<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 161 to 175.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/india-access-to-knowledge-draft-work-plan-july-2014-june-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/enabling-elections"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/making-change/digital-storytelling-human-behavior-vs-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/train-the-trainer-program"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/spy-files-three"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011">
    <title>Leaked Privacy Bill: 2014 vs. 2011</title>
    <link>https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has recently received a leaked version of the draft Privacy Bill 2014 that the Department of Personnel and Training, Government of India has drafted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;After obtaining a copy of the leaked Privacy Bill 2014, we have  replaced the blog "An Analysis of the New Draft Privacy Bill" which was  based off of a report from the Economic Times, with this blog post&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This represents the third leak of potential privacy legislation for India that we know of, with publicly available versions having leaked in &lt;a href="http://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;April 2011&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When compared to the September 2011 Privacy Bill, the text of the 2014 Bill includes a number of changes, additions, and deletions.  Below is an outline of significant changes from the &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011 Privacy Bill&lt;/a&gt; to the 2014 Privacy Bill:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Scope:&lt;/b&gt; The 2014 Bill extends the right to Privacy to all residents of India. This is in contrast to the 2011 Bill, which extended the Right to Privacy to citizens of India.  The 2014 Bill furthermore recognizes the Right to Privacy as a part of Article 21 of the Indian Constitution and extends to the whole of India, whereas the 2011 Bill did not explicitly recognize the Right to Privacy as being a part of Article 21, and excluded Jammu and Kashmir from its purview.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Definitions:&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The 2014 Bill includes a number of new definitions, redefines existing terms, and deletes others.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been added in the 2014 Bill and the definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Personal identifier&lt;/i&gt;:&lt;/b&gt; Any unique alphanumeric sequence of members, letters, and symbols that specifically identifies an individual with a database or a data set.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Legitimate purpose&lt;/i&gt;:&lt;/b&gt; A purpose covered under this Act or any other law for the time being in force, which is certain, unambiguous, and limited in scope for collection of any personal data from a data subject.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Competent authority&lt;/i&gt;&lt;/b&gt; : The authority which is authorized to sanction interception or surveillance, as the case may be, under this Act or rules made there under or any other law for the time being in force.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Notification&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;Notification issued under this Act and published in the Official Gazette&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Control&lt;/i&gt; :&lt;/b&gt; And all other cognate forms of expressions thereof, means, in relation to personal data, the collection or processing of personal data and shall include the ability to determine the purposes for and the manner in which any personal data is to be collected or processed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;i&gt;Telecommunications system&lt;/i&gt;:&lt;/b&gt; Any system used for transmission or reception of any communication by wire, radio, visual or other electromagnetic means but shall not include broadcasting services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Privacy standards&lt;/i&gt;:&lt;/b&gt; The privacy standards or protocols or codes of practice.  developed by industry associations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been re-defined in the 2014 Bill from the 2011 Bill and the 2014 Bill definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Communication data:&lt;/i&gt;&lt;/b&gt;The data held or obtained by a telecommunications service provider in relation to a data subject including the data usage of the telecommunications &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data subject&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;: Any living individual, whose personal data is controlled by any person&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Interception&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;In relation to any communication in the course of its transmission through a telecommunication system, any action that results in some or all of the contents of that communication being made available, while being transmitted, to a person other than the sender or the intended recipient of the communication. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Person&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: A&lt;/i&gt;ny natural or legal person and shall include a body corporate, partnership, society, trust, association of persons, Government company, government department, urban  local body, or any other officer, agency or instrumentality of the state. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Sensitive personal data&lt;/i&gt;:&lt;/b&gt; Personal data relating to: (a) physical and mental health including medical history, (b) biometric, bodily or genetic information, (c) criminal convictions (d) password, (e) banking credit and financial data (f) narco analysis or polygraph test data, (g) sexual orientation.  Provided that any information that is freely available or accessible in public domain or to be furnished under the Right to Information Act 2005 or any other law for time being in force shall not be regarded as sensitive personal data for the purposes of this Act.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Individual:&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;a resident of Indian &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Covert surveillance&lt;/i&gt;:&lt;/b&gt; covert Surveillance" means obtaining private information about an individual and his private affairs without his knowledge and includes: (i) directed surveillance which is undertaken for the purposes of specific investigation or specific operation in such a manner as is likely to result in the obtaining of private information about a person whether or not that person was specifically identified in relation to the investigation or operation; (ii) intrusive surveillance which is carried out by an individual or a surveillance device  in relation to anything taking place on a residential premise or in any private vehicle. It also covers use of any device outside the premises or a vehicle wherein it can give information of the same quality and detail as if the device were in the premises or vehicle; (iii) covert human intelligence service which is information obtained by a person who establishes or maintains a personal or other relationship with an individual for the covert purpose of using such a relationship to obtain or to provide access to any personal information about that individual&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Re-identify&lt;/i&gt;&lt;/b&gt;: means the recovery of data from an anonymised data, capable of identifying a data subject whose personal data has been anonymised;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Process&lt;/i&gt;:&lt;/b&gt; “process" and all other cognate forms of expressions thereof, means any operation or set of operations, whether carried out through automatic means or not by any person or organization, that relates to:(a) collation, storage, disclosure, transfer, updating, modification, alteration or use of personal data; or (b) the merging, linking, blocking, degradation or anonymisation of personal data;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Direct marketing&lt;/i&gt;&lt;/b&gt;: Direct Marketing means sending of a commercial communication to any individual &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data controller&lt;/i&gt;&lt;/b&gt;:  any person who controls, at any point in time, the personal data of a data subject but shall not include any person who merely provides infrastructure for the transfer or storage of personal data to it data controller;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt; Government&lt;/i&gt;&lt;/b&gt;: the Central Government or as the case may be, the State Government and includes the Union territory Administration, local authority or any agency and instrumentality of the Government;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have been removed from the 2014 Bill that were in the 2011 Bill and the 2011 definition:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Consent: Includes implied consent&lt;/li&gt;
&lt;li&gt;Maintain: Includes maintain, collect, use, or disseminate.&lt;/li&gt;
&lt;li&gt;Data processor: In relation to personal data means any person (other than the employee of the data controller), who processes the data on behalf of the data controller. &lt;/li&gt;
&lt;li&gt;Local authority: A municipal committee, district board, body of port commissioners, council, board or other authority legally entitled to, or entrusted by the Government with, the control or management of a municipal or local fund. &lt;/li&gt;
&lt;li&gt;Prescribed: Prescribed by rules made under this Act.&lt;/li&gt;
&lt;li&gt;Surveillance: Surveillance undertaken through installation and use of CCTVs and other system which capture images to identify or monitor individuals (this was removed from the larger definition of surveillance.)&lt;/li&gt;
&lt;li&gt;DNA: Cell in the body of an individual, whether collected from a cheek, cell, blood cell, skin cell or other tissue, which allows for identification of such individual when compared with other individual. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have remained broadly (with some modification) the same between the 2014 Bill and 2011 Bill (as per the 2014 Bill definition):&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Authority: The Data Protection Authority of India &lt;/li&gt;
&lt;li&gt;Appellate tribunal: the Cyber Appellate Tribunal established under Sub-Section (1) of section n48 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;li&gt;Personal data: Any data which relates to a data subject, if that data subject can be identified from that data, either directly or indirectly, in conjunction with other data that the data controller has or is likely to have and includes any expression of opinion about such data subject. &lt;/li&gt;
&lt;li&gt;Member: Member of the Authority &lt;/li&gt;
&lt;li&gt;Disclose: and all other cognate forms of expression thereof, means disclosure, dissemination, broadcast, communication, distribution, transmission, or make available in any manner whatsoever, of personal data. &lt;/li&gt;
&lt;li&gt;Anonymised: The deletion of all data that identifies the data subject or can be used to identify the data subject by linking such data to any other data of the data subject, by the data controller. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Exceptions to the Right to Privacy&lt;/b&gt;: According to the 2011 Bill, the exceptions to the Right to Privacy included: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Sovereignty, integrity and security of India, strategic, scientific or economic interest of the state &lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any offence &lt;/li&gt;
&lt;li&gt;Prevention of public disorder or the detection of crime&lt;/li&gt;
&lt;li&gt;Protection of rights and freedoms of others &lt;/li&gt;
&lt;li&gt;In the interest of friendly relations with foreign state&lt;/li&gt;
&lt;li&gt;Any other purpose specifically mentioned in the Act. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill reflects almost all of the exceptions defined in the 2011 Bill, but removes ‘detection of crime’ from the list of exceptions. The 2014 Bill also qualifies that the application of each exception must be adequate, relevant, and not excessive to the objective it aims to achieve and must be imposed on the manner prescribed – whereas the 2011 Bill stated only that the application of exceptions to the Right to Privacy cannot be disproportionate to the purpose sought to be achieved.&lt;/p&gt;
&lt;p id="content" style="text-align: justify; "&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Acts not to be considered deprivations of privacy:  The 2011 Bill lists five instances that  will not be considered a deprivation of privacy  - namely&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;For journalistic purposes unless it is proven that there is a reasonable expectation of privacy, &lt;/li&gt;
&lt;li&gt;Processing data for personal or household purposes,&lt;/li&gt;
&lt;li&gt;Installation of surveillance equipment for the security of private premises, &lt;/li&gt;
&lt;li&gt;Disclosure of information via the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other activity exempted under the Act.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 limits these instances to:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The processing of data purely for personal or household purposes, &lt;/li&gt;
&lt;li&gt;Disclosure of information under the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other action specifically exempted under the Act.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Privacy Principles:  Unlike the 2011 Bill, the 2014 Bill defines nine specific privacy principles: notice, choice and consent, collection limitation, purposes limitation, access and correction, disclosure of information, security, openness, and accountability. The Privacy Principles will apply to all existing and evolving practices. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Provisions for Personal Data: Both the 2011 Bill and the 2014 Bill have provisions that apply to the processing of personal and sensitive personal data. The 2011 Bill includes provisions addressing the:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data, &lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Retention of personal data,&lt;/li&gt;
&lt;li&gt;Sharing (disclosure) of personal data, &lt;/li&gt;
&lt;li&gt;Security of personal data, &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Access to personal data by data subject,&lt;/li&gt;
&lt;li&gt;Updation of personal data by data subject&lt;/li&gt;
&lt;li&gt;Mandatory processing of data,&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Of these, the 2014 Bill broadly (though not verbatim) reflects the 2011 Bill provisions relating to the:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data,&lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Access to personal data,&lt;/li&gt;
&lt;li&gt;Updating personal data&lt;/li&gt;
&lt;li&gt;Retention of personal data&lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has further includes provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Openness and accountability, &lt;/li&gt;
&lt;li&gt;Choice, &lt;/li&gt;
&lt;li&gt;Consent,&lt;/li&gt;
&lt;li&gt;Exceptions for personal identifiers. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has made changes to the provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Sharing (disclosure of personal data), &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Mandatory processing of data &lt;/li&gt;
&lt;li&gt;Security of personal data&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The changes that have been made have been mapped out below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provisions Relating to Sensitive Personal Data:&lt;/b&gt; The 2011Bill and 2014 Bill both require authorization by the Authority for the collection and processing of sensitive personal data. At the same time, both Bills include a list of circumstances under which authorization for the collection and processing of sensitive personal data is not required. On the whole, this list is the same between the 2011 Bill and 2014 Bill, but the 2014 Bill adds the following circumstances on which authorization is not needed for the collection and processing of sensitive personal data:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;For purposes related to the insurance policy of the individual if the data relates to the physical or mental health or medical history of the individual and is collected and processed by an insurance company.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collected or processed by the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also allows the Authority to specify additional regulations for sensitive personal data, and requires that any additional transaction sought to be performed with the sensitive personal information requires fresh consent to first be obtained. The 2014 Bill carves out another exception for Government agencies, allowing disclosure of sensitive personal data without consent to Government agencies mandated under law for the purposes of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notification of Breach of Security&lt;/b&gt;: The provisions relating to the notification of breach of security in the 2014 Bill differ from the 2011 Bill. Specifically, the 2014 Bill removes the requirement that data controllers must publish information about a data breach in two national news papers. Thus, in the 2014 Bill, data controllers must only inform the data protection authority and affected individuals of the breach. &lt;br /&gt;&lt;b&gt;&lt;br /&gt;Notice&lt;/b&gt;: The 2014 Bill changes the structure of the notice mechanism – where in the 2011 Bill, prior to the processing of data, data controllers had to take all reasonable steps to ensure that the data subject was aware of the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The documented purposes for which such personal data is being collected&lt;/li&gt;
&lt;li&gt;Whether providing of personal data by the data subject is voluntary or mandatory under law or in order to avail of any product or service&lt;/li&gt;
&lt;li&gt;The consequences of the failure to provide the personal data &lt;/li&gt;
&lt;li&gt;The recipient or category of recipients of the personal data &lt;/li&gt;
&lt;li&gt;The name and address of the data controller and all persons who are or will be processing information on behalf of the data controller &lt;/li&gt;
&lt;li&gt;If such personal data is intended to be transferred out of the country, details of such transfer. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In contrast the 2014 Bill provides that before personal data is collected, the data controller must give notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;What data is being collected and&lt;/li&gt;
&lt;li&gt;The legitimate purpose for the collection.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;If the purpose for which the data was collected has changed the data controller will then be obligated to provide the data subject with notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The use to which the personal data will be put&lt;/li&gt;
&lt;li&gt;Whether or not the personal data will be disclosed to a third party and if so the identity of such person &lt;/li&gt;
&lt;li&gt;If the personal data being collected is intended to be transferred outside India  and the reasons for doing so, how the transfer helps in achieving the legitimate purpose and whether the country to which such data is transferred has suitable legislation to provide for adequate protection and privacy of the data. &lt;/li&gt;
&lt;li&gt;The security and safeguards established by the data controller in relation to the personal data &lt;/li&gt;
&lt;li&gt;The processes available to a data subject to access and correct  his personal data&lt;/li&gt;
&lt;li&gt;The recourse open to a data subject, if he has any complaints in respect of collection or processing of the personal data and the procedure relating thereto&lt;/li&gt;
&lt;li&gt;The name, address, and contact particulars of the data controller and all persons who will be processing the personal data on behalf of the data controller. &lt;/li&gt;
&lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of personal data&lt;/b&gt;: Though titled as ‘sharing of personal data’ both the 2011 Bill and 2014 Bill require consent for the disclosure of personal information, but list exceptional circumstances on which consent is not needed. In the 2011 bill, the relevant provision permits disclosure of personal data without consent only if (i) the sharing was a part of the documented purpose, (ii) the sharing is for any purpose relating to the exceptions to the right to privacy or (iii) the Data Protection Authority has authorized the sharing.  In contrast, the 2014 Bill permits disclosure of personal data without consent if (i) such disclosure is part of the legitimate purpose (ii) such disclosure is for achieving any of the objectives of section 5 (iii) the Authority has by order authorized such disclosure (iv) the disclosure is required under any law for the time being in force (v) the disclosure is made to the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.  As a safeguard, the 2014 Bill requires that any person to whom  personal information is disclosed, whether a resident or not, must adhere to all provisions of the Act. Furthermore, the disclosure of personal data must be limited to the extent which is necessary to achieve the purpose for which the disclosure is sought and no person can make public any personal data that is in its control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transborder flow of information&lt;/b&gt;: Though both the 2011 Bill and the 2014 Bill require any country that data is transferred to must have equivalent or stronger data protection standards in place, the 2014 Bill carves out an exception for law enforcement and intelligence agencies and the transfer of any personal data outside the territory of India, in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mandatory Processing of Data&lt;/b&gt;: Both the 2011 Bill and 2014 Bill have provisions that address the mandatory processing of data. These provisions are similar, but the 2014 Bill includes a requirement that data controllers must anonymize personal data that is collected without prior consent from the data subject within a reasonable time frame after collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security of Personal Data:&lt;/b&gt; The provision relating to the security of personal information in the 2014 Bill has been changed from the 2011 Bill by expanding the list and type of breaches that must be prevented, but removing requirements that data controllers must ensure all contractual arrangements with data processors specifically ensure that the data is maintained with the same level of  security.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Conditions on which provisions do not apply:&lt;/b&gt; Both the 2011Bill and 2014 Bill define conditions on which the provisions of updating personal data, access, notification of breach of security, retention of personal data, data quality, consent, choice, notice, and right to privacy  will not apply to personal data.  Though the 2011 Bill and 2014 Bill reflect the same conditions, the 2014 Bill  carves out an exception for Government Intelligence Agencies  - stating that the provisions of  updating personal data, access to data by the data subject, notification about breach of security, retention of personal data, data quality, processing of personal data, consent, choice, notice, collection from an individual will not apply to data collected or processed in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Officers&lt;/b&gt;: Unlike the 2011 Bill, the 2014 Bill defines the role of the privacy officer that must be established by every data controller for the purpose of overseeing the security of personal data and implementation of the provisions of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Power of Authority to Exempt: &lt;/b&gt; Both the 2011 Bill and 2014 Bill contain provisions that enable the Authority to waive the applicability of specific provisions of the Act. The circumstances on which this can be done are based on the exceptions to the Right to Privacy in both the 2011 and 2014 Bill. To this extent, the 2014 Bill differs slightly from the 2011 Bill, by removing the power of the Authority to exempt for the ‘detection of crime’ and ‘any other legitimate purpose mentioned in this Act’ .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Data Protection Authority:&lt;/b&gt; The 2011 Bill and 2014 Bill both establish Data Protection Authorities, but the 2014 Bill further clarifies certain aspects of the functioning of the Authority and expands the functions and the powers of the Authority.  For example, new functions of the Authority include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Auditing any or all personal data controlled by the data controller to assess whether it is being maintained in accordance with the Act, &lt;/li&gt;
&lt;li&gt; Suggesting international instruments relevant to the administration of the Act,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Encouraging industry associations to evolve privacy standards for self regulations, adjudicating on disputes arising between data controllers or between individuals and data controllers.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also expands the powers of the Data Protection Authority – importantly giving him the power to receive, investigate complaints about alleged violations of privacy and issue appropriate orders or directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the 2014 Bill carves out an exception for Government Intelligence Agencies and Law Enforcement agencies – preventing the Authority from conducting investigations, issuing appropriate orders or directions, and adjudicating complaints in respect to actions taken by the Government Intelligences Agencies and Law Enforcement,  if for the objectives of  (a) sovereignty, integrity or security of India; or(b) strategic, scientific or economic interest of India; or(c) preventing incitement to the commission of any offence, or (d) prevention of public disorder, or(e) the investigation of any crime; or (f) protection of rights and freedoms of others; or (g) friendly relations with foreign states; or (h) any other legitimate purpose mentioned in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This power is instead vested with a court of competent jurisdiction.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The National Data Controller Registry&lt;/b&gt;: The 2014 Bill removes the National Data Controller Registry and requirements for data controllers to register themselves and oversight of the Registry by the Data Protection Authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Direct Marketing: &lt;/b&gt;Both the 2011 and 2014 Bills contain provisions regulating the use of personal information for direct marketing purposes. Though the provisions are broadly the same, the 2011 Bill envisions that no person will undertake direct marketing unless he/she is registered in the ‘National Data Registry’  and one of the stated purposes is direct marketing. As the 2014 Bill removes the National Data Registry, the 2014 Bill now requires that any person undertaking direct marketing must have on record where he/she has obtained personal data from.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Interception of Communications&lt;/b&gt;: Though maintaining some of the safeguards defined in the 2011 Bill for interception,  2014 Bill changes  the interception regime envisioned in the 2011 Bill by carving out a wide exception for organizations monitoring the electronic mail of employees,  removing provisions requiring the interception take place only for the minimum period of time required for achieving the purposes, and removing provisions excluding the use of intercepted communications as evidence in a court of law. Similar to the 2011 Bill, the 2014 Bill specifies that the principles of notice, choice and consent, access and correction, and openness will not apply to the interception of communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Video Recording Equipment in public places&lt;/b&gt;: Unlike the 2011 Bill, which addressed only the use of CCTV’s, the 2014 Bill addresses the installation and use of video recording equipment in public places. Though both the 2011 Bill and 2014 Bill both prevent the use of recording equipment and CCTVs for the purpose of identifying an individual, monitoring his personal particulars, or revealing personal, or otherwise adversely affecting his right to privacy - the 2014 Bill requires that the use of recording equipment must be in accordance with procedures, for a legitimate purpose, and proportionate to the objective for which the equipment was installed. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The 2014 Bill makes a broad exception to these safeguards for law enforcement agencies and government intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific, or economic interest of India.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Standards and Self Regulation&lt;/b&gt;: The 2014 Bill establishes a specific mechanism of self regulation where industry associations will develop privacy standards and adhere to them.  For this purpose, an industry ombudsman should be appointed. The standards must be in conformity with the National Privacy Principles and the provisions of the Privacy Bill. The developed standards will be submitted to the Authority and the Authority may frame regulations based on the standards. If an industry association has not developed privacy standards, the Authority may frame regulations for a specific sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Settlement of Disputes and Appellate Tribunal:&lt;/b&gt; The 2014 Bill makes significant change to the process for settling disputes from the 2011 Bill. In the 2014 Bill an Alternative Dispute Mechanism is established where disputes between individuals and data controllers are first addressed by the Privacy Officer of each Data Controller or the industry level Ombudsman. If individuals are not satisfied with the decision of the Ombudsman they may take the complaint to the Authority. Individuals can also take the complaint directly to the Authority if they wish.  If an individual is aggrieved with the decision of the Authority, by a privacy officer or ombudsman through the Alternative Dispute Resolution mechanism, or by the adjudicating officer of the Authority, they may approach the Appellate Tribunal. Any order from the Appellate Tribunal can be appealed at a high court. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In the 2011 Bill disputes between the data controller and an individual can be taken directly to the Appellate Tribunal and orders from the Authority can be appealed at the Tribunal. There is not further path for appeal to an order of the tribunal.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences and Penalties:&lt;/b&gt; The 2014 Bill changes the structure of the offences and penalties section by breaking the two into separate sections - one addressing offences and one addressing penalties while the 2011 Bill addressed offences and penalties in the same section. &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences&lt;/b&gt;: The 2014 Bill penalizes every offence with imprisonment and a fine and empowers a police officer not below the rank of Deputy Superintendent of Police to investigate any offence, limits the courts ability to take cognizance of an offence to only those brought by the Authority, requires that the Court be no lower than a Chief Metropolitan Magistrate or a Chief Judicial Magistrate, and permits courts to compound offences. The 2014 Bill further specifies that any offence that is punishable with three years in prison and above is cognizable, and offences punishable with three years in prison are bailable. . Under the 2014 Bill offences are defined as:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Unauthorized interception of communications &lt;/li&gt;
&lt;li&gt;Disclosure of intercepted communications &lt;/li&gt;
&lt;li&gt;Undertaking unauthorized Covert Surveillance &lt;/li&gt;
&lt;li&gt;Unauthorized use of disclosure of communication data &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The offences defined under the Act are reflected in the 2011 Bill, but the time in prison and fine is higher in the 2014 Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalties&lt;/b&gt;: The 2014 Bill provides a list of penalties including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Penalty for obtaining personal data on false pretext&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalty for violation of conditions of license pertaining to maintenance of secrecy and confidentiality by telecommunications service providers &lt;/li&gt;
&lt;li&gt;Penalty for disclosure of other personal information &lt;/li&gt;
&lt;li&gt;Penalties for contravention of directions of the Authority &lt;/li&gt;
&lt;li&gt;Penalties for data theft &lt;/li&gt;
&lt;li&gt;Penalties for unauthorised collection, processing, and disclosure of personal data&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalties for unauthorized use of personal data for direction marketing. These penalties reflect the penalties in the 2011 bill, but prescribe higher fines&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adjudicating Officer&lt;/b&gt;: Unlike the 2011 Bill that did not have in place an adjudicating officer, the 2014 Bill specifies that the Chairperson of the Authority will appoint a Member of the Authority not  below the Rank of Director of the Government of India to be an adjudicating officer. The adjudicating officer will have the power to impose a penalty and will have the same powers as vested in a civil court under the Code of Civil Procedure. Every proceeding before the adjudicating officer will be considered a judicial processing. When adjudicating the officer must take into consideration the amount of disproportionate gain or unfair advantage, the amount of loss caused, the respective nature of the default&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Remedies and compensation&lt;/b&gt;: Both the 2011 and 2014 Bill contain provisions that permit an individual to pursue a civil remedy, but the 2014 Bill limits these instances to - if loss or damage has been suffered or an adverse determination is made about an individual due to negligence on complying with the Act, and provides for the possibility that the contravening parties will have to provide a public notice of the offense. &lt;br /&gt;&lt;br /&gt;The 2014 Bill removes provisions specifying that individuals that have suffered loss due to a contravention by the data controller of the Act are entitled to compensation.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Exceptions for intelligence agencies&lt;/b&gt;:  Unlike the 2011 Bill, the 2014 Bill includes an exception for Government Intelligence Agencies and Law Enforcement Agencies – stating that the Authority will not have the power to conduct investigations, issue appropriate orders and directions or otherwise adjudicate complaints in respect of action taken by the Government intelligence agencies and Law  Enforcement agencies for achieving any of the objectives that reflect the defined exceptions to privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society welcomes many of the changes that are reflected in the Privacy Bill 2014, but are cautious about the wide exceptions that have been carved out for law enforcement and intelligence agencies in the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the Report of Group of Expert s on Privacy was developed for the purpose of informing a privacy framework for India. As such the Centre for Internet and Society will be analyzing in upcoming posts the draft Privacy Bill 2014 and the recommendations in the Report of the Group of Experts on Privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011'&gt;https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-01T10:52:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/india-access-to-knowledge-draft-work-plan-july-2014-june-2015">
