolute right and on what grounds can it be denied. The Constitution of Venezuela, for example, specifies that the law shall establish exceptions to these principles and infact mentions the secrecy of sources for newspapers as an exception to this rule.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly in Argentina, there exists a public interest exception to the issuance of the writ of Habeas Data.&lt;a href="#fn20" name="fr20"&gt;[20] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, although little literature on the specific exceptions to habeas data is freely available in English, references can still be found to exceptions such as state security (Brazil), secrecy of newspaper sources (Argentina and Venezuela), or other entities defined by law (Venezuela).&lt;a href="#fn21" name="fr21"&gt;[21] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This suggests that the, as would be expected, the right to ask for the writ of habeas data is not an absolute right but would also be subject to certain exceptions and balanced against other needs such as state security and police investigations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Habeas Data in the context of Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Data protection legislation and mechanisms protect people against misuse of personal information by data controllers. Habeas Data, being a figure for use only by certain countries, gives the individuals the right to access, correct, and object to the processing of their information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In general, privacy is the genus and data protection is the species, data protection is a right to personal privacy that people have against the possible use of their personal data by data controllers in an unauthorized manner or against the requirements of force. Habeas Data is an action that is brought before the courts to allow the protection of the individual’s image, privacy, honour, self-determination of information and freedom of information of a person. In that sense, the right of Habeas Data can be found within the broader ambit of data protection. It does not require data processors to ensure the protection of personal data processed but is a legal action requiring the person aggrieved, after filing a complaint with the courts of justice, the access and/or rectification to any personal data which may jeopardize their right to privacy.&lt;a href="#fn22" name="fr22"&gt;[22] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Habeas Data in the Indian Context&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although a number of judgments of the Apex Court in India have recognised the existence of a right to privacy by interpreting the fundamental rights to life and free movement in the Constitution of India,&lt;a href="#fn23" name="fr23"&gt;[23] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;the writ of habeas data has no legal recognition under Indian law. However, as is evident from the discussion above, a writ of habeas data is very useful in protecting the right to privacy of individuals and it would be a very useful tool to have in the hands of the citizens. The fact that India has a fairly robust right to information legislation means that atleast some facets of the right of habeas data are available under Indian law. We shall now examine the Indian Right to Information Act, 2005 (RTI Act) to see what facets of habeas data are already available under this Act and what aspects are left wanting. As mentioned above, the writ of habeas data has the following main features:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;It is a right to the individual or citizen to ask for his/her information contained with any data registry;&lt;/li&gt;
&lt;li&gt;It is available only against public (government) entities or employees; or private entities having a public character;&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Usually it also gives the individuals the right to correct any wrong information contained in the data registry;&lt;/li&gt;
&lt;li&gt;It is a remedy that is usually available by approaching any single judicial forum.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;We shall now take each of these features and analyse whether the RTI Act provides any similar rights and how they differ from each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right to seek his/her information contained with a data registry&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Habeas data enables the individual to seek his or her information contained in any data registry. The RTI Act allows citizens to seek “information” which is under the control of or held by any public authority. The term information has been defined under the RTI Act to mean “any material in any form, including records, documents, memos, e-mails, opinions, advices, press releases, circulars, orders, logbooks, contracts, reports, papers, samples, models, data material held in any electronic form and information relating to any private body which can be accessed by a public authority under any other law for the time being in force”.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the term “record” has been defined to include “(a) any document, manuscript and file; (b) any microfilm, microfiche and facsimile copy of a document; (c) any reproduction of image or images embodied in such microfilm (whether enlarged or not); and (d) any other material produced by a computer or any other device”. It is quite apparent that the meaning given to the term information is quite wide and can include various types of information within its fold. The term “information” as defined in the RTI Act has been further elaborated by the Supreme Court in the case of Central Board of Secondary Education v. Aditya Bandopadhyay,&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;where the Court has held that a person’s evaluated answer sheet for the board exams held by the CBSE would come under the ambit of “information” and should be accessible to the person under the RTI Act.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An illustrative list of items that have been considered to be “information” under the RTI Act would be helpful in further understanding the concept:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Asset declarations by Judges;&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Copy of inspection report prepared by the Reserve Bank of India about a Co-operative Bank;&lt;a href="#fn29" name="fr29"&gt;[29] &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Information on the status of an enquiry;&lt;a href="#fn30" name="fr30"&gt;[30] &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Information regarding cancellation of an appointment letter;&lt;a href="#fn31" name="fr31"&gt;[31] &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Information regarding transfer of services;&lt;a href="#fn32" name="fr32"&gt;[32] &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Information regarding donations given by the President of India out of public funds.&lt;a href="#fn33" name="fr33"&gt;[33] &lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The above list would indicate that any personal information relation to an individual that is available in a government registry would in all likelihood be considered as “information” under the RTI Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, just because the information asked for is considered to come within the ambit of section 2(h) does not mean that the person will be granted access to such information if it falls under any of the exceptions listed in section 8 of the RTI Act. Section 8 provides that if the information asked falls into any of the categories specified below then such information shall not be released in an application under the RTI Act, the categories are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"(a) information, disclosure of which would prejudicially affect the sovereignty and integrity of India, the security, strategic, scientific or economic interests of the State, relation with foreign State or lead to incitement of an offence; &lt;br /&gt;(b) information which has been expressly forbidden to be published by any court of law or tribunal or the disclosure of which may constitute contempt of court; &lt;br /&gt;(c) information, the disclosure of which would cause a breach of privilege of Parliament or the State Legislature; &lt;br /&gt;(d) information including commercial confidence, trade secrets or intellectual property, the disclosure of which would harm the competitive position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information; &lt;br /&gt;(e) information available to a person in his fiduciary relationship, unless the competent authority is satisfied that the larger public interest warrants the disclosure of such information; &lt;br /&gt;(f) information received in confidence from foreign Government; &lt;br /&gt;(g) information, the disclosure of which would endanger the life or physical safety of any person or identify the source of information or assistance given in confidence for law enforcement or security purposes; &lt;br /&gt;(h) information which would impede the process of investigation or apprehension or prosecution of offenders; &lt;br /&gt;(i) cabinet papers including records of deliberations of the Council of Ministers, Secretaries and other officers: &lt;br /&gt;Provided that the decisions of Council of Ministers, the reasons thereof, and the material on the basis of which the decisions were taken shall be made public after the decision has been taken, and the matter is complete, or over: &lt;br /&gt;Provided further that those matters which come under the exemptions specified in this section shall not be disclosed; &lt;br /&gt;(j) information which relates to personal information the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual unless the Central Public Information Officer or the State Public Information Officer or the appellate authority, as the case may be, is satisfied that the larger public interest justifies the disclosure of such information: &lt;br /&gt;Provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied to any person."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above mentioned exceptions seem fairly reasonable and infact are important since public records may contain information of a private nature which the data subject would not want revealed, and that is exactly why personal information is a specific exception mentioned under the RTI Act. When comparing this list to the recognised exceptions under habeas data, it must be remembered that a number of the exceptions listed above would not be relevant in a habeas data petition such as commercial secrets, personal information, etc. The exceptions which could be relevant for both the RTI Act as well as a habeas data writ would be (a) national security or sovereignty, (b) prohibition on publication by a court, (c) endangering the physical safety of a person, (d) hindrance in investigation of a crime. It is difficult to imagine a court (especially in India) granting a habeas data writ in violation of these four exceptions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Certain other exceptions that may be relevant in a habeas data context but are not mentioned in the common list above are (a) information received in a fiduciary relationship; (b) breach of legislative privilege, (c) cabinet papers; and (d) information received in confidence from a foreign government. These four exceptions are not as immediately appealing as the others listed above because there are obviously competing interests involved here and different jurisdictions may take different points of view on these competing interests.&lt;a href="#fn34" name="fr34"&gt;[34] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Available only against public (government) entities or entities having public character.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A habeas corpus writ is maintainable in a court to ask for information relating to the petitioner held by either a public entity or a private entity having a public character. In India, the right to information as defined in the RTI Act means the right to information accessible under the Act held by or under the control of any public authority. The term "public authority" has been defined under the Act to mean “any authority or body or institution of self-government established or constituted—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) by or under the Constitution;&lt;br /&gt;(b) by any other law made by Parliament;&lt;br /&gt;(c) by any other law made by State Legislature;&lt;br /&gt;(d) by notification issued or order made by the appropriate Government, and includes any— (i) body owned, controlled or substantially financed; (ii) non-Government organisation substantially financed, directly or indirectly by funds provided by the appropriate Government;"&lt;a href="#fn35" name="fr35"&gt;[35] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore most government departments as well as statutory as well as government controlled corporations would come under the purview of the term "public authority". For the purposes of the RTI Act, either control or substantial financing by the government would be enough to bring an entity under the definition of public authority.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above interpretation is further bolstered by the fact that the preamble of the RTI Act contains the term “governments and their instrumentalities".&lt;a href="#fn37" name="fr37"&gt;[37] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right to correct wrong information&lt;/b&gt; &lt;br /&gt;While certain sectoral legislations such as the Representation of the People Act and the Collection of Statistics Act, etc. may provide for correction of inaccurate information, the RTI Act does not have any such provisions. This stands to reason because the RTI Act is not geared towards providing people with information about themselves but is instead a transparency law which is geared at dissemination of information, which may or may not relate to an individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Available upon approaching a single judicial forum&lt;br /&gt;&lt;/b&gt;While the right of habeas data is available only upon approaching a judicial forum, the right to information under the RTI Act is realised entirely through the bureaucratic machinery. This also means that the individuals have to approach different entities in order to get the information that they need instead of approaching just one centralised entity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There is no doubt that habeas data, by itself cannot end massive electronic surveillance of the kind that is being carried out by various governments in this day and age and the excessive collection of data by private sector companies, but providing the citizenry with the right to ask for such a writ would provide a critical check on such policies and practices of vast surveillance.&lt;a href="#fn38" name="fr38"&gt;[38] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An informed citizenry, armed with a right such as habeas data, would be better able to learn about the information being collected and kept on them under the garb of law and governance, to access such information, and to demand its correction or deletion when its retention by the government is not justified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we have discussed in this paper, under Indian law the RTI Act gives the citizens certain aspects of this right but with a few notable exceptions. Therefore, if a writ such as habeas data is to be effectuated in India, it might perhaps be a better idea to approach it by amending/tweaking the existing structure of the RTI Act to grant individuals the right to correct mistakes in the data along with creating a separate department/mechanism so that the applications demanding access to one’s own data do not have to be submitted in different departments but can be submitted at one central place. This approach may be more pragmatic rather than asking for a change in the Constitution to grant to the citizens the right to ask for a writ in the nature of habeas data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There may be calls to also include private data processors within the ambit of the right to habeas data, but it could be challenging to enforce this right. This is because it is still feasible to assume that the government can put in place machinery to ensure that it can find out whether information about a particular individual is available with any of the government’s myriad departments and corporations, however it would be almost impossible for the government to track every single private database and then scan those databases to find out how many of them contain information about any specific individual. This also throws up the question whether a right such as habeas data, which originated in a specific context of government surveillance, is appropriate to protect the privacy of individuals in the private sector. Since under Indian law section 43A and the Rules thereunder, which regulate data protection, already provide for consent and notice as major bulwarks against unauthorised data collection, and limit the purpose for which such data can be utilised, privacy concerns in this context can perhaps be better addressed by strengthening these provisions rather than trying to extend the concept of habeas data to the private sector.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. González, Marc-Tizoc, ‘Habeas Data: Comparative Constitutional Interventions from Latin America Against Neoliberal States of Insecurity and Surveillance’, (2015). Chicago-Kent Law Review, Vol. 90, No. 2, 2015; St. Thomas University School of Law (Florida) Research Paper No. 2015-06. Available at SSRN:&lt;a href="http://ssrn.com/abstract=2694803"&gt;http://ssrn.com/abstract=2694803&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Article 8 of the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, 1981, available at &lt;a href="https://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680078b37"&gt;https://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680078b37&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Guadamuz A, 'Habeas Data: The Latin-American Response to Data Protection',&lt;a href="https://www2.warwick.ac.uk/fac/soc/law/elj/jilt/"&gt;2000 (2)&lt;/a&gt; &lt;i&gt;The Journal of Information, Law and Technology (JILT)&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Speech by Chief Justice Reynato Puno, Supreme Court of Philippines delivered at the &lt;i&gt;UNESCO Policy Forum and Organizational Meeting of the Information for all Program (IFAP), Philippine National Committee&lt;/i&gt;, on November 19, 2007, available at &lt;a href="http://jlp-law.com/blog/writ-of-habeas-data-by-chief-justice-reynato-puno/"&gt;http://jlp-law.com/blog/writ-of-habeas-data-by-chief-justice-reynato-puno/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Guadamuz A, 'Habeas Data: The Latin-American Response to Data Protection',&lt;a href="https://www2.warwick.ac.uk/fac/soc/law/elj/jilt/"&gt;2000 (2)&lt;/a&gt; &lt;i&gt;The Journal of Information, Law and Technology (JILT)&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. The author does not purport to be an expert on the laws of these jurisdictions and the analysis in this paper has been based on a reading of the actual text or interpretations given in the papers that have been cited as the sources. The views in this paper should be viewed keeping this context in mind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Article 5, LXXII of the Constitution of Brazil, available at &lt;a href="https://www.constituteproject.org/constitution/Brazil_2014.pdf"&gt;https://www.constituteproject.org/constitution/Brazil_2014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Guadamuz A, 'Habeas Data vs the European Data Protection Directive', Refereed article, &lt;a href="https://www2.warwick.ac.uk/fac/soc/law/elj/jilt/"&gt;2001 (3)&lt;/a&gt; &lt;i&gt;The Journal of Information, Law and Technology (JILT)&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Article 135 of the Constitution of Paraguay, available at &lt;a href="https://www.constituteproject.org/constitution/Paraguay_2011.pdf?lang=en"&gt;https://www.constituteproject.org/constitution/Paraguay_2011.pdf?lang=en&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The petition for a writ of amparo is a remedy available to any person whose right to life, liberty and security is violated or threatened with violation by an unlawful act or omission of a public official or employee, or of a private individual or entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Article 43 of the Constitution of Argentina, available at &lt;a href="https://www.constituteproject.org/constitution/Argentina_1994.pdf?lang=en"&gt;https://www.constituteproject.org/constitution/Argentina_1994.pdf?lang=en&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;].&lt;a class="external-link" href="https://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2001_3/guadamuz/"&gt; https://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2001_3/guadamuz/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Article 28 of the Venezuelan Constitution, available at &lt;a href="http://www.venezuelaemb.or.kr/english/ConstitutionoftheBolivarianingles.pdf"&gt;http://www.venezuelaemb.or.kr/english/ConstitutionoftheBolivarianingles.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. González, Marc-Tizoc, ‘Habeas Data: Comparative Constitutional Interventions from Latin America Against Neoliberal States of Insecurity and Surveillance’, (2015). Chicago-Kent Law Review, Vol. 90, No. 2, 2015; St. Thomas University School of Law (Florida) Research Paper No. 2015-06. Available at SSRN:&lt;a href="http://ssrn.com/abstract=2694803"&gt;http://ssrn.com/abstract=2694803&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Rule on the Writ of Habeas Data Resolution, available at &lt;a class="external-link" href="http://hrlibrary.umn.edu/research/Philippines/Rule%20on%20Habeas%20Data.pdf"&gt;http://hrlibrary.umn.edu/research/Philippines/Rule%20on%20Habeas%20Data.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. The characteristics of habeas data culled out in this paper are by no means exhaustive and based only on the analysis of the jurisdictions discussed in this paper. This author does not claim to have done an exhaustive analysis of every jurisdiction where Habeas Data is available and the views in this paper should be viewed in that context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Except in the case of the Philippines and Venezeula. This paper has not done an analysis of the writ of habeas data in every jurisdiction where it is available and there may be jurisdictions other than the Philippines which also give this right against private entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. González, Marc-Tizoc, ‘Habeas Data: Comparative Constitutional Interventions from Latin America Against Neoliberal States of Insecurity and Surveillance’, (2015). Chicago-Kent Law Review, Vol. 90, No. 2, 2015; St. Thomas University School of Law (Florida) Research Paper No. 2015-06. Available at SSRN:&lt;a href="http://ssrn.com/abstract=2694803"&gt;http://ssrn.com/abstract=2694803&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. The case of &lt;i&gt;Ganora v. Estado Nacional&lt;/i&gt;,  Supreme Court of Argentina, September 16, 1999, &lt;i&gt;cf.&lt;/i&gt;&lt;a href="http://www.worldlii.org/int/journals/EPICPrivHR/2006/PHR2006-Argentin.html"&gt;http://www.worldlii.org/int/journals/EPICPrivHR/2006/PHR2006-Argentin.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. González, Marc-Tizoc, ‘Habeas Data: Comparative Constitutional Interventions from Latin America Against Neoliberal States of Insecurity and Surveillance’, (2015). Chicago-Kent Law Review, Vol. 90, No. 2, 2015; St. Thomas University School of Law (Florida) Research Paper No. 2015-06. Available at SSRN:&lt;a href="http://ssrn.com/abstract=2694803"&gt;http://ssrn.com/abstract=2694803&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;].&lt;a href="http://www.oas.org/dil/data_protection_privacy_habeas_data.htm"&gt; http://www.oas.org/dil/data_protection_privacy_habeas_data.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Even the scope of the right to privacy is currently under review in the Supreme Court of India. See “Right to Privacy in Peril”, &lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt;http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Except in the case of the Philippines. This paper has not done an analysis of the writ of habeas data in every jurisdiction where it is available and there may be jurisdictions other than the Philippines which also give this right against private entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Section 2(f) of the Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. 2011 (106) AIC 187 (SC), also available at &lt;a href="http://judis.nic.in/supremecourt/imgst.aspx?filename=38344"&gt;http://judis.nic.in/supremecourt/imgst.aspx?filename=38344&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. The exact words of the Court were: “The definition of `information' in section 2(f) of the RTI Act refers to any material in any form which includes records, documents, opinions, papers among several other enumerated items. The term `record' is defined in section 2(i) of the said Act as including any document, manuscript or file among others. When a candidate participates in an examination and writes his answers in an answer-book and submits it to the examining body for evaluation and declaration of the result, the answer-book is a document or record. When the answer-book is evaluated by an examiner appointed by the examining body, the evaluated answer-book becomes a record containing the `opinion' of the examiner. Therefore the evaluated answer-book is also an `information' under the RTI Act.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra Agarwal&lt;/i&gt;, AIR 2010 Del 159, available at &lt;a href="https://indiankanoon.org/doc/1342199/"&gt;https://indiankanoon.org/doc/1342199/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;].&lt;i&gt; Ravi Ronchodlal Patel&lt;/i&gt; v. &lt;i&gt;Reserve Bank of India&lt;/i&gt;, Central Information Commission, dated 6-9-2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;].&lt;i&gt; Anurag Mittal&lt;/i&gt; v. &lt;i&gt;National Institute of Health and Family Welfare&lt;/i&gt;, Central Information Commission, dated 29-6-2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;].&lt;i&gt; Sandeep Bansal&lt;/i&gt; v. &lt;i&gt;Army Headquarters, Ministry of Defence&lt;/i&gt;, Central Information Commission, dated 10-11-2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;].&lt;i&gt; M.M. Kalra&lt;/i&gt; v. &lt;i&gt;DDA&lt;/i&gt;, Central Information Commission, dated 20-11-2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;].&lt;i&gt; Nitesh Kumar Tripathi&lt;/i&gt; v. &lt;i&gt;CPIO&lt;/i&gt;, Central Information Commission, dated 4-5-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. A similar logic may apply to the exceptions of (i) cabinet papers, and (ii) parliamentary privilege.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. Section 2 (h) of the Right to Information Act, 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;].&lt;i&gt; M.P. Verghese&lt;/i&gt; v. &lt;i&gt;Mahatma Gandhi University&lt;/i&gt;, 2007 (58) AIC 663 (Ker), available at &lt;a href="https://indiankanoon.org/doc/1189278/"&gt;https://indiankanoon.org/doc/1189278/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;].&lt;i&gt; Principal, M.D. Sanatan Dharam Girls College, Ambala City&lt;/i&gt; v. &lt;i&gt;State Information Commissioner&lt;/i&gt;, AIR 2008 P&amp;amp;H 101, available at &lt;a href="https://indiankanoon.org/doc/1672120/"&gt;https://indiankanoon.org/doc/1672120/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. González, Marc-Tizoc, ‘Habeas Data: Comparative Constitutional Interventions from Latin America Against Neoliberal States of Insecurity and Surveillance’, (2015). Chicago-Kent Law Review, Vol. 90, No. 2, 2015; St. Thomas University School of Law (Florida) Research Paper No. 2015-06. Available at SSRN:&lt;a href="http://ssrn.com/abstract=2694803"&gt;http://ssrn.com/abstract=2694803&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/habeas-data-in-india'&gt;https://cis-india.org/internet-governance/blog/habeas-data-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda and edited by Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Habeas Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-10T04:01:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu">
    <title>Guest Report: Bridging the Concerns with Recommending Aarogya Setu</title>
    <link>https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu</link>
    <description>
        &lt;b&gt;Keywords: Aarogya Setu, Constitutionality, Digital Contact Tracing, Location Data, Personal Data Protection Bill, 2019, Exemptions, Personal Data, Sensitive Personal Data, Mosaic Theory, Surveillance, Privacy, Governing Law, Necessity, Intensity of Review, disparate Impact, Proportionality

&lt;/b&gt;
        