    <title>India Access To Knowledge/Draft Work plan July 2014 - June 2015</title>
    <link>https://cis-india.org/openness/blog-old/india-access-to-knowledge-draft-work-plan-july-2014-june-2015</link>
    <description>
        &lt;b&gt;One of the key mandates of the Access to Knowledge (A2K) programme at the Centre for Internet and Society (CIS)  is to work towards catalysing the growth of the open knowledge movement in South-Asia and in Indic languages. CIS has been a steward of the Wikimedia movement in India since December 2008 when Jimmy Wales visited Bangalore. From September 2012 it has been actively involved in growing the movement in India through a grant received from the Wikimedia Foundation (WMF). Based on the 18-month experience of working with various Indic Wikimedia communities, CIS-A2K has developed its Work Plan for July 2014 to June 2015.&lt;/b&gt;
        &lt;p&gt;This was originally &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#cite_ref-5"&gt;published on Wikimedia blog&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;This work plan consists of 21 plans across 6 verticals&lt;/b&gt;. These are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Language_Area_Work_Plans" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;7 Language Area Plans&lt;/a&gt;&lt;/b&gt;:  CIS-A2K has put in significant efforts in four focus language areas  plans during the last year and has been successful in reaching most of  its goals. In 2014-15 we will further deepen our engagement in these  four language areas (&lt;a class="extiw" href="https://en.wikipedia.org/wiki/Kannada_language" title="en:Kannada language"&gt;Kannada&lt;/a&gt;, &lt;a class="extiw" href="https://en.wikipedia.org/wiki/Konkani_language" title="en:Konkani language"&gt;Konkani&lt;/a&gt;, &lt;a class="extiw" href="https://en.wikipedia.org/wiki/Oriya_language" title="en:Oriya language"&gt;Odia&lt;/a&gt; and &lt;a class="extiw" href="https://en.wikipedia.org/wiki/Telugu_language" title="en:Telugu language"&gt;Telugu&lt;/a&gt;).  Further, this experience and the learnings from it will be leveraged to  work on three more large Indic language Wikipedia projects, which are &lt;a class="extiw" href="https://en.wikipedia.org/wiki/Bengali_language" title="en:Bengali language"&gt;Bangla&lt;/a&gt;, &lt;a class="extiw" href="https://en.wikipedia.org/wiki/Hindi" title="en:Hindi"&gt;Hindi&lt;/a&gt; and &lt;a class="extiw" href="https://en.wikipedia.org/wiki/Marathi_language" title="en:Marathi language"&gt;Marathi&lt;/a&gt;. We have developed a detailed plan for each of these language areas, which can be seen &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Language_Area_Work_Plans" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Community_Strengthening_Initiatives" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;3 Community Strengthening Initiatives&lt;/a&gt;&lt;/b&gt;:  We propose community strengthening initiatives that will further grow  the Indic Wikimedia projects and the associated community, both  qualitatively and quantitatively. These initiatives, focussing on  building capacity and nurturing leadership in the Indic communities,  will ensure that growth is sustained beyond the CIS-A2K program. A  detailed plan for each of these initiatives is available &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Community_Strengthening_Initiatives" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Stand-alone_Wikimedia_Projects" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;8 Stand-alone Wikimedia Projects&lt;/a&gt;&lt;/b&gt;:  These stand-alone projects will have clear deliverables in a limited  span of time, and will help us understand how to take up bigger  initiatives in the respective language. All the stand-alone projects are  more fully described &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Stand-alone_Wikimedia_Projects" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Creating_Movement_Resources" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;Creating Movement Resources&lt;/a&gt;&lt;/b&gt;:  Once CIS-A2K began actively working with the Indic Wikimedia  communities, it soon realized that unlike in English there were not many  Wikimedia-related resources available in Indic languages. During the  last year we produced some resources which were mostly unplanned  outcomes. However, we feel there is an urgent need to create movement  resources in Indic languages like a Creative Commons (CC) handbook; a  Copyright handbook; training manuals; video tutorials, etc. See our  plans for concerted efforts to create resources for strengthening the  Wikimedia movement in India and in Indic languages &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Creating_Movement_Resources" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Creating Movement Resources"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Publicity.2C_Research_and_Documentation" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;Publicity, Research and Documentation&lt;/a&gt;&lt;/b&gt;:  Many of the Indic Wikimedia projects in spite of being in existence for  more than 10 years have not received adequate publicity. Also, the  Wikimedia movement in India could benefit from more systematic research  and documentation. CIS-A2K will put in more intensive efforts into  Publicity, Research and Documentation of the Wikimedia movement in India  during this year as per the plans discussed &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Publicity,_Research_and_Documentation" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Publicity, Research and Documentation"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#General_Support_and_Service_to_the_Movement" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;General Support and Service to the Movement&lt;/a&gt;&lt;/b&gt;:  CIS-A2K deeply believes in extending support and service to the  Wikimedia volunteer community in India. This has been one of the  important aspects of our work so far. We have honoured up to 100  requests of all sizes that we received from the Wikimedia volunteer  communities across all Indic languages. &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/General_Support_and_Service_to_the_Movement" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/General Support and Service to the Movement"&gt;This page&lt;/a&gt; gives more details about the proposed work.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The work plan includes details of aims, objectives, programme activities  and expected outcomes. Most of the language area plans were put  together in active consultation with the respective Wikimedia language  communities. Various inputs and ideas contributed, opportunities  provided, and challenges thrown at the CIS-A2K program during the last  year by the Wikimedia communities in India, our institutional partners, &lt;a class="text external" href="http://wiki.wikimedia.in/Wikimedia_India_Chapter_Executive_Committee_Members" rel="nofollow"&gt;Executive Committee (EC)&lt;/a&gt; of &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_India" title="Wikimedia India"&gt;Wikimedia India Chapter (WMIN)&lt;/a&gt; and the &lt;a href="https://meta.wikimedia.org/wiki/Grants:Start" title="Grants:Start"&gt;Wikimedia Foundation's Grantmaking Team&lt;/a&gt; have significantly informed our work plans.&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;h3&gt;Background to CIS-A2K Program&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation approved a grant of ₹26,000,000 to CIS in  Bangalore, India to expand their A2K programme in India. The grant was  released over a three phase period - first in September 2012 (₹  11,000,000), second in June 2013 (₹ 7,500,000) and third in December  2014(₹ 7,500,000). The purpose of the grant was to enable the A2K team  to work with the Wikimedia community of volunteers in India to expand  the Indic Wikimedia projects and associated communities. In addition,  the grant was aimed at generating improvements in India-relevant free  knowledge in Wikimedia’s English projects, and the wider distribution of  Wikimedia’s free knowledge within India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K created an &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014" title="India Access To Knowledge/Work plan April 2013 - June 2014"&gt;Annual Work Plan (2013-2014)&lt;/a&gt; that is being successfully implemented. Most of the projected outcomes  against the plans have already been met. There have also been many  unplanned outcomes. CIS-A2K has periodically been sharing its work  openly with the Wikimedia community in India, WMIN and WMF's Grantmaking  team. See all our reports and newsletters &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Reports" title="India Access To Knowledge/Reports"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Objective&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The objective of the CIS-A2K is to catalyse the growth of open knowledge  movement in South Asia and in Indic languages. Within the Wikimedia  universe CIS-A2K specifically strives to further grow the Indic and  English Wikimedia projects and communities by a) supporting and serving  the Wikimedia communities; b) building institutional partnerships; c)  bringing more content under free license; d) designing and executing  projects with community participation; e) strengthening the Wikimedia  volunteers; and f) fostering and enabling an appropriate legal and  technological ecosystem.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Context&lt;/h3&gt;
&lt;p&gt;It is important to understand the two broader contexts in which CIS-A2K  program operates, which underpins the implementation of this work plan.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Linguistic Diversity of India&lt;/b&gt;: India is known for its  linguistic diversity. India is home to several dominant languages and  also several small languages which are facing extinction. Due to the  large number of languages that exist in India, the country has more than  20 different language Wikipedias. Each Indic Wikimedia language project  is different from the others in terms of community structure, speaker  base, literacy level, technical knowledge, existing documentation,  language corpora and challenges in the cyberspace, etc. Hence, each  Indian language has its own strengths and challenges which are quite  different from each other.&lt;br /&gt; &lt;br /&gt;Since each Indian language is so distinct, we cannot apply a ‘one-size  fits all’ approach; hence CIS-A2K early on adopted the strategy of  creating a detailed plan for each language. During 2013-14 we chose five  (of which only four could be executed) Indic languages for focussed  intervention and developed [&lt;a class="text external" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014#Language_area_work_plans%7Cgranular"&gt;plans&lt;/a&gt;].  This strategy did pay off and we have now decided to work on seven  languages. It is important to note that we are cautious about not  massively scaling up this strategy and our choice to work on seven  language areas is well informed. However, we have planned to execute  some &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Stand-alone_Wikimedia_Projects" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;stand-alone projects&lt;/a&gt; in other Indic languages and will provide &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/General_Support_and_Service_to_the_Movement" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/General Support and Service to the Movement"&gt;need based support&lt;/a&gt; to other Indic Wikimedia communities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Institutional Context&lt;/b&gt;: The A2K program is housed at CIS  Bangalore. CIS is an almost 6 year old non-profit organisation [with  offices in Bengaluru and New Delhi] focussing on interdisciplinary  policy and academic research. CIS conducts policy research in the  following areas - accessibility, access for knowledge [including  free/open source software, open content, open standards, open access and  open data], internet governance [including privacy and freedom of  speech and expression], telecom [limited to shared backhaul and shared  spectrum]. CIS produces academic research focusing on digital natives  and digital humanities.&lt;br /&gt; &lt;br /&gt;CIS shares the same values as Wikimedia and the free and open source  software community. CIS believes Wikimedia's objectives of disseminating  free knowledge to each and every individual. There are certain advantages the A2K program has because of its location  within CIS. Some of these include: a) opportunity to leverage the  strong network CIS has developed with various free culture / openness  movement stakeholders in the past 6 years of its existence; b) the  advantage of having an office space in a city which is the hub of the  openness movement in India; c) readily available administrative and  support staff and systems that saves a lot of A2K staff's time; d)  cross-pollination of ideas and work done in other CIS programs and  vice-versa; e) organisational principles like subsidiarity, war on  meta-work, post-facto accountability, and amorphous institutional  boundaries give the A2K team members amazing programmatic agility; and  f) the right kind of ecosystem for free knowledge work&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; There are also some disadvantages: a) CIS being a non-chapter or  Wikimedia volunteer-driven entity faces very valid questions about  legitimacy, representation and "voluntary sector" vs. "volunteer"  dichotomy; b) a section of the community view CIS-A2K as a competitor to  WMIN for financial resources which undermines trust-building and  consequently threatens synergies between WMIN and A2K c) CIS has to be  conservative about attributing Wikimedia growth and community growth to  A2K initiatives as it can be misconstrued as credit-grabbing.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Methodology&lt;/h3&gt;
&lt;dl&gt;&lt;dt&gt;Process&lt;/dt&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;This work plan is put together based on an extensive engagement with  various stakeholders of Wikimedia movement in India. These include a)  some Wikimedia volunteers across Indic Wikimedia projects; b) WMIN  Executive Committee; d) Institutional Partners of CIS-A2K; e) a few  like-minded advocates of free knowledge; f) A2K Program Adviser Dr.  Tejaswini Niranjana; and g) a few of the Wikimedia Foundation staff.  Some of the language area plans were shared with that particular  language Wikimedia community for feedback over the Wikipedia village  pumps, mailing lists and social media groups. Each plan document has a  list of contributors who have contributed in developing the plan.&lt;/p&gt;
&lt;dl&gt;&lt;dt&gt;Structure&lt;/dt&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;There are 21 diverse plans within this plan. During the work planning  exercise we realized that this diversity is both a good feature and a  potential bug. We were concerned about making these plans intelligible.  So we have worked very hard to come up with a standard template for all  plans. Thus a cursory glance may give the impression that some plans  look similar, but they are not. However, you may see repetitions in  strategies across plans. Also in some plans we had to deviate from the  template. Moreover, it is less productive to compare one sub-plan with  another sub-plan as each plan was developed taking into consideration a)  specific strengths and opportunities that CIS-A2K program could build  on; b) particular needs for support to which we could respond; and c)  specific challenges that require localized solutions.&lt;/p&gt;
&lt;dl&gt;&lt;dt&gt;Granularity&lt;/dt&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;This plan is not set in stone and will be periodically (right now  quarterly) reviewed and revised if required. The intention of this work  plan is to continually ensure better design and better engagement. Thus  this "plans within the plan" structure was essential to evolve a sense  of granularity of the CIS-A2K team’s work along with micro-level outcome  and impact metrics. This will give us the flexibility to amputate a  plan, if it fails, without affecting the rest of the plans. We also  believe that this granularity in plans will give a focussed direction  for the CIS-A2K team and the volunteers who will collaborate with us in  the implementation.&lt;/p&gt;
&lt;dl&gt;&lt;dt&gt;Mapping Plan to Budget/Mission Level Transparency&lt;/dt&gt;&lt;/dl&gt;
&lt;p style="text-align: justify; "&gt;Each plan has an independent budget and is closely mapped on to the  implementation plan. An attempt is made to correlate why we are spending  a certain amount on a certain activity. Thus all these budgets are very  optimally planned and the overall budget is an assimilation. CIS-A2K  believes that this will give mission level transparency to our work and  provide a clear structure of accountability to the movement.&lt;/p&gt;
&lt;h2&gt;Annual Work Plan July 2014-June 2015&lt;/h2&gt;
&lt;h3&gt;Language Area Work Plans&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K has put in significant efforts in four focus language areas  plans during the last year and has been successful in reaching most of  the proposed goals. In 2014-15 we will further deepen our engagement in  these four language areas (Kannada, Konkani, Odia and Telugu). Further,  this experience and the learnings from it will be leveraged to work on  three more large Indic Wikipedia projects, which are Bangla, Hindi and  Marathi. We have developed a detailed plan for each of these language  areas, which is given below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Bangla" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Bangla"&gt;Bangla&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Hindi" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Hindi"&gt;Hindi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Kannada" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Kannada"&gt;Kannada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Konkani" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Konkani"&gt;Konkani&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Marathi" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Marathi"&gt;Marathi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Odia" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Odia"&gt;Odia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Telugu" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Telugu"&gt;Telugu&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Some of the key factors that determined the selection of languages areas have included:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Deepening the work&lt;/i&gt;. We have decided to continue our work in  the language areas chosen last year as we believe that we need to deepen  our work to ensure that the momentum we have built will be sustained  even after our exit.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Networking of institutions and groups.&lt;/i&gt; The A2K team has put  together a list of knowledge institutions, groups and individuals with  whom it has some connections and believes that it can bring them into  the Wikimedia movement. These collaborations will not only result in  significant quality-content contributions, but will lead to the  diversification and expansion of that particular language Wikimedia  community.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Willingness of that particular language community to interact and engage with the A2K team.&lt;/i&gt; Though we tried approaching other language communities informally, we  were given to understand that they would like to consider engaging with  us at a later stage. We respect the community's decision and express our  willingness to work with newer language areas in a subsequent phase.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Familiarity of the A2K team members with the language.&lt;/i&gt; Each  of us are editors/can edit or at least read the discussions in most of  the above language Wikipedias. This will give us an insider's  perspective of what is happening in that particular language community  and the Wikimedia projects.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Community Strengthening Initiatives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K proposes to undertake three community strengthening initiatives  that will further grow the Indic Wikimedia projects and the associated  community, both qualitatively and quantitatively. These initiatives,  focussing on building capacity and nurturing leadership in the Indic  communities, will ensure that growth is sustained beyond the CIS-A2K  program.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Nurturing_Mediawiki_and_Tech_Talent_in_Indic_Communities" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Nurturing Mediawiki and Tech Talent in Indic Communities"&gt;Nurturing Mediawiki and Tech Talent in Indic Communities&lt;/a&gt;:  Through this initiative CIS-A2K aims to make the Indic Wikimedia  communities relatively more self-reliant in addressing minor technical  issues through nurturing and building community level technical  leadership. This could go a long way in reducing excessive dependency on  the Engineering resources and will help the Indic communities in  building strong technical liaison with the Media Wiki global community  and the WMF Engineer team. The detailed plan is available &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Nurturing_Mediawiki_and_Tech_Talent_in_Indic_Communities" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Nurturing Mediawiki and Tech Talent in Indic Communities"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/TTT_Program" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/TTT Program"&gt;Wikimedia Train the Trainer Program, CIS-A2K&lt;/a&gt;:  The program will help build capacity and enable community members to  conduct outreach sessions independently or with minimal support to  introduce Wikipedia to prospective editors in their respective Indian  languages. See &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/TTT_Program" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/TTT Program"&gt;here&lt;/a&gt; for a detailed design of this initiative.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Wiki-Data_India_Marathon" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Wiki-Data India Marathon"&gt;Wiki-Data India Marathon&lt;/a&gt;:  Wikidata India Marathon will be a month long travelling event (or a set  of events) across India. The primary objective of this marathon will be  to introduce Wikidata to various Indic Wikimedia communities and show  how it can be used and what benefits it has. For more details see &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Wiki-Data_India_Marathon" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Wiki-Data India Marathon"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Stand-alone Wikimedia Projects&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Many project ideas came up as potential opportunities and as unplanned  outcomes of our work during the last year. Based on an internal  evaluation and thorough due-diligence we have short-listed some projects  that could have high rate of success and learning. We propose to take  up 8 such projects as stand-alone Wikimedia projects during this work  plan period. These stand-alone projects will have clear deliverables in a  limited span of time, and will help us understand how to take up bigger  initiatives in the respective language.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Med_GLAM_Project" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Med GLAM Project"&gt;Med GLAM Project at Calicut Medical College&lt;/a&gt;:  The main objective of this project is to create, curate and make openly  available images from the Department of Pathology, Calicut Medical  College (CMC) for the benefit of medical and para-medical students and  staff of CMC specifically and for the larger medical fraternity across  the world, using free/open knowledge database &lt;a class="extiw" href="https://commons.wikimedia.org/wiki/Main_Page" title="commons:Main Page"&gt;Wikimedia Commons&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Wiki_Loves_Public_Art_%28India%29" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Wiki Loves Public Art (India)"&gt;Wiki Loves Public Art (India)&lt;/a&gt;:  This is a photography competition that seeks to get photographs of  works of public art on Wikipedia. The competition is modelled on Wiki  Loves Monuments (WLM) which has been running successfully since 2010. We  plan to execute this in active collaboration with &lt;a class="text external" href="http://wiki.wikimedia.in/City_and_Language_SIG_subcommittee_chair#GLAM" rel="nofollow"&gt;WMIN GLAM SIG&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/100_Books_on_Gujarati_Wikisource" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/100 Books on Gujarati Wikisource"&gt;100 Books on Gujarati Wikisource&lt;/a&gt;:  The main objective of this project is to add significant content to  Gujarati Wikisource using OCR. This project will be executed in  collaboration with Gujarati Wikimedia community, WMIN Chapter, Forbes  Gujarati Sabha (which will provide access to copyright free Gujarati  content to be put up on Gujarati Wikisource) and The Maharaja Sayajirao  University, Baroda.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Urdu_WEP_at_MANUU" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Urdu WEP at MANUU"&gt;Urdu Wikipedia Education Program at MANUU&lt;/a&gt;: This project aims to roll out Wikipedia Educational Programme aimed at the students of &lt;a class="text external" href="https://en.wikipedia.org/wiki/Maulana_Azad_National_Urdu_University"&gt;Maulana Azad National Urdu University, Hyderabad&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Odia_Wikisource_as_OER" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Odia Wikisource as OER"&gt;Odia Wikisource as OER&lt;/a&gt;:  This project aims to make Odia Wikisource a live project. Towards this  three things will be done by CIS-A2K. First, to get a major Odia  author's (Dr. Jagannath Mohanty) content re-released under CC-BY-SA 3.0  and to host it on Odia Wikisource. Second, with the help of Kalinga  Institute of Social Sciences undertake a project whereby the students  will type and proof read the books on Odia Wikisource, which could be  used as OER across various educational institutions. Third, the  digitized children's literature in Odia will be freely distributed  across the government schools in an offline form. This project is  inspired by the Malayalam Wikimedia community's efforts of introducing  Wikisource in schools as part of the IT at Schools program in Kerala.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Making_the_Tulu_Wikipedia_Live" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Making the Tulu Wikipedia Live"&gt;Making the Tulu Wikipedia Live&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Making_the_Santali_Wikipedia_Live" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Making the Santali Wikipedia Live"&gt;Making the Santali Wikipedia Live&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Telugu_Wiki_Bus" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Telugu Wiki Bus"&gt;Telugu Wiki Bus&lt;/a&gt;:  This pilot project aims to create massive awareness about Indic  Wikimedia projects in smaller cities and towns. This is modelled on the  Google bus program and will be implemented in the Telugu speaking region  of Andhra Pradesh.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Creating Movement Resources&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Once CIS-A2K began actively working with the Indic Wikimedia  communities, it soon realized that unlike English there are not many  Wikimedia related resources available in Indic languages. During the  last year we produced some resources, which were mostly unplanned  outcomes. However, we feel that there is an urgent need for concerted  efforts to create resources to strengthen the Wikimedia movement in  India and in Indic languages. We strongly believe that creating these  movement resources will go a long way in growing and strengthening the  Wikimedia volunteers beyond the limits of CIS-A2K program. Some of the  activities in this plan have a larger fit with the larger institutional  work of CIS in the domain of Intellectual Property Rights and Openness.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;We will collaborate with the legal expertise within CIS in executing  some of these activities. A detailed plan of activities under this  initiative along with a budget can be seen &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Creating_Movement_Resources" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Creating Movement Resources"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Publicity, Research and Documentation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Many of the Indic Wikimedia projects in spite of being in existence for  more than 10 years have not received adequate publicity. Many of the  long time Indic Wikimedia volunteers have, during our interactions,  expressed the need to increase the publicity about the Indic Wikimedia  projects so that there is increased public awareness. CIS-A2K has left  no stone unturned to get print and electronic media publicity for Indic  Wikimedia projects and communities duirng 2013-14. Because of our  efforts there were about 100 news items the print media&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;and about 10 programs on electronic media&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;in the last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also the Wikimedia movement in India could benefit with more systematic  research and documentation. It should be noted that CIS has been doing  research about the Wikimedia movement way before the Access to Knowledge  program got a grant from Wikimedia Foundation. Researching on various  elements of the Wikimedia movement is not something new for CIS and the  team will continue its efforts in this direction. In addition to action  research, we undertook systematic documentation of the movement during  the last year. More intensive efforts will be put in Publicity, Research  and Documentation of the Wikimedia movement in India during this year  as per the plans discussed &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Publicity,_Research_and_Documentation" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Publicity, Research and Documentation"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;General Support and Service to the Movement&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K deeply believes in extending support and service to the  Wikimedia volunteer community in India. This has been one of the  important aspects of our work. We have honoured up to 100 requests of  all sizes that we received from the Wikimedia volunteer communities  across all Indic languages. Most of these requests are listed &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Requests" title="India Access To Knowledge/Requests"&gt;here&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Requests" title="Talk:India Access To Knowledge/Requests"&gt;here&lt;/a&gt;.  CIS-A2K also receives requests over e-mail and some community members  do reach out to us over mobile phones to place requests. In general the  quick response time of CIS-A2K to these requests has been appreciated by  many of the community members. We would like to continue with our  efforts in supporting and serving the Wikimedia community in India and  maintain the quick response time. CIS-A2K has actively consulted with  the Wikimedia India Chapter (WMIN) before supporting most of the  community requests, especially when it involved allocating funds for  large community events like &lt;a class="extiw" href="https://en.wikipedia.org/wiki/ta:%E0%AE%B5%E0%AE%BF%E0%AE%95%E0%AF%8D%E0%AE%95%E0%AE%BF%E0%AE%AA%E0%AF%8D%E0%AE%AA%E0%AF%80%E0%AE%9F%E0%AE%BF%E0%AE%AF%E0%AE%BE:%E0%AE%A4%E0%AE%AE%E0%AE%BF%E0%AE%B4%E0%AF%8D_%E0%AE%B5%E0%AE%BF%E0%AE%95%E0%AF%8D%E0%AE%95%E0%AE%BF%E0%AE%AA%E0%AF%8D%E0%AE%AA%E0%AF%80%E0%AE%9F%E0%AE%BF%E0%AE%AF%E0%AE%BE_%E0%AE%AA%E0%AE%A4%E0%AF%8D%E0%AE%A4%E0%AE%BE%E0%AE%A3%E0%AF%8D%E0%AE%9F%E0%AF%81%E0%AE%95%E0%AE%B3%E0%AF%8D_%E0%AE%A8%E0%AE%BF%E0%AE%B1%E0%AF%88%E0%AE%B5%E0%AF%81%E0%AE%95%E0%AF%8D_%E0%AE%95%E0%AF%82%E0%AE%9F%E0%AE%B2%E0%AF%8D,_%E0%AE%9A%E0%AF%86%E0%AE%A9%E0%AF%8D%E0%AE%A9%E0%AF%88/en" title="w:ta:விக்கிப்பீடியா:தமிழ் விக்கிப்பீடியா பத்தாண்டுகள் நிறைவுக் கூடல், சென்னை/en"&gt;Tamil Wikipedia 10th anniversary&lt;/a&gt; celebrations. We also ensure that supporting community events is done  in a transparent manner. However, we would need to review our methods  and further streamline systems of support, which will be worked up on  during this year. &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/General_Support_and_Service_to_the_Movement" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/General Support and Service to the Movement"&gt;&lt;b&gt;This page&lt;/b&gt;&lt;/a&gt; will give more details about the proposed work.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Learning and Evaluation&lt;/h2&gt;
&lt;p&gt;Based on discussions with the Wikimedia India Chapter EC and with some  members of the Wikimeda community, the A2K programme had put together  some evaluation tools to assess the impact of its work during the last  year. We have included some more metrics for evaluation this year.&lt;/p&gt;
&lt;h3&gt;Evaluation Tools&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Quarterly growth of no. of articles&lt;/li&gt;
&lt;li&gt;Quarterly growth of no. of total editors&lt;/li&gt;
&lt;li&gt;Quarterly growth of no. of new editors&lt;/li&gt;
&lt;li&gt;Quarterly growth of no. of active editors&lt;/li&gt;
&lt;li&gt;Quarterly growth of no. of very active editors&lt;/li&gt;
&lt;li&gt;No. of page views&lt;/li&gt;
&lt;li&gt;No. of articles &amp;lt; 2 KB &amp;lt; 5 KB&lt;/li&gt;
&lt;li&gt;No. of new tools/gadgets made available during a time-slice&lt;/li&gt;
&lt;li&gt;No. of mentoring interactions&lt;/li&gt;
&lt;li&gt;No. of bugs filed and resolved&lt;/li&gt;
&lt;li&gt;No. of edits (Article, Other mainspace edits)&lt;/li&gt;
&lt;li&gt;Print and electronic media mentions&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Reports&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We will undertake quarterly and annually review of its work using the  above evaluation tools. The team will also report the successes and  learnings to the Wikimedia India &amp;amp; the global community. In addition  to this the A2K team will actively review progress of each language  area plan in collaboration with the respective Wikimedia community.  Based on this feedback we will undertake mid-course corrections, should  there be a need. This will be openly shared on the respective plan  discussion pages on Meta. In addition to this, A2K will continue to  publish monthly newsletter informing the larger community of the various  activities A2K has undertaken in a certain month and is planning to  undertake in the upcoming month. Towards the the end of the grant, A2K  will share an impact report encompassing analysis of all year long work  done by A2K. To summarize following reports will be published in the  year of 2014 - 2015:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quarterly Report 1 (July 2014 - October 2014)&lt;/li&gt;
&lt;li&gt;Quarterly Report 2 (November 2014 - February 2015)&lt;/li&gt;
&lt;li&gt;Quarterly Report 3 (March 2015 - June 2015)&lt;/li&gt;
&lt;li&gt;Impact Report (July 2014 - June 2015)&lt;/li&gt;