&lt;p id="docs-internal-guid-8cd22a8f-7fff-cd1f-19b3-539a748e971f" style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This report was edited and reviewed by Arindrajit Basu, Mira Swaminathan, and Aman Nair.Read the full report &lt;a class="external-link" href="http://cis-india.org/aarogya setu privacy"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;EXECUTIVE SUMMARY&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;Aarogya Setu collects real-time location data of users every fifteen minutes to facilitate digital contact tracing during the Pandemic. It inter alia color-codes users indicating the extent of risk they pose based on their health status and predicts hotspots which are more susceptible to COVID-19. Its forecasts have reportedly facilitated the identification of 650 clusters of COVID-19 hotspots and predicting 300 emerging hotspots which may have been otherwise missed. In a welcome move, the source code of the application was recently made public. The initially-introduced mandate to use the application was reportedly diluted and a Protocol supplementing the privacy policy with additional safeguards was released. Despite these steps in the right direction, some key concerns continue to require alleviation through engagement. This Report seeks to constructively engage with these concerns towards making privacy safeguards governing its operability more consistent with international best practices.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;First, the Report maps situations in which Aarogya Setu in fact remains mandatory (in Table 1) In these situations, there exists no restriction against private parties (e.g. employers, airlines, etc.) from indirectly making its use mandatory. Consequently, there is no real choice in determining the use of the application. Even where there exists a choice to opt-out (e.g. in contexts where there is only an advisory but no indirect mandate), the choice is not meaningful due to the inability to examine the potential consequences of using the apn remains mandatory for practical purposes since there still exists an obligation to undertake due diligence towards making sure that every employee uses the application. In other words, this part of the report explains why it remains indirectly mandatory to use the application. This indirect mandate impedes the exercise of meaningful consent. This could be addressed through a notification directing that no one should be indirectly compelled to use the application. This part also acknowledges that even where a choice to opt-out (e.g. in contexts where there is only an advisory but no indirect mandate), the choice is not meaningful due to the inability to examine the potential consequences of using the application.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;Second, the report explains why the mandate to use the Application raises concerns in the first place: i.e. in the absence of transparency beyond the publication of the source code. The open-source code may not necessarily result in meaningful algorithmic transparency (since the processing in the models at the Government of India server continues to remain a black box) in respect of predictions made to determine appropriate health responses. Based on the source code per se, people are unable to verify the wherever there exists operability of the Application more meaningfully. Algorithmic transparency enables people to make an informed decision in using the Application by choice. The ability to make an informed decision is critical to the right to privacy. The right to privacy does not just mean drawing boundaries or creating limitations against any external interference. The right also includes the public’s right to know how an algorithm affects their lives. Given the centrality of transparency in the ability of the user to exercise their privacy better, beyond releasing the source code of Aarogya Setu, publicizing information about how predictions are made is important. This part acknowledges the limitations of transparency in that it can only facilitate identification of privacy harms and not really solve them by itself. Yet, it goes ahead and re-emphasises the inter-relationship of transparency and privacy, highlighting how it became a basis recently in striking down a government-used algorithm, which indicates incentive to increase transparency.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Third, the report reviews whether based on the already-available information from the combined reading of the privacy policy and the protocol, the operability of the application seems consistent with best international practices in protecting user privacy. This part begins with an analysis of the privacy policy and the protocol, which indicate privacy concerns in relation to inter alia location data, followed by an explanation as to why there exists a reasonable expectation of privacy over location data (to establish a privacy intrusion). This is followed by structurally applying the proportionality test to identify necessary modifications to the current framework:&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The 'legality' prong may be satisfied by a combined reading of the NDMA and the specificity in the delegated legislation, as has been done in the past particularly in the context of location tracking. However, it is suggested (in the recommendations section) that a statutory legislation comprehensively governing the operability of the Application is introduced to ensure predictability and permanency in the framework governing the operability of the Application as done internationally. Moreover, determining appropriate health responses to the Pandemic is indeed a legitimate interest that is sought to be achieved through the application&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Given the limitations of traditional methods of contact-tracing, digital contact tracing could perhaps be a suitable method of ascertaining appropriate health responses to the Pandemic subject to a comprehensive review of evidence on a regular basis to evaluate verifiably its effectiveness. Since the use of the application seems likely in the long run, its efficacy needs to be backed by concrete evidence which corroborates its accuracy and effectiveness such as statistical data on false positives and negatives that result from the application&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A careful reading of the combined reading of the Aarogya Setu privacy policy and the Protocol with Fair Information Protection Principles (‘FIPP’) indicates some inconsistencies with international best practices. The extent of inconsistency with best practices may not be considered the least restrictive and therefore necessary form in which digital contact tracing can be conducted in India&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Since the inconsistencies seem relatively more restrictive than necessary to facilitate digital contact tracing in India, a balancing of privacy and public health could result in the conclusion that the application is not ‘proportionate’ to the potential privacy harms that can result from using the application. While conducting the balancing exercise, privacy and public health should be viewed as complementary, not competing interests. This conception would encourage courts to consider privacy concerns with sufficient extent of intensity&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;Based on this analysis, the report concludes that digital contact tracing provided the following conditions (detailed in the ‘Recommendations’ section) are conjunctively satisfied:&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Digital contact tracing should supplement (e.g. be in addition to) and not supplant (i.e. replace) traditional methods of contact tracing entirely, particularly for vulnerable groups (e.g. interviews where vulnerable groups, particularly marginalized women do not have access to mobile phones);&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A statutory law should be introduced which strictly and comprehensively governs the scope of the application,&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;the suitability of the application (with meaningful algorithmic transparency) should be corroborated by reliable and relevant statistical evidence (e.g. with the help of closer scrutiny of the basis of predictive outcomes) and&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The privacy compromises using the application should be intrusive to the minimum extent possible. This could be done by further adding robust safeguards through stronger restrictions on sharing the collected data&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;(Final year undergraduate student of the National University of Juridical Sciences (NUJS), Kolkata with a sustained interest in law, technology and policy (graduating with the class of 2020).&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu'&gt;https://cis-india.org/internet-governance/guest-report-bridging-the-concerns-with-recommending-aarogya-setu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Siddharth Sonkar</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-06-24T05:19:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/guest-post-before-cyber-norms-let2019s-talk-about-disanalogy-and-disintermediation">
    <title>Guest post: Before cyber norms, let’s talk about disanalogy and disintermediation</title>
    <link>https://cis-india.org/internet-governance/blog/guest-post-before-cyber-norms-let2019s-talk-about-disanalogy-and-disintermediation</link>
    <description>
        &lt;b&gt;In a guest post in relation to CIS’s recently held roundtable onIndia’s cyber defense strategy, Pukhraj Singh looks at the critical fissures – at the technical and policy levels – in global normative efforts to secure cyberspace. By charting out the key vectors and power asymmetries among key stakeholders – both leading state actors and private actors like Microsoft – Singh posits that there is much to be done before we circumscribe cyber operations within legal strictures.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;By: &lt;strong&gt;Pukhraj Singh&lt;/strong&gt;&lt;br /&gt;Reviewed and Edited by: &lt;strong&gt;Elonnai Hickok, Arindrajit Basu, &lt;/strong&gt;and&lt;strong&gt; Karan Saini&lt;/strong&gt;&lt;/p&gt;
&lt;h3 id="docs-internal-guid-91bbb0b3-7fff-f86d-2f0c-43dae1a21a49" dir="ltr"&gt;The ongoing decoupling of norms&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In September 2019, the French ministry of defense &lt;a href="https://www.defense.gouv.fr/content/download/565895/9750877/file/Droit+internat+appliqu%C3%A9+aux+op%C3%A9rations+Cyberespace.pdf"&gt;published&lt;/a&gt; a document stating its views on the applicability of international law to cyber operations. While it makes an unequivocal espousal of the rules-based order in cyberspace, some of the distinctions made by the paper within the ambit of international law could be of interest to technical experts.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The document makes two key contributions. First, it &lt;a href="https://www.justsecurity.org/66318/an-overview-of-international-humanitarian-law-in-frances-new-cyber-document/"&gt;addresses&lt;/a&gt; two modes of power projection within cyberspace: cyber operations acting as a force multiplier in a hot war that is strictly delineated by kinetic and geographical redlines; and below-threshold, single-domain “dematerialized” operations leveraging cyber intrusions. Secondly, the document has made an attempt to gently &lt;a href="https://blog.lukaszolejnik.com/french-application-of-international-rules-to-cyberwarfare/"&gt;decouple&lt;/a&gt; itself from the Tallinn Manual on some aspects.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In an unrelated development, Microsoft joined hands with a group of peers within the technology industry, civil society and government to set up the &lt;a href="https://blogs.microsoft.com/on-the-issues/2019/09/26/cyberpeace-institute-fills-a-critical-need-for-cyberattack-victims/"&gt;CyberPeace Institute&lt;/a&gt; – a private sector initiative to strengthen the rules-based order.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It is an outcome of the sustained, unrelenting effort of Microsoft in thwarting what it believes to be the unchecked weaponization of cyberspace. Suffering a major reputational loss after the Snowden leaks, the company has &lt;a href="https://www.wired.com/story/us-vs-microsoft-supreme-court-case-data/"&gt;gradually cultivated&lt;/a&gt; fiercely &lt;a href="https://www.irishtimes.com/business/technology/microsoft-s-brad-smith-talks-privacy-snowden-and-international-law-1.2816460"&gt;contrarian&lt;/a&gt; &lt;a href="https://www.cyberscoop.com/microsoft-cyber-peace-institute-hewlitt-foundation-brad-smith/"&gt;positions&lt;/a&gt; on issues like state-enabled surveillance.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Microsoft’s daring contests and cases against the US government have been intimately recorded in the recently released book &lt;a href="https://news.microsoft.com/on-the-issues/tools-and-weapons/"&gt;Tools and Weapons&lt;/a&gt;, authored by its chief legal officer Brad Smith.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Seen through the lens of the future, the aforementioned developments highlight the ongoing readjustment of the legal discourse on cyber operations to account for its incongruous technical dynamics.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;As the structures of cyber power are peeled layer-by-layer, the need to address this technical divergence in the overly legal interpretations of cyber norms would only increase.&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Disanalogy &amp;amp; disintermediation&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Take the case of two fundamental dimensions – disanalogy and disintermediation – which have the potential to alter our understanding of how power is wedded with cyberspace.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Disanalogy is a logical postulation that challenges the primacy of “reasoning by analogy” using which international law is mapped to cyber conflict. Disintermediation highlights how the power dynamics of cyberspace have disrupted statism.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Understanding when and how the realization that international law is reasonably applicable to cyber operations dawned upon the international community leads one to an unending maze. It becomes a cyclical process where one set of initiatives only cross-reference the others, in a self-fulfilling sort of way.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The &lt;a href="https://www.unidir.org/files/medias/pdfs/developments-in-the-field-of-information-and-telecommunications-in-the-context-of-international-security-2012-2013-a-68-98-eng-0-518.pdf"&gt;notes&lt;/a&gt; of the 2013 session of the United Nations’ Governmental Group of Experts, affirming the sanctity of international law in cyberspace, look like an exercise in teleology.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Not to be distracted by the deeply philosophical nature of war, Kubo Mačák of the University of Exeter did &lt;a href="https://ccdcoe.org/uploads/2018/10/Art-09-The-Impact-of-the-Development-of-the-Cyber-Law-of-War-on-General-International-Law.pdf"&gt;point out&lt;/a&gt; that “the unique teleological underpinning of the law of war” should be considered before it is exported to new normative frameworks.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The deductive process inspired by reasoning by analogy that lies at the heart of the cyber norms discourse has not undergone much scrutiny.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In his 2013 &lt;a href="https://www.youtube.com/watch?v=NdhhZcDk6aw"&gt;talk&lt;/a&gt; at NATO’s CCDCOE, Selmer Bringsjord, cognitive sciences professor at the Rensselaer Polytechnic Institute, introduced the idea of disanalogy. Citing the &lt;a href="https://plato.stanford.edu/entries/reasoning-analogy/"&gt;general schema of an analogical argument&lt;/a&gt;, Bringsjord arrived at a disproof divorcing the source domain (the just war theory for conventional war) and target domain (just war theory for cyberwar).&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;He mapped jus in bello in a conventional war across the dimensions of Control, Proportionality, Accessibility, and Discrimination.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Bringsjord further added that these source attributes would not be evident in the target domain for two reasons: the inevitable digitization of every analog object and its interfaces; and the inherent propensity of artificial intelligence to wage attacks on its own.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In a supporting &lt;a href="http://kryten.mm.rpi.edu/SB_JL_cyberwarfare_disanalogy_112113IT.pdf"&gt;paper&lt;/a&gt;, he exhorts that while “Augustine and Aquinas (and their predecessors) had a stunningly long run…today’s world, based as it is on digital information and increasingly intelligent information-processing, points the way to a beast so big and so radically different, that the core of this duo’s insights needs to be radically extended.”&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Celebrated malware reverse engineer Thomas Dullien, too, is of the &lt;a href="https://www.youtube.com/watch?v=BWFdxAG_TGk"&gt;opinion&lt;/a&gt; that machine learning and artificial intelligence are more suited for cyber offence as it has remained a “stable-in-time distribution.”&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Brandon Valeriano of the Marine Corps University has drawn upon the case of incendiary balloons to &lt;a href="https://www.cfr.org/blog/reasoning-analogy-cyberspace-deadly-balloons-and-avoiding-digital-doom"&gt;question&lt;/a&gt; the overreliance on reasoning by analogy. Sadly, such viewpoints remain outliers.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Senior computer scientist David Aucsmith wrote in &lt;a href="https://www.brookings.edu/book/bytes-bombs-and-spies/"&gt;Bytes, Bombs and Spies&lt;/a&gt; that “one of the major challenges in cyberspace is the disintermediation of government.” He adds that while cyberspace has become the “global center of gravity for all aspects of national power,” it further removes the government from the “traditional functions of safety and security.”&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The commercialized nature of the Internet is obvious to many. But steadily over the years, the private sector has also acquired vast swathes of cyber power in a manner that strangely mirrors the military concepts of counterintelligence, defense and deterrence.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In Tools and Weapons, Brad Smith recalls a meeting of top technology executives at the White House. As the executives pushed for surveillance reform after the Snowden leaks, Obama defensively retorted that “the companies at the table collectively had far more data than the government.” The “&lt;a href="https://cybersecpolitics.blogspot.com/2016/06/can-google-do-cyber-deterrence.html"&gt;signals intelligence&lt;/a&gt;” capabilities of &lt;a href="https://www.wsj.com/articles/inside-googles-team-battling-hackers-11548264655"&gt;Google&lt;/a&gt; and &lt;a href="https://www.youtube.com/watch?v=OpTGFcJXL8g"&gt;Microsoft&lt;/a&gt; rival that of a nation state.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Former deputy director of the NSA Chris Inglis writes in Bytes, Bombs and Spies:&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In cyberspace, a small change in configuration of the target machine, system, or network can often negate the effectiveness of a cyber weapon against it. This is not true with weapons in other physical domains…The nature of target-weapon interaction with kinetic weapons can usually be estimated on the basis of physics experimentation and calculation. Not so with cyber weapons. For offensive cyber operations, this extreme “target dependence” means that intelligence information on target characteristics must be precise, high-volume, high-quality, current, and available at the time of the weapon’s use.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Inglis argues that fielding “ubiquitous, real-time and persistent” intelligence, surveillance and reconnaissance (ISR) frameworks is crucial for mustering the ability to produce cyber effects at a place and time of choosing.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Daniel Moore of King’s College London broadly &lt;a href="https://ccdcoe.org/uploads/2018/10/Art-05-Targeting-Technology.-Mapping-Military-Offensive-Network-Operations.pdf"&gt;categorizes&lt;/a&gt; cyber operations into event-based and presence-based.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The ISR framework envisioned by Inglis pre-positions implants with presence-based operations to make sure that the adversarial infrastructure -- perpetually in a state of flux -- remains primed for event-based operations. Falling prey to an analogy, this is as challenging as a group of river-rafters trying to keep their raft still at one position in a raging torrent of water.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;However, it is worthy to note that a major component of such an ISR framework would manifest over privately-owned infrastructure.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It is exactly why the commercial threat intelligence industry lead by the likes of Fireeye, Kaspersky and Crowdstrike has flourished the way it has.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Joe Slowik, principal adversary hunter at Dragos, Inc., &lt;a href="https://pylos.co/2019/09/28/cyber-leviathan/"&gt;corroborates&lt;/a&gt; it: “An entire ecosystem of defense and security developed within the private space…essentially, private (defensive) ‘armies’ grew up and proliferated in the cyber security space over the course of many years.”&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Jason Healey of Columbia’s School of International and Public Affairs has &lt;a href="https://twitter.com/Jason_Healey/status/1181961759155994624"&gt;another way&lt;/a&gt; of looking at it: “In counterinsurgency, host nation must take lead &amp;amp; U.S. role is to provide aid &amp;amp; support. USG not seen as legitimate, may lack the local &amp;amp; cultural knowledge, &amp;amp; lack sufficient resources. In cyberspace, the private sector, esp tech &amp;amp; security companies, are the host nation (sic)”.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Initiatives like the CyberPeace Institute and Cybersecurity Tech Accord are to be seen as emerging geopolitical formations pivoted around the power vacuum created by growing disintermediation.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;While Microsoft avows the applicability of international law, the decreasing technological dependence on it to enforce the rules-based order may herald data-driven normative frameworks solely originating from the private sector.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Take the specific case of fashionable “black-letter rules” – like barring cyber actors from hacking into adversary’s election infrastructure – variedly promulgated by the &lt;a href="https://www.wired.com/2013/03/the-tallinn-manual-on-the-international-law-applicable-to-cyber-warfare/"&gt;Tallinn Manual&lt;/a&gt;, &lt;a href="https://www.microsoft.com/en-us/cybersecurity/content-hub/a-digital-geneva-convention-to-protect-cyberspace"&gt;Microsoft&lt;/a&gt; and &lt;a href="https://cyberstability.org/news/global-commission-introduces-six-critical-norms-towards-cyber-stability/"&gt;Global Commission on the Stability of Cyberspace&lt;/a&gt;. They could very well act as impediments to the success of the norms process.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Cyber actors can be variedly be divided into various &lt;a href="https://cybersecpolitics.blogspot.com/2016/09/the-chinese-get-real.html"&gt;capability tiers&lt;/a&gt;: A, B, C or D Teams, etc. Such categorizations could be derived from multiple &lt;a href="https://cybersecpolitics.blogspot.com/2017/08/strategic-plateaus-in-cyber-domain.html"&gt;variables&lt;/a&gt; like operational structure, concept of operations, capabilities and toolchains, and operating budget, etc.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In what may sound paradoxical, mindless enforcement of such rules creates an inherently inequitable environment where actors would be compelled to flout them. Targeting and target discrimination are possibly the most expensive components of the cyber offensive toolchain. As intelligence analyst Grugq &lt;a href="https://www.youtube.com/watch?v=wP2J9aYM6Oo"&gt;said&lt;/a&gt;, “You need a lot of people to have a small numbers of hackers hacking.”&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The ability to avoid a vulnerable target or an attack surface without sacrificing the initiative is a luxury that only an A-team could afford, further disincentivizing smaller players from participating in confidence-building measures.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In such cases, the private sector could lead the way in the neutral and transparent interpretation of the dynamics and thresholds of power projection in cyberspace. Companies, not countries, have the vantage point and commercial interest to create a level playing field.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Taking the original case of France’s new dossier on cyber operations, its gradual rollback from the strictly black-and-white world of, say, the Tallinn Manual hints at a larger devolution of legally interpreted cyber operations, influenced by technical incongruities like disanalogy and disintermediation.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;While the said document answers many questions relating to the applicability of international law to cyber operations with uncanny confidence, the devil still lies in the details.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;For example, it talks about creating militaristic cyber effects by altering the confidentiality and availability of data on adversarial systems, but skirts around integrity – as if the three dimensions of data security are not symbiotic. Such picket-fencing may be trying to carefully avoid the legal ambiguity on information operations, post-ICJ US vs Nicaragua.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Ask any cyber operator, can a cyber operation proceed &lt;a href="https://grugq.github.io/presentations/short%20course.pdf"&gt;without sabotaging&lt;/a&gt; the integrity of log artifacts or other such stealthy or deceptive maneuvering?&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;It also postulates the export of “non-international armed conflict” to the territory of consenting nation states, as if such factors are completely controllable.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Discussed earlier, a majority of the cyber-ISR frameworks manifest over globally scattered private infrastructure. And almost every layer of the computing architecture is now network-enabled.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In cyberspace, the ‘territory’ of a nation state expands and contracts in real time. It may exist online as the sum of all the global information flows, across the many millions of interfaces, associated with it at any given moment. The sheer &lt;a href="http://geer.tinho.net/geer.secot.7v14.txt"&gt;emergent complexity&lt;/a&gt; of this organism has baffled many.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The adversarial environment fluxes at such a rapid pace that taking “territorial” sanctity into account during an ongoing operation is nigh impossible. This, in fact, is the &lt;a href="https://www.justsecurity.org/67079/top-dod-lawyer-stresses-u-s-compliance-with-the-rule-of-law-in-military-operations/"&gt;very premise&lt;/a&gt; of Defend Forward.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The French document is a good attempt at decoupling cyber operations from legal strictures, but it should be seen as the mere beginning of that process.&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Cognitive cyber offence&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Lastly, the complete absence of the cognitive dimension in the norms process is something that should be outrightly addressed.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Keith Dear, a research fellow at Oxford’s Changing Character of War Program, &lt;a href="https://www.youtube.com/watch?v=Nl_shMx8Yrs"&gt;feels&lt;/a&gt; that war – as “a continuation of politics by other means” – is essentially persuasive and has predominantly psychological effects. They get aggravated more so by the scale and speed of cyber-enabled behavioral modelling.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The threat landscape is at a stage where we are going to see the increasing exploitation of &lt;a href="https://www.teachthought.com/critical-thinking/the-cognitive-bias-codex-a-visual-of-180-cognitive-biases/"&gt;cyber-cognitive attack surfaces&lt;/a&gt; – the cost-benefits are now heavily tilted towards their side. It is like what conventional cyber operations used to be 20 years ago: cheap and easy over scale and speed.