&lt;li&gt;Monthly Newsletters&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Monthly Review and Learning Sessions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K conducted many weekly learning sessions to critically reflect on  the successes and failures of our work internally. We had also used  these weekly sessions to learn about new developments (tools, policies,  etc) in the Wikimedia universe. However, this could not be sustained for  a long period. We will take measures to revive this and make it a  monthly exercise, which we will try to record or screen cast on CIS  website. Simultaneously we will use this to do a monthly review of the  progress of the various plans and discuss about the upcoming month's  events.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Budget&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As stated above in the methodology section, each of the 21 plans have an  independent budget, which is closely mapped on to the implementation  plan. Below we have give a concise picture of the budget requirements  against the 6 verticals. As part of the WMF's grant to CIS, we have  received Rs. 15,000,000.00 or US$ 242,178.00 during the last year. The  proposed budget of Rs. 18,406,454.00 or US$ 297.831.00 is about 23 per  cent more than the previous year's grant.&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Sl. No.&lt;/th&gt;&lt;th&gt;Budget Item&lt;/th&gt;&lt;th&gt;FDC (INR)&lt;/th&gt;&lt;th&gt;FDC (US$)&lt;/th&gt;&lt;th&gt;Other Sources and in kind support (INR)&lt;/th&gt;&lt;th&gt;Other Sources and in kind support (US$)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;1&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Language_Area_Work_Plans" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;Language Area Plans&lt;/a&gt;&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 7,466,440.00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;120,813.05338&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Rs. 2,100,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;33,979.70279&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;2&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Community_Strengthening_Initiatives" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;Community Strengthening Initiatives&lt;/a&gt;&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 2,610,400.00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;42,238.3886&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Rs. 200,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;3,236.16217&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Stand-alone_Wikimedia_Projects" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;Stand Alone Wikimedia Projects&lt;/a&gt;&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 2,584,300.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;41,816.06949&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 2,495,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;40,371.12308&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Creating_Movement_Resources#Budget_.26_Resources" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Creating Movement Resources"&gt;Creating Movement Resources&lt;/a&gt;&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 1,188,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;19,222.80329&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 2,400,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;38,833.94605&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Publicity,_Research_and_Documentation#Budget_.26_Resources" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Publicity, Research and Documentation"&gt;Publicity, Research &amp;amp; Documentation&lt;/a&gt;&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 780,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;12,621.03247&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 0.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;0.00000&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;&lt;b&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/General_Support_and_Service_to_the_Movement#Budget_.26_Resources" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/General Support and Service to the Movement"&gt;General Support and Service to the Movement&lt;/a&gt;&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 636,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;10,290.99570&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 0.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;0.00000&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Other Expenses&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 1,468,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;23,753.43033&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 2,964,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;47,959.92337&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Total before Institutional Development&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 16,733,140.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;270,755.77331&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 10,159,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;164,380.85745&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Institutional Development (10%)&lt;/td&gt;
&lt;td style="text-align: right; "&gt;Rs. 1,673,314.00&lt;/td&gt;
&lt;td style="text-align: right; "&gt;27,075.57733&lt;/td&gt;
&lt;td style="text-align: right; "&gt;Rs. 0.00&lt;/td&gt;
&lt;td style="text-align: right; "&gt;0.00000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;TOTAL BUDGET&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 18,406,454.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;297,831.35064&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;Rs. 10,159,000.00&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;164,380.85745&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Other than item no. 7 and 8 the entire budget will go towards the  programmatic implementation of the plans. The staff costs are not  separately listed here as we see the CIS-A2K team as a programmatic  investment and each of the team member's time is budgeted against a  specific activity or plan. We propose to raise Rs. 10,159,000.00 or US$  163,380.00 other sources and in-kind support towards executing this work  plan. A detailed budget analysis is &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Budget" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Budget"&gt;available here&lt;/a&gt;. Please &lt;a class="external text" href="https://docs.google.com/spreadsheet/ccc?key=0AshSF7ZKRBR5dGpMUnNKdHItUFJGMHluQUFxZGRHMmc&amp;amp;usp=sharing" rel="nofollow"&gt;&lt;b&gt;See this google spreadsheet &lt;/b&gt;&lt;/a&gt;which gives a micro level picture of the Budget against each of the planned activity.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Giving Feedback&lt;/h2&gt;
&lt;p&gt;We appreciate your valuable feedback. However, for the sake of  structured engagement by everyone, we request you to consider the  following before you share your feedback.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;For feedback on the overall A2K Work Plan you can write &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For feedback on respective Language area plans, please write on the discussion page of the respective language plan.&lt;/li&gt;
&lt;/ul&gt;
&lt;dl&gt;&lt;dd&gt; 
&lt;ul&gt;
&lt;li&gt;For &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Bangla" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Bangla"&gt;&lt;b&gt;Bangla&lt;/b&gt;&lt;/a&gt; plan &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Bangla" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/Bangla"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Hindi" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Hindi"&gt;&lt;b&gt;Hindi&lt;/b&gt;&lt;/a&gt; plan &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Hindi" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/Hindi"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Kannada" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Kannada"&gt;&lt;b&gt;Kannada&lt;/b&gt;&lt;/a&gt; plan &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Kannada" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/Kannada"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Konkani" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Konkani"&gt;&lt;b&gt;Konkani&lt;/b&gt;&lt;/a&gt; plan &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Konkani" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/Konkani"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Marathi" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Marathi"&gt;&lt;b&gt;Marathi&lt;/b&gt;&lt;/a&gt; plan &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Marathi" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/Marathi"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Odia" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Odia"&gt;&lt;b&gt;Odia&lt;/b&gt;&lt;/a&gt; plan &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Odia" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/Odia"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Telugu" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Telugu"&gt;&lt;b&gt;Telugu&lt;/b&gt;&lt;/a&gt; plan &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Telugu" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/Telugu"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/dd&gt;&lt;/dl&gt; 
&lt;ul&gt;
&lt;li&gt;For feedback on &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Community_Strengthening_Initiatives" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;&lt;b&gt;Community Strengthening initiatives&lt;/b&gt;&lt;/a&gt;, please write on discussion page of the respective project page.&lt;/li&gt;
&lt;li&gt;For feedback on &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015#Stand-alone_Wikimedia_Projects" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015"&gt;&lt;b&gt;Stand-alone Wikimedia Projects&lt;/b&gt;&lt;/a&gt;, please write on discussion page of the respective project page.&lt;/li&gt;
&lt;li&gt;For feedback on &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Creating_Movement_Resources" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Creating Movement Resources"&gt;&lt;b&gt;Creating Movement Resources&lt;/b&gt;&lt;/a&gt;, please write &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Creating_Movement_Resources" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/Creating Movement Resources"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For feedback on &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Publicity,_Research_and_Documentation" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/Publicity, Research and Documentation"&gt;&lt;b&gt;Publicity, Research and Documentation&lt;/b&gt;&lt;/a&gt;, please write &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/Publicity,_Research_and_Documentation" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/Publicity, Research and Documentation"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;For feedback on &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/General_Support_and_Service_to_the_Movement" title="India Access To Knowledge/Draft Work plan July 2014 - June 2015/General Support and Service to the Movement"&gt;&lt;b&gt;General Support and Service to the Movement&lt;/b&gt;&lt;/a&gt;, please write &lt;a href="https://meta.wikimedia.org/wiki/Talk:India_Access_To_Knowledge/Draft_Work_plan_July_2014_-_June_2015/General_Support_and_Service_to_the_Movement" title="Talk:India Access To Knowledge/Draft Work plan July 2014 - June 2015/General Support and Service to the Movement"&gt;&lt;b&gt;here&lt;/b&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Alternatively you could also share your feedback over e-mail at  vishnu at cis-india.org. Please use the subject line Feedback on Work  Plan.&lt;/li&gt;
&lt;li&gt;Should you feel the need to discuss any aspect of the plan before  sharing your feedback, please write to us and we can set up a  telephone/Skype call.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;h2&gt;Notes&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;span class="reference-text"&gt;CIS supports the Centre for Communication  Governance at National Law University through a fellowship and  participation on the advisory board; CIS supports the open data  community through support for the founders of Data Meet; CIS is  supporting venue costs for some of Cyber Security and Privacy  Foundation's outreach programmes; CIS has supported the last edition of  the Goa Project; CIS allows various groups to use its Bangalore and  Delhi offices for meetings such as Null Con Bangalore, Bitcoin Delhi,  Arduino, Dojo, Crypto Party and Maker Party communities. In the past,  CIS has hosted Inclusive Planet India and Has Geek at its Bangalore  office.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;span class="reference-text"&gt;See the discussion in this &lt;a class="external text" href="http://techcrunch.com/2013/08/06/indian-languages-drive-wikipedia-growth/" rel="nofollow"&gt;TechCrunch article&lt;/a&gt;. Also see &lt;a href="https://cis-india.org/a2k/blog/indian-language-wikipedia-statistics" class="external text" rel="nofollow"&gt;this blog&lt;/a&gt; which inspired TechCrunch to do a feature about the growth of Indic Wikipedia projects.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].  &lt;span class="reference-text"&gt;&lt;a href="https://cis-india.org/openness/" class="external text" rel="nofollow"&gt;Openness initiative at CIS&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;span class="reference-text"&gt;All the four foucs language areas during  the last year's plan received significant print media coverage because  of CIS-A2K's efforts. In addition, even the mainstream English print  media did stories on indic Wikimedia projects, which was unprecedented.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].&lt;span class="reference-text"&gt;There were 6 television programs and 1  radio program on Telugu Wikipedia and 2 television programs and 1 radio  interview on Kannada Wikipedia.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/india-access-to-knowledge-draft-work-plan-july-2014-june-2015'&gt;https://cis-india.org/openness/blog-old/india-access-to-knowledge-draft-work-plan-july-2014-june-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vishnu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-04-08T09:51:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/enabling-elections">
    <title>Enabling Elections</title>
    <link>https://cis-india.org/accessibility/blog/enabling-elections</link>
    <description>
        &lt;b&gt;For making the 2014 General Elections in India participatory and accessible for voters with disabilities the Centre for Law and Policy Research and the Centre for Internet and Society have come up with a report. The report addresses the barriers that people with disabilities face during elections and recommends solutions for the same.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Executive Summary&lt;/h2&gt;
&lt;p&gt;The report examines three main areas:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The barriers that people with disabilities face at the time of elections.&lt;/li&gt;
&lt;li&gt;The legal framework around this issue.&lt;/li&gt;
&lt;li&gt;The measures which need to be taken to eliminate the barriers in the pre-voting phase, during voting phase and also post-voting phase, so as to enhance the participation of voters with disabilities.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Access to the public sphere and full political participation is a matter of right for persons with disabilities and the state is constitutionally mandated to enforce this right. The rights of voters with disabilities are examined under the constitutional provisions, the Representation of People’s Act 1951, the relevant directions of the Supreme Court and the international conventions. This report also considers international best practices while making recommendations, to the extent that they are suitable and practical in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report looks at Electoral Participation in two dimensions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;“Pre-electoral Participation” and&lt;/li&gt;
&lt;li&gt;“Actual Electoral Participation”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The report then goes on to make recommendations for enhancing accessibility in both these categories.&lt;/p&gt;
&lt;p&gt;On Pre-electoral Participation, the report inter alia recommends the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Opportunities for people with disabilities to participate in public consultations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Immediate outreach programs for higher voter registrations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Making election material and candidate guides available in different formats such as large print, Braille and audio formats upon request so that voters can have full knowledge of the candidate they want to vote for.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Providing information for voters about locations which have special access, wheelchair facilities, technological assistance for visually impaired, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;On Actual Electoral Participation, we inter alia recommend the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Accessible polling sites.&lt;/li&gt;
&lt;li&gt;Training election staff to be sensitive to diverse needs of voters.&lt;/li&gt;
&lt;li&gt;Enabling privacy and independent voting by persons with disabilities.&lt;/li&gt;
&lt;li&gt;Arranging for mobile polling booths.&lt;/li&gt;
&lt;li&gt;Making EVM’s compatible and accessible such as by providing for Braille, large print.&lt;/li&gt;
&lt;li&gt;Tactile buttons, 'sip and puff' and audio devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The report also recommends the need to monitor participation of voters with disabilities in the forthcoming elections.There is a need to collect data, surveys and studies in the pre-election, election and post-election phases.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/accessibility/blog/enabling-elections.pdf" class="internal-link"&gt;Click here&lt;/a&gt; to download and read the full report (PDF, 4.5 MB)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/enabling-elections'&gt;https://cis-india.org/accessibility/blog/enabling-elections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-05-10T00:12:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune">
    <title>Institute for Internet &amp; Society 2014, Pune</title>
    <link>https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune</link>
    <description>
        &lt;b&gt;Last month, activists, journalists, researchers, and members of civil society came together at the 2014 Institute for Internet &amp; Society in Pune, which was hosted by CIS and funded by the Ford Foundation. The Institute was a week long, in which participants heard from speakers from various backgrounds on issues arising out of the intersection of internet and society, such as intellectual property, freedom of expression, and accessibility, to name a few. Below is an official reporting summarizing sessions that took place.&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;iframe frameborder="0" height="500" src="http://www.slideflickr.com/iframe/J3JYk2bm" width="700"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;Day One&lt;/h1&gt;
&lt;p&gt;February 11, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 9.40 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction: Sunil Abraham, &lt;i&gt;Executive Director Centre for Internet and Society&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00 a.m. – 10.15 a.m.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction of Participants&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.15 a.m. – 12.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Internet Governance and Privacy: Sunil Abraham&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.00 p.m. – 12.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.30 p.m. – 1.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Keynote: Bishakha Datta, &lt;i&gt;Filmmaker and Activist, and Board Member, Wikimedia Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.00 p.m. – 2.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Participant Presentations&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea Break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Histories, Bodies and Debates around the Internet:   Nishant Shah, &lt;i&gt;Director-Research, CIS&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This year’s Internet Institute, hosted by the Centre for Internet &amp;amp; Society (CIS), kicked off in Pune to put a start to a week of learnings and discussions surrounding internet usage and its implications on individuals of society. Twenty two attendees from all over India attended this year, from backgrounds of activism, journalism, research and advocacy work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Attendees were welcomed by&lt;b&gt; Dr. Ravina Aggarwal&lt;/b&gt;, Program Officer for Media Rights &amp;amp; Access at the Ford Foundation, the event’s sponsor, who started off the day by introducing the Foundation’s initiatives in pursuit of bridging the digital divide by addressing issues of internet connectivity.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DSC_0050.JPG/image_preview" title="Pune_Sunil" height="243" width="367" alt="Pune_Sunil" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Governance &amp;amp; Privacy&lt;/b&gt;, Sunil Abraham &lt;br /&gt;The Institute’s first session was led by &lt;b&gt;Sunil Abraham&lt;/b&gt;,  Executive Director of CIS, and engaged with issues of internet  governance and privacy with reference to four stories: 1) a dispute  between tweeters from the US and those in South Africa over the use of  hashtag &lt;a href="http://www.thoughtleader.co.za/khayadlanga/2009/11/05/yesterday-a-short-lived-war-broke-out-between-america-and-south-africa/comment-page-1/"&gt;#thingsdarkiesays&lt;/a&gt;, which is said not to be as racially derogatory as it is in the US; 2) Facebook’s contested policies on &lt;a href="http://www.zdnet.com/blog/facebook/facebook-clarifies-breastfeeding-photo-policy/8791"&gt;photos featuring users breastfeeding&lt;/a&gt;, 3) a lawsuit between &lt;a href="http://www.theguardian.com/environment/2010/jul/26/tata-sue-greenpeace-turtle-game"&gt;Tata and Greenpeace&lt;/a&gt; over the organization’s use of Tata’s logo in a video game created for  public criticism of their environmentally-degrading practices, and  lastly, 4) the case of &lt;a href="http://en.wikipedia.org/wiki/Savita_Bhabhi"&gt;Savita Bhabhi&lt;/a&gt;,  an Indian pornographic cartoon character which had been banned by  India’s High Court and which had served as a landmark case in expanding  the statutory laws for what is considered to be pornographic.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Each of these stories has one major thing in common: due to their nature of taking place over the internet, they are not confined to one geographic location and in turn, are addressed at the international level. The way by which an issue as such is to be addressed cuts across State policies and internet intermediary bodies to create quite a messy case in trying to determine who is at fault. Such complexity illustrates how challenging internet governance can be within today’s society that is no longer restricted to national or geographic boundaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil also goes on in explaining the relationship between privacy, transparency, and power, summing it up in a simple formula; &lt;b&gt;privacy protection s&lt;/b&gt;hould have a &lt;i&gt;reverse&lt;/i&gt; relationship to &lt;b&gt;power&lt;/b&gt;—the more the power, the less the privacy one should be entitled to. On the contrary, a &lt;i&gt;direct correlation&lt;/i&gt; goes for &lt;b&gt;power&lt;/b&gt; and &lt;b&gt;transparency&lt;/b&gt;—the more the power, the more transparent a body should be. Instead of thinking about these concepts as a dichotomy, Sunil suggests to see them as absolute rights in themselves—instrumental in policies and necessary to address power imbalances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Web We Want&lt;/b&gt;, Bishakha Datta&lt;br /&gt;The Institute’s kickoff was also joined by Indian filmmaker and activist, &lt;b&gt;Bishakha Datta&lt;/b&gt;, who had delivered the keynote address. Bishakha bridged together notions of freedom of speech, surveillance, and accessibility, while introducing campaigns that work to create an open and universally accessible web, such as the &lt;a href="https://webwewant.org/"&gt;Web We Want&lt;/a&gt; and &lt;a href="http://www.sexualityanddisability.org/"&gt;Sexuality and Disability&lt;/a&gt;. Bishakha stresses how the internet as a space has altered how we experience societal constructs, which can be easily exhibited in how individuals experience Facebook in the occurrence of a death, for example. Bishakha initiated discussion among participants by posing questions such as, “what is our expectation of privacy in this brave new world?” and “what is the society we want?” to encompass the need to think of privacy in a new way with the coming of the endless possibilities the internet brings with it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Histories, Bodies and Debates around the Internet&lt;/b&gt;, Nishant Shah&lt;br /&gt;CIS Research Director, &lt;b&gt;Nishant Shah&lt;/b&gt;, led a session examining internet as a technology more broadly, and our understandings of it in relation to the human body. Nishant proposes the idea that history is a form of technology, as well as time, itself, for which our understanding only comes into being with the aid of technologies of measurement. Although we are inclined to separate technology from the self, Nishant challenges this notion while suggesting that technology is very integral to being human, and defines a “cyborg” as someone who is very intimate with technology. In this way, we are all cyborgs. While making reference to several literary pieces, including Haraway’s &lt;i&gt;Cyborg: Human, Animus, Technology&lt;/i&gt;; Kevin Warwick’s &lt;i&gt;Living Cyborg&lt;/i&gt;; and Watt’s small world theory, Nishant challenges participants’ previous notions of how one is to understand technology in relation to oneself, as well as the networks we find ourselves implicated within.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also brought forth by Nishant, was the fact that the internet as a technology has become integral to our identities, making &lt;i&gt;us&lt;/i&gt; accessible (rather than us solely making the technology accessible) through online forms of documentation. This digital phenomenon in which we tend to document what we know and experience as a means of legitimizing it can be summed in the modern version of an old fable: “If a tree falls in a lonely forest, and nobody tweets it, has it fallen?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant refers to several case studies in which the use of online technologies has created a sense of an extension of the self and one’s personal space; which can then be subject to violation as one can be in the physical form, and to the same emotional and psychological effect—as illustrated within the 1993 occurrence referred to as “&lt;a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace"&gt;A Rape in Cyberspace&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Attendee Participation&lt;/b&gt;&lt;br /&gt;Participants remained engaged and enthusiastic for the duration of the day, bringing forth their personal expertise and experiences. Several participants presented their own research initiatives, which looked at issues women face as journalists and as portrayed by the media; amateur pornography without the consent of the woman; study findings on the understandings of symptoms of internet addiction; as well as studies looking at how students engage with college confession pages on Facebook.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Two&lt;/h1&gt;
&lt;p&gt;February 12, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wireless Technology: Ravikiran Annaswamy, &lt;i&gt;CEO and Co-founder at Teritree   Technologies&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wired Technology: Ravikiran Annaswamy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Network, Threats and Securing Yourself: Kingsley   John, &lt;i&gt;Independent Consultant&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea Break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Practical Lab: Kingsley John&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;4.45 p.m. – 5.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wrap-up: Sunil Abraham&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Day Two of the Institute entailed a  more technical orientation to “internet &amp;amp; society” across sessions.  Participants listened to speakers introduce concepts related to wired  and wireless internet connectivity devices and their networks, along  with the network of internet users and how one may secure him or herself  while “online.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wireless &amp;amp; Wired Technology&lt;/b&gt;, Ravikiran Annaswamy&lt;br /&gt;Senior industry practitioner, &lt;b&gt;Ravikiran Annaswamy&lt;/b&gt; had aimed to enable the Institute’s participants to “understand the  depth and omnipresent of telecom networks” that we find ourselves  implicated within. Ravikiran went through the basics of these  networks—including fixed line-, mobile-, IP-, and Next Generation  IP-networks—as well as the technical structuring of wired and wireless  broadband. Many participants found this session to be particularly  enriching as their projects aimed to provide increased access to  internet connectivity to marginalized areas in India, and had been  without the know-how to go about it.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/5.JPG/image_preview" alt="Pune_Participants" class="image-inline image-inline" title="Pune_Participants" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Network, Threats and Securing Yourself&lt;/b&gt;, Kinglsey John&lt;br /&gt;An instructional session on how to protect oneself was given by &lt;b&gt;Kingsley John&lt;/b&gt;, beginning with a lesson on IP Addresses—what they are and the different generations of such, and how IP addresses fit into a broader internet network. Following, Kingsley demonstrated and explained &lt;a href="http://www.slideshare.net/lupucosmin/encrypting-emails-using-kleopatra-pgp"&gt;email encryption through the use of software, Kleopatra&lt;/a&gt;, and how it may be used to generate keys to &lt;a href="http://thehackernews.com/2014/01/PGP-encryption-Thunderbird-Enigmail_12.html"&gt;encrypt emails through Thunderbird mail client&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Evening Discussion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A handful of participants voluntarily partook in an evening discussion, looking at the role of big players in the global internet network, such as Google and Facebook, how they collect and utilize users’ data, and what sorts of measures can be taken to minimize the collecting of such. Due to the widely varying backgrounds of interest among participants, those coming from this technical orientation towards the internet were able to inform their peers on relevant information and types of software that may be found useful related to minimizing one’s online presence.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Three&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;February 13, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.30 a.m. –   11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Free Software: Prof. G. Nagarjuna, &lt;i&gt;Chairperson, Free Software Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00 a.m. –   11.15 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Open Data: Nisha Thompson, &lt;i&gt;Independent Consultant&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.45 p.m. –   1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Freedom of Expression: Bhairav Acharya, &lt;i&gt;Advocate and Adviser, Centre for Internet   and Society&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Copyright: Nehaa Chaudhari, &lt;i&gt;Program Officer, Centre for Internet and Society&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The third day of the Internet Institute incorporated themes presented by speakers ranging from free software, to freedom of expression, to copyright.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Free Software&lt;/b&gt;, Prof. G. Nagarjuna&lt;br /&gt;Chairman on the Board of Directors for the Free Software Foundation of India, &lt;b&gt;Professor G. Nagarjuna&lt;/b&gt; shared with the Institute’s participants his personal expertise on &lt;b&gt;software freedom&lt;/b&gt;. Nagarjuna mapped for us the network of concepts related to software freedom, beginning with the origins of the &lt;b&gt;copyleft movement&lt;/b&gt;, and also touching upon the art of hacking, the &lt;b&gt;open source movement&lt;/b&gt;, and what role software freedom plays in an interconnected world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nagarjuna looks at the free software movement as a political movement in the digital space highlighting the &lt;a href="http://www.gnu.org/philosophy/free-sw.html"&gt;user’s freedoms&lt;/a&gt; associated to the use, distribution, and modification of software for the greater good for all. This is said to distinguish this movement from that of Open Source—a technical and more practical development-oriented movement. The free software movement is not set out to compromise the fundamental issues for the sake of being practical and in that sense, ubiquitous. Instead, its objective is “not to make everybody &lt;i&gt;use&lt;/i&gt; the software, but to have them understand &lt;i&gt;why&lt;/i&gt; they are using the software,” so that they may become “authentic citizens that can also resonate &lt;i&gt;why &lt;/i&gt;they’re doing what they’re doing. We want them to understand the ethical and political aspects of doing so,” Nagarjuna says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Data&lt;/b&gt;, Nisha Thompson&lt;br /&gt;Participants learned from &lt;b&gt;Nisha Thompson&lt;/b&gt; on Open Data; what it is, its benefits, and how it is involved in central government initiatives and policy, as well as civil society groups—generally for uses such as serving as evidence for decision making and accountability. Nisha explored challenges concerning the use of open data, such as those pertaining to privacy, legitimacy, copyright, and interoperability. The group looked at the &lt;a href="http://www.indiawaterportal.org/"&gt;India Water Portal&lt;/a&gt; as a case study, which makes accessible more than 300 water-related datasets already available in the public space for use from anything from sanitation and agriculture to climate change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Freedom of Expression&lt;/b&gt;, Bhairav Acharya&lt;br /&gt;&lt;b&gt;Bhairav Acharya&lt;/b&gt;, a constitutional lawyer, traced the development of the freedom of speech and expression in India. Beginning with a conceptual understanding of censorship and the practice of censorship by the state, society, and the individual herself, Bhairav examines the limits traditionally placed by a nation-state on the right to free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, modern free speech and censorship law was first formulated by the colonial British government, which broadly imported the common law to India. However, the colonial state also yielded to the religious and communitarian sensitivities of its subjects, resulting in a continuing close link between communalism and free speech in India today. After Independence, the post-colonial Indian state carried forward Raj censorship, but tweaked it to serve to a nation-building and developmental agenda. Nation-building and nationalism are centrifugal forces that attempt to construct a homogenous 'mainstream'; voices from the margins of this mainstream (the geographical, ethnic, and religious peripheries) and of the marginalised within the mainstream (the poor and disadvantaged), are censored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this narrative, Bhairav located and explained the evolution of the law relating to press censorship, defamation, obscenity, and contempt of court. Free speech law applies equally online. Broadly, censorship on the internet must survive the same constitutional scrutiny that is applied to offline censorship; but, as technology develops, the law must innovate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Copyright&lt;/b&gt;, Nehaa Chaudhari&lt;br /&gt;CIS Programme Officer, &lt;b&gt;Nehaa Chaudhari&lt;/b&gt; examined the concept of Copyright as an intellectual property right in discussing its fundamentals, purpose and origins, and Copyright’s intersection with the internet. Nehaa also explained the different exceptions to Copyright, along with its alternatives, such as opposing intellectual property protection regimes, including the Creative Commons and Copyleft. Within this session, Nehaa also introduced several cases in which Copyright came into play with the use of the internet, including Hunter Moore’s “&lt;a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F"&gt;Is Anyone Up&lt;/a&gt;?” website, which had showcased pornographic pictures obtained by submission bringing rise to the phenomenon of “revenge porn.” Instances as such blur the lines of what is commonly referred to as intellectual property, and what specific requirements enables one to own the rights to such.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Four&lt;/h1&gt;
&lt;p&gt;February 14, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;E-Accessibility and Inclusion: Prashant Naik, &lt;i&gt;Union Bank&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Patents: Nehaa Chaudhari&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 2.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fieldwork Assignment&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DSC_0053.JPG/image_preview" alt="Pune_Rohini" class="image-inline" title="Pune_Rohini" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;Day Four of the Internet Institute introduced concepts of  eAccessibilty and Inclusion on the internet for persons with  disabilities, along with patents as an intellectual property right.  Participants were also assigned a fieldwork exercise as a hands-on  activity in which they were to employ what they’ve learned to initiate  conversation with individuals in public spaces and collect primary data  while doing so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;eAccessibility and Inclusion&lt;/b&gt;, Prashant Naik&lt;/p&gt;
&lt;b&gt;Prashant Naik&lt;/b&gt; started off the  day with his session on E-Accessibility and Inclusion. Prashant  illustrated the importance of accessibility and what is meant by the  term. Participants learned of assistive technologies for different  disability types and how to create more accessible word and PDF  documents, as well as web pages for users. Prashant demonstrated to  participants what it is like to use a computer as a visually impaired  individual, which provided for an enriching experience.&lt;/td&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Patents&lt;/b&gt;, Nehaa Chaudhari&lt;b&gt;&lt;br /&gt;Nehaa Chaudhari &lt;/b&gt;led a second session at the Internet Institute on intellectual property rights—this one looking at patents particularly and their role within statutory law. Nehaa traced the historical origins of patents before examining the fundamentals of them, and addresses the questions, “Why have patents? And is the present system working for everyone?” Nehaa also introduced notions of the Commons along with the Anticommons, and perspectives within the debate around software patents, as well as different means by which the law can address the exploitation of patents or “patent thickets”—such as through patent pools or compulsory licensing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Fieldwork Assignment&lt;/b&gt;, Groupwork&lt;br /&gt;Participants were split into groups and required to carry out a mini fieldwork assignment in approaching individuals in varying public spaces in Pune in attempts to collect primary data. Questions asked to individuals were to be devised by the group, so long as they pertained to themes examined within the Internet Institute. Areas visited by groups included the Pune Central Mall, MG Road, and FC Road.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Five&lt;/h1&gt;
&lt;p&gt;February 15, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.30 a.m. –   11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;E-Governance: Manu Srivastav, &lt;i&gt;Vice President, eGovernments Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00 a.m. –   11.15 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Market Concerns: Payal Malik, &lt;i&gt;Economic Adviser, Competition Commission of India&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.45 p.m. –   1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Digital Natives: Nishant Shah&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fieldwork Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Day Five of the Internet Institute  brought with it sessions related to themes of e-governance, market  concerns of telecommunications, and so called “Digital Natives.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;eGovernance&lt;/b&gt;, Manu Srivastava&lt;br /&gt;Vice President of the eGovernments Foundation, &lt;b&gt;Manu Srivastava&lt;/b&gt; led a session on eGovernance—the utilization of the internet as a means  of delivering government services communicating with citizens,  businesses, and members of government. Manu examined the complexities of  the eGovernance and barriers to implementation of eGovernance  initiatives. Within discussion, participants examined the nuanced  relationship between the government and citizens with the incorporation  of other governing bodies in an eGovernance system, as well as new  spaces for corruption to take place.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/19.JPG/image_preview" alt="Pune_Chatting" class="image-inline image-inline" title="Pune_Chatting" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Market Concerns&lt;/b&gt;, Payal Malik&lt;br /&gt;&lt;b&gt;Payal Malik&lt;/b&gt;, Advisor of the Economics Division of the Competition Commission of India shared her knowledge on market concerns of the telecommunications industry, and exclaimed the importance of competition issues in such an industry as a tool to create greater good for a greater number of people. She demonstrated this importance by stating that affordability as a product of increased access can only be possible once there is enough investment, which generally only happens in a competitive market. In this way, we must set the conditions to make competition possible, as a tool to achieve certain objectives. Payal also demonstrated the economic benefits of telecommunications by stating that for every 10% increase in broadband penetration, increase in GDP of 1.3%. She also examined the broadband ecosystem in India and touched upon future possibilities of increased broadband penetration, such as for formers and the education sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Digital Natives&lt;/b&gt;, Nishant Shah&lt;br /&gt;&lt;b&gt;Nishant Shah&lt;/b&gt; shed some light on one of the areas that the Centre for Internet &amp;amp; Society looks at within their research scope, this being the “&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Native&lt;/a&gt;.” As referred to by Nishant, the Digital Native is not to categorize a specific type of internet user, but can be said for simply any person who is performing a digital action, while doing away with this false dichotomy of age, location, and geography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant examines varying case studies in which “the digital is empowering natives to not merely be benefactors of change, but agents of change,” from the &lt;a href="http://blog.blanknoise.org/2012/07/i-never-ask-for-it.html"&gt;Blank Noise Project&lt;/a&gt;’s “I NEVER Ask for it…” campaign in efforts to rethink sexual violence, to &lt;a href="http://www.wherethehellismatt.com/"&gt;Matt Harding&lt;/a&gt;’s foolish dancing with groups of individuals from all over the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As occurrences in the digital realm, however, these often political expressions may be rewritten by the network when picked up as a growing phenomenon, in order to make it accessible to online consumers by the masses. In doing so, the expression is removed from its political context and is presented in the form of nothing more than a fad. For this reason, Nishant stresses the need to become aware of the potential of the internet in becoming an “echo-chamber”—in which forms of expression are amplified and mimicked, resulting in a restructuring of the dynamics surrounding the subject—whether it be videos of &lt;a href="http://en.wikipedia.org/wiki/Back_Dorm_Boys"&gt;boys lipsyncing to Backstreet Boys&lt;/a&gt; in their dorm room going viral, or a strong and malicious movement to punish the Chinese girl who had taken a video of her heinously and wickedly killing a kitten after locating her using the &lt;a href="http://en.wikipedia.org/wiki/Human_flesh_search_engine"&gt;Human Flesh Search Engine&lt;/a&gt;.&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Fieldwork Presentations&lt;/b&gt;, Groupwork&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To end off the day, participant groups presented findings collated from the prior evening’s fieldwork exercise, in which they were to ask strangers in various public places of Pune questions pertaining to themes looked at from within this year’s Institute. Participants were divided into four groups and visited Pune’s FC Road, Mahatma Gandhi Road, and Central Mall.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Groups found that the majority of those interviews primarily accessed the phone via the mobile. There was also a common weariness of using the internet and concern for one’s privacy while doing so, especially with uploading photos to Facebook and online financial transactions. People were also generally concerned about using cyber cafes for fear of one’s accounts being hacked. Generally people suspected that so long as conversations are “private” (i.e. in one’s Facebook inbox), so too are they secure. Just as well, those interviewed shared a sense of security with the use of a password.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Six&lt;/h1&gt;
&lt;p&gt;February 16, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wikipedia: Dr. Abhijeet Safai&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Open Access: Muthu Madhan (TBC)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Case Studies Groupwork&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Case Studies Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;As the Institute came closer to its end, participants got the opportunity to hear from speakers on topics pertaining the Wikipedia editing in addition to Open Access to scholarly literature.  Participants also worked together in groups to examine specific case studies referenced in previous sessions, and then presented their conclusions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wikipedia&lt;/b&gt;, Dr. Abhijeet Safai&lt;br /&gt;The Institute was joined by Medical Officer of Clinical Research at Pune’s Symbiosis Centre of Health Care, &lt;b&gt;Dr. Abhijeet Safai&lt;/b&gt;, who led a session on Wikipedia. Having edited over 3700 Wikipedia articles, Dr. Abhijeet was able to bring forth his expertise and familiarity in editing Wikipedia to participants so that they would be able to do the same. Introduced within this session were Wikipedia’s different fundamental pillars and codes of conducts to be complied with by all contributors, along with different features and components of Wikipedia articles that one should be aware of when contributing, such as how to cite sources and discuss the contents of an article with other contributors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Access&lt;/b&gt;, Muthu Madhan&lt;br /&gt;&lt;b&gt;Muthu Madhan&lt;/b&gt; joined the Internet Institute while speaking on Open Access (OA) to scholarly literature. Within his session, Muthu examined the historical context within which the scholarly journal had arisen and how the idea of Open Access began within this space. The presence of Open Access in India and other developing nations was also examined in this session, and the concept of Open Data, introduced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Case Studies&lt;/b&gt;, Groupworks&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/11.JPG/image_preview" alt="Pune_Group2" class="image-inline image-inline" title="Pune_Group2" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/8.JPG/image_preview" alt="Pune_Group" class="image-inline image-inline" title="Pune_Group" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Participants were split up into groups and assigned particular case studies looked at briefly in previous sessions. Case studies included &lt;a href="http://siditty.blogspot.in/2009/11/things-darkies-say.html"&gt;&lt;i&gt;#thingsdarkiessay&lt;/i&gt;&lt;/a&gt;&lt;i&gt;,&lt;/i&gt; a once trending Twitter hashtag in South Africa which had offended many Americans for its use of “darkie” as a derogatory term; the literary novel, &lt;a href="http://en.wikipedia.org/wiki/The_Hindus:_An_Alternative_History"&gt;&lt;i&gt;The Hindus&lt;/i&gt;&lt;/a&gt;, which offers an alternative narrative of Hindu history had been banned in India for obscenity; a case in which several users’ avatars had been controlled by another in a virtual community and forced to perform sexual acts, referred to as &lt;a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace"&gt;&lt;i&gt;A Rape Happened in Cyber Space&lt;/i&gt;&lt;/a&gt;; and lastly, a pornographic submission website, &lt;a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F"&gt;Is Anyone Up?&lt;/a&gt;, for which content was largely derived from “revenge porn.” Each group then presented on the various perspectives surrounding the issue at hand.&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Cyborg&lt;/b&gt;, Nishant Shah&lt;br /&gt;Nishant Shah led an off-agenda session in the evening looking more closely at the notion of the human cyborg. Nishant deconstructs humanity’s relationship to technology, in suggesting that we “think of the human as &lt;i&gt;produced&lt;/i&gt; with the technologies… not who &lt;i&gt;produces&lt;/i&gt; technology.” Nishant explores the Digital Native as an attained identity for those who, because of technology, restructure and reinvent his or her environment—offline as well as online. Among other ideas shared, Nishant refers to works by Haraway on the human cyborg in illustrating our dependency on technology and our need to care for these technologies we depend on.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Seven&lt;/h1&gt;
&lt;p&gt;February 17, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Internet Activism: Laura Stein, &lt;i&gt;Associate Professor, University of Texas &lt;/i&gt;and &lt;i&gt;Fulbright Fellow&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Domestic and International Bodies: Chinmayi Arun, &lt;i&gt;Research Director&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Participant Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Hot Question Challenge&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The last day of the week-long Internet Institute examined concepts of Internet Activism and Domestic and International Bodies. Some participants led presentations on topics of personal familiarity, before a final wrap-up exercise, calling upon individuals to share any new formulations resulting from the Institute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Activism&lt;/b&gt;, Laura Stein&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/17.JPG/image_preview" alt="Pune_Laura" class="image-inline image-inline" title="Pune_Laura" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Associate Professor from the University of Texas, &lt;b&gt;Laura Stein&lt;/b&gt;,  spoke on activism on the internet. Laura examined some grassroots  organizations and movements taking place on the online and the benefits  that the internet brings in facilitating their impact, such as its  associated low costs, accessibility and possibility for anonymity.  Despite the positive effects catalyzed by the internet, Laura stresses  that the “laying field is still unequal, and movements are not simply  transformed by technology.” Some of the websites exemplifying online  activism that were examined within this session includes the &lt;a href="http://www.itgetsbetter.org/"&gt;It Gets Better Project&lt;/a&gt;, which aims to give hope to LGBT youth facing harassment, and the national election watch by the &lt;a href="http://adrindia.org/"&gt;Association for Democratic Reforms&lt;/a&gt;.  Additionally, Laura spoke on public communication policy, comparing  that of the US and India, and how this area of policy may influence  media content and practice.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Domestic and International Bodies&lt;/b&gt;, Chinmayi Arun&lt;br /&gt;As the Internet Institute’s final speaker, Research Director for Communication Governance at National Law University&lt;i&gt; &lt;/i&gt;,&lt;b&gt; Chinmayi Arun&lt;/b&gt;, explores the network of factors that affect one’s behavior on the internet—these including: social norms, the law, the markets, and architecture. In referring to Lawrence Lessig’s &lt;a href="http://en.wikipedia.org/wiki/Pathetic_dot_theory"&gt;pathetic dot theory&lt;/a&gt;, Chinmayi illustrates how individual’s—the pathetic dots in question—are functions of the interactions of these factors, and in this sense, regulated, and stresses the essential need to understand the system, in order to effectively change the dynamics within it. It is worth noting that not all pathetic dots are equal, and Google’s dot, for example, will be drastically bigger than a single user’s, having more leveraging power within the network of internet bodies. Also demonstrated, is the fact that we must acknowledge the need for regulation by the law to some extent, otherwise, the internet would be a black box where anything goes, putting one’s security at risk of violation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hot Question Challenge&lt;/b&gt;&lt;br /&gt;The very last exercise of the Institute entailed participants asking each other questions on demand, relating back to different themes looked at within the last week. Participants had the chance, here, to bridge together concepts across sessions, as well as formulate their own opinions, while posing questions to others that they, themselves, were still curious about.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/DSC_0371.JPG/image_large" alt="Pune_Everyone" class="image-inline image-inline" title="Pune_Everyone" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune'&gt;https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>samantha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-04-07T11:31:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/making-change/digital-storytelling-human-behavior-vs-technology">
    <title>Digital Design: Human Behavior vs. Technology - Vita Beans</title>
    <link>https://cis-india.org/digital-natives/making-change/digital-storytelling-human-behavior-vs-technology</link>
    <description>
        &lt;b&gt;What comes first? Understanding human behavior and communication patterns to design digital technologies? Or should our technologies have the innate capacity to adapt to the profiles of all its potential users? This post will look at accessibility challenges for digital immigrants and the importance of behavioral science for the design of digital technologies. We interview Amruth Bagali Ravindranath from Vita Beans. &lt;/b&gt;
        
&lt;pre&gt;&lt;strong&gt;CHANGE-MAKER:&lt;/strong&gt; Amruth B R
&lt;strong&gt;
PRODUCT&lt;/strong&gt;:
Vita Beans and Guru G
&lt;strong&gt;&lt;strong&gt;
METHOD OF CHANGE&lt;/strong&gt;:
&lt;/strong&gt;Borrow elements from behavioral science and social marketing to make technology more intuitive.
&lt;strong&gt;
STRATEGY OF CHANGE:
&lt;/strong&gt;Make technology easy to use, fun and effective.&lt;/pre&gt;
&lt;div align="center"&gt;&lt;embed align="middle" width="400" height="200" src="http://chirptoons.vitabeans.com/chirplet.swf?chirpfile=60" quality="high" name="chirptoons" allowscriptaccess="always" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" base="http://chirptoons.vitabeans.com/" wmode="transparent"&gt;&lt;/embed&gt;&lt;/div&gt;
&lt;div align="center"&gt;&lt;strong&gt;Chirptoons: &lt;/strong&gt;Create Cartoons in a Jiffy. Designed by &lt;a href="http://www.vitabeans.com/"&gt;Vita Beans&lt;/a&gt;&lt;br /&gt;(The animation seems to be skipping a few lines. Check box below for a transcript)&lt;br /&gt;Design your own here: &lt;a href="http://chirptoons.vitabeans.com/createchirplet.php"&gt;http://bit.ly/1dOEpPo&lt;/a&gt;&amp;nbsp;
&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&lt;blockquote style="float: right;"&gt;
&lt;div align="center"&gt;&lt;strong&gt;Transcript of animation:&lt;/strong&gt;&lt;/div&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Ajoy&lt;/strong&gt;: Hi!&lt;br /&gt;&lt;strong&gt;Usha&lt;/strong&gt;: Hi! What will we talk about today?&lt;br /&gt;&lt;strong&gt;Ajoy:&lt;/strong&gt; We will learn to design digital stories!&lt;br class="kix-line-break" /&gt;&lt;strong&gt;Usha:&lt;/strong&gt; What do you mean by digital stories?&lt;br /&gt;&lt;strong&gt;Ajoy: &lt;/strong&gt;What we are doing right now!.&lt;br /&gt; Telling a story through a digital medium.&lt;br /&gt;&lt;strong&gt;Usha: &lt;/strong&gt;Oh! But what is so complicated about that?&lt;br /&gt;You write a story and then you post it online What’s&lt;br /&gt;the big deal?&lt;br /&gt;&lt;strong&gt;Ajoy:&lt;/strong&gt; This is true. But you want everyone to access &lt;br /&gt;your story right?&lt;br /&gt;&lt;strong&gt;Usha:&lt;/strong&gt; Yes! Of course!&lt;br /&gt;&lt;strong&gt;Ajoy:&lt;/strong&gt; Then you need to think about your audience! &lt;br /&gt;Are you sure they all know how to use this technology?&lt;br class="kix-line-break" /&gt;&lt;strong&gt;Usha:&lt;/strong&gt; Well...no, not really.&lt;br /&gt;&lt;strong&gt;Ajoy:&lt;/strong&gt; Do you know what makes it challenging for them?&amp;nbsp; &lt;br /&gt;Or how to adapt technology to make it easier?&lt;br /&gt;&lt;strong&gt;Usha:&lt;/strong&gt; Eh, no...no clue :(&lt;br /&gt;&lt;strong&gt;Ajoy: &lt;/strong&gt;Then read on.Today we will take a step back.&lt;br /&gt;We must think about human behaviour first!&lt;br class="kix-line-break" /&gt;and then design our technology accordingly.&lt;br /&gt;&lt;strong&gt;Usha: &lt;/strong&gt;Sounds good! Let's do it.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p align="justify"&gt;First off, apologies for such a feeble and sad animation. When I was given access to Chirptoons, I was quite confident I would be able to produce a somewhat interesting introduction to this post and get you excited about our next interview. However, between first-time user friction and a couple of glitches in the program, I found myself -a semi-savvy digital native who has been using technology, almost every day of her life, for the last 15 years- struggling to create the cartoon and clearly failing at it. The biggest challenge was translating what I had in mind into a digital format (The demo was very straightforward. I was just particularly inept), and it was frustrating to the point I decided to drop it, leave it as is, publish my unfinished cartoon and turn this post into a reflection on 'design challenges behind digital storytelling', so I could move on with my life.&lt;/p&gt;
&lt;p align="justify"&gt;What I experienced with Chirptoons is what many users: both digital natives and immigrants constantly face due to the pace at which new digital technologies are emerging.&amp;nbsp; While the privileged demographic who has physical access to technology has a decent knowledge of basic web browsing and document processing features, there is still a very large gap in accessibility in terms of how to navigate more complex formats. At the end of the day, producers retain the creative power and determine the functions and flexibility of the technologies we use in the day to day. Just think of Facebook and its constant interface updates. We have all felt the wrenching need for that 'dislike' button to make our interactions a tad more honest, yet we have no power to create it or change Facebook's format to one that enables our needs better.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;So far, we have explored information from different angles: as activism, as visual design, as stories; and how digital technologies have been used strategically to disseminate it. However, our analysis is lacking a better understanding of the &lt;em&gt;digital&lt;/em&gt;. We have been focusing on citizens as technology 'consumers', and we have not looked at whether digital infrastructures are accessible enough for users to become 'producers'. The question is&lt;em&gt;: how&lt;/em&gt; do we do this: how do we engage different users with different digital literacy levels, skills and aptitudes in the production of digital content?&amp;nbsp;With this post we bring a new topic into our series: accessibility and Information infrastructures. This one will focus on design and the role of behavioural science. Our interview with Amruth&amp;nbsp;Bagali Ravindranath, brought a very unique perspective into the conversation, from 
which I would like to highlight three points:&lt;/p&gt;
&lt;p align="justify"&gt;a) The importance of &lt;strong&gt;behavioral science&lt;/strong&gt; for 
design. Amruth stressed why we need a thorough understanding of 
behavioral and cognitive science in the design of digital technologies 
and how crucial it is to investigate the decision processes and 
communication strategies of humans to make technologies user-friendly 
and context appropriate.&lt;/p&gt;
&lt;p align="justify"&gt;b) How&lt;strong&gt; public relations and social marketing&lt;/strong&gt; 
concepts can also provide insight on how to target and engage potential 
users more effectively. This point starts to answer some of the 
questions we raised on the &lt;a href="https://cis-india.org/digital-natives/making-change/tactical-technology-design-activism-1"&gt;Information Design post&lt;/a&gt;: thinking about the citizen as a consumer. This point also works as 
an alternative take on how to target civic engagement through 
technology.&lt;/p&gt;
c) How to engage&lt;strong&gt; different type of users:&amp;nbsp;&lt;/strong&gt;not 
only the digital native, but also digital immigrants&lt;a style="text-align: justify;" href="https://cis-india.org/digital-natives/making-change/storytelling-performance-2#fn1" name="fr1"&gt;[1]&lt;/a&gt;
&lt;p&gt;&amp;nbsp;who 
still play crucial roles as information gatekeepers in fields such as 
education or urban governance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 align="justify"&gt;Vita Beans&lt;br /&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;We interviewed &lt;strong&gt;Amruth&amp;nbsp;Bagali Ravindranath&lt;/strong&gt;,&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;Founder of &lt;a href="http://www.vitabeans.com/"&gt;Vita Beans&lt;/a&gt; to answer some of these questions. Vita Beans’ mandate is to create inspiring, easy-to-use applications in areas of education and human resources, to share knowledge in innovative, fun an effective ways.
The logic behind their technological framework is trying to mimic the profile of the human brain linked to decision making -including economic, evolutionary, emotional, and psychological elements- and design their applications based on these patterns. Some of the products they offer are cognitive skill development applications, game based learning applications, educational technology research, among others, and their latest educational product: &lt;strong&gt;Guru G&lt;/strong&gt; was chosen by the &lt;a href="http://unreasonableatsea.com/overview/"&gt;Unreasonable at Sea&lt;/a&gt; program (by Unreasonable institute &amp;amp; co-founder of Stanford d.school) as one of the &lt;a href="http://unreasonableatsea.com/companies22/"&gt;11 companies changing the world&lt;/a&gt;.&lt;/p&gt;
&lt;div align="right" style="text-align: left;" class="pullquote" dir="ltr"&gt;&lt;strong&gt;"We are trying to adapt to how the user wants to use something, rather than expecting the user to learn. This is essential in the education space to make things work".&lt;/strong&gt;&lt;/div&gt;
&lt;p align="justify"&gt;&lt;a href="http://unreasonableatsea.com/vita-beans/"&gt;Guru G&lt;/a&gt; is a "gamified teaching, teacher training &amp;amp; open certification platform", that aims to democratize access to technology for quality teachers. Rather than focusing on the student as most education technologies do, Guru G believes that teachers are the most important element of the education system. Enabling teachers, means quality education will reach the lives of hundreds of students during their professional life time, and with this in mind, Vita Beans designed a platform that is engaging, easy to use and intuitive, designed specifically with teachers, schools and governments in mind.&lt;/p&gt;
&lt;div align="center"&gt;&lt;iframe src="//player.vimeo.com/video/65920949" frameborder="0" height="281" width="500"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;p align="center"&gt;&lt;a href="http://vimeo.com/65920949"&gt;Unreasonable Barcelona: Anand Joshi, Guru-G&lt;/a&gt; from &lt;a href="http://vimeo.com/unreasonable"&gt;Unreasonable Media&lt;/a&gt; on &lt;a href="https://vimeo.com"&gt;Vimeo&lt;/a&gt;.&lt;/p&gt;
&lt;h3 align="left"&gt;Inspiration &lt;br /&gt;&lt;/h3&gt;
&lt;div align="right" class="pullquote"&gt;&lt;em&gt;"Teachers don't use and don't like to use technology"&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;p align="justify"&gt;The idea came from the products Vita Beans had already developed for the education space, such as their text2animation &amp;amp; text2game prototypes. They had produced over 80 collaborative games teachers were using in the classroom. Students play together in teams and learn about different topics through the process of gaming. However, suddenly they realized teachers had great ideas they didn't know how to translate into a&lt;em&gt; &lt;/em&gt;digital form because they did not have the knowledge or the skills to create digital content.&amp;nbsp;This is, according to Amruth, the crisis they are trying to solve in the education space: the quality of teachers, access to good teachers and the difficulty for teachers to adopt new technologies were the biggest challenges.&lt;em&gt;&amp;nbsp;"&lt;/em&gt;&lt;/p&gt;
&lt;h3 align="left"&gt;The design challenge&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;Their initial prototypes were designed with assumptions based on their&amp;nbsp;gamification&amp;nbsp;experiments with students. &lt;em&gt;"We miserably failed with teachers and we discovered what a good gamification system for teachers looks like by prototyping with teachers and looking at the small things. It was an interesting learning experience."&amp;nbsp;&lt;/em&gt;&amp;nbsp;They identified two common reasons why they hesitated to adopt anything new in the classroom.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Teachers don't want to feel like they can't use something a student can.&lt;/li&gt;&lt;li&gt;Teachers can't visualize themselves using that tool, this there is an element of uncertainty and lack of confidence.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p align="justify"&gt;It was imperative for Vita Beans to switch focus:&lt;em&gt; "Any tool you design, you expect to train the user to understand your tool, and if they refuse to do that; you blame them." &lt;/em&gt;They used their behavioural science background to come up with infrastructural solutions that solve the limitations from the outset.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;The solutions&lt;/h3&gt;
&lt;p align="justify"&gt;They started prototyping with &lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Natural_language_processing"&gt;natural language processing&lt;/a&gt;&lt;/strong&gt; for their text2animation &amp;amp; text2game projects. NLP is a branch of computer science concerned with the interactions between computers and human languages. Teachers articulated their ideas in simple English and the program used NLP to take what they said, try to understand what they were trying to visualize and convert into programming language to build an animated movie out of it (like what we used to open this article -but with hopefully better results). Amruth was very confident about the potential of this prototype and shared with us that UNICEF might take it up and implement it as an open source animated video and game creation tool in Africa.&lt;/p&gt;
They also developed an &lt;strong&gt;adaptive navigation engine&lt;/strong&gt; for one of their game based learning platforms; a tool that adapts to what you are trying to do: &lt;em&gt;"There is no fixed way to navigate from one task to another. It tries to learn the closest action that each teacher is trying to do and it executes that. It tries to learn how the teacher wants to use it."' &lt;/em&gt;This was a success.&amp;nbsp;They incorporated touch screens to make the product more intuitive and the teachers picked it up quickly.&lt;em&gt;&amp;nbsp;&lt;/em&gt;
&lt;p&gt;Amruth claims they are the first in the world to develop a gamification platform specifically for teachers and the reason was their solution to the navigation issue. This experience also indirectly helped in designing Guru-G.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: center;"&gt;&lt;iframe src="//www.youtube.com/embed/bf_rwl6JTMc" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;p style="text-align: center;"&gt;"Amruth Bagali Ravindranath talks about text2animation &amp;amp; text2game prototypes"&lt;br /&gt;Amruth B R, at TedxMcGill. Courtesy of YouTube&lt;/p&gt;
&lt;p align="justify"&gt;These design solutions and the&amp;nbsp;learnings&amp;nbsp;from each project inspired the team to come up with products which have been adopted commercially across 10 states in India, reached 4000+ schools &amp;amp; over 3 million kids internationally through partners in India &amp;amp; North America. They have helped education companies build their primary and secondary school education products, (including one of India's top classroom technologies), have been covered by the media and won several entrepreneurship awards. More information&amp;nbsp;&lt;a href="http://unreasonableatsea.com/vita-beans/"&gt;here&lt;/a&gt; and on &lt;a href="http://www.guru-g.com/"&gt;their website.&lt;/a&gt;&amp;nbsp;Our question is: what is it about behavioral science that helped Amruth's team arrive to this epiphany in tech design?&amp;nbsp;&lt;/p&gt;
&lt;h2 align="justify"&gt;Behavioral Science and Social Marketing&lt;br /&gt;&lt;/h2&gt;

&lt;p align="justify"&gt;Comparing marketing to advocacy is bound to be met by resistance and perhaps controversy. I raised this question when we interviewed Maya Ganesh for the&amp;nbsp;&lt;a href="https://cis-india.org/digital-natives/making-change/tactical-technology-design-activism-1"&gt;Information Design post&lt;/a&gt;, and stated the following in our conclusion:&amp;nbsp;"&lt;em&gt;Our consumption habits in the market are shaping how we process and interact with information in the public space. The possibility of 
'consumer behavior' permeating modalities of activism, reinforces the need 
to explore more interesting strategies for information 
dissemination&lt;/em&gt;." Now that we are starting to look closely at the infrastructure supporting information, I will stubbornly return to the same question: to what extent should we borrow tactics for advocacy from marketing? and add: how much of it should permeate the design of digital technologies?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Amruth made a casual reference during our interview that triggered this thought. We were discussing the importance of understanding behavior patterns, when he brought up &lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Edward_Bernays"&gt;Edward Bernays&lt;/a&gt;. &lt;/strong&gt;This man used psychoanalysis, psychology and social science to design public