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The cyber norms community only considers the first or second order effects of cyberattacks. The reality is that causation could be separated by many, many degrees – also missing out on the fact that a cyberattack is generally an indiscernible mixture of not just effects, but also perceptions. Every cyber operation could be &lt;a href="https://dl.acm.org/citation.cfm?id=3316742&amp;amp;dl=ACM&amp;amp;coll=DL"&gt;deemed&lt;/a&gt; as an information operation even after full denouement.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We have only begun to understand the significance of the cognitive dimension. Leading thinkers like former Secretary of the Navy Richard Danzig had for long proposed perceptive instead of spatial redlines for cyber conflict, aptly capturing its emergent properties.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;His &lt;a href="https://s3.amazonaws.com/files.cnas.org/documents/CNAS_PoisonedFruit_Danzig.pdf?mtime=20161010215746"&gt;suggested&lt;/a&gt; baseline was: “The United States cannot allow the insecurity of our cyber systems to reach a point where weaknesses in those systems would likely render the United States unwilling to make a decision or unable to act on a decision fundamental to our national security.”&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Danzig’s paradigm neatly fits into the Defend Forward philosophy of the US Cyber Command. Former director of the NSA Michael Hayden once &lt;a href="https://www.usnews.com/news/articles/2013/02/20/former-cia-director-cyber-attack-game-changers-comparable-to-hiroshima"&gt;said&lt;/a&gt; that Stuxnet had the “whiff of August 1945,” while former NSA exploitation engineer Dave Aitel &lt;a href="https://cybersecpolitics.blogspot.com/2016/09/the-stern-stewart-summit-germany-and.html"&gt;labelled&lt;/a&gt; it as the “announcement of a team.” The theatres of war, &lt;a href="https://www.cfr.org/blog/not-cyber-deterrence-united-states-wants"&gt;frameworks&lt;/a&gt; for deterrence and &lt;a href="https://www.cfr.org/blog/sony-hack-north-koreas-toughest-counteraction-obamas-proportional-response"&gt;parameters&lt;/a&gt; for proportional response may turn out to be purely perceptive in nature.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;As the cyber option gets increasingly expended by militaries, we have &lt;a href="https://www.washingtonpost.com/gdpr-consent/?destination=%2fpolitics%2f2019%2f10%2f01%2fare-cyber-operations-us-retaliatory-option-september-oilfield-strikes-would-this-deter-iran%2f%3f"&gt;come to understand&lt;/a&gt; that the esoteric cognitive parameters of digital conflict could be crucial enough to decide victory or defeat.&lt;/p&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;As the United Nations’ Governmental Group of Experts’ dialogue came to a grinding halt in 2016, Michelle Markoff, former deputy coordinator for Cyber Issues in the US State Department, gave a &lt;a href="https://www.youtube.com/watch?v=nAuehrVCBBU&amp;amp;feature=youtu.be&amp;amp;t=4m10shttps://www.youtube.com/watch?v=nAuehrVCBBU&amp;amp;feature=youtu.be&amp;amp;t=4m10s"&gt;candid account&lt;/a&gt; of what went wrong.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;She also went on to recommend “interleaving strategies” like defence, declaratory policies, alliance activities, and norms of behaviour. It is interesting to note all the four dimensions proffered by her neatly fit into the remit of the private sector when it comes to fostering cyber stability.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The threat intelligence industry, by its indirect participation in the great power play, is already carving a rudimentary framework for declaratory signaling. Private sector alliances – by being more open and neutral about attack attribution, adversarial intent and capabilities, and targeting criteria – may lower the incentives while increasing the costs of cyber actions. That may force various actors to the negotiating table.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The emergence of customary international law in cyberspace, as a precursor to effective normative frameworks, is a necessity that may squarely fall on the shoulders of corporations. In that sense, diplomatic initiatives and alliance activities by Microsoft and others must be keenly observed.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Pukhraj Singh is a cyber threat intelligence analyst who has worked with the Indian government and security response teams of global companies. He blogs at www.pukhraj.me. Views posited are the author’s alone.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/guest-post-before-cyber-norms-let2019s-talk-about-disanalogy-and-disintermediation'&gt;https://cis-india.org/internet-governance/blog/guest-post-before-cyber-norms-let2019s-talk-about-disanalogy-and-disintermediation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pukhraj Singh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Norms Formulation</dc:subject>
    

   <dc:date>2019-11-18T10:14:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gsma-research-outputs">
    <title>GSMA Research Outputs</title>
    <link>https://cis-india.org/internet-governance/blog/gsma-research-outputs</link>
    <description>
        &lt;b&gt;This is a collection of research under our GSMA project that we have undertaken in collaboration with Privacy International. The research has sought to understand different legal and regulatory aspects of security and surveillance in India and consists of blog entries and reports. Any feedback or comment is welcome. &lt;/b&gt;
        &lt;h3&gt;Indian Law and the Necessary Proportionate Principles&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The presentation shows that there are no comprehensive provisions for the principles of legitimate aim, competent judicial authority, proportionality, transparency, etc. whereas these are partially present for the principles of legality, necessity, adequacy, public oversight, safeguards for international cooperation, etc. The presentation also looks at the Indian intelligence agencies and shows us that there are nine agencies authorized to intercept communications along with at least eleven additional agencies. It further dwelves into the establishment and structure of Indian intelligence agencies and whom they report to, the sharing of information internationally as well as nationally. It shows us that India has MLAT agreements with 36 countries and request to CBI can be initiated informally or formally through court order. It then lists out the various regulatory and important bodies responsible for national security. Some cases of unlawful interception / leaks have been discussed along with examples of arrests based on digital evidence. The various government schemes, the telecommunication companies in India, telecom licenses requirements, government developed security and surveillance solutions, private security companies, security expos, export, import and selling of security and surveillance equipment, and the way forward are also discussed.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indian-law-and-necessary-proportionate-principles.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Security, Surveillance and Data Sharing Schemes and Bodies in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following the 2008 Mumbai terrorist attacks, India had implemented a wide range of data sharing and surveillance schemes. Though developed under different governments the purpose of these schemes has been to increase public safety and security by tackling crime and terrorism. As such, two data sharing schemes have been proposed - the National Intelligence Grid (NATGRID) and the Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS), as well as several surveillance systems, such as the Lawful Intercept and Monitoring (LIM) system, the Network Traffic Analysis system (NETRA), state Internet Monitoring Systems and the Central Monitoring System (CMS). This chapter details the various schemes and provides policy recommendations for their improvement, with regards to the protection of the right to privacy and other human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Export and Import of Security Technologies in India: QA&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The write-up examines in question-answer format the standards regulating the export of technologies that can be used for surveillance purposes, the department and legislation that governs exports and imports of security technologies in India, the procedure for obtaining an export licence for the export of SCOMET items, what is ITC (HS) and why is it important, and examples of ITC codes for technologies that can facilitate security or surveillance. The research finds answers to all these queries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Regulation of CCTV’s in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In light of the increasing use and installation of CCTV’s in cities across India, and the role that CCTVs play in the Home Ministry's plans for implementing "Mega Policing Cities", this blog seeks to review various attempts to regulate the use of CCTV's in India, review international best practices, and provide preliminary recommendations for the regulation of CCTV's in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/regulation-of-cctvs-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Mutual Legal Assistance Treaties (MLATs) and Cross Border Sharing of Information in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is unclear the exact process that intelligence agencies in India share information with other agencies internationally. India is a member of Interpol and the Central Bureau of Investigation, which is a Federal/Central investigating agency functioning under the Central Government, Department of Personnel &amp;amp; Training is designated as the National Central Bureau of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/mlats-and-cross-border-sharing-of-information-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Composition of Service Providers in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Telecom, at present, is one of the fastest-growing industries in India. As of January 2014, according to the Telecom Regulatory Authority of India (TRAI) there are 922 million wireless and over the wire subscribers in India, and 56.90 million broadband subscribers including wired, wireless and wimax subscribers. India’s overall wireless teledensity was quoted as having 893.31million subscribers, with a 0.79% (7.02 million) monthly addition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/composition-of-service-providers-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Surveillance and Security Industry in India - An Analysis of Indian Security Expos&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ‘Spy Files’, a series of documents released by whistleblower website WikiLeaks over the last few years, exposed the tremendous growth of the private surveillance industry across the world – a multi-billion dollar industry thriving on increasing governmental and private capabilities for mass surveillance of individuals. These documents showed how mass surveillance is increasingly made possible through new technologies developed by private players, often exploiting the framework of nascent but burgeoning information and communication technologies like the internet and communication satellites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-and-security-industry-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;An Analysis of News Items and Cases on Surveillance and Digital Evidence in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a technologically advanced era, with preponderance of electronic communications in both professional and social interactions and the ability to store such information in digital form, digital evidence has gained significance in civil as well as criminal litigation in India. In order to match the pace with the progressive technology, the Indian Courts have embarked on placing more and more reliance on the digital evidence and a portion of such digital evidence is obtained through electronic surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Policy Recommendations for Surveillance Law in India and an Analysis of  Legal Provisions on Surveillance in India and the Necessary &amp;amp;  Proportionate Principles&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Government of India has created a legal framework which supports the carrying out of surveillance by authorities through its various laws and license agreements for service providers. The Centre for Internet and Society (CIS) acknowledges that lawful, warranted, targeted surveillance can potentially be a useful tool in aiding law enforcement agencies in tackling crime and terrorism. However, current Indian laws and license agreements appear to overextend the Government's surveillance capabilities in certain cases, while inadequately safeguarding individuals' right to privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/policy-recommendations-for-surveillance-law-in-india-and-analysis-of-legal-provisions-on-surveillance-in-india-and-the-necessary-and-proportionate-principles.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Surveillance Industry in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India has the world's second largest population, an expanding middle class and undoubtedly a huge market which attracts international investors. Some of the world's largest corporations have offices in India, such as Google Incorporated and BlackBerry Limited. In the Information Age, the market revolves around data and companies which produce technologies capable of mining such data are on the rise. Simultaneously, companies selling surveillance technologies appear to be on the peak too, especially since the global War on Terror requires law enforcement agencies around the world to be equipped with the latest surveillance gear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-industry-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;State of Cyber Security and Surveillance in India: A Review of the Legal Landscape&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;The issue of cyber security and surveillance, especially unauthorised surveillance, though traditionally unprioritised, has recently gained much traction due to the increasing number of news reports regarding various instances of unauthorised surveillance and cyber crimes. In the case of unauthorised surveillance, more than the frequency of the instances, it is their sheer magnitude that has shocked civil society and especially civil rights groups. In the background of this ever increasing concern regarding surveillance as well as increasing concerns regarding cyber security due to the increased pervasiveness of technology in our society, this paper tries to discuss the legal and regulatory landscape regarding surveillance as well as cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gsma-research-outputs'&gt;https://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>GSMA Research</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-06T14:18:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf">
    <title>GSMA Conference Invite</title>
    <link>https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf'&gt;https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-10-14T01:49:36Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/growing-cyberspace-controls">
    <title>Growing cyberspace controls, Internet filtering</title>
    <link>https://cis-india.org/news/growing-cyberspace-controls</link>
    <description>
        &lt;b&gt;OpenNet Initiative investigates, analyses filtering and surveillance practices, writes T Ramachandran in this article published in the Hindu on Sunday, February 20, 2011.&lt;/b&gt;
        
&lt;p&gt;Governments in many parts of the world have been aggressively adopting a new generation of controls aimed at filtering and controlling information flow on the Internet, citing concerns such as cyber security, crime and terrorism, according to the OpenNet Initiative.&lt;/p&gt;
&lt;p&gt;The OpenNet Initiative, which says it “investigates and analyses Internet filtering and surveillance practices in a credible and non-partisan fashion,” in its updated study released last year titled, “Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace,” said that it was fast becoming the global norm to control information flow on the Internet.&lt;/p&gt;
&lt;p&gt;The OpenNet is a collaborative partnership between the Citizen Lab at the Munk School of Global Affairs, University of Toronto, the Berkman Centre for Internet and Society at Harvard University, and the Ottawa-based SecDev Group.&lt;/p&gt;
&lt;p&gt;Asked whether the trend was likely to become more pronounced, given the recent developments in the Middle East, one of the contributors to the study, Ethan Zuckerman, a senior researcher at the Berkman Centre, said, “In general, we see governments becoming more aggressive and more overt about their Internet filtering.”&lt;/p&gt;
&lt;p&gt;The OpenNet has described the recent Internet blackout in Egypt as ‘just-in-time-blocking' - when information flow is brought to a halt during critical times such as political crises, elections, or social unrest. Discussions have resurfaced about the deployment of 'Internet kill switches,' a way in which nations could snuff out the Internet when such a crisis occurs.&lt;/p&gt;
&lt;p&gt;“For all the talk of Internet kill switches, turning off the Internet is a relatively easy and unsophisticated thing to do. What is hardest to do is filtering on finer, more granular levels,” Mr. Zuckerman told The Hindu.&lt;/p&gt;
&lt;p&gt;The first-generation controls were deployed primarily at Internet “choke points,” places in the network where Internet addresses that had been blacklisted by the authorities could be filtered and blocked. These were mainly the gateways run by the Internet Service Providers (ISPs). The number-based IP addresses connected to particular websites or domain names could be used for the blocking. Keywords could also be used in weeding out proscribed sites or pages.&lt;/p&gt;
&lt;p&gt;Reports of watchdogs such as the OpenNet and Freedom House indicate that though not pronounced, selective filtering has been a part of the Indian Internet scene. Google's Transparency Report for the first half of 2010 also shows that India is among the nations from where a number of government inquiries for information about users and requests to remove or censor content emanate.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“As far as censorship of Internet goes in India it is still first generation in terms of blocking and filtering at the Internet choke points. However, the Indian government has made and is making several moves that continue to undermine privacy and anonymity on the Internet. This has a chilling effect on freedom of expression and information accessing behaviour on the Internet,” says Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Second and third generation techniques of Internet filtering, as described in Access Controlled, are “more subtle, flexible, and even offensive in character,” often using legal regulations to supplement or legitimise technical filtering measures, extralegal or covert practices. These include the use of viruses to infiltrate computer systems, the launching of distributed denial-of-service (DDoS) attacks and surveillance at strategic points in the Internet and telecommunications infrastructure. The DDoS attacks involve directing traffic of such large volume at targeted sites during a particular period, in order to crash them, or keep them largely inaccessible. Counter-information campaigns could also be mounted, supplemented by policy measures and other strategies, including legal ones.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Governments have also been assiduously building up capabilities for monitoring and intercepting the large volume of information that flows on the Internet, including email, which mostly flows through the infrastructure of Internet Service Providers (ISPs) and Internet exchange points. In the Indian context, the I.T. Act “along with the ISP licences allows for blanket surveillance and also data retention,” says Mr. Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It is difficult to say if this sort of monitoring and interception is really effective in countering terrorism and other national security threats, says Mr. Zuckerman. “I don't believe trading privacy for security is a fair trade.”&lt;/p&gt;
&lt;p&gt;Read the original news in&amp;nbsp; the &lt;a class="external-link" href="http://www.hindu.com/2011/02/20/stories/2011022053711000.htm"&gt;Hindu&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/growing-cyberspace-controls'&gt;https://cis-india.org/news/growing-cyberspace-controls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-20T14:36:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/grants-apg-proposals-2014-2015-round2-the-centre-for-internet-and-society-impact-report-form">
    <title>Grants:APG/Proposals/2014-2015 round2/The Centre for Internet and Society/Impact report form</title>
    <link>https://cis-india.org/a2k/blogs/grants-apg-proposals-2014-2015-round2-the-centre-for-internet-and-society-impact-report-form</link>
    <description>
        &lt;b&gt;This form is for organizations receiving Annual Plan Grants to report on their results to date. For progress reports, the time period for this report will the first 6 months of each grant (e.g. 1 January - 30 June of the current year). For impact reports, the time period for this report will be the full 12 months of this grant, including the period already reported on in the progress report (e.g. 1 January - 31 December of the current year).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Read the original published on &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Impact_report_form"&gt;Wikimedia Blog here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This form includes four sections, addressing global metrics, program  stories, financial information, and compliance. Please contact APG/FDC  staff if you have questions about this form, or concerns submitting it &lt;a href="https://meta.wikimedia.org/wiki/Grants:APG/Reporting_requirements" title="Grants:APG/Reporting requirements"&gt;by the deadline&lt;/a&gt;. After submitting the form, organizations will also meet with APG staff to discuss their progress.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Global metrics overview - all programs&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are trying to understand the overall outcomes of the work being  funded across our grantees' programs. Please use the table below to let  us know how your programs contributed to the &lt;a class="extiw" href="https://meta.wikimedia.org/wiki/Grants:Learning_%26_Evaluation/Global_Metrics" title="m:Grants:Learning &amp;amp; Evaluation/Global Metrics"&gt;Global Metrics&lt;/a&gt;. We understand not all Global Metrics will be relevant for all programs, so feel free to put "0" where necessary. For each program include the following table and&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Next to each required metric, list the outcome achieved for all of your programs included in your proposal.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Where necessary, explain the context behind your outcome.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In addition to the Global Metrics as measures of success for your  programs, there is another table format in which you may report on any  OTHER relevant measures of your programs success.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;For more information and a sample, see &lt;a class="extiw" href="https://meta.wikimedia.org/wiki/Grants:Learning_%26_Evaluation/Global_Metrics" title="m:Grants:Learning &amp;amp; Evaluation/Global Metrics"&gt;Global Metrics&lt;/a&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overall&lt;/h3&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Metric&lt;/th&gt;&lt;th&gt;Achieved outcome&lt;/th&gt;&lt;th&gt;Explanation&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1. # of active editors involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;157&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;CIS-A2K has been able to increase participation of female editors across its Focus Language Areas.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;2. # of new editors&lt;/td&gt;
&lt;td&gt;799&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Our WEP initiatives have helped in introducing and retaining editors across FLA (except for Odia).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3. # of individuals involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1200&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Public events and anniversary celebrations held in Odia and Kannada have helped Wikimedia projects in reaching the general public as these events have been widely covered by media.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4. # of new images/media added to Wikimedia articles/pages&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2823&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Photo-walks, WEP activities and image re-licensing efforts have helped the A2K team in achieving this metric.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5. # of articles added or improved on Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;18998&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Thematic edit-a-thons anchored by A2K and Collaborative edit-a-thons that have been supported by A2K have been a big hit during the last grant period amongst Indic Wikimedians.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6. Absolute value of bytes added to or deleted from Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;109.64 MB&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Kannada&lt;/h3&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Metric&lt;/th&gt;&lt;th&gt;Achieved outcome&lt;/th&gt;&lt;th&gt;Explanation&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1. # of active editors involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;23&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;As of now the Kannada community is relatively small, A2K would like to expand the user and editor base by taking Wikimedia activities to various parts of the state.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2. # of new editors&lt;/td&gt;
&lt;td style="text-align: right; "&gt;609&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;These numbers include new editors from WEP initiative and editathons conducted as part of 13 Kannada Wikipedia anniversary.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3. # of individuals involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;700&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Public event organised during the 13th Kannada Wikipedia anniversary has boosted our reach.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4. # of new images/media added to Wikimedia articles/pages&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1290&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Due to the Photo walk organised as part of the 13th year Kannada Wikipedia anniversary celebrations.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5. # of articles added or improved on Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;8132&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Most of the articles created under WEP initiative are still under sandbox (as a quality enforcing measure), hence the number is low. The number also includes Wikisource folios.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6. Absolute value of bytes added to or deleted from Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;56.5 MB&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Konkani&lt;/h3&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Metric&lt;/th&gt;&lt;th&gt;Achieved outcome&lt;/th&gt;&lt;th&gt;Explanation&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1. # of active editors involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;4&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Activities in Konkani Wikipedia dipped after the project became live.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2. # of new editors&lt;/td&gt;
&lt;td style="text-align: right; "&gt;20&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;The new editors were introduced to Konkani Wikipedia with the help of &lt;a class="text external" href="http://www.nirmalainstitute.org/" rel="nofollow"&gt;Nirmala Institute of Education, Panjim&lt;/a&gt; an institutional partner of CIS-A2K.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3. # of individuals involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;50&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4. # of new images/media added to Wikimedia articles/pages&lt;/td&gt;
&lt;td style="text-align: right; "&gt;34&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5. # of articles added or improved on Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1546&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Konkani Wikipedians took the project of creating one article per village in Goa quite enthusiatically.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6. Absolute value of bytes added to or deleted from Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;8.11 MB&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Marathi&lt;/h3&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Metric&lt;/th&gt;&lt;th&gt;Achieved outcome&lt;/th&gt;&lt;th&gt;Explanation&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1. # of active editors involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;64&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Events conducted at Pune University, Pune and IIT-Bombay involved existing Wikipedians.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2. # of new editors&lt;/td&gt;