persuasion campaigns and could get masses to choose what he wanted them to without them realizing it. While this sounds awfully dangerous and manipulative, I would like to rescue the idea of understanding human behavior well enough to design technology around it and I will entertain this thought in the context of
social change -please, don't judge.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Pillip Kotler, S. C. Johnson Distinguished Professor of International Marketing at the Kellogg School of Management at Northwestern University, wrote a paper bringing marketing and social change together: &lt;em&gt;“Can social
causes be advanced more successfully through applying principles,
concepts and techniques of marketing?”. &lt;/em&gt;He defines marketing as:&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 style="text-align: center;"&gt;"a sophisticated technology, that draws heavily on behavioral science for clues to solve communication and persuasion related to&amp;nbsp;influencing&amp;nbsp;accessibility. [...] Most of the effort is spent on discovering the wants of a target audience and creating goods and services to satisfy them" (Kotler, 1971)&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p align="justify"&gt;This definition is a useful bridge to link marketing with accessibility of digital technologies. G.D. Wiebe wrote an influential paper on social marketing, that coined the question: "&lt;em&gt;Why can't you sell brotherhood and rational thinking like you can sell soap?&lt;/em&gt;", that later influenced public information campaigns by USAID, the WHO, and the World Bank &lt;a href="https://cis-india.org/digital-natives/making-change/storytelling-performance-2#fn1" name="fr1"&gt;[2]&lt;/a&gt;&amp;nbsp;. While he recognized how these models can to an extent &lt;em&gt;commodify &lt;/em&gt;human behavior and social principles, he stressed that knowledge of behavioral science is a useful framework for product planning, that must be given a socially useful implementation. He developed the following criteria of considerations:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th align="center"&gt;Criteria&lt;br /&gt;&lt;/th&gt;
&lt;th align="center"&gt;Description&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt; &lt;strong&gt;Force&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;The intensity of the person's motivation toward the goal -a combination of his predisposition prior to the message and the stimulation of the message&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Direction&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Knowledge of how or where the person might go to consummate his motivation.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Mechanism&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;The existence of an agency that enables the person to translate his motivation into action.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Adequacy&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;The ability and effectiveness of the agency in performing its task.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Distance&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Estimate of the energy and cost required (by the user) to consummate the motivation in relation to the reward&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="justify"&gt;Considering this framework is part of recognizing how knowledge circulating market networks affects our behavior. Nishant Shah addressed two ideas along these lines in the thought piece. First, he suggests us to recognize the negotiations that take place in the state-citizen-market ecosystem, and how they affect our rights, demands and&amp;nbsp;responsibilities&amp;nbsp;in society. Second, how this leads to a different understanding of the citizen as an "embodiment of these state-market negotiations". Keeping consumer behavior, and the forces shaping, enabling and constraining it in mind, is an interesting framework when we think of ourselves as information consumers&amp;nbsp;-and as Yochai Benkler posits in The Wealth of Networks- in an ongoing transition to information producers. This also depends on how we think of information. We usually define content as information, but the structure and infrastructure are also pieces of 'information' we continuously shape through our interaction with technology. Hence, when we talk about making information accessible, we are also talking about producing legible and intelligible infrastructures.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Linking it back to digital technology&lt;/h3&gt;
&lt;p align="justify"&gt;I am aware that the relationship we are trying to draw seems little far-fetched, but Amruth and the Vita Bean's team experience shows this behavioral-science approach, not only has a lot of potential, but is seldom explored in the education technology market. He told us about his success story with a&amp;nbsp;&lt;strong&gt;behavior simulation engine.&lt;/strong&gt; They used neuroscience as a base to build computer based activities and games to predict the behavior of its users on specific situations. They had an accuracy of 86%, which according to Amruth, is larger than every known psychological framework, and according to their &lt;a href="http://www.vitabeans.com/case-studies.php"&gt;testimonial&lt;/a&gt;, above most behavioral tests in the market (which only yield 20-40% of accuracy). Amruth said: &lt;em&gt;"That
 was the first behavior research connection that brought us into the 
start-up space. Exploring games, exploring human behavior."&lt;/em&gt;&lt;/p&gt;
&lt;blockquote style="float: left;"&gt;
&lt;div style="text-align: center;"&gt;&lt;strong&gt;Design challenges in&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;&lt;strong&gt;mobile applications**&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;li&gt;Make it noticeable&amp;nbsp;&lt;/li&gt;&lt;li&gt;Make it useless if not shared&amp;nbsp;&lt;/li&gt;&lt;li&gt;Manufacture peer pressure&lt;/li&gt;&lt;li&gt;Easy to personalize&amp;nbsp;&lt;/li&gt;&lt;li&gt;Must evolve constantly&amp;nbsp;&lt;/li&gt;(static stories die)&lt;/blockquote&gt;
&lt;p align="justify"&gt;We can also link these ideas back to storytelling. Amruth and I discussed what is the best way to use technology to engage users with digital stories. He made a good point at pairing up both processes:&lt;em&gt; "What&amp;nbsp;makes a storytelling session effective is how you contextualize a story for the person you are sitting with. As kids we are used to a one way process. As adults, stories are more interactive, so you may bring a new dimension, and the story might go in a very different direction. The technology must enable and reflect that." &lt;/em&gt;Compelling narratives must motivate the audience to interact with the stories, and digital devices must perform the same function. The infrastructure and interface of technologies must be intuitive, familiar and persuasive enough to sway users into interacting with it.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;A way to do this is by pairing up technologies with the criterion above. In terms of functionality: provide them with a &lt;strong&gt;mechanism&lt;/strong&gt; that translates the users ideas into action, that is&amp;nbsp;&lt;strong&gt;efficient&lt;/strong&gt;&amp;nbsp;at enabling&amp;nbsp;them, and that reduces the '&lt;strong&gt;distance &lt;/strong&gt;(the&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;cost or amount of energy needed) to perform a task -as has been accomplished with Guru G in India. As for the &lt;strong&gt;force &lt;/strong&gt;and&lt;strong&gt; direction&lt;/strong&gt; of motivation, Amruth brought up some design challenges when discussing adoption of mobile applications [**"&lt;em&gt;by analysing what increases the probability of a solution / campaign 
growing organically by word of mouth, going viral, and specifically what make something fashionable&lt;/em&gt;". See box on the left]. These challenges may vary from one application to the other but, at the end of day, the analysis and conceptualization of the product must be persuasive and empathetic with its users.&lt;/p&gt;
&lt;h3&gt;Making Change&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;To close our interview, Amruth and I talked about what it means to 'make change' through digital design. He believes 'making change' is composed of three elements:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Empathy: &lt;/strong&gt;Your attempt to make change&amp;nbsp;will depend on the amount of empathy you feel towards the people you are trying to create change for.&lt;em&gt; "We spend time interacting with teachers, classrooms, just to get an idea of how the teacher thinks, empathize with prospective users".&lt;/em&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Imagination:&lt;/strong&gt;&amp;nbsp;How you translate this empathy into solutions. &lt;em&gt;"Imagination helps you think of as many solutions as you can to solve the design and adoption challenges"&lt;/em&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Action:&amp;nbsp;&lt;/strong&gt;The most challenging stage according to Amruth: &lt;em&gt;"If your technology is too hard to use, you will lose audience. If it's not impactful enough, it is trivialized. How do you reach a balance in making it effortless and yet, impactful?"&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p align="justify"&gt;&lt;br /&gt;This post took a step back in our analysis of citizen action, to uncover a less visible space where change is also taking place: the intersection of the user with the machine. We seldom look at the relationship: producer-machine-consumer (and its multiple combinations) and how &amp;nbsp;our behavior is being reconfigured by new digital technologies (in this project). The pace at which we need to upgrade our own operation systems, requires a degree of digital literacy that is not being facilitated by the state, the market or even civil society. Vita Beans, is one of the few examples of market actors working towards cutting the middle-man between users and digital technologies. If widely adopted, this model has the potential of re-organizing the state-citizen-market dynamic: from&amp;nbsp;how citizens interact with the technology market to how new ways of producing and using technology might shape citizens' negotiation with the state.&lt;/p&gt;
&lt;div&gt;This was also a set of explorations. It is a fairly new area in our research that will lead to more conversations with people who understand technology as an infrastructure and as material, as opposed to us- who often understand it as a practice, a space or an actor. Our goal is to bring content and infrastructure closer together, and make a stronger emphasis on inter-disciplinarity and multi-stakeholderism as a strategy to leverage change.&amp;nbsp;
&lt;div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;&lt;strong&gt;Footnotes:&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="text-align: justify;"&gt;[&lt;/span&gt;&lt;a style="text-align: justify;" href="https://cis-india.org/digital-natives/making-change/storytelling-performance-2#fr1" name="fn1"&gt;1&lt;/a&gt;&lt;span style="text-align: justify;"&gt;]&amp;nbsp;Refer to Marc Prensky's Digital Native, Digital Immigrant, for more on the limitations of digital immigrants in the education space; "&lt;/span&gt;It‟s very serious, because the single biggest problem facing &amp;nbsp;&lt;span style="text-align: justify;"&gt;education today is that &amp;nbsp;our Digital Immigrant instructors, who speak an outdated &amp;nbsp;&lt;/span&gt;&lt;span style="text-align: justify;"&gt;language (that of the pre-digital age), are struggling to teach a population that speaks &lt;/span&gt;&lt;span style="text-align: justify;"&gt;an entirely new language". Access it here:&amp;nbsp;&lt;/span&gt;&lt;a href="http://bit.ly/IMBu0j"&gt;http://bit.ly/IMBu0j&lt;/a&gt;&amp;nbsp;&lt;br /&gt;&lt;br /&gt;The CIS book : Digital Alternatives with a Cause, is also an interesting and comprehensive read of what comprises a digital native or digital immigrant today:&amp;nbsp;&lt;a href="https://cis-india.org/digital-natives/blog/dnbook"&gt;http://cis-india.org/digital-natives/blog/dnbook&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="text-align: justify;"&gt;[&lt;/span&gt;&lt;a style="text-align: justify;" href="https://cis-india.org/digital-natives/making-change/storytelling-performance-2#fr1" name="fn1"&gt;2&lt;/a&gt;&lt;span style="text-align: justify;"&gt;]&amp;nbsp;&lt;/span&gt;The World Bank makes reference to G.D. Wiebe's thinking on their blog: &lt;a href="http://bit.ly/1jNZVZA"&gt;http://bit.ly/1jNZVZA&lt;/a&gt;. Also refer to: Baker, Michael (2012).&amp;nbsp;The Marketing Book. Oxford: Butterworth-Heinemann. p.&amp;nbsp;696 and&amp;nbsp;&lt;span class="mw-cite-backlink"&gt;&lt;span class="reference-text"&gt;&lt;span class="citation book"&gt;Lefebvre, R. Craig.&amp;nbsp;Social Marketing and Social Change: Strategies and Tools to Improve Health, Well-Being and the Environment\year=2013. San Francisco: Jossey-Bass. p.&amp;nbsp;4. for examples of these interventions. Finally, the Wikipedia page on Social Marketing explains the role of G.D. Wiebe in the field: &lt;a href="http://bit.ly/1lw4jPV"&gt;http://bit.ly/1lw4jPV&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/h2&gt;
&lt;div id="gs_cit1" class="gs_citr"&gt;Kotler, P., &amp;amp; Zaltman, G. (1971). Social marketing: an approach to planned social change. Journal of marketing, 35(3).&lt;/div&gt;
&lt;p&gt;&lt;span class="reference-text"&gt;&lt;span class="citation journal"&gt;&lt;br /&gt;Shah, Nishant “Whose Change is it Anyways?&amp;nbsp;Hivos Knowledge Program.&amp;nbsp;April 30, 2013.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="reference-text"&gt;&lt;span class="citation journal"&gt;Wiebe, G.D. (1951-1952). "Merchandising Commodities and Citizenship on Television".&amp;nbsp;Public Opinion Quarterly&amp;nbsp;&lt;strong&gt;15&lt;/strong&gt;&amp;nbsp;(Winter): 679.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/making-change/digital-storytelling-human-behavior-vs-technology'&gt;https://cis-india.org/digital-natives/making-change/digital-storytelling-human-behavior-vs-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>denisse</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Making Change</dc:subject>
    
    
        <dc:subject>Net Cultures</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-10-24T14:29:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments">
    <title>Open Call for Comments: The Privacy Protection Bill 2013 drafted by the Centre for Internet and Society</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is announcing an Open Call for Comments to the CIS Privacy Protection Bill 2013.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In early 2013 the Centre for Internet and Society drafted the Privacy (Protection) Bill 2013 as a citizen’s version of privacy legislation for India. The Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been collecting comments to the Privacy Protection Bill since April 2013 with the intention of submitting the Bill to the Department of Personnel and Training as a citizen’s version of a privacy legislation for India.  If you would like to submit comments on the Privacy Protection Bill to be included as part of the Centre for Internet and Society’s submission to the Department of Personnel and Training, please email comments to &lt;a href="mailto:bhairav@cis-india.org"&gt;bhairav@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="internal-link"&gt;Download the latest version of the Privacy Protection Bill&lt;/a&gt;&lt;/b&gt; (February 2014)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-25T05:38:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing">
    <title>An Introduction to Spectrum Sharing</title>
    <link>https://cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing</link>
    <description>
        &lt;b&gt;We will look at how current technology – mainly GSM, but also CDMA and touching upon LTE - shares spectrum, how they might share spectrum, the trade-off between spectral (in this case, 'trunking') and 'economic' efficiency in the traditional, purely intra-operator shared scenario, and how it might be overcome by inter-operator sharing.&lt;/b&gt;
        
&lt;h3&gt;The Current Scenario – Wi-Fi, GSM and CDMA: A Primer from the Perspective of Spectrum Coordination&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Sharing spectrum is not a radically new idea: it's probably being shared in many places in your living room. Your family's phones could be communicating with your laptops using Bluetooth; your Wi-Fi router is sharing Wi-Fi spectrum with your next door neighbor's. There is no central brain that tells each device how to share spectrum, but each device pair (phone+laptop, for example) has some unique identifier (a code) that enables them to hear each other over the “noise” created by the other devices, as though they were speaking different languages. Each device can access the same frequencies at the same time and place, but does not know in advance which other devices are going to use them, and as long as there aren't too many such devices close to each other, the scheme works well.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;From a technological standpoint, this is one of two kinds of spectrum coordination that's currently in wide use: the second is where each device is given a narrow sliver of frequency to itself for a specified period of time.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; This is what happens with GSM cellphone technology: the service provider's tower allocates frequency — from the pool of frequencies available — to users on a per-call basis: this is called Frequency Division Multiple Access, or FDMA. GSM further divides access between different users in the same frequency channel in the time domain with bursts of data of the order of milliseconds, something called Time Division Multiple Access or TDMA; you'd be sharing your frequency channel with up to seven other people&lt;a name="fr2" href="#fn2"&gt;[2] &lt;/a&gt;and your content would be sent in sub-millisecond bursts approximately every five milliseconds.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Code Division Multiplexing, or CDMA, Is concept that assigns a user a 'code' for the duration of her call that effectively makes interference from other users, with other codes, appear as noise. The following picture illustrates FDMA, TDMA and CDMA:&lt;a name="fr3" href="#fn3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Frequency.png" alt="null" class="image-inline" title="Frequency" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The preceding discussion would suffice for a single cell tower, alone in a desert. In the real world, there's more than one tower, so we'll have to create a system so that no two adjacent towers end up allocating the same frequency at the same time. The simplest way to do that, and the only one currently used, is splitting the available spectrum such that the range of frequencies available to a tower does not intersect with that available to any of its neighbors, ever – that way, a tower can only allocate from its own set of frequencies, but it need not concern itself with what its neighbors are doing. If adjacent towers were to share spectrum, then the preceding condition only needs to apply at that exact moment in time – at that precise instant a tower should be aware of the frequencies being used by all towers that are close enough to interfere with it, and pick a frequency outside that set, which it can use for the duration of a call.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Frequency Reuse&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;When there weren't so many cellphones crowding up the spectrum, it did not make economic sense to invest in the extra infrastructure required to make neighboring towers&amp;nbsp; 'talk' to each other with low latency, so the solution we have now, even within the towers of a single service provider, is that any tower's neighbors do not intrude upon the spectrum assigned to that particular tower — what a neighbour is in this statement is qualified below. To start with, let's look at how towers could ideally be placed. We want to place towers on the ground in some regular pattern that makes them end up equidistant from each other: there are as many ways of doing that as there are of tiling a plane, which you can think of as tiling a bathroom with regular shapes (called 'regular polygons' by the pedantic).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Starting from the simplest, we can do it with tiles shaped like triangles, squares or hexagons, and a little thought will convince you that these are the only choices. Since a tower's signal would be 'strong enough' only up to some maximum radius, we'd ideally like to tile our plane with circles, but if we settle for the next best thing, the closest shape to a circle with which to tile the plane is a hexagon, in a honeycomb pattern; if you're looking at it from above, the towers would be placed as in the diagram below.&lt;a name="fr4" href="#fn4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Figure.png" alt="null" class="image-inline" title="Figure" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;This is just a part of a much larger honeycomb on the ground; the towers go in the center of the hexagons, where the numbers are; why the numbers are as they are will become clear in a couple of lines. Let's focus at tower 1 in the center of the diagram for our example. If the signals decay slow enough — so that the signals radiated from the nearest neighbors (towers surrounding 1, i.e. 2 through 7) and the next-nearest neighbors (towers two steps away from 1, with numbers from 2 through 7), interfere significantly with tower 1 in the center, but the next-to-next-nearest neighbors (three steps away from 1) do not, then the frequency reuse pattern can be like what we see in the diagram above, with towers denoted by the same number (and only the same number) using same exclusive set of frequencies. In this example, the closest towers with the same frequency as the central tower are the 1's in the hexagons at the edge – the frequency reuse factor is 3 (see footnote). In this diagram, the ordering of the numbers makes no difference – the situation would be the same if we exchanged the position of every, say, 1 and 3.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In reality the grid of towers of a particular operator covering a city is rarely hexagonal, due to local constraints, so what needs to be taken care of is not to use the frequencies that the nearest neighbors, next-nearest neighbors and so on are using depending upon the frequency reuse factor.&lt;a name="fr5" href="#fn5"&gt;[5] &lt;/a&gt;It's clear that without the towers being able to communicate in near-real time, with and FDMA/TDMA system like GSM, this is the optimal — and, in fact, the only — way to go.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Neighbouring towers sharing spectrum&lt;/h3&gt;
&lt;p style="text-align: justify;" class="western"&gt;Everything changes, though, if the towers can communicate and coordinate fast enough — in theory, at least, all the service provider's towers could pick spectrum from a common pool.&lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; In fact, every service providers could put their spectrum into a common pool from which frequencies can be allocated to users as before. This would increase &lt;em&gt;trunking efficiency&lt;/em&gt; and thereby the maximum number of users per tower dictated by &lt;em&gt;quality of service&lt;/em&gt; limits &lt;em&gt; &lt;/em&gt;(both terms are defined in the next section), making more efficient use of the spectrum.&lt;/p&gt;
&lt;h3 style="text-align: justify;" class="western"&gt;The Current Trade-off between Trunking and 'Economic' Efficiency: The Principal Argument for (Inter-operator) Shared Spectrum&lt;/h3&gt;
&lt;p&gt;Imagine the following scenario:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;We have 5 MHz of spectrum split it into five channels of one MHz each;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Five thousand people own cell phones and each is assigned a channel so that there are a thousand cellphone users per channel;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;People call infrequently: calls are randomly distributed but on average, in each channel, five people attempt to make a call every minute and each call is ten seconds long.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;" class="western"&gt;In this way, a lot of people can use a few channels with a reasonable hope that their calls will be connected, a phenomenon called 'trunking'. Chances are high, however, that at least one person's going to make a call before the previous caller on her channel is done, and end up being blocked. The probability that a call will go through is factored into the &lt;a class="western" href="https://en.wikipedia.org/wiki/Mobile_QoS"&gt;Quality of Service&lt;/a&gt; (QoS) through the &lt;a class="western" href="https://en.wikipedia.org/wiki/Blocking_probability#Erlang_B_formula"&gt;Erlang B Formula&lt;/a&gt;; roughly speaking, the less chance there is of a caller being blocked, the higher your QoS. It's  essentially a question of queuing: the same logic can be applied to beds at a hospital. The number of hospital beds in a town would be much fewer than the number of people, but it works because everyone's not sick all the time; if people are sick more often, or for longer durations, the chances that someone won't get a bed would be higher:&lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Numberofbeds.png" alt="null" class="image-inline" title="Number of beds" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;" class="western"&gt;Suppose someone own an Airtel phone and Airtel's channels are all in use, but Vodaphone has a channel free at the time. Let's look at two alternatives:&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;a) she's not allowed to switch, and cannot make her call;&lt;br /&gt;b) she's allowed to switch to the empty channel, and her call goes through.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;Clearly, the second choice is better &lt;strong&gt;— &lt;/strong&gt;and it has greater trunking efficiency.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;In the current scenario, service providers get exclusive rights to chunks of spectrum. Naively, the more competitors (in this case, service providers like Airtel and Vodaphone) you have in a market, the better the competition. This, unfortunately, leads to a decrease in trunking efficiency &lt;strong&gt;— &lt;/strong&gt;it's inversely proportional to the number of players in the market because every chunk of frequencies split between two service providers (every successive split) increases the chances for an event such as the one described above happening. The question that logically follows is: what is the optimal number of service providers for the Indian market? This is hard to find, and differs depending on who you ask &lt;strong&gt;— &lt;/strong&gt;incumbents, for instance, may quote a smaller number, whereas prospective new entrants may quote a larger one. The number is controversial within policy-making circles as well, and is being debated as this article is being written. We note in passing that the number of competitors &lt;strong&gt;— &lt;/strong&gt;and thus fragmentation of spectrum &lt;strong&gt;— &lt;/strong&gt;is higher in the Indian market than most others.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;If spectrum were shared, however, all this would be moot. This, therefore, is the primary argument towards spectrum sharing: better trunking efficiency as well as more competition &lt;strong&gt;— &lt;/strong&gt;you can , in this instance, have it both ways.&lt;/p&gt;
&lt;h3 style="text-align: justify;" class="western"&gt;CDMA and Spectrum Sharing&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;GSM is a simple example, where both the difficulty and the benefits of intra-operator spectrum sharing are readily apparent. Things get more difficult conceptually if we talk about newer technologies, so we'll have to get a little deeper into the technicalities. Code Division Multiple Access, or CDMA, allows phones to communicate using the same frequencies at the same time and place, but differentiated by codes &lt;strong&gt;—&lt;/strong&gt; similar to WiFi but using different encoding schemes and technology.&amp;nbsp; CDMA might look (from the analogy with Wifi) to require no central planning, but quality of service guarantees require that various phones in a 'cell' coordinate, and the coordinating agent happens to be that cell's tower. Two things need to happen: one, the code allocated to each phone needs to be sufficiently different,&lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt; at least with respect to other nearby phones, which means the tower has to allocate codes. Additionally, the distance involved between cellphone and tower (as against laptop and router) causes the &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Near-far_problem"&gt;near-far problem&lt;/a&gt;.&lt;a name="fr9" href="#fn9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For synchronous CDMA, the concept analogous to frequency reuse is code reuse &lt;strong&gt;—&lt;/strong&gt; a tower needs to take into account the codes being used by its nearest neighbors, next-nearest neighbors and so on, which might be easier than coordinating timing in a TDMA system. For asynchronous CDMA (the most commonly used variant), even that is not required &lt;strong&gt;—&lt;/strong&gt; the &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Chip_(CDMA)"&gt;low cross-correlation pseudorandom codes&lt;/a&gt; that are used have so many possibilities that the likelihood of a collision would be small, though other users would appear as &lt;a class="external-link" href="https://en.wikipedia.org/wiki/Code_division_multiple_access#Asynchronous_CDMA"&gt;gaussian noise&lt;/a&gt;, so just like GSM, the number of users is limited by QoS limits. This makes intro-operator sharing of spectrum between adjacent towers easier and asynchronous CDMA ends up with a frequency reuse factor of 1, meaning that a tower can access the same set of frequencies as its (intra-operator) neighbor, hypothetically making it easier to use in a shared-spectrum system.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;LTE&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;LTE uses Orthogonal Frequency Division Multiplexing, or OFDM, which can be – very roughly &lt;strong&gt;—&lt;/strong&gt; thought of as combining ideas used in FDMA as well as CDMA, in that information is redundantly split between several frequencies ('subcarriers' in the literature) and each frequency can have more than one channel, using an orthogonal coding schemes like (synchronous) CDMA, where, as mentioned earlier, a mobile phone can distinguish its channel by its code. As it's an FDMA system, the benefits of frequency sharing for LTE can be inferred as above for GSM.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;The Regulatory Perspective&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The European Commission has this to say about shared spectrum:&lt;a name="fr10" href="#fn10"&gt;[10] &lt;/a&gt;“From a regulatory point of view, band sharing can be achieved in two ways: either by the Collective Use of Spectrum (CUS), allowing spectrum to be used by more than one user simultaneously without a license; or using Licensed Shared Access (LSA), under which users have individual rights to access a shared spectrum band”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CUS is how unlicensed spectrum like Wi-Fi is currently used, which does not require a central 'brain' allocating spectrum to users. It requires no setup or organization before or during use. LSA is what shared spectrum would have to be like when used by service providers: it requires setup and organization but could offer better efficiency and quality of service because the central 'brain' &lt;strong&gt;—&lt;/strong&gt; in this case the CPU at the cellphone tower &lt;strong&gt;—&lt;/strong&gt; can figure out the most efficient way to allocate spectrum to users, just like a city's traffic lights coordinate the flow of traffic to prevent jams, and for that multiple towers &lt;strong&gt;—&lt;/strong&gt; or multiple transmitters on a single tower &lt;strong&gt;—&lt;/strong&gt; would have to coordinate somehow. In other words, you don't require approval before setting up your Wi-Fi router in your living room, but (depending upon the router, how many neighbors have routers, how close they are, and how far you are from your router) your connection might get dropped; this kind of thing is okay because there usually aren't that many people with routers living that close to each other, though that's fast changing. The 2.4 GHz Wi-Fi band is further crowded in by other microwave radio technologies, like Bluetooth and microwave ovens. Cellphones are a different thing altogether, because you wouldn't want your cellphone to stop working in the middle of a crowded bus if you're late en route to meeting someone at a coffee shop, or if you're being mugged and need to call the police. Therefore it is the service providers' and regulatory agencies' responsibility to provide a high (minimum) quality of service. This classification is symbolized by the following diagram:&lt;a name="fr11" href="#fn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Multiple.png" alt="null" class="image-inline" title="Multiple Access Techniques" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;" class="western"&gt;CUS falls on the left, being contention-based – that is, different user devices (eg, laptops) could contend with each other for the attention of the base station (eg, Wi-Fi router &lt;strong&gt;—&lt;/strong&gt; random access, CSMA), whereas LSA is conflict-free (which would be the case if the router decides, period). The potential for conflict exists in CUS, there being multiple devices asking for spectrum, whereas for LSA, a central authority  decides which device to allocate spectrum to at any particular point in space and time. CUS isn't total chaos, however: it would now be appropriate &lt;strong&gt;—&lt;/strong&gt; taking a leaf from ex-FCC chief technology officer Jon M. Peha – to introduce the concepts of &lt;em&gt;coexistence&lt;/em&gt; and &lt;em&gt;etiquette&lt;/em&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;In our Wi-Fi example, the Wi-Fi routers merely coexist, and the technological standard allows them to try and use the codes/spectral bands that are in their best interests, to best communicate with their client devices (though actual Wi-Fi routers also follow some sort of etiquette with other routers). One could additionally introduce some sort of etiquette into the equation by requiring that one router should, for example, “wait in the cue” for another &lt;strong&gt;—&lt;/strong&gt; and vice versa &lt;strong&gt;—&lt;/strong&gt; as and when required, as well as other requirements for cooperation depending upon the technology used. This minimal cooperation would be enough for them to, in Mr Peha's &lt;a class="western" href="http://morse.colorado.edu/~timxb/5520/ho/PehaSpectrum.pdf"&gt;words&lt;/a&gt;, “greatly improve efficiency &lt;em&gt;if and only if&lt;/em&gt; designed appropriately for the applications in the band” - depending upon the technology used, being too 'polite' could cause longer wait times that decrease efficiency. The situation is complicated by the existence of multiple technologies at the same spot – for example, your Bluetooth receiver, two-way radio and Wifi router working in the same room. If there is potential for interference, common communication protocols could be implemented to enable all those devices to 'talk' to each other and effectively follow some form of wireless etiquette so that they can cooperate and not get in each others way. This is all the more important as Wi-Fi will become an essential part of the cellphone communication network for 4G.&lt;/p&gt;