&lt;td style="text-align: right; "&gt;59&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Activities conducted at SWERI, Pandharpur, TISS, Mumbai and IIT-Mumbai have contributed to this.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3. # of individuals involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;150&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Involvement of Maharashtra Knowledge Corporation Limited opened up new readership to get involved in Marathi Wikimedia projects.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4. # of new images/media added to Wikimedia articles/pages&lt;/td&gt;
&lt;td style="text-align: right; "&gt;27&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;A2K team could not organise a dedicated photo walk or invest in image re-licensing activity.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;5. # of articles added or improved on Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;331&lt;/td&gt;
&lt;td&gt;Although the number of the articles is low, many new female editors were  introduced and have taken up editing on Marathi Wikipedia.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6. Absolute value of bytes added to or deleted from Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2.64 MB&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Odia&lt;/h3&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Metric&lt;/th&gt;&lt;th&gt;Achieved outcome&lt;/th&gt;&lt;th&gt;Explanation&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1. # of active editors involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;21&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;a class="text external" href="http://cis-india.org/openness/odia-wikipedia-takes-puri" rel="nofollow"&gt;Wiki Tungi&lt;/a&gt; activities are lead by active Wikimedians from the Odia community.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2. # of new editors&lt;/td&gt;
&lt;td style="text-align: right; "&gt;56&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;a class="extiw" href="https://or.wikipedia.org/wiki/%E0%AC%89%E0%AC%87%E0%AC%95%E0%AC%BF%E0%AC%AA%E0%AC%BF%E0%AC%A1%E0%AC%BC%E0%AC%BF%E0%AC%86:%E0%AC%A8%E0%AC%AC%E0%AC%95%E0%AC%B3%E0%AD%87%E0%AC%AC%E0%AC%B0_%E0%AC%97%E0%AC%A3%E0%AC%B8%E0%AC%AE%E0%AD%8D%E0%AC%AA%E0%AC%BE%E0%AC%A6%E0%AC%A8%E0%AC%BE_%E0%AD%A8%E0%AD%A6%E0%AD%A7%E0%AD%AB" title="or:ଉଇକିପିଡ଼ିଆ:ନବକଳେବର ଗଣସମ୍ପାଦନା ୨୦୧୫"&gt;Nabakalebara edit-a-thon&lt;/a&gt; gained a lot of currency on the social media platforms which in turn resulted in new editors for Odia Wikimedia projects.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3. # of individuals involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;120&lt;/td&gt;
&lt;td&gt;Three events with Puri WikiTungi (Puri Workshop, 15th Anniversary celebration, and Mission Odisha event), &lt;a class="text external" href="http://cis-india.org/openness/introducing-odia-wikipedia-to-students-of-utkal-university-bhubaneswar" rel="nofollow"&gt;Wikipedia workshop in Utkal University&lt;/a&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4. # of new images/media added to Wikimedia articles/pages&lt;/td&gt;
&lt;td style="text-align: right; "&gt;601&lt;/td&gt;
&lt;td&gt;Nabakalebara edit-a-thon had an in-built component of adding images related to the Rathayatra.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5. # of articles added or improved on Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1780&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Only pages created in Odia Wikipedia and Odia Wikisource are indicated and not article improved.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6. Absolute value of bytes added to or deleted from Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;9.56 MB&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Telugu&lt;/h3&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Metric&lt;/th&gt;&lt;th&gt;Achieved outcome&lt;/th&gt;&lt;th&gt;Explanation&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1. # of active editors involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;30&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2. # of new editors&lt;/td&gt;
&lt;td style="text-align: right; "&gt;45&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Need to try getting more New users on to the board.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3. # of individuals involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;150&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4. # of new images/media added to Wikimedia articles/pages&lt;/td&gt;
&lt;td style="text-align: right; "&gt;871&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5. # of articles added or improved on Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1342&lt;/td&gt;
&lt;td&gt;Includes folios digitized in Wikisource.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6. Absolute value of bytes added to or deleted from Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;7.23 MB&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Train-a-Wikipedian&lt;/h3&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Metric&lt;/th&gt;&lt;th&gt;Achieved outcome&lt;/th&gt;&lt;th&gt;Explanation&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1. # of active editors involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Editors who have participated in at least one training session.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2. # of new editors&lt;/td&gt;
&lt;td style="text-align: right; "&gt;10&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Editors who got beginners' training (includes account creation and basic Wikipedia training such as Wikiformatting, components of Wikipedia, article structure).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3. # of individuals involved&lt;/td&gt;
&lt;td style="text-align: right; "&gt;30&lt;/td&gt;
&lt;td&gt;#1+#2 and the people who were involved during training sessions.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4. # of articles added or improved on Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5867&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5. Absolute value of bytes added to or deleted from Wikimedia projects&lt;/td&gt;
&lt;td style="text-align: right; "&gt;25.6 MB&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;Telling your program stories - all programs&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Please tell the story of each of your programs included in your proposal. This is your chance to tell your story by using any additional metrics (beyond global metrics) that are relevant to your context, beyond the global metrics above. You should be reporting against the targets you set at the beginning of the year throughout the year. We have provided a template here below for you to report against your targets, but you are welcome to include this information in another way. Also, if you decided not to do a program that was included in your proposal or added a program not in the proposal, please explain this change. More resources for storytelling are at the end of this form. Here are some ways to tell your story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;We encourage you to share your successes and failures and what you are learning. Please also share why are these successes, failures, or learnings are important in your context. Reference learning patterns or other documentation.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt; Make clear connections between your offline activities and online results, as applicable. For example, explain how your education program activities is leading to quality content on Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt; We encourage you to tell your story in different ways by using videos, sound files, images (photos and infographics, e.g.), compelling quotes, and by linking directly to work you produce. You may highlight outcomes, learning, or metrics this way.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt; We encourage you to continue using dashboards, progress bars, and scorecards that you have used to illustrate your progress in the past, and to report consistently over time.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt; You are welcome to use the table below to report on any metrics or measures relevant to your program. These may or may not include the global metrics you put in the overview section above. You can also share your progress in another way if you do not find a table like this useful.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;A2K key activities&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;During this grant period CIS-A2K has organized and supported a number of events in collaboration with Indic Wikimedia community members. Some of those are:&lt;/p&gt;
&lt;table class="vertical listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;July 2015&lt;/th&gt;&lt;th&gt;August 2015&lt;/th&gt;&lt;th&gt;September 2015&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="text external" href="https://blog.wikimedia.org/2015/07/15/konkani-wikipedia-goes-live/"&gt;Konkani Wikipedia goes live&lt;/a&gt;,&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/July_2015#Event_organized.2Fparticipated" title="CIS-A2K/Reports/Newsletter/July 2015"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;&lt;a class="text external" href="http://cis-india.org/openness/events/rare-telugu-religious-and-historical-work-preserved-at-annamacharya-library-to-come-on-wikisource" rel="nofollow"&gt;Telugu Wikipedia edit-a-thon at Annamacharya library&lt;/a&gt;&lt;br /&gt; &lt;a class="text external" href="http://cis-india.org/openness/events/tulu-wikipedia-edit-a-thon-in-mangalore" rel="nofollow"&gt;Tulu Wikipedia edit-a-thon in Mangalore&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/July_2015" title="CIS-A2K/Reports/Newsletter/July 2015"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;&lt;a class="text external" href="http://cis-india.org/openness/events/seminar-on-empowering-marathi-schools-pune" rel="nofollow"&gt;Seminar on "Empowering Marathi Schools", Pune&lt;/a&gt;,&lt;br /&gt; &lt;a class="extiw" href="https://kn.wikipedia.org/wiki/%E0%B2%B5%E0%B2%BF%E0%B2%95%E0%B2%BF%E0%B2%AA%E0%B3%80%E0%B2%A1%E0%B2%BF%E0%B2%AF:%E0%B2%B8%E0%B2%AE%E0%B3%8D%E0%B2%AE%E0%B2%BF%E0%B2%B2%E0%B2%A8/%E0%B3%A7%E0%B3%AF" title="kn:ವಿಕಿಪೀಡಿಯ:ಸಮ್ಮಿಲನ/೧೯"&gt;Kannda Wikipedia meetup&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/August_2015" title="CIS-A2K/Reports/Newsletter/August 2015"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: left; "&gt;
&lt;th style="text-align: justify; "&gt;October 2015&lt;/th&gt;&lt;th style="text-align: justify; "&gt;November 2015&lt;/th&gt;&lt;th style="text-align: justify; "&gt;December 2015&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external text" href="http://cis-india.org/openness/konkani-language-books-from-konkani-language-culture-center-mannd-sobhaann-to-enrich-konkani-wikipedia" rel="nofollow"&gt;Konkani language book donation&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/October_2015" title="CIS-A2K/Reports/Newsletter/October 2015"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/November_2015#top" title="CIS-A2K/Reports/Newsletter/November 2015"&gt;4 Indic language communities IRC meeting&lt;/a&gt;,&lt;br /&gt; &lt;a class="text external" href="http://cis-india.org/openness/news/making-tulu-wikipedia-live" rel="nofollow"&gt;Community discussion for making Tulu Wikipedia live&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/November_2015" title="CIS-A2K/Reports/Newsletter/November 2015"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;&lt;a class="text external" href="http://cis-india.org/a2k/events/sau-dhuni-teen-project-december-edit-a-thon-at-womens-studies-centre-university-of-pune" rel="nofollow"&gt;Sau Dhuni Teen Project: December Wikipedia Edit-a-thon&lt;/a&gt;,&lt;br /&gt; &lt;a class="text external" href="http://cis-india.org/openness/discussion-on-bringing-peshwa-culture-on-marathi-wikipedia" rel="nofollow"&gt;Initiative to bring 1000 books&lt;br /&gt; about the culture of&lt;br /&gt; Maharashtra on Marathi Wikipedia&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/December_2015" title="CIS-A2K/Reports/Newsletter/December 2015"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;January 2016&lt;/th&gt; &lt;th style="text-align: justify; "&gt;February 2016&lt;/th&gt; &lt;th style="text-align: justify; "&gt;March 2016&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="text external" href="http://cis-india.org/a2k/news/100-konkani-articles-added-to-wikipedia-in-one-day" rel="nofollow"&gt;Konkani-language Edit-a-thon and English-Romi Konkani dictionary release&lt;/a&gt;,&lt;br /&gt; &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/Geographical_Indications_in_India_Edit-a-thon" title="CIS-A2K/Events/Geographical Indications in India Edit-a-thon"&gt;Geographical Indications in India Edit-a-thon&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/January_2016" title="CIS-A2K/Reports/Newsletter/January 2016"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;&lt;a class="text external" href="http://cis-india.org/openness/events/digitisation-sprint-at-andhra-loyola-college-vijayawada-to-bring-more-books-on-telugu-wikisource" rel="nofollow"&gt;Digitisation sprint at Andhra Loyola College&lt;/a&gt;,&lt;br /&gt; &lt;a class="text external" href="https://blog.wikimedia.org/2016/02/28/kannada-wikipedia-vasanth-sn/"&gt;Kannada Wikipedia's 13th anniversary&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/February_2015" title="CIS-A2K/Reports/Newsletter/February 2015"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;(&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/February_2016" title="CIS-A2K/Reports/Newsletter/February 2016"&gt;See more&lt;/a&gt;) &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Press_releases/National_Wikipedia_Education_Program_Review_Meeting_At_Christ_University_Bengaluru" title="CIS-A2K/Press releases/National Wikipedia Education Program Review Meeting At Christ University Bengaluru"&gt;National Wikipedia Education review program&lt;/a&gt;,&lt;br /&gt; &lt;a class="text external" href="https://blog.wikimedia.org/2016/05/09/bangla-translations-odia-womens-history/"&gt;Odia-language Women’s History Month edit-a-thons&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/March_2016" title="CIS-A2K/Reports/Newsletter/March 2016"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;th style="text-align: justify; "&gt;April 2016&lt;/th&gt; &lt;th style="text-align: justify; "&gt;May 2016&lt;/th&gt; &lt;th style="text-align: justify; "&gt;June 2016&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="extiw" href="https://or.wikipedia.org/wiki/%E0%AC%89%E0%AC%87%E0%AC%95%E0%AC%BF%E0%AC%AA%E0%AC%BF%E0%AC%A1%E0%AC%BC%E0%AC%BF%E0%AC%86:%E0%AC%9C%E0%AC%A8%E0%AD%8D%E0%AC%AE%E0%AC%A4%E0%AC%BF%E0%AC%A5%E0%AC%BF/%E0%AD%A7%E0%AD%AA" title="or:ଉଇକିପିଡ଼ିଆ:ଜନ୍ମତିଥି/୧୪"&gt;Odia Wikipedia's 14th anniversary&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/April_2016" title="CIS-A2K/Reports/Newsletter/April 2016"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;&lt;a class="text external" href="http://cis-india.org/openness/events/mini-train-the-trainer-and-mediawiki-training-for-wikimedians-in-pune" rel="nofollow"&gt;Mini TTT and MWT in Pune&lt;/a&gt;,&lt;br /&gt; &lt;a class="text external" href="http://cis-india.org/openness/events/advanced-training-for-kannada-language-wikimedians-in-bangalore" rel="nofollow"&gt;Advanced training for Kannada-language Wikimedians&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/May_2016" title="CIS-A2K/Reports/Newsletter/May 2016"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/Train_the_Trainer_Program/2016" title="CIS-A2K/Events/Train the Trainer Program/2016"&gt;Train the Trainer 2016&lt;/a&gt;,&lt;br /&gt; &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/MediaWiki_Training/2016" title="CIS-A2K/Events/MediaWiki Training/2016"&gt;MediaWiki Training&lt;/a&gt;&lt;br /&gt; (&lt;a class="mw-redirect" href="https://meta.wikimedia.org/wiki/CIS-A2K/Reports/Newsletter/June_2016" title="CIS-A2K/Reports/Newsletter/June 2016"&gt;See more&lt;/a&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;Capacity building&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Train the Trainer&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="mw-redirect" href="https://meta.wikimedia.org/wiki/TTT" title="TTT"&gt;Train the Trainer&lt;/a&gt; (or TTT in short) is a residential program that attempts to groom  leadership skills among the Indian Wikimedians. Participating  Wikimedians interact with A2K staff members and community leaders  towards designing, implementing and documenting activities such as  outreach, GLAM projects, edit-a-thons, etc. Various topics such as  grants' structure, funding opportunities both with A2K and WMF,  effective reporting and documentation, use of Global and other metrics,  etc., are also covered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the first 2 iterations in &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/Train_the_Trainer_Program/2013" title="CIS-A2K/Events/Train the Trainer Program/2013"&gt;2013&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/Train_the_Trainer_Program/2015" title="CIS-A2K/Events/Train the Trainer Program/2015"&gt;2015&lt;/a&gt;, the third iteration of the training program &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/Train_the_Trainer_Program/2016" title="CIS-A2K/Events/Train the Trainer Program/2016"&gt;was conducted in June 2016&lt;/a&gt;.&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Diversity&lt;/dt&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;In this iteration—&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Language:&lt;/b&gt; 16 Wikimedians from 10 different language communities participated as shown in the pie chart below.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="center" style="text-align: justify; "&gt;
&lt;div class="tnone thumb"&gt;
&lt;div class="thumbinner"&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:TTT_2016_participants_by_community.png"&gt;&lt;img class="thumbimage" height="198" src="https://upload.wikimedia.org/wikipedia/commons/thumb/c/c5/TTT_2016_participants_by_community.png/320px-TTT_2016_participants_by_community.png" width="320" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="center" style="text-align: justify; "&gt;
&lt;div class="tnone thumb"&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Participants of TTT 2016, representing different language communities&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Gender:&lt;/b&gt; This year we had 5 female participants (out of 15  participants). After the 2013 iteration we felt we should try to  encourage more female Wikipedians to participate in TTT. However, this  does not mean that we had any different eligibility criteria set for the  female Wikipedians.&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="center" style="text-align: justify; "&gt;
&lt;div class="tnone thumb"&gt;
&lt;div class="thumbinner"&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:TTT_2016_participants_by_gender.png"&gt;&lt;img class="thumbimage" height="198" src="https://upload.wikimedia.org/wikipedia/commons/thumb/a/a5/TTT_2016_participants_by_gender.png/320px-TTT_2016_participants_by_gender.png" width="320" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="center" style="text-align: justify; "&gt;
&lt;div class="tnone thumb"&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Participants division by gender&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Representation of Indic Wikimedia communities:&lt;/b&gt; We had  participants from all over India. Although TTT is a national-level  event, we also had participants from outside of India (Nepal and Sri  Lanka).&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:CIS-A2K_TTT_2016.jpg"&gt;&lt;img class="thumbimage" height="166" src="https://upload.wikimedia.org/wikipedia/commons/thumb/b/b0/CIS-A2K_TTT_2016.jpg/300px-CIS-A2K_TTT_2016.jpg" width="300" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;TTT 2016 participants&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;After the 2015 version we found that a few participants faced  difficulties to understand and work on the pre-event presentations. This  year (2016), we have given more detailed instructions and were in touch  with the participants while they were doing pre-event works.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;By dovetailing TTT and MWT, A2K team was able to bring Indic  Wikimedians working for outreach and on technical front together. This  helped the participants to create a wishlist regarding tools, gadgets,  and other technical help required to conduct effective outreach  activities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Based on participants' feedback and suggestions plus our own  observations, while keeping Wikimedia Foundation's guidelines in mind,  we make necessary changes to our program structure. In this year's TTT  we made a number of changes‖&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;We encouraged more eligible female editors to participate.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We found that the objective and aims of the event remained unclear  to a few participants in the earlier iterations. This year we have given  more attention to explain the program's objectives, aims and  expectations.&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Challenges&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;We expected that the participants would be in touch with us while  planning, conducting, and making reports of an event. After 2015 TTT&lt;sup class="reference" id="cite_ref-too_early_1-0"&gt;&lt;a href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Impact_report_form#cite_note-too_early-1"&gt;[1]&lt;/a&gt;&lt;/sup&gt; we found a few participants did not respond to our emails or messages.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;While TTT 2016 participants have shown active interest during  WCI-related edit-a-thon, the same level of interest was not seen during  regular monthly meetups.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Despite having communicated to the TTT 2015 participants that a mini  TTT should be organized in their communities, however this was not  taken up actively.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Mediawiki_Training"&gt;Mediawiki Training&lt;/span&gt;&lt;/h4&gt;
&lt;div class="thumbinner" style="text-align: justify; "&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:MWT%283%29.jpg"&gt;&lt;img class="thumbimage" height="200" src="https://upload.wikimedia.org/wikipedia/commons/thumb/0/0d/MWT%283%29.jpg/300px-MWT%283%29.jpg" width="300" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Participants of MWT 2016, during the workshop&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;MediaWiki Training (MWT) is an annual residential training workshop  that intends to bridge the prevalent gap between outreach volunteers and  MediaWiki volunteers and developers. MWT attempts to create and groom  'tech' leaders from the existing Indian language Wikipedians. It aims to  facilitate discussions around nurturing leadership regarding technical  issues such as filing bugs that hinder the growth of Indian language  Wikipedia and Wikimedia projects. At the same time, it encourages active  contribution towards improving the existing MediaWiki software from the  participants to understand importance of utilizing technology for  outreach activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/MediaWiki_Training/2015" title="CIS-A2K/Events/MediaWiki Training/2015"&gt;first iteration of the event&lt;/a&gt; was held on 24-27 June 2015. 14 editors from 8 Indic communities  participated in this workshop. Some of the topics taught during the  workshop were: Bugs -presentation, demo &amp;amp; case study, Bots - Pywiki  &amp;amp; AWB, MediaWiki tools, TranslateWiki, Quarry, WikiMetrics, APIs,  User scripts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/MediaWiki_Training/2016" title="CIS-A2K/Events/MediaWiki Training/2016"&gt;second iteration&lt;/a&gt; of the workshop was conducted on 17-19 June 2016 in Bangalore. MWT 2016  was planned to facilitate an idea-exchange platform between outreach  volunteers and MWT participants. 11 editors from 6 Indic Wikimedia  communities recieved training during this workshop. Some of the topics  discussed during the program were Wikidata, usage of Wikimedia labs  tools, templates and infobox creation, as well as AutoWikiBrowser (AWB).&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Ensure better logistics co-ordination thus guaranteeing involved participation from the participants.&lt;/li&gt;
&lt;li&gt;Priority topics must be given more time.&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Challenges&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Scheduling follow-up events such as mini version of MWT across Indic Wikimedia communities.&lt;/li&gt;
&lt;li&gt;To identify female Wikimedians and encourage them to participate in MWT.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Train-a-Wikipedian_2"&gt;Train-a-Wikipedian&lt;/span&gt;&lt;/h4&gt;
&lt;div class="thumbinner" style="text-align: justify; "&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:Train-a-Wikipedian_by_CIS-A3K.jpg"&gt;&lt;img class="thumbimage" height="225" src="https://upload.wikimedia.org/wikipedia/commons/thumb/f/f3/Train-a-Wikipedian_by_CIS-A3K.jpg/300px-Train-a-Wikipedian_by_CIS-A3K.jpg" width="300" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Train-a-Wikipedian session in Hyderabad on 15 May 2016&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian" title="CIS-A2K/Train-a-Wikipedian"&gt;Train-a-Wikipedian&lt;/a&gt; (TAW) was started in December 2015 to identify enthusiastic Indic  Wikipedians, to train and groom them to develop their editing skills.  Inspired by the &lt;a class="extiw" href="https://en.wikipedia.org/wiki/Wikipedia:Adopt-a-user" title="en:Wikipedia:Adopt-a-user"&gt;Adopt-a-User program&lt;/a&gt; of the English-language-Wikipedia, this initiative is working on  encouraging new Wikimedians who nominate themselves to learn basic  Wikimedia policies. Until 30 June 2016, more than &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian/Sessions" title="CIS-A2K/Train-a-Wikipedian/Sessions"&gt;25 training sessions&lt;/a&gt; have been conducted.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The concept of Train-a-Wikipedian was appreciated by several Indic Wikimedians from different communities.&lt;/li&gt;
&lt;li&gt;More than 25 Wikimedians signed up for this program.&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Reflections&lt;/dt&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;These are some of the reflections/feedback we received from Train-a-Wikipedian participants:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Username&lt;/p&gt;
&lt;table class="vertical listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;Community&lt;/th&gt; &lt;th&gt;Topics/Learnings&lt;/th&gt; &lt;th&gt;Feedback/Reflections&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://meta.wikimedia.org/wiki/User:Nrgullapalli" title="User:Nrgullapalli"&gt;User:Nrgullapalli&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian/Nrgullapalli" title="CIS-A2K/Train-a-Wikipedian/Nrgullapalli"&gt;Training page&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;Telugu Wikipedia&lt;/td&gt;
&lt;td&gt;Policy discussion such as civility, stub,&lt;br /&gt; How to search in a better way using operators etc on the web to get references&lt;br /&gt; Introduction to The Wikipedia Library / Resource exchange / CIS-A2K Resource exchange.&lt;/td&gt;
&lt;td&gt;
&lt;blockquote&gt;
&lt;div&gt;
&lt;div&gt;“&lt;/div&gt;
The training was helpful, I learned a couple of new tools. But I feel  such trainings should be conducted on regular basis and follow-ups  should be done.
&lt;div&gt;”&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://meta.wikimedia.org/wiki/User:Mouryan" title="User:Mouryan"&gt;User:Mouryan&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian/Mouryan" title="CIS-A2K/Train-a-Wikipedian/Mouryan"&gt;Training page&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;Bengali Wikipedia&lt;/td&gt;
&lt;td&gt;Essentials of conducting local Wiki-event.&lt;br /&gt; Using special pages such as Special:UncategorizedPages,, Special:ShortPages etc., Google Books citation, Metrics.wikimedia.org&lt;/td&gt;
&lt;td&gt;
&lt;blockquote&gt;
&lt;div&gt;
&lt;div&gt;“&lt;/div&gt;
It was amazing and a quite enriching experience for me at a personal  level sir. The things I learnt at Train-a-Wikipedian Hyderabad actually  paid the results soon enough.and it enabled to successfully conduct my  first offline Wikipedia Meetup in Kolkata just within one month's time. .  .