&lt;p style="text-align: justify;" class="western"&gt;To conclude, there are many ways shared spectrum technology could hypothetically work, and in practice the core technologies that are used would dictate the details of the spectrum sharing solution. Spectrum sharing would reduce the regulatory conundrum that is spectrum allocation, and make more efficient use of spectrum &lt;strong&gt;—&lt;/strong&gt; most obviously through trunking efficiency, though there may be other technological benefits depending upon the core technology used. For maximum efficiency and robustness, there would have to be some kind of rules followed, so that devices apply for spectrum like people in a cafeteria queue as opposed to the scrum you might find trying to get into an Indian bus; the etiquette we were talking about earlier should be baked into the design of the communication infrastructure. Some services (like voice calling) by their nature, need a guaranteed high QoS &lt;strong&gt;—&lt;/strong&gt; need to be conflict-free &lt;strong&gt;—&lt;/strong&gt; and therefore need Licensed Shared Access. Others need a minimum of regulation &lt;strong&gt;—&lt;/strong&gt; but with the movement of what used to be CUS-appropriate devices (In many plans for 4G LTE-Advanced, specifically Wi-Fi) towards LSA-appropriate applications, a careful optimization needs to be done in deciding where to draw the line.&lt;/p&gt;
&lt;h3 style="text-align: justify;" class="western"&gt;The Big Question: Infrastructure Sharing&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;We've gone through a thought experiment on intra- and inter-operator sharing of spectrum for the particular case of mobile towers in adjacent cells, and come to the general conclusion that the solution is in principle a question of fast and efficient coordination between the geographically separated towers, toward which there are two driving forces at present: the demand for more efficient use of spectrum by a growing body of users with growing data needs, and the supply of low latency, cheaper and higher bandwidth communication options using fiber-optic cables.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There are essentially two parts to the big question we're going to ask: one, what happens when there are multiple operators serving the same geographical area, and two, is it necessary to have multiple towers standing right next to each other for multiple operators?&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;To answer the first question, one could have a 'roaming' agreement between multiple operators at the same spot: if all the channels of one operator are busy, the user just has to switch to a channel of an operator which isn't.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For the second, a single tower (the physical tower structure as well as the transmitting equipment on it) could serve any operator, who could rent it's usage on a per-call basis. That, in fact, already seems to be the case: Airtel and Vodaphone, for instance, each own a 42% share in India's largest tower corporation Indus Towers, the remaining 16% belonging to Idea Cellular.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/PitampuraTower.png" title="Pitampura Tower" height="264" width="383" alt="null" class="image-inline" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Infrastructure sharing will be explored further in a forthcoming post.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Coarse-grained Spectrum Sharing&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;For completeness, we should point out that there are more course-grained (simpler but less efficient) means of sharing in time as well as geography: the appropriate thought experiment is to imagine a radio station at the base of a hill that only has two shows, one for breakfast and one for dinner. Using its radio spectrum on the other side of that hill, or beyond the area it serves, would be fine at anytime; using it's spectrum in between the morning and evening shows would be fine anywhere.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Caveats&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;It must be emphasized at this point that the above is a purely hypothetical scenario, and not a prescription. Getting this to work would involve technical hurdles that a brief overview such as the one above could not bring up, that could only be discovered in the process of bringing the technology to market. Each technological solution – GSM, CDMA and LTE – would present its own difficulties, which may become apparent only when the product is shipped, so to speak. Fine technical judgments would need to be made: an example of the difficulty involved could be gauged from the early debates comparing the first CDMA standard (IS-95) with GSM at the time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The economic model to use for shared spectrum and shared infrastructure is also something under intense discussion right now, and a number of scholarly papers have already been written up.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. This is what you'd get in your first few Google search results when you look for “shared spectrum”, because the former has become so widely accepted that it's now part of the linguistic background.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. Explained on http://www.radioraiders.com/gsm-frequency.html, referring to 3GPP spec &lt;a class="external-link" href="http://www.3gpp.org/ftp/Specs/latest/Rel-7/45_series/45005-7d0.zip"&gt;http://www.3gpp.org/ftp/Specs/latest/Rel-7/45_series/45005-7d0.zip&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. From &lt;a class="external-link" href="http://www.umtsworld.com/technology/cdmabasics.htm"&gt;http://www.umtsworld.com/technology/cdmabasics.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. From Mike Buehrer, William Tranter-Code Division Multiple Access (CDMA)-Morgan &amp;amp; Claypool Publishers (2006).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. There are multiple definitions; the simplest one is “how many steps (in cells) that you have to walk from the tower before you can reuse the frequency”, which will suffice for us.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. Of course, it's going to be messier in practices.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. From &lt;a class="external-link" href="http://www.vumc.com/branch/PICA/Software/"&gt;http://www.vumc.com/branch/PICA/Software/&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote-western"&gt;[&lt;a name="fn8" href="#fr8"&gt;8&lt;/a&gt;]. Orthogonal for synchronous CDMA, or 'sufficiently' orthogonal for asynchronous CDMA&lt;/p&gt;
&lt;p style="text-align: justify;" class="sdfootnote-western"&gt;[&lt;a name="fn9" href="#fr9"&gt;9&lt;/a&gt;]. Remember that the receiver on the tower has to demux (split) the signals received from many cellphones, and while a Wifi router would perhaps service multiple laptops in the same building, a CDMA tower has to work for a couple of hundred phones at varying distances – some a building-length away and some, many kilometers away. Every receiver has its own maximum signal to noise ratio, where the strength of the signal received has to be more that a certain fraction (which can be quite small, for a good receiver) of the strength of the electromagnetic (radio) noise it receives from other sources; cellphone towers have to deal with much larger signal to noise ratios than Wifi routers. For an FDMA or TDMA system, different users' data arrives at different frequency or time-slots, so as long as those slots are properly differentiated, one user's signal won't be another user's noise. For the commonly used asynchronous CDMA system, however, this is not the case, so at a receiver on a tower, the signal transmitted by a distant cellphone could be swamped by that from a much closer phone. The way this is dealt with is to have phones closer to the tower decrease their transmission power. So even in CDMA, the tower is still telling the phone what to change, only in this case it's the transmission power as opposed to the exact frequency and time.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn10" href="#fr10"&gt;10&lt;/a&gt;]. http://ec.europa.eu/digital-agenda/en/promoting-shared-use-europes-radio-spectrum&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn11" href="#fr11"&gt;11&lt;/a&gt;]. From Mike Buehrer, William Tranter-Code Division Multiple Access (CDMA)-Morgan &amp;amp; Claypool Publishers (2006)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing'&gt;https://cis-india.org/telecom/blog/an-introduction-to-spectrum-sharing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>beli</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Shared Spectrum</dc:subject>
    

   <dc:date>2014-03-20T09:34:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3">
    <title>Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 3)</title>
    <link>https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3</link>
    <description>
        &lt;b&gt;In a three-part study, Ananth Padmanabhan examines the "John Doe" orders that courts have passed against ISPs, which entertainment companies have used to block dozens, if not hundreds, of websites.  In this, the third and concluding part, he looks at the Indian law in the Copyright Act and the Information Technology Act, and concludes that both those laws restrain courts and private companies from ordering an ISP to block a website for copyright infringement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the third part of his study, Ananth Padmanabhan looks into the fair use provisions recently introduced in respect of mere conduit intermediaries by the Copyright (Amendment) Act, 2012, and concludes that there is no scope for any general, or specific, access blocking orders at the behest of the plaintiff in a civil suit, in India. He also argues that the &lt;a class="external-link" href="http://eprocure.gov.in/cppp/sites/default/files/eproc/itact2000.pdf"&gt;Information Technology Act, 2000&lt;/a&gt; read with the&lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt; Information Technology (Intermediaries Guidelines) Rules, 2011&lt;/a&gt; do not in any manner permit the Government to override the provisions of the &lt;a class="external-link" href="http://www.ircc.iitb.ac.in/webnew/Indian%20Copyright%20Act%201957.html"&gt;Copyright Act, 1957&lt;/a&gt; (as amended) while facilitating the denial of access to websites on grounds of copyright infringement, because the Copyright Act, 1957, is a complete code by itself.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Fair Use Provisions Introduced by the Copyright (Amendment) Act, 2012&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In 2010, the &lt;a href="https://cis-india.org/a2k/blogs/copyright-bill-analysis" class="external-link"&gt;controversial Copyright (Amendment) Bill&lt;/a&gt; came up for deliberation before the Parliamentary Standing Committee on Human Resource Development headed by Mr. &lt;a class="external-link" href="http://archive.india.gov.in/govt/rajyasabhampbiodata.php?mpcode=173"&gt;Oscar Fernandes&lt;/a&gt;. While a major part of the discussion on this amendment revolved around the altered royalty structure and rights allocation between music composers and lyricists on the one hand and film producers on the other, it can be safely stated that this is the most significant amendment to the Copyright Act, 1957 for more than this one reason. The amendment seeks to reform the Copyright Board, bring in a scheme of statutory licenses, expand the scope of performers’ rights and introduce anti-circumvention measures to check copyright piracy. As part of its ambitious objective, the amendment also attempts a new fair use model to protect intermediaries and file-sharing websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Copyright (Amendment) Act, 2012, which gives expression to this fair use model through Sections 52(1)(b) and (c), reads thus:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;52. Certain acts not to be infringement of copyright&lt;/i&gt;&lt;/b&gt;&lt;i&gt;. - (1) The following acts shall not constitute an infringement of copyright, namely:&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(a) to (ad) - *****&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(b) the transient or incidental storage of a work or performance purely in the technical process of electronic transmission or communication to the public;&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(c) transient or incidental storage of a work or performance for the purpose of providing electronic links, access or integration, where such links, access or integration has not been expressly prohibited by the right holder, unless the person responsible is aware or has reasonable grounds for believing that such storage is of an infringing copy:&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Provided that if the person responsible for the storage of the copy has received a written complaint from the owner of copyright in the work, complaining that such transient or incidental storage is an infringement, such person responsible for the storage shall refrain from facilitating such access for a period of twenty-one days or till he receives an order from the competent court refraining from facilitating access and in case no such order is received before the expiry of such period of twenty-one days, he may continue to provide the facility of such access;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From a plain reading, it is clear that two important exceptions are carved out: one, in respect of the technical process of electronic transmission and the other, in respect of providing electronic links, access or integration. The material distinction between these exceptions is the presence of a take-down &lt;i&gt;proviso &lt;/i&gt;in respect of the latter kind of activity, ie. when providing electronic links, access or integration. This window of opportunity is not provided to the copyright owner when the third party is an ISP involved in the pure technical process of electronic transmission of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;R.K. Productions&lt;/i&gt;, the court was not informed of the introduction of these provisions &lt;i&gt;vide&lt;/i&gt; the Copyright (Amendment) Act, 2012, despite the hearing happening on a date subsequent to the amendment coming into force. This probably influenced the outcome as well, since the court held that ISPs were liable to block access to infringing content, once the specific webpage was brought to the notice of the concerned ISP. Newly introduced Section 52(1)(b) however makes it abundantly clear that ISPs cannot, in any manner, be held liable when they are acting as mere conduit pipes for the transmission of information. This legal position is also materially different from jurisdictions such as the United Kingdom where, the ISPs though not liable for copyright infringement, are statutorily mandated to lend all possible assistance such as take-down or blocking of access upon notice of infringement being furnished to them. This dichotomy between liability for infringement on the one hand and a general duty to assist in the prevention of infringement on the other is explained clearly by the Chancery Division in &lt;i&gt;Twentieth Century Fox Film Corporation v. British Telecommunications Plc.&lt;/i&gt;&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Newzbin2&lt;/i&gt;, the Chancery Division took note of the safe harbour provisions created by the E-Commerce Directive,&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;particularly Articles 12 to 14 that dealt with acting as a “mere conduit”, caching and hosting respectively. The interesting feature with the “mere conduit” exception, which in all other respects is akin to the exception contained in Section 52(1)(b) of the Copyright Act, 1957, is the additional presence of Article 12(3). This provision clarifies that the “mere conduit” exception shall not stand in the way of a court or administrative authority requiring the service provider to terminate or prevent an infringement. Article 18 of this Directive also casts an obligation upon Member States to ensure that court actions available under national law permit the rapid adoption of measures, including interim measures, designed to terminate any alleged infringement and to prevent any further impairment of the interests involved. Similarly, the court looked into the Information Society Directive,&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 8(3) of which provides that “Member States shall ensure that rightholders are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe a copyright or related right.” This Directive was transposed into the domestic law in UK by the Copyright and Related Rights Regulations 2003, SI 2003/2498, resulting in the insertion of Section 97A in the Copyright, Designs and Patents Act 1988. This provision empowers the court to grant an injunction against a service provider who has actual knowledge of another person using their service to infringe copyright, such as where the service provider is given sufficient notice of the infringement. Finally, the Chancery Division also took note of the Enforcement Directive,&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 11 of which provided that Member States shall ensure that copyright owners are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe an intellectual property right. This entire legislative scheme compelled the court in &lt;i&gt;Newzbin2&lt;/i&gt; to conclude that an order of injunction could be granted against ISPs who are “mere conduits”, restraining them from providing access to websites that indulged in mass copyright infringement. The court reasoned that the language used in Section 97A did not require knowledge of any particular infringement but only a more general kind of knowledge about certain persons using the ISPs’ services to infringe copyright. Thus, it is seen that in the United Kingdom, though a “mere conduit” activity is not infringement at all, the concerned ISP can be directed by the court to block access to a website that hosts infringing content on the basis of the above legislative scheme. The enquiry should therefore be directed towards whether India has a similar scheme for copyright enforcement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Information Technology Act – An Inapplicable Scheme for Website Blocking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act, 2000&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;read with certain recently framed guidelines provides for a duty that could be thrust upon even “mere conduit” ISPs to disable access to copyrighted works. This is due to the presence of Section 79(2)(c) of this Act, which makes it clear that an intermediary shall be exempt from liability only where the intermediary observes due diligence as well as complies with the other guidelines framed by the Central Government in this behalf. Moreover, Section 79(3) provides that the intermediary shall not be entitled to the benefit of the exemption in Section 79(1) in a situation where the intermediary, upon receiving actual knowledge that any information, data, or communication link residing in or connected to a computer resource controlled by the intermediary is being used to commit an unlawful act, fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner. In pursuance of Section 79(2)(c), the Central Government has also framed the Information Technology (Intermediaries Guidelines) Rules, 2011, which came into effect on 11.04.2011. Rule 4 of these Rules, when read along with Rule 2(d), casts obligation on an intermediary on whose computer system, copyright infringing content has been &lt;i&gt;stored, hosted or published&lt;/i&gt;, to &lt;i&gt;disable&lt;/i&gt; such information within thirty six hours from when it is brought to actual knowledge of the existence of such content by any affected person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One way of understanding and interpreting in harmonious fashion, the provisions of the IT Act and the Rules therein and the recent amendments to the Copyright Act, is to contend that the issue of infringement of copyright by “mere conduit” ISPs is governed by Section 52(1)(b), which completely absolves them of any liability, while that of enforcement of copyright through the medium of such ISPs is governed by the IT Act. This bifurcation suffers from the difficulty that Section 79 of the IT Act is not an enforcement provision. It is a provision meant to exempt intermediaries from certain kinds of liability, in the same way as Section 52 of the Copyright Act. This provision, read with Section 81, makes it clear that the IT Act does not speak to liability for copyright infringement. From this, it has to necessarily follow that all issues pertaining to liability for such infringement have to be decided by the provisions of the Copyright Act. Therefore, the scheme in the IT Act read with the Intermediaries Guidelines Rules cannot confer additional liability for copyright infringement on ISPs where the Copyright Act exempts them from liability. More to the point, the intermediary cannot be liable for copyright infringement in the event of non-compliance with Section 79(3) or Rule 4 of the Intermediaries Guidelines Rules read with Section 79(1)(c) of the IT Act. Rule 4 of the Intermediaries Guidelines Rules, 2011, to the extent that it renders intermediaries outside the protective ambit of Section 79(1) upon failure to disable access to copyrighted content, is of no relevance as “mere conduits” have already been exempted from liability under Section 52(1)(b). Moreover, since these provisions in the IT Act do not deal with enforcement measures such as injunction orders from the court to disable access to infringing content in particular or infringing websites in general, it would be wrong to contend that the scheme in India is similar to the one in the United Kingdom where the issue of infringement has been divorced from that of enforcement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, Section 52(1)(b) is a blanket “mere conduit” exemption from liability for copyright infringement that stands uninfluenced by the presence of Section 79 of the IT Act or the Intermediaries Guidelines Rules. In the absence of a legislative scheme for enforcement in India akin to Section 97A of the UK Copyright, Designs and Patents Act 1988, Indian Courts cannot grant an injunction directing such “mere conduit” ISPs to block access to websites in general or infringing content in particular and any such action is not even maintainable in law post the insertion of Section 52(1)(b). The decision to the contrary in the &lt;i&gt;R.K.Productions &lt;/i&gt;case is incorrect.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. [2011] EWHC 1981 (Ch.). Hereinafter referred to as &lt;i&gt;Newzbin2.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. European Parliament and Council Directive 2000/31/EC on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (8 June 2000). This Directive was transposed into the domestic law in UK by the Electronic Commerce (EC Directive) Regulations 2002, SI 2002/2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. European Parliament and Council Directive 2001/29/EC on the harmonisation of certain aspects of copyright and related rights in the information society (22 May 2001).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. European Parliament and Council Directive 2004/48/EC on the enforcement of intellectual property rights (29 April 2004). This Directive was transposed into the UK domestic law primarily by the Intellectual Property (Enforcement, etc.) Regulations 2006, SI 2006/1028.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Hereinafter referred to as the IT Act.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3'&gt;https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ananth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-02-14T05:13:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2">
    <title>Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 2)</title>
    <link>https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2</link>
    <description>
        &lt;b&gt;In a three-part study, Ananth Padmanabhan examines the "John Doe" orders that courts have passed against ISPs, which entertainment companies have used to block dozens, if not hundreds, of websites.  In this, the second part, he looks at the law laid down by the U.S. Supreme Court and the Delhi High Court on secondary and contributory copyright infringement, and finds that those wouldn't allow Indian courts to grant "John Doe" orders against ISPs.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the second part of his study, Ananth Padmanabhan proceeds to examine applying a general theory of secondary or contributory copyright infringement against ISPs. He traces the basis for holding a third party liable as a contributory by closely examining the decisions of the U.S. Supreme Court in Sony Corp. v Universal City Studios&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;and MGM Studios, Inc. v Grokster, Ltd.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;and concludes that this basis does not hold good in the case of a mere conduit intermediary such as an ISP.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. 464 U.S. 417 (1984). Hereinafter referred to as &lt;i&gt;Betamax&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. 545 U.S. 913 (2005). Hereinafter referred to as &lt;i&gt;Grokster.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Primary and Secondary Infringement&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Liability for copyright infringement can either be primary or secondary in character. In the case of ISPs, liability as primary infringers does not arise at all, and it is in their capacity as conduit pipes facilitating the transmission of information that they could be held secondarily liable. Even in such cases, the contention of copyright owners is that once the ISP is notified of infringing content, it has the primary responsibility of preventing access to such content. This contention is essentially rooted in a theory of secondary infringement based on knowledge and awareness, and the means to prevent further infringement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The controversy around a suitable model of secondary infringement is reflected in two judicial pronouncements – separated by a gap of more than two decades – delivered by the U.S. Supreme Court. In &lt;i&gt;Sony Corp. v Universal City Studios&lt;/i&gt;,[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;] the US Supreme Court held that the manufacturers of home video recording devices known in the market as Betamax would not be liable to copyright owners for secondary infringement since the technology was capable of substantially non-infringing and legitimate purposes. The U.S. Supreme Court even observed that these time-shifting devices would actually enhance television viewership and hence find favour with majority of the copyright holders too. The majority did concede that in an appropriate situation, liability for secondary infringement of copyright could well arise. In the words of the Court, “&lt;i&gt;vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the circumstances in which it is just to hold one individual accountable for the actions of another&lt;/i&gt;”. However, if vicarious liability had to be imposed on the manufactures of the time-shifting devices, it had to rest on the fact that they sold equipment with constructive knowledge of the fact that their customers &lt;i&gt;may&lt;/i&gt; use that equipment to make unauthorized copies of copyrighted material. In the view of the Court, there was no precedent in the law of copyright for the imposition of vicarious liability merely on the showing of such fact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notes of dissent were struck by Justice Blackmun, who wrote an opinion on behalf of himself and three other judges. The learned Judge noted that there was no private use exemption in favour of making of copies of a copyrighted work and hence, unauthorised time-shifting would amount to copyright infringement. He also concluded that there was no fair use in such activity that would exempt it from the purview of infringement. The dissent held the manufacturer liable as a contributory infringer and reasoned that the test for contributory infringement would only be whether the contributory infringer had &lt;i&gt;reason to know or believe &lt;/i&gt;that infringement would take place and &lt;i&gt;not whether he actually knew of the same&lt;/i&gt;. Off-the-air recording was not only a foreseeable use for the Betamax, but also its intended use, for which Sony would be liable for copyright infringement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This dissent has considerably influenced the seemingly contrarian position taken by the majority in the subsequent decision, &lt;i&gt;MGM Studios, Inc. v Grokster, Ltd.&lt;/i&gt;&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; This case called into question the liability of websites that facilitated peer-to-peer (P2P) file-sharing. Re-formulating the test for copyright infringement, the US Supreme Court held that ‘&lt;i&gt;one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties&lt;/i&gt;’. In re-drawing the boundaries of contributory infringement, the Court observed that contributory infringement is committed by any person who intentionally induces or encourages direct infringement, and vicarious infringement is committed by those who profit from direct infringement while declining to exercise their right to limit or stop it. When an article of commerce was good for nothing else but infringement, there was no legitimate public interest in its unlicensed availability and there would be no injustice in presuming or imputing intent to infringe in such cases. This doctrine would at the same time absolve the equivocal conduct of selling an item with substantial lawful as well as unlawful uses and would limit the liability to instances of more acute fault than the mere understanding that some of the products shall be misused, thus ensuring that innovation and commerce are not unreasonably hindered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court distinguished the case at hand from &lt;i&gt;Betamax&lt;/i&gt;, and noted that there was evidence here of active steps taken by the respondents to encourage direct copyright infringement, such as advertising an infringing use or instructing how to engage in an infringing use. This evidence revealed an affirmative intent that the product be used to infringe, and an &lt;i&gt;active &lt;/i&gt;encouragement of infringement. Without reversing the decision in &lt;i&gt;Betamax&lt;/i&gt;, but holding that it was misinterpreted by the lower court, the Court observed that &lt;i&gt;Betamax&lt;/i&gt; was not an authority for the proposition that whenever a product was capable of substantial lawful use, the producer could never be held liable as a contributory for the use of such product for infringing activity by third parties.&lt;i&gt; &lt;/i&gt;In the view of the Court, &lt;i&gt;Betamax &lt;/i&gt;did not displace other theories of secondary liability.&lt;i&gt; &lt;/i&gt;This other theory of secondary liability applicable to the case at hand was held to be the inducement rule, as per which any person who distributed a device with the object of promoting its use to infringe copyright, as evidenced by clear expression or other affirmative steps taken to foster infringement, would be liable for the resulting acts of infringement by third parties. However, the Court clarified that &lt;i&gt;mere knowledge of infringing potential or of actual infringing uses would not be enough&lt;/i&gt; under this rule to subject a distributor to liability. Similarly, ordinary acts incident to product distribution, such as offering customers technical support or product updates, support liability etc. would not by themselves attract the operation of this rule. The inducement rule, instead, premised liability on &lt;i&gt;purposeful, culpable expression and conduct&lt;/i&gt;, and thus did nothing to compromise &lt;i&gt;legitimate&lt;/i&gt; commerce or discourage innovation having a &lt;i&gt;lawful&lt;/i&gt; promise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These seemingly divergent views on secondary infringement expressed by the U.S. Supreme Court are of significant relevance for India, due to the peculiar language used in the Indian Copyright Act, 1957.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 51 of the Act, which defines infringement, bifurcates the two types of infringement – ie. primary and secondary infringement – without indicating so in as many words. While Section 51(a)(i) speaks to primary infringers, 51(a)(ii) and 51(b) renders certain conduct to be secondary infringement. Even here, there is an important distinction between 51(a)(ii) and 51(b). The former exempts the alleged infringer from liability if he could establish that &lt;i&gt;he was not aware and had no reasonable ground for believing that &lt;/i&gt;the communication to the public, facilitated through the use of his “place”, would amount to copyright infringement. The latter on the other hand permits no such exception. Thus, any person, who makes for sale or hire, or by way of trade displays or offers for sale or hire, or distributes for the purpose of trade, or publicly exhibits by way of trade, or imports into India, any infringing copies of a work, shall be liable for infringement, without any specific &lt;i&gt;mens rea&lt;/i&gt; required to attract such liability. It is in the context of the former provision, ie. 51(a)(ii) that the liability of certain file-sharing websites for copyright infringement has arisen.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mere Conduit ISPs – Secondary Infringement Absent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;MySpace&lt;/i&gt;, the Delhi High Court examined the liability for secondary infringement on the part of a website that provides a platform for file-sharing. While holding the website liable, the Single Judge considered material certain facts such as the revenue model of the defendant, which depended largely on advertisements displayed on the webpages, and automatically generated advertisements that would come up for a few seconds before the infringing video clips started playing. Shockingly, the Court even considered relevant the fact that the defendant did provide for safeguards such as hash block filters, take down stay down functionality, and rights management tools operational through fingerprinting technology, to prevent or curb infringing activities being carried on in their website. This, in the view of the Court, made it evident that the defendant had a &lt;i&gt;reasonable apprehension or belief &lt;/i&gt;that the acts which were being carried on in the website &lt;i&gt;could&lt;/i&gt; infringe someone else’s copyright including that of the plaintiff. The logic employed by the Court to attribute liability for secondary infringement on file-sharing websites is befuddling and reveals complete disregard for the degree of regulatory authority available on the internet even where the space, i.e., the website, is supposedly “under the control” of a person. However, a critical examination of this decision is not relevant in understanding the liability of mere conduit ISPs. This is for the reason that none of the factual considerations relied on by the Single Judge to justify imposition of liability on a file-sharing website under Section 51(a)(ii) arise when the defendant is an ISP that only provides the path for content-neutral transmission of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was completely ignored by the Madras High Court in &lt;i&gt;R.K.Productions v. B.S.N.L.&lt;/i&gt;,&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;where the producers of the Tamil film “3”, which enjoyed considerable pre-release buzz due to its song “Kolaveri Di”, sought an omnibus order of injunction against all websites that host torrents or links facilitating access to, or download of, this film. Though this was worded as a John Doe plaint by branding the infringers as unknown administrators of different torrent sites and so on, the real idea was to look to the resources and wherewithal of the known defendants, ie. the ISPs, to block access to the content hosted by the unknown defendants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This prompted the ISPs to file applications under Or. VII, Rule 11 of the Civil Procedure Code, seeking rejection of the plaint on the ground that the suit against them was barred by law. The Single Judge of the Madras High Court dismissed these applications for rejection of the plaint, after accepting the contention that the ISPs are necessary parties to the suit as the act of piracy occurs through the channel or network provided by them. The High Court heavily, and incorrectly, relied on MySpace without appreciating the distinction between a mere conduit ISP and a file-sharing website such as MySpace or YouTube, as regards their respective roles and responsibilities, the differing degrees of regulatory control over content enjoyed by them, and most importantly, the recognition and formalisation of these distinctions in the Copyright Act, 1957, vide the Copyright (Amendment) Act, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. 464 U.S. 417 (1984). Hereinafter referred to as Betamax.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. 545 U.S. 913 (2005). Hereinafter referred to as Grokster.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Hereinafter the Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;Super Cassette Industries Ltd. v MySpace Inc.&lt;/i&gt;, MIPR 2011 (2) 303 (hereinafter referred to as &lt;i&gt;MySpace&lt;/i&gt;). This decision of the Delhi High Court has been rightly criticised. &lt;i&gt;See &lt;/i&gt;&lt;a href="https://cis-india.org/a2k/blogs/super-cassettes-v-my-space"&gt;http://cis-india.org/a2k/blog/super-cassettes-v-my-space&lt;/a&gt; (last accessed on 24.03.2013).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2'&gt;https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ananth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-03-06T16:48:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights">
    <title>The Right of Persons with Disabilities Bill 2013 and the Lack of Access to Accessibility Rights</title>
    <link>https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights</link>
    <description>
        &lt;b&gt;The Rights of Persons with Disabilities Bill, 2013 (The RPD Bill) went through three avatars since its commissioning in 2009 under the Sudha Kaul Committee. This blog post brings you a summary of the three stages since it was initially commissioned.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The first was the one the Committee proposed in 2011, after consultations with persons with disabilities and Disabled People's Organizations across the country; the second was &lt;a class="external-link" href="http://www.socialjustice.nic.in/pdf/draftpwd12.pdf"&gt;notified by the Ministry of Social Justice and Empowerment in 2012&lt;/a&gt;, which was in parts opposed to by several stakeholders; and the third, the &lt;a class="external-link" href="http://www.thehindu.com/news/national/cabinet-okays-disabilities-bill/article5456834.ece"&gt;RPD BIll of 2013&lt;/a&gt;, has actually brought the entire disability lobby, as it were, together, in being entirely appalled at the turn of events. The Bill, which is being furiously evaluated in the short time available between its being made available to the public and its impending introduction (and possible passing in the House), is full of flaws. Not only does it not adhere to the standards of the UNCRPD, but it also violates the spirit of the Indian Constitution, as well as contradicting existing case law, and most importantly it betrays the consensus and recommendations of persons with disabilities who were initially part of these recommendations. &lt;br /&gt;&lt;br /&gt;Doubtlessly, while access to government establishments and entities like courts, collectorates, municipal offices, is important for persons with disabilities, there are other establishments which are equally important for persons with disabilities, for purposes of recreation, access to culture, and private services. I've made the point elsewhere that the law proposed is less of an empowering statute and more on the lines of the charity model – and in line with that, the indication is that persons with disabilities will only ever have to come in contact with the government and other entities, so they can enforce rights, take grants, petition government servants, etc. But if the statute itself is rights based, why so much focus on access to forums for rights enforcement, and not on others beyond this?&lt;br /&gt;&lt;br /&gt;While they did have their flaws, the &lt;a class="external-link" href="http://www.socialjustice.nic.in/pwd2011.php"&gt;2011 and 2012 versions of the Bill&lt;/a&gt;, which had rather comprehensive provisions with regard to ensuring accessibility. To start with, the right of persons with disabilities, on an equal basis with others to the physical environment, transportation, information and communications, including appropriate technologies and systems, and other facilities and services open or provided to the public, both in urban and in rural areas, was  recognized. The RPD Bill recognizes the obligation of the government to provide accessibility measures, but by now wording it in terms of a right, it does not do complete justice. The 2011 and 2012 drafts were replete with separate sections on the right to transport, personal mobility, communications, services, the built environment, etc. On the other hand, the RPD Bill clumsily lops all of these into a few sections, with repeated emphasis on infrastructure and services run by "establishments", which is, in effect, the government. There is no mention of website accessibility, though a cursory mention is made to the appropriate government ensuring that all contents available in audio, print and electronic media are in accessible format; and that persons with disabilities have access to electronic media by providing audio description, sign language interpretation and close captioning. Again, the ambiguity as to whether this extends to websites which are not run by the government, is not clear. &lt;br /&gt;&lt;br /&gt;There is another aspect to accessibility which is lost under the Act by its failure to recognize it as a right. A senior person in the sector, who is blind, told me of an instance where he was barred from entering a bar with some friends. "You won't be able to tell what the bill is or how many drinks you've had", said the manager. He was therefore, being discriminated against entering a place, solely on the grounds of his disability. Persons who have been cured of leprosy are denied access to transport and other public facilities on the basis of outdated statutes. Persons who use crutches and calllipers are denied entry to religious places. The understanding of the Bill on accessibility is extremely limited, and limited to the built environment of government establishments, and this does nothing to extend the rights of persons with disabilities. Groups which are forwarding non negotiables for amendments to the Bill do not consider, at present, the right to accessibility to be a non negotiable. I do wonder, however, whether any of the other rights make sense when express and implied bars to access exist and are effectively encouraged, under this proposed law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights'&gt;https://cis-india.org/accessibility/blog/rights-of-persons-with-disabilities-bill-2013-and-lack-of-access-to-accessibility-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>salelkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-02-03T02:21:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia">
    <title>CIS-A2K: Work Accomplished on Konkani Wikipedia</title>
    <link>https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society’s Access to Knowledge (CIS-A2K team) is pleased to share with you the key accomplishments about the work it accomplished on Konkani Wikipedia from September to December 2013 in this report. In accordance with the Centre for Internet and Society’s Access to Knowledge Program’s (CIS-A2K) Konkani Work Plan 2013-14 the program has invested time and effort to build Konkani Wikimedia community and projects.&lt;/b&gt;
        &lt;h2&gt;Highlights&lt;/h2&gt;
&lt;h3&gt;Increased editing activity on Konkani Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K has been organising different programs and workshops. The idea is to bring in as many volunteers as possible who can contribute to Konkani Wikipedia for years to come. We have organised these outreach sessions mainly in Devanagari, Romi and Kannada scripts. As a result of these programs we have been able to significantly increase no. of editors, consistently have minimum of 5-6 active editors per month and build a community of volunteers. You can also view level of editing activity on Konkani Wikipedia for the past few months in the chart below:&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/EditsonKonkaniWikipedia.png" alt="Edits on Konkani Wikipedia" class="image-inline" title="Edits on Konkani Wikipedia" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Above: Edits Per Month on Konkani Wikipedia (Mar-13 to Dec-13) (by Nitika Tandon, CC-BY-SA 3.0) &lt;/i&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Increased number of articles on Konkani Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Total number of articles increased from 150 in Sep 2013 to 315 in Nov 2013. The number of articles have doubled over a period of 3 months. We should keep in mind that out of those who edited in Devanagari; 95% of them were completely new to the input method and had to spend considerable time learning and practicing it.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ArticlesonKonkaniWikipedia.png" alt="Articles on Konkani Wikipedia" class="image-inline" title="Articles on Konkani Wikipedia" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Above: No. of articles on Konkani Wikipedia (by Nitika Tandon, CC-BY-SA 3.0)&lt;/i&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Translated Media Wiki messages&lt;/h3&gt;
&lt;p&gt;CIS-A2K organised translation sprint to help translate Media Wiki interface messages. We achieved translating &lt;a class="text external" href="http://translatewiki.net/w/i.php?title=Special:Translate&amp;amp;language=gom-deva&amp;amp;group=core-0-mostused&amp;amp;filter=&amp;amp;action=translate" rel="nofollow"&gt;79% of these messages in Konkani Devanagari&lt;/a&gt; while all &lt;a class="text external" href="http://translatewiki.net/w/i.php?title=Special:Translate&amp;amp;language=gom-latn&amp;amp;group=core-0-mostused&amp;amp;filter=&amp;amp;action=translate" rel="nofollow"&gt;100% messages have already been translated in Romi script&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Re-release of Konkani Vishwaksh under Creative Commons License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Upon CIS-A2K‘s explicit request, Goa University has approved the  re-release of Vishwakosh under Creative Commons License (CC-BY-SA 3.0)  to make it freely available to public, giving them the right to share,  use and even build upon the work that has already been done. This is a  huge step to help preserve Konkani language and culture in the digital  era. Konkani Vishwakosh is a four-volume hard copy encyclopedia (3632  pages) published by Goa University; a work that took over 14 years to  develop. It encompasses the world’s information in a nutshell with  special emphasis and detailed information on Goa, Konkani, Goan culture,  folklore, history, geography etc. To know more about click &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Konkani_Vishwakosh_CC" title="India Access To Knowledge/Events/Konkani Vishwakosh CC"&gt;here&lt;/a&gt; and &lt;a class="text external" href="http://blog.wikimedia.org/2013/11/26/konkani-vishkawosh-free-license/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Initiated &amp;amp; Completed 30% of Konkani Vishwakosh Digitization Project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Goa University in collaboration with the CIS-A2K is digitizing Konkani  Vishwakosh. 37 participants are enrolled in this project who are working  to digitize the encyclopedia in a time bound manner. All 3632 pages of  Konkani Vishwakosh will be digitized. The program started on 19th  October and in just about 2 months 30% of the encyclopedia had already  been digitized. You can monitor the progress of this project on  Wikisource. Here are the links for &lt;a class="text external" href="https://wikisource.org/wiki/Index:Konkani_Viswakosh_Vol1.pdf"&gt;Volume 1&lt;/a&gt;, &lt;a class="text external" href="https://wikisource.org/wiki/Index:Konkani_Viswakosh_Vol2.pdf"&gt;Volume 2&lt;/a&gt;, &lt;a class="text external" href="https://wikisource.org/wiki/Index:Konkani_Viswakosh_Vol3.pdf"&gt;Volume 3&lt;/a&gt; and &lt;a class="text external" href="https://wikisource.org/wiki/Index:Konkani_Vishwakosh_-_Volume_4_Released.pdf"&gt;Volume 4&lt;/a&gt;.  Please note that some of the participants firstly digitize the  encylopedia either in their Sandbox or offline and then move it to  Wikisource. To know more about the project click &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Konkani_Vishwakosh_Digitization" title="India Access To Knowledge/Events/Konkani Vishwakosh Digitization"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Signed an MoU with Goa University&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Goa University entered into a three year MoU with CIS for building Konkani Wikipedia. As part of this partnership, Goa University and CIS-A2K will work together to help build Konkani Wikipedia and community.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;White paper by a Linguist&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="text external" href="https://en.wikipedia.org/wiki/Pratap_Naik"&gt;Fr. Pratap Naik&lt;/a&gt;,  S.J. B.Sc., B.Ed. M.A. (Linguistics), M.Phil. (Linguistics), Ph.D.  (Linguistics) has written a white paper discussing issues faced by  Konkani language and his views on how it should be dealt on Wikimedia  projects. We'll soon upload the white paper on Wikimedia Commons and  make the link available.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;14 Outreach session, over 450 participants, in 3 months&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K organised about 14 outreach sessions and reached out to over 450  people to create awareness about Konkani Wikipedia and the community  between Sep-Dec 2013. Details of these sessions can be found &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Konkani_Wikipedia_@Goa_University/Events" title="India Access To Knowledge/Konkani Wikipedia @Goa University/Events"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Got consensus from field experts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past few months CIS-A2K has spoken with Konkani Wikipedians (such as &lt;a class="text external" href="https://incubator.wikimedia.org/wiki/User:Fredericknoronha"&gt;Frederick Noronha&lt;/a&gt;, &lt;a class="text external" href="https://incubator.wikimedia.org/wiki/User:Deepak_D%27Souza"&gt;Deepak D'Souza&lt;/a&gt;, Seby Fernandes) Konkani linguists (such as Fr. Pratap), professors from Konkani Department at Goa University (&lt;a class="text external" href="https://en.wikipedia.org/wiki/Madhavi_Sardesai"&gt;Dr. Madhavi Sardesai&lt;/a&gt; and &lt;a class="text external" href="http://www.unigoa.ac.in/academic_staff.php?staffid=40&amp;amp;adepid=7&amp;amp;mdepid=1" rel="nofollow"&gt;Dr. Priyadarshini Tadkodkar&lt;/a&gt;), cultural experts (such as Prof. Alito Siqueira and &lt;a href="https://meta.wikimedia.org/wiki/User:Outofindia" title="User:Outofindia"&gt;Harriet Vidyasagar&lt;/a&gt;)  and other experts to propose a solution for Konkani Wikipedia that  faces a problem of usage of multiple scripts. To a great extent we have  got consensus from different field experts that we should strive to  create separate Wikis for each script, at least those which prove to be  active.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedians Speak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the ongoing projects of CIS-A2K is 'Wikipedians Speak' which are small videos of Wikipedians that captures their expereinces, learnings and challenges. As a part of this project CIS-A2K published several videos of Konkani Wikipedians.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/User:Nitika.t/Draft2"&gt;Link to the post published on Wikipedia&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia'&gt;https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nitika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Konkani Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-12-31T11:48:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013">
    <title>CIS-A2K Narrative Report (September 2012 – June 2013)</title>
    <link>https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013</link>
    <description>
        &lt;b&gt;This narrative report captures the work done by the Access to Knowledge (CIS-A2K) team in the first ten months of the grant. The report also throws some light on the CIS-A2K program strategy in the next one year.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This narrative report was originally published on the Wikipedia page. &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Reports/CIS-A2K_Narrative_Report:_%28September_2012_%E2%80%93_June_2013%29"&gt;Access it here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: left; "&gt;Background to the Access to Knowledge Programme&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_Foundation"&gt;Wikimedia Foundation&lt;/a&gt; approved a &lt;a href="https://cis-india.org/about/news/wikimedia-foundation-awards-grant-to-cis"&gt;grant&lt;/a&gt; to support the growth of Indian language Wikimedia communities to the &lt;a href="https://cis-india.org/a2k"&gt;Centre for Internet &amp;amp; Society (CIS) &lt;/a&gt;to expand their &lt;a href="https://meta.wikimedia.org/wiki/India_Access_to_Knowledge"&gt;Access to Knowledge program (A2K)&lt;/a&gt; in India. The grant enabled CIS to work with the Wikimedia community of volunteers in India to expand upon Wikimedia’s Indic language free knowledge projects, including Wikipedia in Indic languages. Further, the grant aims to generate improvements in India-relevant free knowledge in Wikimedia’s English projects and wider distribution of Wikimedia’s free knowledge within India.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Section A: Introduction&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Objective of the Narrative Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This narrative report captures the work done by the A2K program during the period of September 2012 to June 2013. It examines projects and activities and its impact and outcomes over a period of the initial Ten months of the Grant. This report will also inform CIS-A2K program’s strategy for the next one year to achieve the goals set out by its donor, Wikimedia Foundation, and &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan"&gt;goals&lt;/a&gt; listed in our &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014"&gt;Work Plans&lt;/a&gt; (which were developed in consultation with the Wikimedia community in India). Importantly, this Narrative Report is critical for the Wikimedia community in India, Global Wikimedia community and the Wikimedia Foundation to get a comprehensive overview of A2K’s work and to critically assess the A2K program’s eligibility for further support.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Context&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though the mandate of the CIS-A2K program was clearly articulated before the commencement of the program, it should be noted, that the context in which the program had to undertake its work was very disturbed. Majority of the Wikimedia community in India saw CIS-A2K as an extension of the India Program as the entire team of the India Program moved into the CIS’s A2K program, except for the Director. Thus the CIS-A2K program inherited the not so conducive image of the India Program that was operational until August 2012. It should be noted that by August 2012, the Wikimedia community in India was extremely critical of the India Program’s work and achievement.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the community explicitly expressed lack of faith and Trust in the India Program’s method of work.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Thus, it is important to note that the CIS-A2K program did not start with a clean slate but had to first address multiple challenges, before it could take on active implementation of various programmatic activities. These challenges include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;building trust with the Wikimedia community in India;&lt;/li&gt;
&lt;li&gt;building a collaborative relationship with Wikimedia India Chapter;&lt;/li&gt;
&lt;li&gt;finding a new leadership to anchor the program that was left vacant in August 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;A2K Program Achievements (September 2012 to June 2013)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS Access to Knowledge (A2K) team started working on facilitating the improvement of Indian language Wikimedia projects with special focus on Indic Wikipedias in September 2012. Some key activities during the period of September 2012 to June 2013 are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Number of newsletters published: 10&lt;/li&gt;
&lt;li&gt; Number of events conducted: 49&lt;/li&gt;
&lt;li&gt; Number of Wikipedia Education Programs conducted: 5&lt;/li&gt;
&lt;li&gt; Number of people reached: about 1314&lt;/li&gt;
&lt;li&gt; Number of women participants: approximately 406 (30.9%)&lt;/li&gt;
&lt;li&gt; Number of community meet-ups &amp;amp; IRCs: 13&lt;/li&gt;
&lt;li&gt; Number of sites across India where Wikimedia events were conducted: 18&lt;/li&gt;
&lt;li&gt; Number of valid usernames: 582&lt;/li&gt;
&lt;li&gt; Number of blogs posted: 58&lt;/li&gt;
&lt;li&gt; Number of Print and Electronic Media mentions: 28&lt;/li&gt;
&lt;li&gt; Number of Hackathons supported: 2&lt;/li&gt;
&lt;li&gt; Number of community celebration events: 7&lt;/li&gt;
&lt;li&gt; Number of Institutional partnerships: 13&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;CIS hired A2K Programme Director, &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;T. Vishnu Vardhan&lt;/a&gt;, through an open and multi-stakeholder process of selection.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;Representatives from Wikimedia India Chapter, Wikimedia community in India and Wikimedia Foundation were actively part of the selection process. This process was extremely critical and ensured participation of the Wikimedia community in India and the WMIN Chapter in deciding the leadership of the program.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Noted academician Dr. Tejaswini Niranjana was hired as Adviser to A2K.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; This was done upon the request of the selection committee that was constituted for the selection of the program Director and in consultation with the WMF.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A2K proactively interacted with the WMIN Chapter Executive Committee and built collaborative working relationship.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Most of the A2K programs executed in collaboration with WMIN Chapter and community.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Began a new project on &lt;a href="http://geohacker.github.io/indicwiki"&gt;visualisation of the growth of Indic Wikipedias &lt;/a&gt;&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Sajjad Anwar and Sumandro are working on this. Two blog posts have been published so far. This was appreciated by the Wikimedia community in India and the WMF. Further, the WMF has expressed interest in extending these visualizations at a global level.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A2K has successfully reached out to the Wikipedians across Indian Language communities through conducting outreach programs, resolving technical bugs, supporting with required logistics, merchandise and media publicity, building public relations and communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014" title="India Access To Knowledge/Work plan April 2013 - June 2014"&gt;Work-plans&lt;/a&gt; for the growth of Indic Wikipedias&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; were developed in a participatory manner with active collaboration from Wikimedia community in India and Wikimedia India Chapter Executive Committee.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proactive open disclosure of &lt;a class="text external" href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Grant_Budget_and_Utilization_Sept12_-Feb13.pdf"&gt;A2K budget&lt;/a&gt;. and proposed revisions to the budget seeking feedback from the Wikimedia community in India towards building transparency.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS-A2K gave significant media visibility to Indian Language Wikipedias both in print and electronic media.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Section B: A2K Programme Impact&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In discussing the A2K program’s impact we have presented below both the tangible and intangible aspects of our work.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Intangible Impact&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The A2K team has left no stone unturned since the commencement of the program in September 2012 to work in a transparent manner. We have taken the following measures in being transparent:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Periodic publication of A2K work and outcomes through monthly newsletters.&lt;/li&gt;
&lt;li&gt; Circulation of A2K monthly newsletters and notifications on various India related Wikimedia mailing lists.&lt;/li&gt;
&lt;li&gt; Real-time listing and communication of activities on A2K Meta page.&lt;/li&gt;
&lt;li&gt; Active documentation of all events and activities, which were published as blogs on CIS.&lt;/li&gt;
&lt;li&gt; Prior announcements of all the events organized or supported by A2K.&lt;/li&gt;
&lt;li&gt; Open and collaborative process of hiring Program Director.&lt;/li&gt;
&lt;li&gt; Keeping the Wikimedia India Chapter EC in the loop on all programmatic developments since March 2013.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Proactive disclosure of A2K program budget and proposed revised budget to the Indian Wikimedia community.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In addition to this A2K has explored various possibilities of collaboration with the Indian Wikimedia community and Chapter alike. The biggest instance is the A2K Wok Planning exercise for 2013-14, where multiple stakeholders were consulted. These include&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Some English-language Wikimedia community members from India;&lt;/li&gt;
&lt;li&gt;Wikimedia India chapter Executive Committee;&lt;/li&gt;
&lt;li&gt;Indian language Wikimedians and&lt;/li&gt;
&lt;li&gt;A few of the Wikimedia Foundation staff.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Some of the collaborative and community building efforts of A2K were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Support to community-led activities and facilitating community participation and ownership (e.g. &lt;a href="http://blog.wikimedia.org/2013/04/24/indian-wikiwomen-celebrate-womens-history-month/"&gt;Wiki Women’s Month&lt;/a&gt;).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mobilization of the Indian Wikimedia community in organizing mega community events like &lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013"&gt;Telugu Wiki Mahotsavam&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Engagement with WMI Chapter EC and built a collaborative relationship.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Education programs in 4 Indian languages done in collaboration with the local Wikimedia community.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Supporting Wikimedians in conducting outreach events.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Almost all the A2K events since February were done in collaboration with WMI Chapter and the Wikimedia community in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A2K team actively participated in various community meet-ups.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A2K has provided significant media visibility to Indian Language Wikipedias, especially in mainstream English press. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These transparency and collaboration efforts resulted in building trust among the Wikimedia India communities, where in they have begun to constructively engage with the A2K program’s work. This is a significant achievement since the closure of India program in August 2012. However, there are still some Wikimedians who prefer to ignore the A2K program, which indicates that the A2K program still needs to prove its worth. Thus it could be said that the A2K program has been partly successful in winning the faith of the Indian Wikimedia communities and still needs to put in more effort in this direction. The A2K team is committed to achieve this by demonstrating success through its work during the next phase of this program.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tangible Impact&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is difficult for the CIS-A2K program to either take direct credit for the growth or direct blame for the lack of it in the Indian language Wikimedia projects. However, we believe that we have been one of the factors — and sometimes a key factor — in impacting the growth of the Wikimedia projects and communities in India since the commencement of the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the A2K program has done some amount of work with almost all Indian language Wikipedias, the A2K team has had relatively more involvement in 10 Indic languages - Assamese, Bengali, Gujarati, Hindi, Kannada, Malayalam, Marathi, Odia, Punjabi and Telugu - during September 2012 to June 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to this based on the various outreach work done by A2K we have attempted to present an analysis of direct new Wikipedia users that have emerged in languages impacted by the A2K program, keeping in mind that community mobilization will always be an autonomous activity to some extent.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Article1.png" alt="article 1" class="image-inline" title="article 1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Graph 1&lt;/b&gt;: Growth of Articles in Indian Language Wikipedias from September 2012 to June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The growth momentum in Indian languages over the eight month period of September 2012 to June 2013 looks healthy.&lt;/li&gt;
&lt;li&gt; Some language Wikipedias have been growing at a phenomenal rate than others in terms of percentage change since September 2012.&lt;/li&gt;
&lt;li&gt; Punjabi, Assamese and Odia Wikipedias have a growth rate of 82%, 59%, and 37% respectively and are the top 3 Indian language Wikipedia projects during the ten month period.&lt;/li&gt;
&lt;li&gt; In terms of absolute number of articles, Tamil, Malayalam, Punjabi and Hindi Wikipedias have grown by about 5,812; 5,008; 3050; and 2,734 articles respectively.&lt;/li&gt;
&lt;li&gt; However, given the small size of the Wikipedia communities in Punjabi, Nepali, Kannada, Odia and Sanskrit the growth achieved by them is much commendable and all efforts have to be put to ensure that this momentum continues by strengthening these communities and also expanding them.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Article2.png" alt="article 2" class="image-inline" title="article 2" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Graph 2&lt;/b&gt;: Active Editors in Indian Language Wikipedias from September 2012 to June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;There is a fluctuation in the number of active editors in all Indian language Wikipedias.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The active editors on Assamese, Marathi and Gujarati Wikipedias have been consistently coming down, which is a cause of concern.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;It is important to note that Tamil, Telugu, Kannada and Nepali Wikipedias where the number of Active Editors were declining earlier have shown a remarkable turnaround. The efforts of the A2K program, especially in Telugu and Kannada, over the last 4 months could have resulted in this positive change.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;It seems the &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_Nepal/Wiki_Wikipedia_Education_Program_Nepal"&gt;Wikipedia Education Program, Nepal&lt;/a&gt; has been instrumental in bringing &lt;a href="http://blog.wikimedia.org/2013/09/18/nepal-wikipedia-education-program-pilot/"&gt;significant number of new active editors&lt;/a&gt; on Nepali Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Overall the active editors on Malayalam Wikipedia have crossed the 100 mark numerous times, making it the first Indian language Wikipedia to reach this benchmark. However, in month of May and June 2013 this dropped to a 2 digit figure again.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Looking at the trends Tamil Wikipedia may soon reach the 100 active editor mark.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Even Bengali community could cross 100 active editors if concerted efforts are put in.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Assamese Wikipedia, which received support from A2K program until January 2013, had a consistent active editor population which was around 20 people. However, once the support from the A2K dwindled since February a declining trend can be noticed. One could deduce that the A2K program has had critical relevance in the growth of Assamese Wikipedia. The decline over the last 5 months also alerts us to the possibility of building dependencies on the A2K program, which is a concern that we need to address going forward. &lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Article3.png" alt="article 3" class="image-inline" title="article 3" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Graph 3: Monthly growth of New Editors on Indian Language Wikipedias from September 2012 to June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;On an average 94 new editors have joined Indian language Wikipedias every month.&lt;/li&gt;
&lt;li&gt; Bengali, Malayalam and Tamil Wikipedias have consistently seen more than 10 new editors joining almost every month since Jan 2013.&lt;/li&gt;
&lt;li&gt; Hindi, Marathi and Telugu have many new editors joining per month.&lt;/li&gt;
&lt;li&gt; Total of 849 new people have become editors for Indian language Wikipedia since Sep 2012.&lt;/li&gt;