&lt;div&gt;”&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://meta.wikimedia.org/wiki/User:Rajasekhar1961" title="User:Rajasekhar1961"&gt;User:Rajasekhar1961&lt;/a&gt;&lt;br /&gt; (&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian/Rajasekhar1961" title="CIS-A2K/Train-a-Wikipedian/Rajasekhar1961"&gt;Training page&lt;/a&gt;)&lt;/td&gt;
&lt;td&gt;Telugu Wikipedia&lt;/td&gt;
&lt;td&gt;AdminTools such as MoreMenu, QuickWikiEditor, Citation making using  Google Books citation tool, autofilling (from reftoolbar), DOI citation  tool; Quick Page purging&lt;/td&gt;
&lt;td&gt;
&lt;blockquote&gt;
&lt;div&gt;
&lt;div&gt;“&lt;/div&gt;
I picked up some very useful skills &amp;amp; learnt good tools. But, I  became a little inactive after that so could not utilize these learnings  much. I hope to do so in future.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;This initiative was inspired by English Wikipedia's program  Adopt-a-user, however we found that we must make necessary changes to  meet requirements of Indic Wikimedians.&lt;/li&gt;
&lt;li&gt;Real-life training sessions left a deeper impact and motivated Wikimedians much more than online training modules.&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Challenges&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;We failed to conduct sufficient number of offline training sessions.&lt;/li&gt;
&lt;li&gt;Follow-ups have not been done for a couple of workshops, for example a TAW workshop was &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian/Sessions/2016-05-15" title="CIS-A2K/Train-a-Wikipedian/Sessions/2016-05-15"&gt;conducted in Hyderabad on 15 May&lt;/a&gt; and was well-received, but no follow-up TAW workshop has been conducted since then in the city.&lt;/li&gt;
&lt;li&gt;From A2K's side sometimes there were delays in connecting and  co-ordinating with the signed-up participants. On the other hand  sometimes, we did not got responses from the participants when we  contacted them.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Policies_and_guidelines_on_Indic_Wikipedias"&gt;Policies and guidelines on Indic Wikipedias&lt;/span&gt;&lt;/h3&gt;
&lt;div class="thumbinner" style="text-align: justify; "&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:Indic_Wikipedia_Policies_and_Guidelines_Handbook.pdf"&gt;&lt;img class="thumbimage" height="311" src="https://upload.wikimedia.org/wikipedia/commons/thumb/7/79/Indic_Wikipedia_Policies_and_Guidelines_Handbook.pdf/page1-220px-Indic_Wikipedia_Policies_and_Guidelines_Handbook.pdf.jpg" width="220" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Indic Wikipedia policy handbook&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K started working on &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Policies_and_guidelines" title="CIS-A2K/Policies and guidelines"&gt;a project&lt;/a&gt; to support and encourage Indic Wikipedians to create and/or localize  policies in their native languages. A survey was conducted and a &lt;a href="https://meta.wikimedia.org/wiki/File:Indic_Wikipedia_Policies_and_Guidelines_Handbook.pdf" title="File:Indic Wikipedia Policies and Guidelines Handbook.pdf"&gt;policy handbook&lt;/a&gt; was also created.&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Efforts must be taken to initiate discussion regarding creation, localisation of policies in events organized by A2K&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Challenges&lt;/dt&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;Although a few policy-discussion meetups have been conducted (such as &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian/Sessions/2016-02-07" title="CIS-A2K/Train-a-Wikipedian/Sessions/2016-02-07"&gt;this one&lt;/a&gt;), we faced difficulties finding volunteer translators to translate the handbook into Indic languages.&lt;/p&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="PopUpMediaTransform" id="mwe_player_0"&gt;&lt;img alt="File:WikipediansSpeak-Soubhagyavathi.webm" src="https://upload.wikimedia.org/wikipedia/commons/thumb/a/aa/WikipediansSpeak-Soubhagyavathi.webm/220px--WikipediansSpeak-Soubhagyavathi.webm.jpg" /&gt;&lt;a href="https://upload.wikimedia.org/wikipedia/commons/a/aa/WikipediansSpeak-Soubhagyavathi.webm" target="new" title="Play media"&gt;&lt;span class="play-btn-large"&gt;&lt;span class="mw-tmh-playtext"&gt;Play media&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Dr. Soubhagyavathi talks about Kannada Wikipedia&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Kannada_2"&gt;Kannada&lt;/span&gt;&lt;/h3&gt;
&lt;div class="thumbinner" style="text-align: justify; "&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:Kannada_Wikipedia_Editathon_DSERT_January08.JPG"&gt;&lt;img class="thumbimage" height="199" src="https://upload.wikimedia.org/wikipedia/commons/thumb/c/cb/Kannada_Wikipedia_Editathon_DSERT_January08.JPG/300px-Kannada_Wikipedia_Editathon_DSERT_January08.JPG" width="300" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Kannada Wikipedia Edit-a-thon partcipants at DSERT in January 2016&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Kannada Wikipedia has reached the 20,000 article mark during this  year. Kananda community members collaboratively designed the plan for  the 13th Kannada Wikipedia anniversary. This activity brought together  Wikimedians from different parts of Karnataka. By applying for a PEG  Kannada Wikipedians have interacted with global Wikipedians and WMF  staff. This event resulted in new editors and outreach activities in  various parts of Karnataka. ​A2K has appointed a &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Glossary" title="CIS-A2K/Glossary"&gt;Program Associate&lt;/a&gt; as per its revised strategy &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Glossary" title="CIS-A2K/Glossary"&gt;A2K 2.0&lt;/a&gt; for Kannada Wikimedia projects.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Institutional_partnership"&gt;Institutional partnership&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Two new partnerships have been initiated during this grant period–&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Department of State Educational Research and Training (DSERT), Government of Karnataka and&lt;/li&gt;
&lt;li&gt;Alva's Education Foundation at Moodabidri.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;While Alva's Education Foundation is going to be a partner in  implementing Wikipedia Education Program. DSERT is an institution that  trains school teachers all across Karnataka state. A2K will be training  the trainers about using and editing Wikipedia and other Wikimedia  projects in the context of their classroom. However, the 3 other  institutional partnerships - Karnataka Janapada University, Manjusha  Museum, Dharmasthala, and Tumkur University, Tumkur- that were  anticipated during the writing of workplan, could not materialize. This  was due to the delay in recruiting a Program Associate for the Kannada  Wikimedia projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A2K has successfully continued its earlier partnerships and has  benefited from their advice regarding our WEP activities and workplan.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Awareness_and_Outreach"&gt;Awareness and Outreach&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Both  the DSERT partnership and the 13th anniversary helped raise awareness  around thematic article writing which encouraged Kannada Wikipedians to  engage in projects. Various editing projects on literature, science,  engineering subjects were taken up actively by the community members.  Approximately 225 articles were created exclusively as part of 13th year  anniversary celebrations.&lt;/p&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:Wikipendrive.jpg"&gt;&lt;img class="thumbimage" height="138" src="https://upload.wikimedia.org/wikipedia/commons/thumb/d/db/Wikipendrive.jpg/220px-Wikipendrive.jpg" width="220" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Offline versions of Kannada Wikipedia (using kiwix) were distributed  through flash drives like this during 13th year Kannada Wikipedia  anniversary&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K also tried to engage in skill-building activities for the  Kannada community members. As per the requests from volunteers, capacity  building programs were arranged both in groups and in one-on-one  settings to individual Wikimedians. Both TTT and MWT saw active  participation from Kannada community. The results of these would be  visible in the coming months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to increase the offline readership of Kannada Wikipedia,  offline versions of Kannada Wikipedia (using kiwix) were distributed  through flash drives during 13th year Kannada Wikipedia anniversary held  at Mangalore. 50 such flash drives have been distributed so far to  those in need.&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Kannada was not properly represented in terms of blogs and media coverage and we have been working on addressing this issue.&lt;/li&gt;
&lt;li&gt;A better communication method would be devised with inputs from the community members.&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Gating factors&lt;/dt&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;A2K has not been successful towards re-releasing of textbooks published by the Government of Karnataka under CC-by-SA licences.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;An orientation for Kananda bloggers, some of who could be potential Wikimedians, has not taken place.&lt;/li&gt;
&lt;li&gt;Some community members have repeatedly emphasized on having better  communication, documentation of activities taken up by the Program  Associate.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Odia_2"&gt;Odia&lt;/span&gt;&lt;/h3&gt;
&lt;div class="thumbinner" style="text-align: justify; "&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:Odia-Active-Editors-7-2015-2-2016.png"&gt;&lt;img class="thumbimage" height="132" src="https://upload.wikimedia.org/wikipedia/commons/thumb/c/c0/Odia-Active-Editors-7-2015-2-2016.png/220px-Odia-Active-Editors-7-2015-2-2016.png" width="220" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Active editors in Odia Wikipedia during the period July 2015 to Feb 2016&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Through the community building activities such as the formation of  Puri WikiTungi and revival of Bhubaneswar WikiTungi, active editors of  the Odia Wikipedia movement reached &lt;a class="text external" href="https://stats.wikimedia.org/EN/ChartsWikipediaOR.htm"&gt;30 editors&lt;/a&gt; (as of 30 June 2016). Regular follow-up with Wikimedians on-Wiki and  via different social media channels along with monthly meetups has  helped in editor retention. This has further encouraged Odia Wikimedians  to participate in both on-Wiki and off-Wiki activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K has supported the community to celebrate the 14th Anniversary  of Odia Wikipedia, which facilitated 30 Wikimedians to meet and discuss  the future activities for Odia Wikimedia projects.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Formation_of_Puri_WikiTungi"&gt;Formation of Puri WikiTungi&lt;/span&gt;&lt;/h4&gt;
&lt;div class="thumbinner" style="text-align: justify; "&gt;
&lt;div class="PopUpMediaTransform" id="mwe_player_2"&gt;&lt;img alt="File:WikipediansSpeak - Odia Wikipedian Adyasha Sahu.webm" src="https://upload.wikimedia.org/wikipedia/commons/thumb/a/a5/WikipediansSpeak_-_Odia_Wikipedian_Adyasha_Sahu.webm/220px--WikipediansSpeak_-_Odia_Wikipedian_Adyasha_Sahu.webm.jpg" /&gt;&lt;a href="https://upload.wikimedia.org/wikipedia/commons/a/a5/WikipediansSpeak_-_Odia_Wikipedian_Adyasha_Sahu.webm" target="new" title="Play media"&gt;&lt;span class="play-btn-large"&gt;&lt;span class="mw-tmh-playtext"&gt;Play media&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Adyasha Sahu a Wikimedian from Puri community sharing her journey in the Wikimedia movement.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="text external" href="http://cis-india.org/openness/odia-wikipedia-takes-puri" rel="nofollow"&gt;Puri WikiTungi&lt;/a&gt; is a city-based editing group formed by Wikimedians from Puri to spread  awareness about Odia Wikimedia projects in and around the city. This  group was formed after the first Wikipedia workshop in Puri. Around 30  individuals attended the workshop. 14 participants from this workshop  have emerged as active editors on Odia Wikipedia and Odia Wikisource.  They are also involved in conducting offline meet-ups, seminar and  workshops.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Bridging_the_Gender_gap"&gt;Bridging the Gender gap&lt;/span&gt;&lt;/h4&gt;
&lt;div class="thumbinner" style="text-align: justify; "&gt;&lt;a class="image" href="https://meta.wikimedia.org/wiki/File:Gender_diversity_in_Odia_Wikimedia_community_%282014-16%29.svg"&gt;&lt;img class="thumbimage" height="101" src="https://upload.wikimedia.org/wikipedia/commons/thumb/1/19/Gender_diversity_in_Odia_Wikimedia_community_%282014-16%29.svg/220px-Gender_diversity_in_Odia_Wikimedia_community_%282014-16%29.svg.png" width="220" /&gt;&lt;/a&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Gender diversity in Odia Wikimedia community during 2014-16. For this  statistics Odia Wikipedia and Odia Wikisource have been considered.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K has engaged with seven new female Wikipedians and this has  resulted in their active participation on Odia Wikimedia projects. One  of the female Wikmedians, &lt;a href="https://meta.wikimedia.org/wiki/User:Chinmayee_Mishra" title="User:Chinmayee Mishra"&gt;Chinmayee Mishra&lt;/a&gt; has independently conducted a Wikipedia orientation workshop. This  workshop has boosted participation of female Wikipedians. Their efforts  have been discussed through blog posts and other social media platforms.&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;Two organizations are unofficially supporting Odia Wikimedia  community by providing meetup space and internet access for Bhubaneswar  and Puri WikiTungis. A2K must make official agreements with these  institutions.&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Gating factors&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Failed to build a partnership with any institution for running  Education program for Odia Wikimedia projects. Awareness about the  importance of WEPs is required for achieving this.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Telugu_2"&gt;Telugu&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A2K team has been successfully collaborating with Telugu Wikipedia community to improve &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%BE%E0%B0%9C%E0%B1%86%E0%B0%95%E0%B1%8D%E0%B0%9F%E0%B1%81/%E0%B0%97%E0%B1%82%E0%B0%97%E0%B1%81%E0%B0%B2%E0%B1%8D_%E0%B0%85%E0%B0%A8%E0%B1%81%E0%B0%B5%E0%B0%BE%E0%B0%A6_%E0%B0%B5%E0%B1%8D%E0%B0%AF%E0%B0%BE%E0%B0%B8%E0%B0%BE%E0%B0%B2_%E0%B0%B6%E0%B1%81%E0%B0%A6%E0%B1%8D%E0%B0%A7%E0%B0%BF" title="te:వికీపీడియా:వికీప్రాజెక్టు/గూగుల్ అనువాద వ్యాసాల శుద్ధి"&gt;content quality&lt;/a&gt; on Telugu Wikipedia and strengthen the community by increasing its reader and editor base. The team also &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B8%E0%B0%AE%E0%B0%BE%E0%B0%B5%E0%B1%87%E0%B0%B6%E0%B0%82/%E0%B0%A4%E0%B1%86%E0%B0%B2%E0%B1%81%E0%B0%97%E0%B1%81_%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE_%E0%B0%A6%E0%B0%BF%E0%B0%A8%E0%B1%8B%E0%B0%A4%E0%B1%8D%E0%B0%B8%E0%B0%B5%E0%B0%82_2015_-_%E0%B0%A4%E0%B1%86%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%B2%E0%B1%8B%E0%B0%95%E0%B0%BF_%E0%B0%9A%E0%B0%BE%E0%B0%B0%E0%B0%BF%E0%B0%A4%E0%B1%8D%E0%B0%B0%E0%B0%BF%E0%B0%95_%E0%B0%9B%E0%B0%BE%E0%B0%AF%E0%B0%BE%E0%B0%9A%E0%B0%BF%E0%B0%A4%E0%B1%8D%E0%B0%B0%E0%B0%BE%E0%B0%B2%E0%B1%81" title="te:వికీపీడియా:సమావేశం/తెలుగు వికీపీడియా దినోత్సవం 2015 - తెవికీలోకి చారిత్రిక ఛాయాచిత్రాలు"&gt;shares ideas&lt;/a&gt; by &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B0%E0%B0%9A%E0%B1%8D%E0%B0%9A%E0%B0%AC%E0%B0%82%E0%B0%A1/%E0%B0%AA%E0%B0%BE%E0%B0%A4_%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%9A_46#.E0.B0.B5.E0.B0.BF.E0.B0.9C.E0.B0.AF.E0.B0.B5.E0.B0.BE.E0.B0.A1_.E0.B0.86.E0.B0.82.E0.B0.A7.E0.B1.8D.E0.B0.B0_.E0.B0.B2.E0.B0.AF.E0.B1.8A.E0.B0.B2.E0.B0.BE_.E0.B0.95.E0.B0.B3.E0.B0.BE.E0.B0.B6.E0.B0.BE.E0.B0.B2.E0.B0.B2.E0.B1.8B_.E0.B0.A1.E0.B0.BF.E0.B0.9C.E0.B0.BF.E0.B0.9F.E0.B1.88.E0.B0.9C.E0.B1.87.E0.B0.B7.E0.B0.A8.E0.B1.8D_.E0.B0.B8.E0.B1.8D.E0.B0.AA.E0.B1.8D.E0.B0.B0.E0.B0.BF.E0.B0.82.E0.B0.9F.E0.B1.8D" title="te:వికీపీడియా:రచ్చబండ/పాత చర్చ 46"&gt;providing&lt;/a&gt; and &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B8%E0%B0%AE%E0%B0%BE%E0%B0%B5%E0%B1%87%E0%B0%B6%E0%B0%82/%E0%B0%97%E0%B1%8D%E0%B0%B0%E0%B0%82%E0%B0%A5%E0%B0%BE%E0%B0%B2%E0%B0%AF%E0%B0%BE%E0%B0%A7%E0%B0%BF%E0%B0%95%E0%B0%BE%E0%B0%B0%E0%B1%81%E0%B0%B2%E0%B0%95%E0%B1%81_%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80_%E0%B0%85%E0%B0%95%E0%B0%BE%E0%B0%A1%E0%B0%AE%E0%B1%80" title="te:వికీపీడియా:సమావేశం/గ్రంథాలయాధికారులకు వికీ అకాడమీ"&gt;extending&lt;/a&gt; support such as involving community members in &lt;a class="text external" href="http://cis-india.org/a2k/blogs/cis-brings-nadustunna-charithra-magazine-under-by-cc-by-sa-licence" rel="nofollow"&gt;discussions with potential partners&lt;/a&gt; and &lt;a class="text external" href="http://cis-india.org/openness/a-workshop-to-improve-telugu-wikipedia-articles-on-nobel-laureates" rel="nofollow"&gt;designing programs based on their suggestions&lt;/a&gt;. Such collaboration has strengthened communities to conduct many &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%BE%E0%B0%9C%E0%B1%86%E0%B0%95%E0%B1%8D%E0%B0%9F%E0%B1%81/%E0%B0%B8%E0%B0%82%E0%B0%98%E0%B0%9F%E0%B0%A8%E0%B0%B2%E0%B1%81,_%E0%B0%AA%E0%B0%B0%E0%B0%BF%E0%B0%A3%E0%B0%BE%E0%B0%AE%E0%B0%BE%E0%B0%B2%E0%B1%81_%E0%B0%8E%E0%B0%A1%E0%B0%BF%E0%B0%9F%E0%B0%A5%E0%B0%BE%E0%B0%A8%E0%B1%8D" title="te:వికీపీడియా:వికీప్రాజెక్టు/సంఘటనలు, పరిణామాలు ఎడిటథాన్"&gt;Edit-a-thons&lt;/a&gt; which have resulted in a wide variety of quality articles. A2K intends  to continue such collaborative activities resulting in improvements of  stub and poorly translated articles.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Activities_and_Events"&gt;Activities and Events&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K  team has been involved in conducting (holding or co-ordinating) several  edit-a-thons in Telugu Wikimedia community, while a few were &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%BE%E0%B0%9C%E0%B1%86%E0%B0%95%E0%B1%8D%E0%B0%9F%E0%B1%81/%E0%B0%AA%E0%B0%BE%E0%B0%A4_%E0%B0%A4%E0%B1%86%E0%B0%B2%E0%B1%81%E0%B0%97%E0%B1%81_%E0%B0%B8%E0%B0%BF%E0%B0%A8%E0%B0%BF%E0%B0%AE%E0%B0%BE_%E0%B0%B5%E0%B1%8D%E0%B0%AF%E0%B0%BE%E0%B0%B8%E0%B0%BE%E0%B0%B2_%E0%B0%B5%E0%B0%BF%E0%B0%B8%E0%B1%8D%E0%B0%A4%E0%B0%B0%E0%B0%A3_%E0%B0%8E%E0%B0%A1%E0%B0%BF%E0%B0%9F%E0%B0%A5%E0%B0%BE%E0%B0%A8%E0%B1%8D" title="te:వికీపీడియా:వికీప్రాజెక్టు/పాత తెలుగు సినిమా వ్యాసాల విస్తరణ ఎడిటథాన్"&gt;anchored in Telugu&lt;/a&gt;, others were &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%BE%E0%B0%9C%E0%B1%86%E0%B0%95%E0%B1%8D%E0%B0%9F%E0%B1%81/%E0%B0%9C%E0%B0%BE%E0%B0%97%E0%B1%8D%E0%B0%B0%E0%B0%AB%E0%B0%BF%E0%B0%95%E0%B0%B2%E0%B1%8D_%E0%B0%87%E0%B0%82%E0%B0%A1%E0%B0%BF%E0%B0%95%E0%B1%87%E0%B0%B7%E0%B0%A8%E0%B1%8D%E0%B0%B8%E0%B1%8D_%E0%B0%87%E0%B0%A8%E0%B1%8D_%E0%B0%87%E0%B0%82%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE_%E0%B0%8E%E0%B0%A1%E0%B0%BF%E0%B0%9F%E0%B1%8D-%E0%B0%85-%E0%B0%A5%E0%B0%BE%E0%B0%A8%E0%B1%8D" title="te:వికీపీడియా:వికీప్రాజెక్టు/జాగ్రఫికల్ ఇండికేషన్స్ ఇన్ ఇండియా ఎడిట్-అ-థాన్"&gt;multi-lingual&lt;/a&gt;. Many initiatives of the last grant period (i.e. July 2014 to June 2015) &lt;a class="text external" href="http://cis-india.org/openness/news/telugu-wiki-edit-a-thon-at-alc" rel="nofollow"&gt;have been continued&lt;/a&gt;. A2K and the community have &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%BE%E0%B0%9C%E0%B1%86%E0%B0%95%E0%B1%8D%E0%B0%9F%E0%B1%81/%E0%B0%AA%E0%B0%BE%E0%B0%A4_%E0%B0%A4%E0%B1%86%E0%B0%B2%E0%B1%81%E0%B0%97%E0%B1%81_%E0%B0%B8%E0%B0%BF%E0%B0%A8%E0%B0%BF%E0%B0%AE%E0%B0%BE_%E0%B0%B5%E0%B1%8D%E0%B0%AF%E0%B0%BE%E0%B0%B8%E0%B0%BE%E0%B0%B2_%E0%B0%B5%E0%B0%BF%E0%B0%B8%E0%B1%8D%E0%B0%A4%E0%B0%B0%E0%B0%A3_%E0%B0%8E%E0%B0%A1%E0%B0%BF%E0%B0%9F%E0%B0%A5%E0%B0%BE%E0%B0%A8%E0%B1%8D" title="te:వికీపీడియా:వికీప్రాజెక్టు/పాత తెలుగు సినిమా వ్యాసాల విస్తరణ ఎడిటథాన్"&gt;collaboratively organised&lt;/a&gt; an of sharing resources has resulted in which focused on improving  Telugu movie articles. Community members have expanded stubs with  information, references and photos. For the edit-a-thon A2K provided  resources and references and the community members developed stub  articles and created new articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Capacity building activities have also been carried out with Telugu Wikipedians. A &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B8%E0%B0%AE%E0%B0%BE%E0%B0%B5%E0%B1%87%E0%B0%B6%E0%B0%82/%E0%B0%B9%E0%B1%88%E0%B0%A6%E0%B0%B0%E0%B0%BE%E0%B0%AC%E0%B0%BE%E0%B0%A6%E0%B1%81/%E0%B0%95%E0%B0%BE%E0%B0%AA%E0%B1%80%E0%B0%B9%E0%B0%95%E0%B1%8D%E0%B0%95%E0%B1%81%E0%B0%B2_%E0%B0%85%E0%B0%B5%E0%B0%97%E0%B0%BE%E0%B0%B9%E0%B0%A8_%E0%B0%95%E0%B0%BE%E0%B0%B0%E0%B1%8D%E0%B0%AF%E0%B0%95%E0%B1%8D%E0%B0%B0%E0%B0%AE%E0%B0%82" title="te:వికీపీడియా:సమావేశం/హైదరాబాదు/కాపీహక్కుల అవగాహన కార్యక్రమం"&gt;copyrights session&lt;/a&gt; was conducted to improve Telugu Wikimedians' understanding on the  subject and clear doubts for Wikisource contributors. Community members,  Meena Gayathri and T.Sujatha, attending CIS A2K's &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Train-a-Wikipedian/Sessions/2016-02-11" title="CIS-A2K/Train-a-Wikipedian/Sessions/2016-02-11"&gt;Train-a-Wikipedian session&lt;/a&gt; have expressed that they gained invaluable knowledge and skills in content translation. The two later initiated a &lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%8D%E0%B0%B0%E0%B0%BE%E0%B0%9C%E0%B1%86%E0%B0%95%E0%B1%8D%E0%B0%9F%E0%B1%81/%E0%B0%97%E0%B1%82%E0%B0%97%E0%B1%81%E0%B0%B2%E0%B1%8D_%E0%B0%85%E0%B0%A8%E0%B1%81%E0%B0%B5%E0%B0%BE%E0%B0%A6_%E0%B0%B5%E0%B1%8D%E0%B0%AF%E0%B0%BE%E0%B0%B8%E0%B0%BE%E0%B0%B2_%E0%B0%B6%E0%B1%81%E0%B0%A6%E0%B1%8D%E0%B0%A7%E0%B0%BF" title="te:వికీపీడియా:వికీప్రాజెక్టు/గూగుల్ అనువాద వ్యాసాల శుద్ధి"&gt;project&lt;/a&gt; to improve the quality of Google Translated articles. More than 30 such articles have been improved through it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the &lt;a class="text external" href="http://cis-india.org/openness/blog-old/tools-orientation-for-telugu-wikimedians-at-hyderabad" rel="nofollow"&gt;Quick introduction sessions&lt;/a&gt; held in Hyderabad community meet-ups by CIS A2K helped explain some  online tools usage and enabled Wikipedians to contribute better for  Wikimedia projects. One of the most active Wikipedians, &lt;a href="https://meta.wikimedia.org/wiki/User:%E0%B0%B8%E0%B1%8D%E0%B0%B5%E0%B0%B0%E0%B0%B2%E0%B0%BE%E0%B0%B8%E0%B0%BF%E0%B0%95" title="User:స్వరలాసిక"&gt;Swaralasika&lt;/a&gt;, said that he was able to make better citations after the sessions which has helped him improve his editing.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Institutional_Partnership_2"&gt;Institutional Partnership&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;With the institutional partnerships established between CIS A2K and Annamayya library, Telugu Wikisource community members &lt;a class="text external" href="https://te.wikisource.org/wiki/%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%B8%E0%B1%8B%E0%B0%B0%E0%B1%8D%E0%B0%B8%E0%B1%8D:%E0%B0%B8%E0%B1%8D%E0%B0%95%E0%B0%BE%E0%B0%A8%E0%B1%8D_%E0%B0%A6%E0%B1%8B%E0%B0%B7%E0%B0%BE%E0%B0%B2_%E0%B0%A8%E0%B0%BF%E0%B0%B5%E0%B0%BE%E0%B0%B0%E0%B0%A3"&gt;have uploaded some of the missing pages&lt;/a&gt; in on Telugu Wikisource. Due to the attempts of the community members  towards proofreading these books can be downloaded now. The Andhra  Loyola College partnership has also cultivated new editors and engage in  WEP activities.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Outreach_and_Media"&gt;Outreach and Media&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Increased media coverage has helped the cause of Telugu Wikimedia projects. Hard work of several Telugu Wikipedians (such as &lt;a href="https://meta.wikimedia.org/wiki/User:Pranayraj1985" title="User:Pranayraj1985"&gt;Pranayraj&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/User:%E0%B0%B5%E0%B0%BF%E0%B0%B6%E0%B1%8D%E0%B0%B5%E0%B0%A8%E0%B0%BE%E0%B0%A7%E0%B1%8D.%E0%B0%AC%E0%B0%BF.%E0%B0%95%E0%B1%86." title="User:విశ్వనాధ్.బి.కె."&gt;Viswanadh&lt;/a&gt;) has been recognized and highlighted. &lt;a href="https://meta.wikimedia.org/wiki/User:Pranayraj1985" title="User:Pranayraj1985"&gt;Pranayraj&lt;/a&gt; points out that the media coverage helped him reach more people who want to contribute to Wikipedia.&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A2K team has been working to make Telugu Wikipedia more visible in popular Telugu media, especially in printed media such as &lt;a class="text external" href="http://cis-india.org/a2k/news/telugu-wikipedia-day-2015-photo-walk" rel="nofollow"&gt;off-wiki&lt;/a&gt; and &lt;a class="text external" href="http://cis-india.org/a2k/news/telugu-wikipedia-articles-on-punjab-media-coverage" rel="nofollow"&gt;on-wiki&lt;/a&gt; events coverage in major local newspapers like &lt;i&gt;Eenadu&lt;/i&gt;, &lt;i&gt;Sakshi&lt;/i&gt;, &lt;i&gt;Andhra Jyothi&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;WEP activities at partner institutions need to be synchronized with their academic schedule.&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Gating factors&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Technical support requests from the community were delayed on our  end. To overcome this, we are trying to find interns to assign technical  tasks requested from communities.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Konkani_2"&gt;Konkani&lt;/span&gt;&lt;/h3&gt;
&lt;div class="thumbinner" style="text-align: justify; "&gt;
&lt;div class="PopUpMediaTransform" id="mwe_player_4"&gt;&lt;img alt="File:Darshan Kandolkar talks about Konkani Wikipedia.webm" src="https://upload.wikimedia.org/wikipedia/commons/thumb/d/da/Darshan_Kandolkar_talks_about_Konkani_Wikipedia.webm/300px--Darshan_Kandolkar_talks_about_Konkani_Wikipedia.webm.jpg" /&gt;&lt;a href="https://upload.wikimedia.org/wikipedia/commons/d/da/Darshan_Kandolkar_talks_about_Konkani_Wikipedia.webm" target="new" title="Play media"&gt;&lt;span class="play-btn-large"&gt;&lt;span class="mw-tmh-playtext"&gt;Play media&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Darshan Kandolkar talks about Konkani Wikipedia&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Having gone live since July 2015 after nine years of incubation, &lt;a class="extiw" href="https://gom.wikipedia.org/wiki/" title="gom:"&gt;Goan Konkani Wikipedia&lt;/a&gt; has developed and expanded with the help of CIS A2K to draw more  contributors and resources into the project. CIS-A2K has attempted to  develop Konkani Wikipedia in all the three scripts (Romi, Devanagari,  Kannada). Institutions such as Thomas Stephen Konkani Kendra (TSKK) for  Romi script, Goa Konkani Sahitya Academy for Devanagari script,  Karnataka Konkani Sahitya Academy for Kannada script have agreed to  donate content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Department of Computer Science, Goa University, had organized an  edit-a-thon to include the villages of Goa state on Konkani Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the discontinuation of the Program Associate for Konkani,  several of our programmatic activities have not been accomplished during  this grant period.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Partnership"&gt;Partnership&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;In  the past year, CIS-A2K had the honour to collaborate with Mannd  Sobhaann and World Konkani Centre, organizations working with Konkani  language and culture, to bring in more resources into Konkani Wikipedia.  These two organizations work for popularization and conservation of  Konkani culture and language. Mannd Sobhaan has donated three Konkani  books under CC-BY-SA license which has provided great sources for  citation and references. On the other hand, these organizations have  also agreed to hold GLAM activities, while A2K would digitize their  archives of audio, video and text resources to further expand resources  available for Konkani Wikimedia projects.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Activities_and_Events_2"&gt;Activities and Events&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;A  one-day edit-a-thon was organized at Krishnadas Shama Central Library,  Goa in January 2016. Members of CIS-A2K participated in this event to  help mentor the participants. The event created 100 new articles on  Konkani Wikipedia in a single day.&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Increase editor base by engaging academicians and bloggers.&lt;/li&gt;
&lt;li&gt;Increase readership by introducing Konkani Wikipedia in primary and higher primary schools.&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Gating factors&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Activity in the end of 2015 was low in Konkani Wikipedia that no new articles were created in November and December.&lt;/li&gt;
&lt;li&gt;Non-availability of a Program Associate&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Marathi_2"&gt;Marathi&lt;/span&gt;&lt;/h3&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Partnership_2"&gt;Partnership&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Maharashtra  Granthottejak Sanstha (MGS) has re-licensed 1000 books on the culture,  history, and literature under CC-by-SA 4.0 license in October, 2015. In  December 2015, a discussion was initiated by CIS A2K at The Energy  Resources Institute (TERI) to plan digitization and uploading of the  books for Marathi Wikisource.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Events_and_Outreach"&gt;Events and Outreach&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;A  two-day workshop was organised by the CIS A2K Program Associate in  August 2015 at Srimati Savitribai Phule Pune University. This workshop  was an attempt to bridge the &lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K_/Projects/Sau_Dhuni_Teen/December_2015_Edit-a-thon_at_Krantijyoti_Savitribai_Phule%27s_Women%27s_Studies_Centre,_Pune_University" title="CIS-A2K /Projects/Sau Dhuni Teen/December 2015 Edit-a-thon at Krantijyoti Savitribai Phule's Women's Studies Centre, Pune University"&gt;gender gap&lt;/a&gt; on Marathi Wikipedia. The "Sau Dhuni Teen" project focused on creating  Wikipedia articles on notable women, themes and works related to gender  studies. This event attracted new editors and introduced to them input  methods for Marathi methods and basic guidelines of contributing to  Wikipedia. The event also served as an important initiative to utilize  Wikipedia in generating Indian language annotations on academic sources  in Women's Studies and the Social Sciences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In May, 2016, CIS A2K organized a two-day mini version of  Train-the-trainer (TTT) and Mediawiki Training (MWT) for Marathi  Wikimedians in Pune. Topics covered in the Mediawiki training include  Wikidata, bug triage, Mediawiki extensions, etc., while the TTT session  focused on advanced editing skills, outreach planning, and grants  structure introduction.&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A strategy is required to utilize books donated by Maharashtra Granthottejak Sanstha (MGS) as references on Marathi Wikipedia.&lt;/li&gt;
&lt;li&gt;Spreading Marathi Wikipedia-related activities to different parts of Maharashtra .&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Gating factors&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Some participants of workshops reflect that unavailability of  sandboxes in Marathi Wikipedia was a concern for new editor as they were  unsure if the article might be changed during the time they edit.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="General_Support_and_Service_to_the_Movement"&gt;General Support and Service to the Movement&lt;/span&gt;&lt;/h3&gt;
&lt;div class="thumbinner" style="text-align: justify; "&gt;
&lt;div class="PopUpMediaTransform" id="mwe_player_6"&gt;&lt;img alt="File:Odia Wikisourcer Pankajmala Sarangi sharing her experience and future plans.webm" src="https://upload.wikimedia.org/wikipedia/commons/thumb/9/9b/Odia_Wikisourcer_Pankajmala_Sarangi_sharing_her_experience_and_future_plans.webm/220px--Odia_Wikisourcer_Pankajmala_Sarangi_sharing_her_experience_and_future_plans.webm.jpg" /&gt;&lt;a href="https://upload.wikimedia.org/wikipedia/commons/9/9b/Odia_Wikisourcer_Pankajmala_Sarangi_sharing_her_experience_and_future_plans.webm" target="new" title="Play media"&gt;&lt;span class="play-btn-large"&gt;&lt;span class="mw-tmh-playtext"&gt;Play media&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="thumbcaption"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="tright thumb" style="text-align: justify; "&gt;
&lt;div class="thumbinner"&gt;
&lt;div class="thumbcaption"&gt;Odia Wikisourcer Pankajmala Sarangi shares her experience and future plans to grow the community. &lt;a href="https://meta.wikimedia.org/wiki/File:Odia_Wikisourcer_Pankajmala_Sarangi_sharing_her_experience_and_future_plans.webm" title="File:Odia Wikisourcer Pankajmala Sarangi sharing her experience and future plans.webm"&gt;Video&lt;/a&gt; by &lt;a class="extiw" href="https://en.wikisource.org/wiki/or:User:Pmsarangi" title="wikisource:or:User:Pmsarangi"&gt;Pankajmala Sarangi&lt;/a&gt; (original video) and Subhashish Panigrahi (post production), &lt;a class="text external" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en" rel="nofollow"&gt;CC BY-SA 4.0&lt;/a&gt;. Pankajmala recorded the video herself covering a few specific topics sent over email.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Partnership_Summary"&gt;Partnership Summary&lt;/span&gt;&lt;/h4&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Growing partnerships in WEPs&lt;/b&gt;: A2K team has successfully  continued all the partnerships form the previous grant period and has  also been able to bring new partners onboard thus adding value to the  Wikimedia movement. A2K conducted a review program for its WEP partners  in Bangalore during the last grant period. This review program allowed  the WEP partners across 3 different states to meet and discuss the  salient features of the WEP initiative being run at their institutions.  This review program helped A2K team to understand institutional  expectations and challenges. The review meeting also helped us to  generate inter institutional collaboration and sync A2K schedule with  academic calendar of these institutions.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Book/Resource donation and digitization&lt;/b&gt;: A2K team is  immensely happy to have partnered with Maharashtra Granthottejak Sanstha  which has donated 1000 books about the Maratha administration, culture,  history and social life. Maharashtra Knowledge Corporation Limited,  Pune has offered us in-kind support by digitising all these books and  making them available to be uploaded on Marathi Wikisource.&lt;/li&gt;
&lt;li&gt;Our collaboration with Manasu Foundation, Bangalore has also allowed  us to digitise content donated to A2K for free. Andhra Loyola College,  Vijayawada now hosts a Digital Resource Lab that provides nevessary  infrastructure (Computers, Internet access and printing facility) for  all the Telugu Wikimedians.&lt;/li&gt;
&lt;li&gt;Centurion University, Bhubhaneswar has expressed in digitising Odia  publications from the copyright lapse period. With this partnership A2K  expects to add close to 50000 folios to Odia Wikisource.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Goa University partnership and Indian village articles&lt;/b&gt;: After  a brief lull in the activities of Konkani Wikipedia activities have  spiked up again mainly because of the encouragement offered by Goa  University. Prof. Madhav Gadgil with support from Goa University has  launched a project of using the Census of India data to create articles  on Villages of India. This activity has been eagerly taken up by the  Konkani community members.Encouraged by the level of enthusiasm shown by  the Konkani community members Telugu, Marathi and Odia community  members have also been engaged in creating articles on villages of India  in their respective languages.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Partnership in image re-licensing&lt;/b&gt;: Alva's Education  Foundation have donated more than 15000 images under CC-BY_SA license.  These images depict the folk art forms, famous personalities, cultural  practices, tribal costumes and other areas regarding the social and  cultural life of Karnataka in particular and South India in general.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Decision of focusing on existing partnerships&lt;/b&gt;: Many  institutions that were indicated under the category 'To be explored' for  a partnership during this plan year have not been approached as A2K  team worked towards consolidating its work with the existing  institutions rather than crowding our resources. This decision was taken  in accordance with the suggestion of community members and FDC  suggestion.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Partnership re-assessment&lt;/b&gt;: A further re-assessment of  Institutional partnerships based on the parameters of RoI, contribution  to Global Metrics and community support will be undertaken during the  grant period July 2016- June 2017. Thus providing the A2K team  opportunity to consolidate its work further and adopting course  corrections (such as working with a different Wikimedia project,  changing target group, conducting intensive summer/winter camps and if  necessary exiting the partnership).&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Outreach_Strategies_Development"&gt;Outreach Strategies Development&lt;/span&gt;&lt;/h4&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Online and offline media outreach strategies&lt;/b&gt;: Stories related  to Indian language Wikipedias and Wikimedia projects used to get less  attention in the regional language media in India. There has been a hike  in news articles and columns related to Indic-language Wikimedia  projects both in print and electronic media. One of the most important  reasons behind this is the establishment and growing relations with  journalists and news editors that are responsible for specific genre of  news. Actively writing opinion pieces to newspaper editorials and making  blog posts on popular online portals are another reason.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Laying out strategies for recruiting new contributors using social media&lt;/b&gt;:  Learning from our past initiative experiences such as the movement  where new contributors on social media helped Odia Wikisource go live&lt;sup class="reference" id="cite_ref-2"&gt;&lt;a href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Impact_report_form#cite_note-2"&gt;[2]&lt;/a&gt;&lt;/sup&gt;, CIS-A2K has been helping communities with online outreach strategies. Some of the lessons learned can be found in &lt;a href="https://meta.wikimedia.org/wiki/Grants:Learning_patterns/Harvesting_new_Wikimedians_from_social_media" title="Grants:Learning patterns/Harvesting new Wikimedians from social media"&gt;this&lt;/a&gt; learning pattern.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Other_Communication_and_Contribution"&gt;Other Communication and Contribution&lt;/span&gt;&lt;/h4&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Balance of Focus Language Area (FLA) and non-FLA language&lt;/b&gt;: As  CIS-A2K has been working primarily in five focus languages (Kannada,  Konkani, Marathi, Odia and Telugu, with Tulu and Santali as two  additional languages), there has been more attention paid to the  aforementioned seven languages and less on the remaining Indian  languages. The same pattern also reflects in our media outreach. To  balance this and to provide support in the larger Indic language  community, CIS-A2K has made efforts in connecting non-FLA Wikimedians  with global community leaders&lt;sup class="reference" id="cite_ref-3"&gt;&lt;a href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Impact_report_form#cite_note-3"&gt;[3]&lt;/a&gt;&lt;/sup&gt; and writing about work accomplished in non-FLA communities.&lt;sup class="reference" id="cite_ref-4"&gt;&lt;a href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Impact_report_form#cite_note-4"&gt;[4]&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Highlighting the' community-led projects and less-known languages&lt;/b&gt;: CIS-A2K has contributed and highlighting in promoting the projects that are primarily community-led&lt;sup class="reference" id="cite_ref-5"&gt;&lt;a href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Impact_report_form#cite_note-5"&gt;[5]&lt;/a&gt;&lt;/sup&gt; that are not necessarily catalyzed by the CIS-A2K. Also, via public  speaking and publications, CIS-A2K has attempted to promote indigenous  and the less-known languages of India.&lt;sup class="reference" id="cite_ref-6"&gt;&lt;a href="https://meta.wikimedia.org/wiki/Grants:APG/Proposals/2014-2015_round2/The_Centre_for_Internet_and_Society/Impact_report_form#cite_note-6"&gt;[6]&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Challenges"&gt;Challenges&lt;/span&gt;&lt;/h4&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Labor intensive WEP programs&lt;/b&gt;: WEP initiative at many of our  institutions have proven to be labour intensive. A2K team has not been  able to integrate its efforts with the community members. There has also  been a perception that the participating Higher Education institutions  are required to only provide infrastructure and carve time out of  academic schedule. This leads to a situation where the A2K team is often  forced to devote time and resources towards the evaluation of  assignments.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Lack of institutional partnership in Odia community&lt;/b&gt;: Despite  the A2K team's attempts to establish formal institutional partnership  and further a WEP initiative in Odia language, we have not been  successful. With the consent of the Odia community A2K team has  approached Centurion University regarding setting up a Wikisource  Learning Centre.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="CIS-A2K_request_page"&gt;CIS-A2K request page&lt;/span&gt;&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K has a &lt;a href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Requests" title="Talk:CIS-A2K/Requests"&gt;request page&lt;/a&gt; intended for Wikimedian/s from India to place requests for support from  CIS-A2K. Between 1 July 2015 and 30 June 2016, CIS-A2K has supported 21  such programs/initiatives. The communities supported by CIS-A2K include  Odia, Kannada, Telugu, Malayalam, Bengali etc. Besides offering  financial support to conduct events, CIS-A2K has also provided  non-financial support such as SWAG material, and technical and  documentaion support.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the events/initiatives we have supported are&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Odia Wikipedians &lt;a href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Requests/Archive_2015_2#Request_to_fund_for_Odia_Wikipedia_workshop_cum_Nabakalebara_Editathon_during_the_event." title="Talk:CIS-A2K/Requests/Archive 2015 2"&gt;conducting Nabakalebara edit-a-thon&lt;/a&gt; (July 2015), &lt;a class="text external" href="https://meta.wikimedia.org/w/index.php?title=Talk:CIS-A2K/Requests&amp;amp;oldid=15252159#Funding_request_for_Odia_Wikisource_1st_Birthday_Celebration"&gt;Odia Wikisource 1st anniversary celebration&lt;/a&gt; (October 2015), &lt;a class="text external" href="https://meta.wikimedia.org/w/index.php?title=Talk:CIS-A2K/Requests&amp;amp;oldid=15924524#Funding_request_for_Wikipedia.27s_15th_Birthday_Celebration"&gt;Wikipedia's 15th Birthday celebration&lt;/a&gt; (January 2016)&lt;/li&gt;
&lt;li&gt;funding Bengali Wikipedia community to conduct a &lt;a href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Requests/Archive_2015_2#Requesting_Funds_for_Wikiacademy_at_Oxford_Book_stores_Kolkata" title="Talk:CIS-A2K/Requests/Archive 2015 2"&gt;workshop (Wikiacademy)&lt;/a&gt; (August 2015), &lt;a href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Requests/Archive_2015_2#Requesting_Funds_for_Wikiacademy_at_Oxford_Book_stores_Kolkata" title="Talk:CIS-A2K/Requests/Archive 2015 2"&gt;a meetup&lt;/a&gt; (October 2015), and an "&lt;a class="text external" href="https://meta.wikimedia.org/w/index.php?title=Talk:CIS-A2K/Requests&amp;amp;oldid=15924524#Request_For_Funding_of_In-depth_Meet-up_of_Bengali_Wikipedia_editor_community_in_Kolkata"&gt;in-depth Meet-up of Bengali Wikipedia editor community in Kolkata&lt;/a&gt;" (June 2016)&lt;/li&gt;
&lt;li&gt;helping Malayalam Wikimedia community to &lt;a href="https://meta.wikimedia.org/wiki/Talk:CIS-A2K/Requests/Archive_2015_2#Funding_request_for_Malayalam_wiki_Padana_Shibiram_.E2.80.93_Kozhikode_-2" title="Talk:CIS-A2K/Requests/Archive 2015 2"&gt;organize a meet-up at Kozhikode, Kerala&lt;/a&gt; (July 2015), and &lt;a class="text external" href="https://meta.wikimedia.org/w/index.php?title=Talk:CIS-A2K/Requests&amp;amp;oldid=15252159#Grant_request_for_Malayalam_Wikimedia_Anniversary_Outreach_program_.28Wikisangamotsavam_2015.29"&gt;Wikisangamotsavam 2015&lt;/a&gt; (December)&lt;/li&gt;
&lt;li&gt;support Telugu Wikipedians to conduct a photowalk and a joint Telugu-English Wikimedians’ meetup in Hyderabad (both in December)&lt;/li&gt;
&lt;li&gt;supporting &lt;a class="text external" href="https://meta.wikimedia.org/w/index.php?title=Talk:CIS-A2K/Requests&amp;amp;oldid=15924524#Request_fund_for_two-day_workshop_on_Samskrit_Wikisource_-_2016"&gt;two-day workshop on Samskrit Wikisource - 2016&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Lessons learnt&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="mw-disambig" href="https://meta.wikimedia.org/wiki/Grants" title="Grants"&gt;WMF grants opportunities&lt;/a&gt; should be discussed and promoted amongst Indic Wikimedia communities.&lt;/li&gt;
&lt;li&gt;Wikimedia communities must be encouraged to optimize in-kind support such as event venue, internet connectivity.&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Challenges&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;We have continuously informed communities that a request (specially  if it is a large one) should come to us at least 3-4 weeks before the  event date(s). However we have received requests at the last moment and  hence faced difficulties (such as time-pressure) reviewing and process  these requests in time.&lt;/li&gt;
&lt;li&gt;We ask communities to submit expenditure details and narrative  report of an event soon after its completion. However, we have faced  difficulties collecting the said records in time.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Revenues_received_during_this_period_.286_month_for_progress_report.2C_12_months_for_impact_report.29"&gt;Revenues received during this period (6 month for progress report, 12 months for impact report)&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provide exchange rate used:&lt;/i&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;1 USD = 61.88 INR&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="fdc-progress-table-2"&gt; &lt;/span&gt; &lt;i&gt;Table 2&lt;/i&gt; &lt;b&gt;Please report all spending in the currency of your grant unless US$ is requested.&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;Please also include any in-kind contributions or resources that  you have received in this revenues table. This might include donated  office space, services, prizes, food, etc. If you are to provide a  monetary equivalent (e.g. $500 for food from Organization X for service  Y), please include it in this table. Otherwise, please highlight the  contribution, as well as the name of the partner, in the notes section.&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dd&gt; 
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Revenue source&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Currency&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Anticipated&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Q1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Q2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Q3&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Q4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Cumulative&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Anticipated ($US)*&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Cumulative ($US)*&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Explanation of variances from plan&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;GSMA&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;263,783.00&lt;/td&gt;
&lt;td align="right"&gt;263,783.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;263,783.00&lt;/td&gt;
&lt;td align="right"&gt;4262.73&lt;/td&gt;
&lt;td align="right"&gt;4262.73&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wikimedia Foundation&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;12,000,000.00&lt;/td&gt;
&lt;td align="right"&gt;6,997,845.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;4,998,082.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;11,995,927.00&lt;/td&gt;
&lt;td align="right"&gt;193,923.72&lt;/td&gt;
&lt;td align="right"&gt;193,857.90&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Kusuma Foundation&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;15,000,000.00&lt;/td&gt;
&lt;td align="right"&gt;7,500,000.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;7,500,000.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;15,000,000.00&lt;/td&gt;
&lt;td align="right"&gt;242,404.65&lt;/td&gt;
&lt;td align="right"&gt;242,404.65&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MacArthar Foundation&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;6,593,625.00&lt;/td&gt;
&lt;td align="right"&gt;6,593,625.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;6,593,625.00&lt;/td&gt;
&lt;td align="right"&gt;106,555.03&lt;/td&gt;
&lt;td align="right"&gt;106,555.03&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cybersteward Project&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;495,100.00&lt;/td&gt;
&lt;td align="right"&gt;495,100.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;495,100.00&lt;/td&gt;
&lt;td align="right"&gt;8,000.97&lt;/td&gt;
&lt;td align="right"&gt;8,000.97&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Big Data MF&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;4,578,734.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;4,578,734.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;4,578,734.00&lt;/td&gt;
&lt;td align="right"&gt;73,993.76&lt;/td&gt;
&lt;td align="right"&gt;73,993.76&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Privacy International&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;3,883,300.63&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;405,388.00&lt;/td&gt;
&lt;td align="right"&gt;3,477,912.63&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;3,883,300.63&lt;/td&gt;
&lt;td align="right"&gt;62,755.34&lt;/td&gt;
&lt;td align="right"&gt;62,755.34&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IDRC&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;6,751,260.57&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;6,751,260.57&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;6,751,260.57&lt;/td&gt;
&lt;td align="right"&gt;109,102.47&lt;/td&gt;
&lt;td align="right"&gt;109,102.47&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;The Mozilla Corporation&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;662,173.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;662,173.00&lt;/td&gt;
&lt;td align="right"&gt;662,173.00&lt;/td&gt;
&lt;td align="right"&gt;10,700.92&lt;/td&gt;
&lt;td align="right"&gt;10,700.92&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/dd&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;* Provide estimates in US Dollars&lt;/p&gt;
&lt;table class="vertical listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Grants&lt;/th&gt; &lt;th&gt;Explanation&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;GSMA&lt;/td&gt;
&lt;td&gt;This fund is allocated to CIS for GSMA project undertaken in  collaboration with Privacy International. The research has sought to  understand different legal and regulatory aspects of security and  surveillance in India.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wikimedia Foundation&lt;/td&gt;
&lt;td&gt;Wikimedia Foundation has given this grant, as part of their APG, to  work with the Wikimedia community of volunteers in India to expand  Wikimedia’s Indic language free knowledge projects, including Wikipedia  in Indic languages. In addition, the grant aims to generate improvements  in India-relevant free knowledge in Wikimedia’s English projects and  wider distribution of free knowledge within India.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Kusma Foundation Fund&lt;/td&gt;
&lt;td&gt;Kusuma Foundation funds the core of CIS programmes.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Spending_during_this_period_.286_month_for_progress_report.2C_12_months_for_impact_report.29"&gt;Spending during this period (6 month for progress report, 12 months for impact report)&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Please use the exchange rate in your APG proposal.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="fdc-progress-table-3"&gt; &lt;/span&gt; &lt;i&gt;Table 3&lt;/i&gt; &lt;b&gt;Please report all spending in the currency of your grant unless US$ is requested.&lt;/b&gt;&lt;/p&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dd&gt;(The "budgeted" amount is the total planned for the year as  submitted in your proposal form or your revised plan, and the  "cumulative" column refers to the total spent to date this year. The  "percentage spent to date" is the ratio of the cumulative amount spent  over the budgeted amount.)&lt;/dd&gt;&lt;/dl&gt; &lt;dl style="text-align: justify; "&gt;&lt;dd&gt; 
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Expense&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Currency&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Budgeted&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Q1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Q2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Q3&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Q4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Cumulative&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Budgeted ($US)*&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Cumulative ($US)*&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Percentage spent to date&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Explanation of variances from plan&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Staff Cost&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;5,884,320.00&lt;/td&gt;
&lt;td align="right"&gt;986,800.00&lt;/td&gt;
&lt;td align="right"&gt;1,328,057.00&lt;/td&gt;
&lt;td align="right"&gt;1,695,815.00&lt;/td&gt;
&lt;td align="right"&gt;1,455,531.00&lt;/td&gt;
&lt;td align="right"&gt;5,466,203.00&lt;/td&gt;
&lt;td align="right"&gt;95,092.44&lt;/td&gt;
&lt;td align="right"&gt;88,335.54&lt;/td&gt;
&lt;td&gt;92.9&lt;/td&gt;
&lt;td&gt;Slightly under spent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Staff Travel &amp;amp; Stay&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;985,000.00&lt;/td&gt;
&lt;td align="right"&gt;211,267.00&lt;/td&gt;
&lt;td align="right"&gt;162,566.00&lt;/td&gt;
&lt;td align="right"&gt;453,724.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;827,557.00&lt;/td&gt;
&lt;td align="right"&gt;15,917.91&lt;/td&gt;
&lt;td align="right"&gt;13,373.58&lt;/td&gt;
&lt;td&gt;84.02&lt;/td&gt;
&lt;td&gt;Due to inclusion of Program Associates presence staff travel has come down&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Volunteer Support&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;1,530,000.00&lt;/td&gt;
&lt;td align="right"&gt;41,847.00&lt;/td&gt;
&lt;td align="right"&gt;422,041.00&lt;/td&gt;
&lt;td align="right"&gt;100,631.00&lt;/td&gt;
&lt;td align="right"&gt;764,787.00&lt;/td&gt;
&lt;td align="right"&gt;1,329,306.00&lt;/td&gt;
&lt;td align="right"&gt;24,725.27&lt;/td&gt;
&lt;td align="right"&gt;21,482.00&lt;/td&gt;
&lt;td&gt;86.89&lt;/td&gt;
&lt;td&gt;Increased activities with the intervention of Program Associates&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Meetups&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;895,000.00&lt;/td&gt;
&lt;td align="right"&gt;84,285.00&lt;/td&gt;
&lt;td align="right"&gt;4,679.00&lt;/td&gt;
&lt;td align="right"&gt;151,904.00&lt;/td&gt;
&lt;td align="right"&gt;114,825.00&lt;/td&gt;
&lt;td align="right"&gt;355,693.00&lt;/td&gt;
&lt;td align="right"&gt;14,463.48&lt;/td&gt;
&lt;td align="right"&gt;5,748.11&lt;/td&gt;
&lt;td&gt;39.74&lt;/td&gt;
&lt;td&gt;A2K team has conducted Train-the-Trainer and Media Wiki Training  during the last quarter of the grant period. These receipts will be  updated in the final cumulative financial report&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Digitization&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;150,000.00&lt;/td&gt;
&lt;td align="right"&gt;5,250.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;10,250.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;15,500.00&lt;/td&gt;
&lt;td align="right"&gt;2,424.05&lt;/td&gt;
&lt;td align="right"&gt;250.48&lt;/td&gt;
&lt;td&gt;39.74&lt;/td&gt;
&lt;td&gt;Purchase of scanners to assist communities towards digitisation has been done&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Equipment&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;80,000.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;170,000.00&lt;/td&gt;
&lt;td align="right"&gt;362,430.00&lt;/td&gt;
&lt;td align="right"&gt;122,660.00&lt;/td&gt;
&lt;td align="right"&gt;655,090.00&lt;/td&gt;
&lt;td align="right"&gt;1,292.82&lt;/td&gt;
&lt;td align="right"&gt;10,586.46&lt;/td&gt;
&lt;td&gt;819&lt;/td&gt;
&lt;td&gt;Essential equipment such as laptops, video camera and hard disks purchased for newly hired Program Associates and A2K staff&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Assistant/Intern&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;110,000.00&lt;/td&gt;
&lt;td align="right"&gt;20,000.00&lt;/td&gt;
&lt;td align="right"&gt;30,000.00&lt;/td&gt;
&lt;td align="right"&gt;110,000.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;160,000.00&lt;/td&gt;
&lt;td align="right"&gt;1,777.63&lt;/td&gt;
&lt;td align="right"&gt;2,585.65&lt;/td&gt;
&lt;td&gt;145.45&lt;/td&gt;
&lt;td&gt;Hiring of 3 Program Associates has resulted in over spending&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Consumables (Printing, Statinery, Swag)&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;460,000.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;0&lt;/td&gt;
&lt;td align="right"&gt;7,433.74&lt;/td&gt;
&lt;td align="right"&gt;0&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;td&gt;A2K was unable to utilise these funds for publishing and distributing of Community Resources&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Miscellaneous&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;165,000.00&lt;/td&gt;
&lt;td align="right"&gt;89,003.00&lt;/td&gt;
&lt;td align="right"&gt;21,207.00&lt;/td&gt;
&lt;td align="right"&gt;50,978.00&lt;/td&gt;
&lt;td align="right"&gt;50,442.00&lt;/td&gt;
&lt;td align="right"&gt;211,630.00&lt;/td&gt;
&lt;td align="right"&gt;2,666.45&lt;/td&gt;
&lt;td align="right"&gt;3,420.01&lt;/td&gt;
&lt;td&gt;128&lt;/td&gt;
&lt;td&gt;Unanticipated expenses regarding orientation of PA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Design/Documentation &amp;amp; Research&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;50,000.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;20,950.00&lt;/td&gt;
&lt;td align="right"&gt;-&lt;/td&gt;
&lt;td align="right"&gt;16,508.00&lt;/td&gt;
&lt;td align="right"&gt;37,458.00&lt;/td&gt;
&lt;td align="right"&gt;808.02&lt;/td&gt;
&lt;td align="right"&gt;605.33&lt;/td&gt;
&lt;td&gt;75&lt;/td&gt;
&lt;td&gt;Optimal spending&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Program Advisor&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;580,800.00&lt;/td&gt;
&lt;td align="right"&gt;132,000.00&lt;/td&gt;
&lt;td align="right"&gt;132,000.00&lt;/td&gt;
&lt;td align="right"&gt;132,000.00&lt;/td&gt;
&lt;td align="right"&gt;132,000.00&lt;/td&gt;
&lt;td align="right"&gt;528,000.00&lt;/td&gt;
&lt;td align="right"&gt;9,385.91&lt;/td&gt;
&lt;td align="right"&gt;8,532.64&lt;/td&gt;
&lt;td&gt;90.9&lt;/td&gt;
&lt;td&gt;Optimal spending&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;TOTAL&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;INR&lt;/td&gt;
&lt;td align="right"&gt;11,979,132.00&lt;/td&gt;
&lt;td align="right"&gt;1,570,452.00&lt;/td&gt;
&lt;td align="right"&gt;2,291,500.00&lt;/td&gt;
&lt;td align="right"&gt;3,067,732.00&lt;/td&gt;
&lt;td align="right"&gt;2,656,753.00&lt;/td&gt;
&lt;td align="right"&gt;9,586,437.00&lt;/td&gt;
&lt;td align="right"&gt;193,586.49&lt;/td&gt;
&lt;td align="right"&gt;154,919.80&lt;/td&gt;
&lt;td&gt;80&lt;/td&gt;
&lt;td&gt;Final Financial report will have the cumulative details.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/dd&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;* Provide estimates in US Dollars&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Compliance"&gt;Compliance&lt;/span&gt;&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Is_your_organization_compliant_with_the_terms_outlined_in_the_grant_agreement.3F"&gt;Is your organization compliant with the terms outlined in the grant agreement?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As  required in the grant agreement, please report any deviations from your  grant proposal here. Note that, among other things, any changes must be  consistent with our WMF mission, must be for charitable purposes as  defined in the grant agreement, and must otherwise comply with the grant  agreement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Are you in compliance with all applicable laws and regulations as outlined in the grant agreement? Please answer "Yes" or "No".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Are you in compliance with provisions of the United States Internal  Revenue Code (“Code”), and with relevant tax laws and regulations  restricting the use of the Grant funds as outlined in the grant  agreement? Please answer "Yes" or "No".&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;References&lt;/h2&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;span class="reference-text"&gt;2016 TTT version was conducted between  15–17 June 2016, and in this impact report we are reporting only till 30  June 2016. Although we have seen positive impact after this year's TTT,  we are not including these in this report.&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;Panigrahi, Subhashish. "&lt;a class="text external" href="https://blog.wikimedia.org/2014/10/21/more-than-40-million-people-await-the-launch-of-odia-wikisource/"&gt;More Than 40 Million People Await the Launch of Odia Wikisource&lt;/a&gt;". Wikimedia Blog (21 October 2014).&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;[ Roali], an IME for Assamese language that  is quite popular in the Assamese speakers, came live after long time.  CIS-A2K has worked closely with the developer of this IME, some of the  Assamese Wikipedia community members and Wikimedia Foundation's Language  Engineering team in the entire process.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;Broadening the scope of blogs CIS-A2K has  contributed to the larger Indic communities has been a constant effort,  though in a limited capacity. A few such blogs can be read here: &lt;a class="text external" href="http://www.huffingtonpost.in/subhashish-panigrahi-/why-its-essential-to-grow-indian-language-wikipedias/" rel="nofollow"&gt;1&lt;/a&gt;, &lt;a class="text external" href="https://globalvoices.org/2015/08/29/googles-optical-character-recognition-software-now-works-with-all-south-asian-languages/" rel="nofollow"&gt;2&lt;/a&gt;, and &lt;a class="text external" href="http://www.thehoot.org/media-watch/digital-media/can-wikipedia-revive-dying-indian-languages-9186" rel="nofollow"&gt;3&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;In &lt;a class="text external" href="http://www.huffingtonpost.in/subhashish-panigrahi-/an-innovation-thats-bringing-an-online-revolution-in-the-odia-l/" rel="nofollow"&gt;this&lt;/a&gt; article, a community-led project for creating a script encoding  converter for the Odia-language Wikimedia projects was highlighted.  There were more publication in the Odia newspapers and the project was  promoted on social media so that more people contribute using the  Unicode standard. The latter will eventually help &lt;a class="text external" href="http://cis-india.org/a2k/news/the-telegraph-april-7-2016-anwesha-ambaly-odia-gets-more-space-in-e-world" rel="nofollow"&gt;spread&lt;/a&gt; the language's reach on the Internet.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;&lt;span class="reference-text"&gt;CIS-A2K and type designer Pooja Saxena submitted a paper and presented a paper titled "&lt;a class="text external" href="http://typoday.in/2016/spk_papers/Pooja_Saxena_Shubhasis%20Panigrahi_TypographyDay-2016.pdf" rel="nofollow"&gt;Bringing Ol Chiki to the digital world&lt;/a&gt;"  at the Typoday 2016, an annual conference in India to bring type  designers and script experts under one roof. The presentation is about  CIS-A2K's work in bringing a freely-licensed typeface for the &lt;a class="extiw" href="https://en.wikipedia.org/wiki/Ol_Chiki_alphabet" title="w:Ol Chiki alphabet"&gt;Ol Chiki script&lt;/a&gt; that is used to write &lt;a class="extiw" href="https://en.wikipedia.org/wiki/Santali_language" title="w:Santali language"&gt;Santali&lt;/a&gt;, an indigenous language spoken across several countries in South Asia.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Signature"&gt;Signature&lt;/span&gt;&lt;/h2&gt;
&lt;dl style="text-align: justify; "&gt;&lt;dt&gt;Once complete, please sign below with the usual four tildes.&lt;/dt&gt;&lt;/dl&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/User:Lahariyaniyathi" title="User:Lahariyaniyathi"&gt;Lahariyaniyathi&lt;/a&gt; (&lt;a href="https://meta.wikimedia.org/wiki/User_talk:Lahariyaniyathi" title="User talk:Lahariyaniyathi"&gt;talk&lt;/a&gt;) 17:01, 28 September 2016 (UTC)&lt;/li&gt;
&lt;/ul&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Resources"&gt;Resources&lt;/span&gt;&lt;/h1&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Resources_to_plan_for_measurement"&gt;Resources to plan for measurement&lt;/span&gt;&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Global metrics are an important starting point for grantees when it comes to measuring programmatic impact (&lt;a href="https://meta.wikimedia.org/wiki/Grants:Learning_patterns/Calculating_global_metrics" title="Grants:Learning patterns/Calculating global metrics"&gt;Learning Patterns&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/File:Global_Metrics_Tutorial.pdf" title="File:Global Metrics Tutorial.pdf"&gt;Tutorial&lt;/a&gt;) but don’t stop there.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/Grants:Evaluation/Logic_models" title="Grants:Evaluation/Logic models"&gt;Logic Models&lt;/a&gt; provide a framework for mapping your pathway to impact through the  cause and effect chain from inputs to outputs to outcomes. Develop a  logic model to map out your theory of change and determine the metrics  and measures for your programs.&lt;/li&gt;
&lt;li&gt;Importantly, both &lt;a href="https://meta.wikimedia.org/wiki/Grants:Evaluation/Quantitative_vs_Qualitative" title="Grants:Evaluation/Quantitative vs Qualitative"&gt;qualitative and quantitative measures are important&lt;/a&gt; so consider both as you determine &lt;a href="https://meta.wikimedia.org/wiki/Grants:Evaluation/Measures_for_evaluation" title="Grants:Evaluation/Measures for evaluation"&gt;measures for your evaluation&lt;/a&gt; and be sure to &lt;a href="https://meta.wikimedia.org/wiki/Grants:Evaluation/Learning_modules/3Welcome" title="Grants:Evaluation/Learning modules/3Welcome"&gt;ask the right questions&lt;/a&gt; to be sure to capture your program stories.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span class="mw-headline" id="Resources_for_storytelling"&gt;Resources for storytelling&lt;/span&gt;&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/Grants:Evaluation/Reporting_and_Storytelling" title="Grants:Evaluation/Reporting and Storytelling"&gt;WMF storytelling series&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/User:MCruz_%28WMF%29/Sandbox/Storytelling_toolkit" title="User:MCruz (WMF)/Sandbox/Storytelling toolkit"&gt;toolkit (DRAFT)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="text external" href="http://www.frameworksinstitute.org/workshops/wideanglelens/children/part1.html" rel="nofollow"&gt;Online workshop on Storytelling&lt;/a&gt;. By Frameworks institute   
&lt;ul&gt;
&lt;li&gt;The origin of storytelling&lt;/li&gt;
&lt;li&gt;Story frames, with a focus on news-worthiness.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a class="text external" href="http://workingnarratives.org/wp-content/uploads/2013/08/Story-Guide.pdf" rel="nofollow"&gt;Reading guide: Storytelling and Social change&lt;/a&gt;. By Working Narratives   
&lt;ul&gt;
&lt;li&gt;The uses of the story.&lt;/li&gt;
&lt;li&gt;Case studies.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a class="text external" href="https://philanthropy.com/article/3-Tips-for-Telling-Stories/228559" rel="nofollow"&gt;Blog: 3 Tips on telling stories that move people to action&lt;/a&gt;. By Paul VanDeCarr (Working Narratives), on Philanthropy.com&lt;/li&gt;
&lt;li&gt;&lt;a class="text external" href="http://www.sparknow.net/publications/SDC_Story_Guide_en.pdf" rel="nofollow"&gt;Building bridges using narrative techniques&lt;/a&gt;. By Sparknow.net   
&lt;ul&gt;
&lt;li&gt;Differences between a report and a story&lt;/li&gt;
&lt;li&gt;Question guides and exercises.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a class="text external" href="http://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/188.pdf" rel="nofollow"&gt;Guide: Tools for Knowledge and Learning&lt;/a&gt;. By Overseas Development Institute (UK).   
&lt;ul&gt;
&lt;li&gt;Developing a strategy&lt;/li&gt;
&lt;li&gt;Collaboration mechanisms&lt;/li&gt;
&lt;li&gt;Knowledge sharing and learning&lt;/li&gt;
&lt;li&gt;Capturing and storing knowledge.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/grants-apg-proposals-2014-2015-round2-the-centre-for-internet-and-society-impact-report-form'&gt;https://cis-india.org/a2k/blogs/grants-apg-proposals-2014-2015-round2-the-centre-for-internet-and-society-impact-report-form&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>hasan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-10-09T14:40:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/scrub-the-internet-clean">
    <title>Govt wants to scrub the Internet clean</title>
    <link>https://cis-india.org/news/scrub-the-internet-clean</link>
    <description>
        &lt;b&gt;Web advocacy groups, experts say govt’s move to evolve content guidelines amounts to censorship. This article by Surabhi Agarwal &amp; Leslie D’monte was published in Livemint on 7 December 2011. Sunil Abraham has been quoted in this article.&lt;/b&gt;
        
&lt;p&gt;India, the world’s largest democracy, may force companies such as Google Inc​., Microsoft Corp​., Yahoo Inc. and Facebook Inc​. to take down online content that it deems offensive because they haven’t been able to come up with an effective self-censorship mechanism governing millions of users.&lt;/p&gt;
&lt;p&gt;The Congress-led United Progressive Alliance government had no option but to "evolve guidelines" to ensure that "blasphemous content on the Internet or television is not allowed", with Internet and social networking sites such as those above "failing to respond to and cooperate with" the government’s request to keep "objectionable" content out of their websites, Kapil Sibal, minister of communications and information technology (IT), said in New Delhi on Tuesday.&lt;/p&gt;
&lt;p&gt;His comments unleashed a firestorm of criticism by Internet advocacy groups and experts, who said the move amounted to censorship and was anti-democratic, impractical and unwarranted since existing laws were comprehensive enough to remove "objectionable" content. The move, they argued, would also stem the growth of user-generated content sites, and thus the Internet itself.&lt;/p&gt;
&lt;p&gt;The government has been battling a series of corruption scandals and criticism of its inability to move forward on policy reforms. A campaign against corruption fuelled by online support has also challenged the government’s authority to legislate, forcing its own version of an anti-graft legislation onto the agenda.&lt;/p&gt;
&lt;p&gt;The latest move by the government follows the introduction of new rules to the Information Technology Act, 2008, that were published earlier this year, also heavily criticized, that called on Internet service providers (ISPs) along with other entities to police online postings, including blogs.&lt;/p&gt;
&lt;p&gt;Sibal referred to what he considered objectionable content as a "matter of grave concern", which affects the "sensibility of our people and is against our cultural ethos".&lt;/p&gt;
&lt;p&gt;Once the new policy framework is implemented, companies “will be duty-bound to share information about those who post content, even if it (the content) is posted outside India”. He didn’t say by when the policy would be put in place.&lt;/p&gt;
&lt;p&gt;Discussions with executives from the firms mentioned above had begun in September, Sibal said. They had been asked to come up with solutions to address the perceived problem in a month’s time and had failed to do so, he said.&lt;/p&gt;
&lt;p&gt;According to local media reports, the move follows posts about some senior Congress leaders, including party president Sonia Gandhi​. The minister, who is also one of India’s top lawyers, did not refer to any specific "objectionable" material during his press briefing, but rued that “the content has still not been removed".&lt;/p&gt;
&lt;p&gt;Google India defended the right of free speech, while saying that it didn’t condone illegality.&lt;/p&gt;
&lt;p&gt;"Even where content is legal but breaks our own terms and conditions, we take that down too, once we’ve been notified about it," Google India said in a release. "But it also means that when content is legal but controversial, we don’t remove it because people’s differing views should be respected, so long as they are legal."&lt;/p&gt;
&lt;p&gt;Facebook India also said that it would remove any content that crossed the line.&lt;/p&gt;
&lt;p&gt;It "has policies and onsite features in place that enable people to report abusive content", the company said. "We will remove any content that violates our terms, which are designed to keep material that is hateful, threatening, incites violence or contains nudity off the service."&lt;/p&gt;
&lt;p&gt;While Yahoo India declined to comment, Microsoft did not respond to an email till press time.&lt;/p&gt;
&lt;p&gt;Internet censorship is a rising trend, with approximately 40 countries filtering the Web in varying degrees, including democratic and non-democratic governments. Governments are using increasingly sophisticated censorship and surveillance techniques, including blocking social networks, to restrict a variety of types of content, says the 2010 Global Network Initiative (GNI) report. GNI seeks to protect freedom of speech online.&lt;/p&gt;
&lt;p&gt;This August, for instance, the Centre had written to the department of telecommunications, asking it to "ensure effective monitoring of Twitter and Facebook", which minister of state for communications and IT Milind Deora acknowledged a few days later in a written reply to a question in the Rajya Sabha. He mentioned access to “encrypted data” on social networking sites, but did not elaborate on the subject.&lt;/p&gt;
&lt;p&gt;Currently, the Indian Telegraph Act and the IT Act, 2008, (amendments were introduced in IT Act, 2000) give the government the power to monitor, intercept and even block online conversations and websites. The Centre for Internet and Society (CIS) has put up a list of 11 such websites blocked by a government order. The data was received from the department of information technology (DIT).&lt;/p&gt;
&lt;p&gt;Moreover, under section 79 of the IT Intermediary (Rules and Guidelines), 2011, intermediaries (comprising telcos, ISPs, network services providers, search engines, cyber cafes, Web-hosting companies, online auction portals and online payment sites) are mandated to exercise "due diligence" and advise users not to share/distribute information violative of the law or a person’s privacy and rights. Intermediaries are expected to act on a complaint within 36 hours of receiving it, and remove such content when warranted.&lt;/p&gt;
&lt;p&gt;In case the intermediary doesn’t find the content objectionable, the matter will have to be contested in a court of law.&lt;/p&gt;
&lt;p&gt;"Currently, you need a court of law to direct a company in case something has to be removed. That takes a lot of time. So there has to be a mechanism that is faster in dealing with such content as (it) can be very damaging," said a DIT official, who did not want to be named.&lt;/p&gt;
&lt;p&gt;"The Indian government can, and should, monitor conversations and websites if it believes the content can harm the security, defence, sovereignty and integrity of the country," said Pavan Duggal, a Supreme Court lawyer and cyber law expert. However, he wondered how the government would go about implementing the task of monitoring each and every conversation on an unstructured Internet.&lt;/p&gt;
&lt;p&gt;Bangalore-based CIS, an Internet advocacy group, said "this pre-emptive manual screening of content, if implemented, would sound the death knell of freedom of expression in India".&lt;/p&gt;
&lt;p&gt;"This screening is worrisome. Companies will err on the side of caution in a bid to please the government, and the courts will not be involved," said Sunil Abraham, executive director of CIS. “This is not only unconstitutional, but technically impossible too. Speech and words have nuances. Can humans decipher these with accuracy?"&lt;/p&gt;
&lt;p&gt;The move will undermine key principles on which the Internet was built, said Nikhil Pahwa, editor and publisher of digital industry news and analysis blog MediaNama.&lt;/p&gt;
&lt;p&gt;"It is completely impossible to enforce this. There is no way that content can be prescreened before it is placed online," he said. “It also kills the concept of immediate communication, which the Internet stands for."&lt;/p&gt;
&lt;p&gt;Cyber law expert NA Vijayashankar, who runs cyber law information portal Naavi, said: "The government has valid reason to control anti-national activities on the Internet. But there are existing laws for it. The current proposition is impractical since pre-scrutiny of content on the Internet is not possible. It will affect the growth of user-generated content, which is helping Internet penetration grow in India."&lt;/p&gt;
&lt;p&gt;Internet censorship happens frequently in countries such as Myanmar, Cuba, China (which had blocked keyword searches of the word "Egypt" on the Internet as well as on Weibo, the Chinese equivalent of Twitter), Iran, Egypt and Saudi Arabia. On the very day the Egyptian government set out to block Internet services in the country (in January), US Republican​ senator Susan Collins floated the COICA Bill, popularly called the "kill switch" Bill, which, if approved, would give the US president similar powers.&lt;/p&gt;
&lt;p&gt;Read the original published in Livemint &lt;a class="external-link" href="http://www.livemint.com/2011/12/06222621/Govt-wants-to-scrub-the-Intern.html?atype=tp"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/scrub-the-internet-clean'&gt;https://cis-india.org/news/scrub-the-internet-clean&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-07T04:07:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/govt-to-monitor-facebook-twitter">
    <title>Govt wants to monitor Facebook, Twitter</title>
    <link>https://cis-india.org/news/govt-to-monitor-facebook-twitter</link>
    <description>
        &lt;b&gt;The Union home ministry has written to the department of telecom asking it to "ensure effective monitoring of Twitter and Facebook". &lt;/b&gt;
        
&lt;p&gt;Milind Deora, minister of state for communications and information technology, said in written reply to a question on Friday in the Rajya Sabha that DoT has received a letter from MHA to ensure monitoring of social networking websites like &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/Twitter"&gt;Twitter&lt;/a&gt; in order to "strengthen cyber security paraphernalia".&amp;nbsp;&lt;/p&gt;
&lt;p&gt;He said that in cases where the data is encrypted, the department works with all concerned parties to obtain lawful access to it.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Citing security a reason, India in the recent months has sought more surveillance and monitoring from internet service providers as well as companies like &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/Research-in-Motion"&gt;Research In Motion&lt;/a&gt;, which sells BlackBerry phones capable of encrypted emails and messaging.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In April the government notified a new set of IT rules, virtually making intermediaries like internet service providers and web hosts and websites like Facebook and Twitter responsible for any wrongdoings on their networks. The rules were widely criticized by privacy activists.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Sunil Abraham, executive director of &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/Centre-for-Internet"&gt;Centre for Internet &lt;/a&gt;and Society said these "blanket surveillance practices" are counterproductive.&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"People advocating greater surveillance don't understand how the web works. In some cases, if there is evidence, targeted monitoring can be done but if governments wants to go through each tweet and every status update, it's just waste of money and resources. Agencies involved in monitoring can do better work by focusing on core issues. This will also save ordinary law-abiding citizens from unnecessary harassment," said Abraham.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div&gt;According to their policies, Twitter and Facebook don't share any private information available on their servers without valid court order or subpoena. Twitter had said in the past that even if there was a court order, it would first inform the users in question before sharing information related to them.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;This article was published in the Times of India on August 8, 2011. The original can be read &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/social-media/Govt-wants-to-monitor-Facebook-Twitter/articleshow/9530919.cms"&gt;here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/govt-to-monitor-facebook-twitter'&gt;https://cis-india.org/news/govt-to-monitor-facebook-twitter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-09T09:21:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried">
    <title>Govt to keep Aadhaar record for 7 years, activists worried</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried</link>
    <description>
        &lt;b&gt;The government will keep for seven years a record of all the services and benefits availed using the Aadhaar number, say new rules, prompting fears that the database could be used for surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/govt-to-keep-aadhar-record-for-7-years-activists-worried/story-jSY820Ee1ZnQNLL5vuWMOI.html"&gt;Hindustan Times&lt;/a&gt; on October 17, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Unique Identification Authority of India (UIDAI), which issues the 12-digit biometric identity to all Indian residents, will be required to preserve its record of verification of an Aadhaar number for the duration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This is an unprecedented centralised data retention provision,” said Sunil Abraham, director of the Bengaluru-based think tank, Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;UIDAI chief executive officer ABP Pandey said the concerns were exaggerated. The agency was keeping records in case a dispute arose over a transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information will be retained online for two years and another five years in the offline archives, say the rules notified in September.&lt;br /&gt;&lt;br /&gt;Users will be able to check the records but only for two years.&lt;br /&gt;&lt;br /&gt;This restriction won’t apply to security agencies. Pandey, however, said the records would not be available to them without a district judge’s permission.&lt;br /&gt;&lt;br /&gt;But, HT found that the rules allow designated joint secretary-level officers at the Centre to order access to information on the grounds of national security.&lt;br /&gt;&lt;br /&gt;“Once Aadhaar becomes mandatory for all services, it can be used by benign and malignant actors to conduct a 360-degree surveillance on any individual,” Abraham said.&lt;br /&gt;&lt;br /&gt;This is how the system, which will need millions of fingerprint-reading machines, works.&lt;br /&gt;&lt;br /&gt;Every time a person fingerprints and quotes the Aadhaar number, the agency concerned sends the data to UIDAI to crosscheck the particulars.&lt;br /&gt;&lt;br /&gt;The UIDAI authenticates about five million Aadhaar numbers, which are quoted to avail LPG subsidy, cheap ration and even passport, a day against a capacity to verify 100 million requests daily.&lt;br /&gt;&lt;br /&gt;“You can think of it as Natgrid Plus,” Abraham said, a reference to the National Intelligence Grid being built by the government.&lt;br /&gt;&lt;br /&gt;A one-stop database for counter-terrorism agencies, Natgrid will collate information real time from databases of various agencies such as bank, rail and airline networks.&lt;br /&gt;&lt;br /&gt;“…we do not record the purpose for which an authentication request was received but only the details of the agency that sent it,” UIDAI’s Pandey said.&lt;br /&gt;&lt;br /&gt;But seven years is a long time. Only a select category of government files are kept for longer than five years.&lt;br /&gt;&lt;br /&gt;Asked about two-year deadline for users, Pandey said it would have been a logistic nightmare to let people access the records once the information was offline.&lt;br /&gt;&lt;br /&gt;The Supreme Court has a ruled that Aadhaar is not a must for availing welfare schemes and is to decide if collecting biometric data for the 12-digit number infringed an individual’s privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-october-17-2016-govt-to-keep-aadhaar-record-for-seven-years-activitsts-worried&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-17T01:53:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework">
    <title>Govt releases white paper on data protection framework</title>
    <link>https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework</link>
    <description>
        &lt;b&gt;Public comments are welcome till 31 December on the data protection white paper, which is aimed at securing digital transactions and addressing privacy issues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Komal Gupta was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/LIKM3FxX3KEcA52uGMlcJP/Govt-releases-white-paper-on-data-protection-framework.html"&gt;Livemint&lt;/a&gt; on November 28, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A  nuanced approach towards data protection will have to be followed in  India, keeping in mind the fact that individual privacy is a fundamental  right limited by reasonable restrictions, according to a white paper  issued by the government on a data protection framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government has sought public comments till 31 December on the white  paper, which is aimed at securing digital transactions and addressing  customer and privacy protection issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white paper, drafted  by the committee of experts on data protection framework, was released  by the ministry of electronics and information technology on Monday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On  31 July, the government constituted a 10-member committee of experts  headed by former Supreme Court justice B.N. Srikrishna to study various  issues relating to data protection and make specific suggestions on the  principles to be considered for data protection as well as suggest a  draft Data Protection bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other members of the committee include  telecom secretary Aruna Sundararajan,  Unique Identification Authority  of India chief executive Ajay Bhushan Pandey, and additional secretary  in the information technology ministry Ajay Kumar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  committee seeks to put the onus on stakeholders and the public through a  questionnaire on issues such as collection of personal data, consent of  consumers, penalties and compensation, code of conduct and an  enforcement model that should be set up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The sensitivity of the  data could also develop based on its combination with other types of  information. For example, an email address taken in isolation, is not  sensitive. However, if it is combined with a password, then it could  become sensitive as it opens access to many other websites and systems,  which may expose the individual to harm such as cyberattacks and  phishing frauds,” the white paper said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also possible that  personal or even non-personal data, when processed using big data  analytics, could be transformed into sensitive personal data. Therefore,  there may be a need to create safeguards which will prevent misuse of  personal information in these contexts of use, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white  paper also seeks “to designate certain lawful grounds under which data  can be processed, even in the absence of consent.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In some  situations, seeking consent prior to a data processing activity would  not be possible, or it may defeat the purpose of the processing. For  instance, where law enforcement officials need to apprehend a criminal,  seeking the consent of the criminal prior to processing would defeat the  purpose of the investigation, it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It seems to be an  eminently reasonable white paper which raises the right questions.  However, it lacks analysis of data protection vis-a-vis Aadhaar,” said  Pranesh Prakash, policy director at the Centre for Internet and Society,  a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Safeguarding privacy rights needs  much more than a data protection law; it needs a larger consultation  that includes issues like surveillance as well, added Prakash.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework'&gt;https://cis-india.org/internet-governance/news/livemint-november-28-2017-komal-gupta-govt-releases-white-paper-on-data-protection-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-28T14:34:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy">
    <title>Govt presses 'undo' button on draft encryption policy</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy</link>
    <description>
        &lt;b&gt;The decision came a day before PM embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, Google and Tesla.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/govt-presses-undo-button-on-draft-encryption-policy-115092201014_1.html"&gt;Business Standard&lt;/a&gt; on September 23, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The government on Tuesday scrapped a draft &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=National+Encryption+Policy" target="_blank"&gt;national encryption policy &lt;/a&gt;that mandated firms and individuals to allow authorities access to all encrypted information on email, apps, websites and business servers.&lt;br /&gt;&lt;br /&gt;The decision came a day before Prime Minister&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Narendra+Modi" target="_blank"&gt;Narendra Modi &lt;/a&gt;embarked on a visit to the US, where he is expected to meet leaders of firms such as Apple, Facebook, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google" target="_blank"&gt;Google &lt;/a&gt;and Tesla. Activists and executives from technology firms had expressed outrage on the draft policy, saying the move would have taken India a step back in technology adoption.&lt;br /&gt;&lt;br /&gt;At a meeting of the Union Cabinet on Tuesday, Modi was livid at the controversy generated by the draft policy and directed officials to withdraw it ahead of his US trip, sources said.&lt;br /&gt;&lt;br /&gt;The draft had global ramifications, as Facebook,&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter &lt;/a&gt;and messaging apps such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;were named in it.&lt;br /&gt;&lt;br /&gt;Ravi Shankar Prasad, Union minister for communications and information technology, distanced the government from the draft hosted on the IT department site, but admitted it gave “uncalled-for misgivings”. He directed officials to rework the draft but did not set a timeframe for seeking feedback from the public.&lt;br /&gt;&lt;br /&gt;“Yesterday (Monday), it was brought to our notice that the draft had been put in the public domain for, seeking comment. I read the draft. I understand that the manner in which it was written could lead to misconceptions. I have asked for the draft policy to be withdrawn and reworded. I personally feel some of the expressions used in the draft are giving rise to uncalled-for misgivings,” Prasad said. “Experts had framed the draft policy. It is not the government’s final view.”&lt;br /&gt;&lt;br /&gt;According to the original draft, the encryption policy sought every message sent by a user, be it through services such as WhatsApp, an SMS or an email, be mandatorily stored in plain text format for 90 days and made available on demand to security agencies. Failure to do so, it added, would draw legal action.&lt;br /&gt;&lt;br /&gt;This was because typically, all messaging apps and services such as WhatsApp, Viber, Line, Google Chat and Yahoo! Messenger have high levels of encryption, which security agencies find hard to crack and intercept.&lt;br /&gt;&lt;br /&gt;Early on Tuesday, before Prasad announced the withdrawal of the draft policy, the government had issued an addendum to keep social media and web applications such as WhatsApp, Twitter and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;out of its purview.&lt;br /&gt;&lt;br /&gt;In a three-point clarification, the Department of Electronics and Information Technology (DeitY) said some encryption products were exempt. “Mass-use encryption products, currently being used in web applications, social media sites and social media applications, such as WhatsApp, Facebook and Twitter…SSL/TLS encryption products being used in internet banking and payment gateways, as directed by the Reserve Bank of India”, and SSL/TLS encryption products being used for e-commerce and password based transactions,” it said.&lt;br /&gt;&lt;br /&gt;“Ideally, the new policy should only focus on two objectives: It should mandate encryption standards within the government, military, law enforcement and intelligence agencies. It shouldn’t regulate the use of encryption by the private sector; the private sector should be allowed to use whatever it believes is appropriate, as long as it is considered a reasonable security measure by courts, under section 43A of the IT Act,” said Sunil Abraham, director,&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Centre+For+Internet+And+Society" target="_blank"&gt;Centre for Internet and Society &lt;/a&gt;(CIS).&lt;br /&gt;&lt;br /&gt;Prasad reiterated the government, under the leadership of Prime Minister Narendra Modi, had promoted social media activism. “The right of articulation and freedom we fully respect. But at the same time, we need to acknowledge that cyber space transaction is rising enormously for individuals, businesses, the government and companies,” he said.&lt;br /&gt;&lt;br /&gt;Opposition parties slammed the Draft policy. Congress communications in-charge Randeep Surjewala said, “Subjugation of individual freedom, surveillance of the citizen and suppression of dissent have emerged as the DNA of the Narendra Modi-led BJP government. The draft policy on encryption, first circulated, then amended and now, withdrawn with a rider for re-issuing it, is a totalitarian, misconceived and a failed attempt of the Modi government to override all sense of individual freedom of speech and expression and encroach upon the right to privacy of communication…With 243.1 million internet users in India at the end of 2014 (173 million being mobile internet users), 112 million Facebook users, 80 million WhatsApp users, 22 million Twitter users and 950 million mobile connections, the intrusion of individual liberty is fraught with dangerous dimensions under the Modi government.”&lt;br /&gt;&lt;br /&gt;Aam Aadmi Party spokesperson Raghav Chadha said, “Only a fascist government can bring such a policy. The draft policy was in violation of the right to personal liberty and the fundamental tenets of freedom of speech and expression…the draft policy was for snooping. It presupposes the 1.2 billion people of India are potential criminals. It reflects the inclination of the government and its intention to turn India into a totalitarian state.”&lt;br /&gt;&lt;br /&gt;&lt;b&gt;ABOUT THE NATIONAL ENCRYPTION POLICY&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Five things the government  draft policy wanted&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Information security for individuals, businesses and government agencies&lt;/li&gt;
&lt;li&gt;Development of indigenous encryption standards&lt;/li&gt;
&lt;li&gt;Use of digital signatures to authenticate transactions&lt;/li&gt;
&lt;li&gt;Legal interception and data retention&lt;/li&gt;
&lt;li&gt;Service providers to register under appropriate government agency&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Things that caused outrage&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Regulation of private sector encryption&lt;/li&gt;
&lt;li&gt;Storage of all encrypted communications for&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;90 days&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Gaining backdoor into private communications of users&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Amendment &amp;amp; withdrawal&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Omission of mass encryption products such as those used by social networks&lt;/li&gt;
&lt;li&gt; Withdrawal of draft policy following Ravi Shankar Prasad’s statement&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/news/business-standard-september-23-2015-govt-presses-undo-button-on-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-09-25T01:55:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham">
    <title>Govt narrative on Aadhaar has not changed in the last six years: Sunil Abraham</title>
    <link>https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham</link>
    <description>
        &lt;b&gt;The bill is basically the same as the UPA version, with some cosmetic changes, and some tokenism towards the right to privacy, says Abraham.&lt;/b&gt;
        &lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Shreeja Sen interviewed Sunil Abraham. The article was &lt;a class="external-link" href="http://www.livemint.com/Politics/l0H1RQZEM8EmPlRFwRc26H/Govt-narrative-on-Aadhaar-has-not-changed-in-the-last-six-ye.html"&gt;published in Livemint &lt;/a&gt; on March 8, 2016.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The government’s bid to push financial inclusiveness and access to government services has received a fresh boost, with finance minister Arun Jaitley introducing a proposed law to give legislative backing to Aadhaar, being implemented by the Unique Identification Authority of India (UIDAI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This project, which uses a person’s biometric data like fingerprints and iris scans to authenticate identity of people receiving subsidies and other state benefits, will move India towards a cashless economy and help digital initiatives such as biometric attendance, Pradhan Mantri Jan Dhan Yojana, digital certificates, pension payments and the proposed introduction of payments banks.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, 42&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham is executive director of Centre for Internet and Society, a Bengaluru-based think tank focusing on accessibility, access to knowledge, telecom and Internet governance. He has written extensively on the UID scheme, and the intersection of privacy and security. He founded Mahiti—an enterprise that aims to reduce the cost and complexity of information and communications technology for the voluntary sector by using free software.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar project has faced its share of roadblocks with cases challenging it pending before the Supreme Court. A constitution bench of the court will decide whether the right to privacy is a fundamental right and if Aadhaar violates it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of Centre for Internet and Society, a Bengaluru-based policy research institute, is a critic of Aadhaar for several reasons. He explained his concerns in an interview. Edited excerpts:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Have any of the concerns regarding the Aadhaar project since its inception in 2009 been addressed?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whatever we complained about six or seven years ago, whatever complaints were made by the civil society...all of those complaints remain in the exact same situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nothing has changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;What kind of concerns?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first thing to remember is that privacy and security are just two sides of the same coin. You cannot have one without the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our first concern with the project is centralization. Whenever you build an information system, and you create a central point of failure, then it will fail because the possibility of failure exists. The Internet has no central point of failure. That is why it is so difficult for you to bring the Internet down. Complaint number 2 is the opaque technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI keeps saying that “we have built a technology using a free software and open standard stack”. The first is a de-duplication software and the second one is the authentication software—those are the most important pieces of software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This software is proprietary and nobody knows how they work and nobody can independently audit them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third complaint is the use of an irrevocable and non-consensual authentication factor. In the UID scheme, the biometrics serve two purposes: it can be used to identify a citizen and it can be used to authenticate a transaction. Authentication factors, commonly known as passwords, should always be revocable. That means if the password is compromised, you should be able to change the password or at least say that this password is no longer valid. The use of biometrics eliminates those two important requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, in most other authentication, the process of authentication ensures that you are consenting. For example, PIN (personal identity number) authentications. But suppose I am authenticating you through your irises, then as long as your eyes are open, the machine will think you’re authenticating. There’s no way of saying I don’t want to authenticate. Or if you’re sleeping, somebody can hold your fingers over a biometric reader and open your iPhone. So that’s complaint number three.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fourth complaint from the privacy perspective is: there is a very important database that they don’t talk about. I call it the transactions database. Suppose there is somebody who is using the UIDAI service to authenticate a transaction, then UIDAI should keep a record of that successful or unsuccessful transaction authentication. That means you have been registered into the database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You go to a fair price shop to purchase subsidized grain and at that fair price shop or ration shop, you use your finger on the biometric reader, and then the UIDAI system says “yes you are indeed who you say you are”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, at that point, later the shop should not be able to say X never came here, or X came twice. So, in order for them to not say all those things, a record should be made on the UID database, that on this day, from this geographical location, this particular biometric reader sent us X’s biometric template and asked if the template matched against X’s UID number...the transaction database can be used for profiling. They never talk about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They never tell us what that database holds and how long they’re keeping all those records. None of that is clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Does Aadhaar bill help assuage your doubts about the project?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government narrative has not changed in the last six years; the bill is basically the same as the UPA (United Progressive Alliance) version, with some cosmetic changes, and some tokenism towards the right to privacy. The proof that the technology is fallible is in the bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the technology was infallible, as the UIDAI would like us to believe, then the bill would not criminalize the following: (1) impersonation at the time of enrolment; (2) unauthorized access to the Central Identities Data Repository.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Imagine that the bill admits that every Indian’s biometric can be stolen from one single centralized database. Now why don’t we have a similar offence for stealing all private keys from the Internet—we don’t because that is technical impossibility thanks to decentralization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore we don’t need a law to make (it) illegal. We’ve suggested changes to both the technology and the law. We’ve written seven open letters to the UIDAI, and we’ve never gotten any response. Very few of our concerns have been addressed. We’ve seen dogs getting UID, various other things getting UID, so there’s a lot of evidence that the system does not work. From Kerala we have stories of one person getting several UIDs, so we have no idea about technological feasibility of the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of our distinguished fellows, Hans Varghese Mathews, has published an academic paper in the latest &lt;i&gt;EPW&lt;/i&gt; (&lt;i&gt;Economic and Political Weekly&lt;/i&gt;), by extrapolating UIDAI field trial data to national scale. He predicts that by the time the number crosses 1 billion, every time UIDAI tries to register someone new, they will match with about 850 people already in the database positively. So, the unique identification capability of the UIDAI will not scale above the billion. The consequence of the technology failing is not trivial. If someone replaces your biometrics in the central database, then the onus is on you to prove that you are a resident of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previously, human beings determined the answer to this question, and they had to find proof that you were not a resident. Now, a fallible technology will be asked to answer this important question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Isn’t the basic function of the Aadhaar project to ensure that benefits reach the person they are meant for, and it’s easier for people to get an identity proof for those who have no other ID, like migrant workers?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two responses: is it good anti- corruption technology? Unfortunately not, because it is intended at retail fraud. The person under surveillance is very poor. But the person responsible for corruption is not poor. So, I believe you should be surveilling those responsible for corruption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What I had said is UID should be first given to every single bureaucrat and every single politician in the country. From Delhi till the Panchayat office, till the ration shop in the village, that supply chain must be monitored and documented using cryptography, so that nobody can deny anything. We need non-repudiatable audit trail from New Delhi to the village because according to all analyses, that is where the theft is happening—in the supply chain. The villager who is taking false benefits, that is called retail fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bulk of the fraud is actually wholesale fraud. Please tackle wholesale fraud using non-repudiatable public audit trail from New Delhi to the village first, before you start surveilling the poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second point is that people find it easy to get the UID. That is fine, but there is a problem; that it’s not uniquely identifying anybody. So, people will keep registering and the UID system will keep giving them more and more UIDs because there are no human checks and balances. Because you’ve gone with a pure technological solution, it’s very easy to fool (the system).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, the ease of registration has not served the purpose.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham'&gt;https://cis-india.org/internet-governance/news/livemint-march-8-2016-shreeja-sen-govt-narrative-on-aadhaar-has-not-changed-in-last-six-years-sunil-abraham&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T16:37:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/govt-and-blackberry">
    <title>Govt and BlackBerry firm wait for the other to hang up</title>
    <link>https://cis-india.org/news/govt-and-blackberry</link>
    <description>
        &lt;b&gt;Sunil Abraham speaks to Archna Shukla on the stand-off between the Government of India and RIM. The news was published in expressindia.com.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;What is the current stand-off between the government and RIM all about? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The current logjam is with regards to BlackBerry messenger, email and web traffic. Around two years ago, the government had asked BlackBerry to allow it to monitor the text messages (SMSes) and phone calls exchanged through its platform. The government has since then been monitoring these services with the help of telecom service providers. It, however, still doesn’t have any means to monitor, intercept or decrypt BlackBerry’s messenger, email and web exchanges. The government wants to put in place a surveillance infrastructure to monitor these services and is asking BlackBerry to cooperate.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is unique about BlackBerry services? Why doesn’t the government have a similar problem with Nokia or Apple? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Companies such as Apple do not provide email and messenger services in India. They only sell their handsets in the country. Nokia recently started providing such services under the Nokia Messaging Services Platform. The service, which includes enterprise solutions, consumer services and Nokia’s own messaging solution Ovi mail, is still in beta format. Nokia’s India spokesperson said the company will set up servers for its various services inside India whenever it kickstarts the functions in a full fledged manner.&lt;/p&gt;
&lt;p&gt;Canadian firm Research in Motion (RIM), makers of BlackBerry, on the other hand, provides all these services alongside selling its handsets. It also manages all its data and traffic on its own without giving the access to anybody. The servers for these services are installed outside India. The government is concerned that keeping servers outside the country will give access to foreign authorities to monitor its local traffic and information. In the US, for instance, this kind of monitoring will be possible under the provisions of the Patriot Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Is BlackBerry the only one to use strong encryptions? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The use of strong encryption in information technology is prevalent in both the wireless industry and Internet platforms. BlackBerry, however, uses a superior encryption that is highly reliable and secure and it owes its popularity in the world markets to this feature mainly. According to Sunil Abraham, the Executive Director of Bangalore-based advocacy group Centre for Internet and Society, BlackBerry uses strong encryption with 256 bit keys. In comparison, gmail.com and Citibank.co.in use only 128 bit keys.&lt;/p&gt;
&lt;p&gt;“If you have encryption on while visiting citibank.com or when using an offline mail client like MS Outlook Express, the government can identify the encrypted service that you are using and the recipient of your encrypted messages. Then they can launch a targeted brute-force attack to intercept and decrypt specific communications,” he says, adding that with the BlackBerry, the government can only see that you are having an encrypted transaction with the BlackBerry servers. They cannot identify the recipients and web services. This makes the brute-force attack difficult as a lot of time is spent decrypting unimportant messages.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What is the problem that RIM is facing in UAE and Saudi Arabia? &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In UAE, it is facing the same problem as in India. In Saudi Arabia, BlackBerry will instal computer servers, which would allow the government some access to user’s data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Can the Indian government and RIM meet half-way?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Unlikely. Though, as per PTI reports,&lt;/p&gt;
&lt;p&gt;BlackBerry has made an attempt to break the logjam by offering metadata and relevant information to security agencies which will enable them in lawful interception, it has has failed to enthuse them. At a meeting between government officials and RIM, company’s representatives said that “they can provide the metadata of the message like the Internet Protocol address of BES and PIN and International Mobile Equipment Identity of the BlackBerry mobile”, sources said. Metadata is loosely defined as data about data. It provides information about a certain item’s content like how large the picture is, the colour depth, the image resolution when the image was created, and other data. A text document’s metadata may contain information about how long the document is, who the author is, when the document was written, and a short summary of the document. However, sources said the RIM, which has nearly one million subscribers across India, failed to enthuse the security agencies who want an uninterrupted access to the messaging services on BlackBerry platform. The security agencies apprehend that BlackBerry services in the present format pose a serious security threat.&lt;/p&gt;
&lt;p&gt;The government may argue that if surveillance is allowed in some countries, it should have the same access, too.&lt;/p&gt;
&lt;p&gt;So far, RIM’s public stand has been that its security architecture was specifically designed to provide corporate customers with the ability to transmit information wirelessly while providing them with the necessary confidence that no one, including RIM, could access their data.&lt;/p&gt;
&lt;p&gt;Abraham of the Centre for Internet and Society says there is a possibility of a compromise behind the doors and the citizens may never get to know that a surveillance regime and infrastructure have been put in place to monitor their communications.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.expressindia.com/latest-news/Govt-and-BlackBerry-firm-wait-for-the-other-to-hang-up/657828/"&gt;Click&lt;/a&gt; to read the original.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/govt-and-blackberry'&gt;https://cis-india.org/news/govt-and-blackberry&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2011-04-02T10:46:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