&lt;li&gt; However, the conversion rate of new editors into active editors is still a challenge across all Indian language Wikipedias.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Article4.png" alt="article 4" class="image-inline" title="article 4" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Graph 4: Snapshot of “Page Views” of Indian Language Wikipedias in September 2012 &amp;amp; June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Overall the “Page View” trends of Indian Language Wikipedias until April 2013 look positive. but since the last two months the trend is in the decline. However, it should be noted that the month on month “Page View” trends keep fluctuating.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Bengali, Tamil, Malayalam and Punjabi Wikipedias have shown highest percentage growth in page views since September 2012.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; In absolute numbers Bengali Wikipedia has seen a spectacular growth of 3,000,000 page-views, Tamil and Malayalam Wikipedias witnessed a growth of about 927,150 and 365,913 a page-views respectively.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Based on the the absolute numbers of “Page Views” for Indian Wikipedias it could be speculated that there is a significant increase in demand for knowledge and information in Indian languages on the internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In the below given Graph 5, we have also looked at the direct impact the A2K programme had in cultivating new editors on Indian language Wikipedias through various outreach programs that conducted during September 2012 to June 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Article5.png" alt="article 5" class="image-inline" title="article 5" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Graph 5: New Editors from CIS-A2K Outreach September 2012-June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that during the 10 month period CIS-A2K reached out to a total of 1,314 participants. This is approximate 130 people per month. However, the username data for more than 700 participants could not be ascertained, due to incorrect inefficient data collection and input. This includes participants giving wrong usernames, trouble with the handwriting of some of the participants, etc. We have already taken note of this issue and have put in measures to efficiently capture the new user data. Hence, we have only presented an analysis of 582 participants, whose usernames are valid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analysis of this data reveals that more than 120 users have done more than 5 edits, which is about 21 per cent of the participants with valid usernames. Further, 25 participants have done more than 100 edits on English and various Indian language Wikipedias, which constitutes 4 per cent of the total participants that the A2K programme has reached out to. Further 11 users have become very active editors on Indian language Wikipedias with more than 1000 edits to their credit.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Section C: Learning and Challenges&lt;/h2&gt;
&lt;h3&gt;Outreach&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the biggest constraints with the existing outreach efforts across India including that of CIS-A2K's is that they are all based on light-touch model. We have learned that a light touch outreach with no follow up, no hand-holding, no support system will not be able to yield desired results. We need to have a thoroughly thought out well-designed outreach programs where there should be continuous interaction with the participants for a minimum of 2-3 months. CIS-A2K approach to outreach should be different from usual Wikipedia editing training. Further, any outreach with an educational institution on the lines of a "Wikipedia Education Program" requires at least 3-4 months commitment from everyone concerned (i.e. student, institution, community and CISA2K).&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;This in no way means diminish the 	importance of the light-touch model of 1/2 or 1 day Wikipedia 	editing training workshops, as seldom you get institutions/groups 	who are willing to commit to a long-term engagement. Thus a mixed 	approach is more pragmatic, while more energies need to put in 	long-term engagements.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;There is a strand of criticism 	about effectiveness of physical outreach in general. However 	physical outreach for Indian languages is extremely essential as 	this is the lead exercise by which language communities have 	strengthened themselves over the years, though this has been very 	slow. The need to involve human element, face-to-face interaction 	and two-way communication is an extremely important factor of for 	growth of Indian language communities.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;The need for each language 	community is different with respect to outreach. There are some 	communities that are more comfortable with conducting physical 	outreach while other communities are more efficient with outreach on 	social networking sites. For instance the &lt;a href="https://en.wikipedia.org/wiki/or:ପ୍ରଧାନ_ପୃଷ୍ଠା"&gt;Odia 	Wikipedia&lt;/a&gt; community where the average age of the active members 	is less than 25 is more active on Social Media and extensively uses 	it to network among themselves and to also discuss about the 	Wikipedia, whereas the &lt;a href="https://en.wikipedia.org/wiki/te:మొదటి_పేజీ"&gt;Telugu 	Wikipedia&lt;/a&gt; is more comfortable with physical meetings and 	primarily uses Village Pump for all community discussions.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;Based on the interaction with most of the Indian language 	Wikimedia communities, CIS-A2K noticed that except for some 	communities like Malayalam, an institutional partnership is 	something that might not be easily taken up by community members. 	This is so because it requires high level of effort, time and strong 	network, amongst several other things. CIS-A2K has been focusing to 	address this need in general and in the five focus language areas in 	particular.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Work Plan Development and Community Communications&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Even after sending multiple invitations, it took a lot of effort by CIS-A2K to encourage the larger community to engage and participate actively in the development of language focused work plan. CIS-A2K put its best efforts in inviting the community members through meta pages, village pumps, language and city-wide mailing lists, Indian mailing list, India English mailing list, meet-ups, IRCs, social-media channels to give their valuable suggestions and feedback. However, very few community members showed interest and helped in refining the plans. Better feedback could be gathered during physical and informal meetings with the community members.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Less than 10% active volunteers 	across all Indian language communities are active on Meta and even 	less on Indian mailing lists. During some informal conversations 	some community members expressed that it is too much of an 	additional burden to also visit Meta and engage. Taking into 	consideration that most of the language communities have less than 	20 active volunteers, pragmatically speaking it is a huge ask to 	expect them to actively participate on Meta or mailing lists. Thus 	one cannot have a uniform standard and uniform mode of communication 	with different language communities. Thus CIS-A2K needs to explore 	various means of engaging with the Wikimedia community in India and 	should adopt a mixed channel approach of gauging community feedback. 	Though this is requires additional efforts on the team.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The mediums listed show a 	significant effort was made to solicit feedback and participation. 	It's okay and understandable that strategic planning is not for 	everyone, that volunteers economize their time devoted to the 	movement. So CIS-A2K does not necessarily see it as a failure that 	participation was low. What CIS-A2K aimed to do was to make sure 	participation was solicited, encouraged, and made possible. Of 	course ideally we would want higher participation, but CIS-A2K is 	careful not to confuse and turn &lt;b&gt;higher participation in 	strategizing into a goal in itself&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In spite of this CIS-A2K took the 	risk and went ahead with a &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Learning_and_Evaluation"&gt;participatory 	and continuous mode of evaluation&lt;/a&gt;. We foresee a challenge in 	actively involving the community in quarterly evaluation cycles as 	this would require them also to introspect. In the five focus 	language communities such an introspection exercise was not done 	systematically before and a mandatory imposition may not be 	productive either for the Community or for CIS-A2K. The challenge 	would be that in the first 2 quarterly cycles CIS-A2K could miss 	meeting its own evaluation criteria. However, the opportunity here 	is to train the community to systematically introspect, which will 	go a long way in strengthening the Indian language Wikipedias and 	the associated communities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Some programs, especially institutional partnerships, have a 	higher risk of failure than others. Though CIS-A2K committed to a 	very granular break-down of outcomes, it may require significant 	revisions. Hence it is extremely important for CIS-A2K to review and 	revise the plans and goals every 3-4 months.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Community Engagement/Development&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Indian language communities are able to grow and cultivate new editors who come from similar background as their’s. For example, we find that the Telugu community comprises primarily in the age group of 30-50 years, while on the other hand, the Odia community consists of relatively younger editors between the age group of 20-30 years. Hence, it is essential that the community building programs take this aspect into consideration and work to diversify the community mix by engaging with people belonging to varied backgrounds.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency and accountability are essential to build community trust. CIS-A2K has already taken various measures in this direction. However, there are occasions when more demands are placed on CIS-A2K, which consumes a lot of CIS-A2K's time and effort. The challenge is to struck a balance between the demands of transparency and accountability and the actual work they describe.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Meetups, one-on-one meetings/talk with community members are an essential ingredient to build long-term relationship. This is especially very important for nascent language communities with few editors. These kind of personal interactions help community members to know and connect with other Wikipedians. It also helps build trust and working relationship between community members and the A2K team.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS-A2K recognizes the potential role of Wikimedia India Chapter in growing the Wikimedia movement in India. Though CIS-A2K's work doesn't depend on the India Chapter, there is a huge potential for collaboration between the &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_India"&gt;Wikimedia India Chapter&lt;/a&gt; and CIS-A2K. CIS-A2K has put in its best efforts to build a cordial working relationship with the India Chapter. However, the extent of the collaboration would depend on the India Chapter's capacity and interest.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Section D: Progress Report&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A detailed progress report of the A2K program activities has been presented on a monthly basis below. Most of the activities have been documented as blog posts or news-items on the CIS website. All of the A2K events, blog-posts and news-items can be seen &lt;a href="https://cis-india.org/@@search?Subject%3Alist=Wikipedia"&gt;here.&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Outreach Sessions in September 2012&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Note: Although most of these workshops were conducted prior to the grant period, the reports for all of these were written during September 2012&lt;/i&gt;:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/first-punjabi-wikipedia-workshop"&gt;The First Punjabi Wikipedia Workshop&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 27, 2012). A total of 25 participants came for this workshop. There were 15 new editors (of which 13 were female).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-punjabi-university-patiala"&gt;Punjabi Wikipedia Workshop at Punjabi University, Patiala&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 28, 2012). About 30 participants including students and teachers attended the workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-amritsar"&gt;Punjabi Wikipedia Workshop at Amritsar&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 30, 2012). Nearly 50 participants including students and teachers from eight different schools apart from the students and teachers of Spring Dale School attended the workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/report-of-the-wikipedia-workshop-in-british-library"&gt;Wikipedia Workshop in British Library, Chandigarh&lt;/a&gt; (by Subhashish Panigrahi, September 27, 2012). About 32 participants attended the session on Day 1 and 10 participants attended the session on Day 2.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/kannada-wiki-workshop-tumkur-university"&gt;Kannada Wiki Workshop at Tumkur University&lt;/a&gt; (Tumkur, Karnataka, September 15, 2012). About 30 participants including students and teachers participated in this workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-hyderabad-report"&gt;Wikipedia comes to Hyderabad!&lt;/a&gt; (By Noopur Raval, September 30, 2012). There was coverage in the Hindu on September 28, 2012. About 60 students participated in the event.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in October 2012&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/bengaluru-a-hub-for-kannada-and-sanskrit-wikipedia"&gt;Bengaluru: A Hub for Kannada and Sanskrit Wikipedia and other Wikimedia projects!&lt;/a&gt; (October 7, 2012, Bangalore). Nitika Tandon, Subhashish Panigrahi and Jessie Wild led the session. Seven Kannada wikipedians participated in the event. &lt;/span&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-ghaziabad"&gt;Wikipedia workshop @ Inmantec College, Ghaziabad&lt;/a&gt; (by Nitika Tandon, October 19, 2012). The Access to Knowledge team was approached by Gaurav Prashar, Assistant Dean at Inmantec College, Ghaziabad to organize the workshop. Over 120 participants attended the workshop including MCA, BCA, BBA students and faculty members. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wiki-women-day-2012-pune"&gt;Bridging Gender Gap in Pune: WikiWomenDay 2012 Celebrated with Success!&lt;/a&gt; (organised by Wikipedia Club Pune at PAI International Learning Solutions, Azam Campus, Pune, October 28, 2012). Subhashish Panigrahi shares the experience in a blog post. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/first-pune-odia-wikipedia-organized"&gt;First Pune Odia Wikipedia Workshop Organized!&lt;/a&gt; (Co-organised by CIS and Pune Odia Wikipedia community, Pune, October 27, 2012). The Access to Knowledge team showed the participants the &lt;a href="https://en.wikipedia.org/wiki/or:ଉଇକିପିଡ଼ିଆ:ଚାଟସଭା/ପ୍ରଶ୍ନ"&gt;Chatasabha&lt;/a&gt;, a friendly desk on Odia Wikipedia and demonstrated how they can ask questions and see the answered questions. New wikipedians were connected to &lt;a href="http://facebook.com/groups/OdiaWiki"&gt;Facebook&lt;/a&gt; &lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in November 2012&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wiki-workshop-at-aml"&gt;Odia Wikipedia Workshop at AML&lt;/a&gt; (Academy of Media Learning, Bhubaneswar, November 10, 2012). Odia Wikipedians like &lt;a href="https://meta.wikimedia.org/wiki/User:Ansumang"&gt;Ansuman Giri&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/or:User:ManXiii"&gt;Manoranjan Behera&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/or:User:Guguly18"&gt;Diptiman Panigrahi&lt;/a&gt; participated in this event. &lt;/span&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/follow-up-to-wikipedia-introductory-session-at-bharati%20vidyapeeth"&gt;Follow up to Wikipedia Introductory Session&lt;/a&gt; (Bharati Vidyapeeth, Delhi, November 19, 2012). A Wikipedia introductory session was organised at Bharati Vidyapeeth Engineering College in Delhi early this year and a follow up session was organised by CIS on November 19, 2012. About 15 participants attended the follow up session. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-workshop-organized-in-kmbb-college-bhubaneswar"&gt;An Odia Wikipedia Workshop at KMBB&lt;/a&gt; (co-organized with CIS and with Odia Wikipedians, KMBB College, Bhubaneswar November 18, 2012). The agenda for the two-and-a-half hour session was to educate students about open source movement, journey of Wikipedia and how to contribute to Odia Wikipedia and how it would help them. Nine active Odia Wikipedians joined to support this event. &lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Outreach Sessions in December 2012&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/marathi-wiki-workshop-at-tiss"&gt;Marathi Wiki Workshop at TISS&lt;/a&gt; (co-organised with the Wikimedia India Chapter, Tata Institute of Social Science, Mumbai, December 8, 2012). There were about 25 participants (MA and PhD level) and 5 conductors - Yogesh, Nikita, Moksh, Kartik and Nitika.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait"&gt;Wikipedia Workshop at NMAIT&lt;/a&gt; (NMAIT, Karkala Taluk, Karnataka December 21, 2012, co-organised in association with Metawings Institute). Subhashish Panigrahi led the session. About 170 engineering students took part in this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-srm-chennai"&gt;Wikipedia Workshop at SRM&lt;/a&gt; (SRM University, Chennai, Tamil Nadu, December 17, 2012, co-organised in association with Metawings Institute). Noopur Raval participated in the event. About 40 students from different engineering colleges in Chennai participated in the workshop. &lt;br /&gt;&lt;br /&gt;(&lt;i&gt;Note: The following events were also conducted in December 2012. However, reports for these events were published later in January.&lt;/i&gt;)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/two-day-wiki-workshop-in-goa-university"&gt;Two-day Wiki Workshop in Goa University: An Introduction&lt;/a&gt; (by Nitika Tandon, January 15, 2013). The workshop was conducted on December 12 and 13, 2012 along with the Wikipedia community members for M.A. and Ph.D. students at the Goa University. Over 35 participants attended the two-day workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-in-st-xaviers-college-goa"&gt;Wikipedia in St. Xavier's College, Mapusa, Goa&lt;/a&gt; (by Nitika Tandon, January 19, 2013). The workshop was conducted on December 14, 2012. Over 30 participants attended the session.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/promoting-glam-in-goa"&gt;Promoting GLAM in Goa&lt;/a&gt; (by Nitika Tandon, January 24, 2013). The Access to Knowledge team organised an introductory Galleries, Libraries, Archives, Museums (GLAM) session at Goa State Central Library on December 13, 2012. About 45 people from over 10 different GLAM institutes in Goa participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/konkani-in-wikipedia-incubator"&gt;Konkani in Wikipedia Incubator — Taking it to the Next Level&lt;/a&gt; (by Nitika Tandon, January 25, 2013). An introductory session on Konkani in Wikipedia was conducted at the Konkani Department in Goa University on December 12, 2012. About 30 participants took part in the event.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Session in January 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/wikipedia-workshop-at-rkgit-ghaziabad" class="external text" rel="nofollow"&gt;A Wiki Workshop at Raj Kumar Goel Institute of Technology, Ghaziabad&lt;/a&gt; (RKGIT, Ghaziabad, January 17, 2013). Around 65 mechanical engineering  students from second and third year participated in this workshop.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Session in February 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog-old/digital-literacy-workshop" class="external text" rel="nofollow"&gt;Digital Literacy Workshop at Department of Arts, Delhi University&lt;/a&gt; (University of Delhi, February 5, 2013). A digital literacy workshop  was organised at the Department of Arts, Delhi University for students  pursuing their masters in Modern Indian Languages and Literary Studies  on February 5, 2013. About 30 students and 4 faculty members attended  the workshop.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in March 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-session-at-bits-goa" class="external text" rel="nofollow"&gt;Introductory Wikipedia session at BITS Goa&lt;/a&gt; (organised by CIS, Birla Institute of Technology &amp;amp; Science, Pilani,  Goa, March 7, 2013). The Access to Knowledge team was invited by Nikhil  Dixit, Public Relations Officer at the Birla Institute of Technology  &amp;amp; Science, Pilani – Goa (BITS Goa) to organise Wikipedia session on  March 7, 2013. About 30 people participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/te:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B8%E0%B0%AE%E0%B0%BE%E0%B0%B5%E0%B1%87%E0%B0%B6%E0%B0%82/%E0%B0%AE%E0%B0%BE%E0%B0%B0%E0%B1%8D%E0%B0%9A%E0%B0%BF_8,_2013_%E0%B0%B8%E0%B0%AE%E0%B0%BE%E0%B0%B5%E0%B1%87%E0%B0%B6%E0%B0%82" title="w:te:వికీపీడియా:సమావేశం/మార్చి 8, 2013 సమావేశం"&gt;Telugu Wikipedia Training Workshop on Women's Day&lt;/a&gt; (organised by CIS, Theatre Outreach Unit, University of Hyderabad,  Hyderabad, March 8, 2013). Telugu Wikipedians Dr. Rajasekhar and  Rahmanuddin alongwith T. Vishnu Vardhan led this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-workshop-for-kannada-science-writers" class="external text" rel="nofollow"&gt;Wikipedia Workshop for Kannada Science Writers&lt;/a&gt; (organised by Wikimedia India Chapter, Karnataka Rajya Vijnana  Parishath and CIS, Karnataka Rajya Vijnana Parishath Conference Hall,  Banashankari 2nd Stage, Bangalore, March 17, 2013). Dr. U.B. Pavanaja  led the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop" class="external text" rel="nofollow"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (organised by CIS, Institution of Engineers, JLB Road, Mysore, March 24, 2013). Dr. U.B. Pavanaja led this workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Indian Languages Workshop at IIT, Bombay (organised by CIS, IIT Mumbai, March 28, 2013). Noopur Raval led the event.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in April 2013&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013#.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80.E0.B0.AA.E0.B1.80.E0.B0.A1.E0.B0.BF.E0.B0.AF.E0.B0.BE_.E0.B0.A4.E0.B1.86.E0.B0.B2.E0.B1.81.E0.B0.97.E0.B1.81_.E0.B0.AE.E0.B0.B9.E0.B1.8B.E0.B0.A4.E0.B1.8D.E0.B0.B8.E0.B0.B5.E0.B0.82.2C_.E0.B0.AE.E0.B1.81.E0.B0.82.E0.B0.A6.E0.B0.B8.E0.B1.8D.E0.B0.A4.E0.B1.81_.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80_.E0.B0.85.E0.B0.95.E0.B0.BE.E0.B0.A1.E0.B1.86.E0.B0.AE.E0.B1.80"&gt;Telugu Wikipedia Workshop&lt;/a&gt; (April 9, 2013 at the Centre for Good Governance, Hyderabad). Telugu Wikipedians Arjunarao, Rahmanuddin and Pavithran along with T. Vishnu Vardhan led this half-day workshop. This was organized as a pre-event to &lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013"&gt;Telugu Wiki-Mahotsavam&lt;/a&gt;. &lt;/span&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013#.E0.B0.AA.E0.B1.8D.E0.B0.B0.E0.B0.BE.E0.B0.A5.E0.B0.AE.E0.B0.BF.E0.B0.95_.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80_.E0.B0.85.E0.B0.95.E0.B0.BE.E0.B0.A1.E0.B0.AE.E0.B1.80"&gt;Telugu Wikipedia Workshop&lt;/a&gt; (April 11, 2013 at the Theatre Outreach Unit, University of Hyderabad, Hyderabad). Telugu Wikipedians Radhkrishna and Rajachandra led this half-day workshop. This was organized as part of the &lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013"&gt;Telugu Wiki-Mahotsavam&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013#.E0.B0.AA.E0.B1.8D.E0.B0.B0.E0.B0.BE.E0.B0.A5.E0.B0.AE.E0.B0.BF.E0.B0.95_.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80_.E0.B0.85.E0.B0.95.E0.B0.BE.E0.B0.A1.E0.B0.AE.E0.B1.80"&gt;Telugu Wikipedia Advance level Workshop&lt;/a&gt; (April 11, 2013 at the Theatre Outreach Unit, University of Hyderabad, Hyderabad). Telugu Wikipedians Arjunarao and Rahmanuddin led this demonstration. This was organized as part of the &lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013"&gt;Telugu Wiki-Mahotsavam&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop-udupi-april-29-2013"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (April 29, 2013, Govinda Pai Research Centre, MGM College Udupi). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia. &lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Outreach Sessions in May 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia workshop (May 8, 2013, TISS, Mumbai). T. Vishnu Vardhan conducted the workshop to the students of Post Graduate Diploma in Community Media. A total of 14 students and 1 teacher attended this multi-lingual Wikipedia training workshop.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in June 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Kannada Wikipedia Workshop (June 4, 2013, Ramakrishna Vidyalaya, Hassan). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia workshop (June 10, 2013, Internet Institute, Palm Grove, Bangalore). T. Vishnu Vardhan conducted the workshop. This orientation workshop on Wikipedia was attended by representatives from about 25 Civil Society organizations across India. This was followed up by a hands-on Wikipedia training workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kannada Wikipedia workshop for bloggers (June 24, 2013, Suchitra, Bangalore). Dr U.B. Pavanaja conducted the workshop and gave a presentation on Kannada Wikipedia.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Education Programme Updates&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/launch-of-assamese-wikipedia-education-program"&gt;Launch of Assamese Wikipedia Education program&lt;/a&gt; at Guwahati University (by Nitika Tandon, October 22, 2012). The program was launched on October 14, 2012 with 15 post-graduate students (90 per cent of these are women students) under the guidance of Prof. Dulumoni Goswami, Head of the Department of Education, Guwahati University.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/malayalam-wikipedia-education-program-august-october-update"&gt;Malayalam Wikipedia Education Program: August to October Updates&lt;/a&gt; (by Shiju Alex, October 29, 2012). This program is the first of its kind in an Indic language, and Malayalam community is doing the program in collaboration with the IT@School, a project of the Department of General Education, # &lt;a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition"&gt;Government of Kerala, setup in 2001, to foster the IT education in schools. Gujarati Wikipedia Article Competition&lt;/a&gt; – 10 schools, 200 students, 20 articles on Gujarati Wikipedia (by Noopur Raval, October 31, 2012). This was a competition to raise Wikipedia awareness and help students discover the joy of writing articles in their native language and an attempt to connect producers having knowledge in Gujarati to a wide audience of more than 4,00,000 readers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot"&gt;Gujarat Wikipedia Education program:Rajkot&lt;/a&gt; (by Noopur Raval, October 31, 2012). This report analyses a series of meetings and workshops held in Rajkot, a city in Gujarat, India during the month of October 2012 including students from the Galaxy Education System, Christ College students and members from the Wikipedia community.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/first-odia-wikipedia-education-program-to-be-rolled-out-at-iimc-dhenkanal"&gt;First Odia Wikipedia Education Program to be Rolled Out&lt;/a&gt; (by Subhashish Panigrahi, November 30, 2012). Odia wikipedians launched this program at the Indian Institute of Mass Communications, Dhenkanal on November 8, 2012 to bring students to edit articles on Odia wikipedia through a series of assessments by professors.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/odia-education-program-at-iimc-dhenkanal"&gt;Odia Education Program&lt;/a&gt; (Indian Institute of Mass Communication, Dhenkanal, Orissa, January 26, 2013). This is the first Odia Education Program which ran for three months and 16 students took active part in contributing on various articles on Odia Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-education-program-iimc-dhenkanal"&gt;Odia Wikipedia Community Brings Wikipedia Education Program to IIMC, Dhenkanal&lt;/a&gt; (by Subhashish Panigrahi, February 28, 2013). Sixteen student wikipedians signed up and took part in editing more than a dozen articles on Odia Wikipedia.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Hackathons&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-hackathon-bits-hyderabad"&gt;Wikipedia Hackathon at BITS Hyderabad&lt;/a&gt; (organized by CIS - A2K team and BITS-Pilani, Hyderabad, October 26 – 27, 2012). &lt;/span&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog-old/mini-hackathon-delhi"&gt;A Wikipedia Mini-hackathon in Delhi&lt;/a&gt; (CIS, New Delhi, November 11, 2012) &lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Meetups&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/kolkata-tasting-the-sweetness-of-wikipedia"&gt;Kolkata: Tasting the Sweetness of Wikipedia!&lt;/a&gt; (Kolkata, November 3, 2012). The journeys of three Wikipedians — Jayanta Nath, Deepon Saha and Ashwin Baindur are examined. Subhashish Panigrahi participated in the meeting.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://wiki.wikimedia.in/WikiMeetups/Bangalore/Bangalore51"&gt;Wikivoyage, November 18, 2012&lt;/a&gt;: Ravikiran presented the Wikivoyage project and discussions on Wiki Project Karnataka. A total of 13 participants attended this meeting.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://wiki.wikimedia.in/WikiMeetups/Bangalore/Bangalore52"&gt;Wikidata, December 2, 2012&lt;/a&gt;: &lt;a href="https://en.wikipedia.org/wiki/User:LydiaPintscher"&gt;Lydia Pintscher&lt;/a&gt; presented the Wikidata project. The talk covered history of Wikidata project, state of the project and Wikidata India opportunities. About 13 people attended this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-February/009453.html"&gt;Wikimedia Meet-up, Hyderabad&lt;/a&gt; (7 Hyderabad based Wikimedians attended this meet-up. Abhijith Jayanthi - SIG Hyderabad, Rahimanuddin Shaik - SIG Telugu, Dr. Rajasekhar; Veera Venkata Chowdary, Tausif, Sai Anudeep, and Akhila Thumma came together for a discussion meeting with the CIS-A2K Program Director T. Vishnu Vardhan.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wiki-meet-up-kolkata"&gt;Kolkata Wiki Community Meetup&lt;/a&gt; (organised by CIS and Kolkata Wiki Community, March 14, 2013). Four Wikipedians from Kolkata, Wikimedia Foundation's mobile Developer Yuvaraj Pandian and OPW intern Sucheta Ghoshal joined T. Vishnu Vardhan and Subhashish Panigrahi for this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-cuttack-community-meetup-march-16-2013"&gt;Odia Wikipedia - Cuttack Community Meetup&lt;/a&gt; (organised by CIS and Odia Wiki Community, Cuttack, March 16, 2013). T. Vishnu Vardhan and Subhashish Panigrahi met Odia Wikipedians in Cuttack to discuss about the current state of Odia Wikipedia and understand the community building strategies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-meet-up-bhubaneswar-march-17-2013"&gt;Odia Wikipedia – Bhubaneswar Community Meetup&lt;/a&gt; (organised by CIS and Odia Wiki Community, Bhubaneswar, March 17, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/telegu-wiki-meet-up-at-cis-june-2-2013"&gt;First Telugu Wiki Meetup @ CIS, Bangalore&lt;/a&gt; (co-organised by Telugu Wikipedia community and CIS-A2K on June 2, 2013). &lt;a href="https://en.wikipedia.org/wiki/te:వాడుకరి:Veera.sj"&gt;S.J. Veera&lt;/a&gt; conducted the meet-up.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Celebration and Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary"&gt;Celebrating Odia Wikipedia's Ninth Anniversary&lt;/a&gt; (organized by the Odia Wiki Community with support from CIS and Academy for Media Learning, January 29, 2013, Bhubaneswar). The event attracted good coverage in the local media:&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଓଡ଼ିଶାନ୍&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;: &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;: &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ର‌ୟୋଗ&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;, &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ସମ୍ବାଦ&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;: &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଲିପି ବ୍ୟାକରଣ ଓ ମାନକ ଭାଷାର ପ୍ରୟୋଗ ଜରୁରୀ&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.eindiadiary.com/content/odisha-workshop-organized-9th-anniversary-odia-language-application-odia-language-e-media"&gt;eindiadiary.com&lt;/a&gt;: 	Odisha: Workshop organized on 9th Anniversary of Odia language: 	Application of Odia language in e-media,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://news.fullorissa.com/odia-wikipedias-9th-anniversary"&gt;Fullorissa.com: 	Odia Wikipedia’s 9th anniversary&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://indiaeducationdiary.in/Orissa/Shownews.asp?newsid=19485"&gt;Indiaeducationdiary.in: 	Odisha: Workshop organized on 9th Anniversary of Odia language: 	Application of Odia language in e-media&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.odishaviews.com/odia-language-workshop-organized-on-9th-anniversary-of-odia-wikipedia-application-of-odia-language-in-e-media"&gt;Odishaviews.com:Odia 	language workshop organized on 9th Anniversary of Odia Wikipedia: 	Application of Odia language in e-media&lt;/a&gt; &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-womens-workshop-in-mumbai" class="external text" rel="nofollow"&gt;Wikipedia Women's Workshop in Mumbai&lt;/a&gt; (by Noopur Raval, Vidyalankar Institute of Technology, Wadala, Mumbai, November 4, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/wiki-womens-day-in-goa"&gt;Wiki Women's Day in Goa&lt;/a&gt; (organised by the Wikimedia India Chapter and CIS, Nirmala Institute of Education, Panaji, Goa, March 8, 2013). The workshop was organised on International Women's Day. Rohini Lakshane and Nitika Tandon led the workshop. &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/events/telegu-wiki-mahotsavam-2013"&gt;Telugu Wiki Mahotsavam 2013&lt;/a&gt; (organised by Telugu Wikipedia Community and CIS, Hyderabad, April 9 – 11, 2013). T. Vishnu Vardhan was one of the trainers at the Wikipedia Academy at Centre for Good Governance on April 9, 2013. Vishnu Vardhan spoke about the Access to Knowledge work in one of the sessions of Wikimedia. Meeting with Media Heads on April 10, 2013. Vishnu Vardhan gave a talk on A2K’s plans for the growth of Telegu Wikipedia in 2013-14 at the Telegu Wikipedia general meeting on April 11, 2013. Vishnu Vardhan also gave a talk about Access to Knowledge in the digital era at the Wiki Chaitanya Vedika on April 11, 2013. &lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span&gt;Events Participated In&lt;/span&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/celebrating-the-success-of-wikipedia-in-wikipedia-summit-pune-2013"&gt;Celebrating the success of Wikipedia in Wikipedia Summit Pune 2013&lt;/a&gt; (organized by Wikipedia Club, Pune, January 12 – 13, 2013).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/foss-wikimedia-under-one-roof-gnunify"&gt;GNUnify 2013&lt;/a&gt; (organized by Pune Linux/Unix User Group and Symbiosis Institute of Computer Studies &amp;amp; Research, Pune, February 15 – 17, 2013). Subhashish Panigrahi participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/creative-commons-comes-to-india"&gt;Creative Commons comes to India&lt;/a&gt; (co-organized by Pune Linux/Unix User Group and Symbiosis Institute of Computer Studies &amp;amp; Research in Pune, February 15, 2013, and CIS the Wikimedia India Chapter, Chitrakala Parishad, Bangalore, February 25, 2013).The Access to Knowledge team participated in the CC meetings organized in Bangalore.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/fifty-fourth-bangalore-wikimedia-meetup"&gt;Fifty-fourth Bangalore Wikimedia Meet-up at IIM, Bangalore&lt;/a&gt; (organized by Radhakrishna Arvapally, SIG (Special Interest Group) Chair, Bangalore (a part of the Wikimedia India Chapter) with support from Solutions IQ, Wikimedia India Chapter and CIS, Indian Institute of Management, February 25, 2013). Sudhwana Jogalekar (President, Wikimedia India) spoke on Wikimedia Projects. T. Vishnu Vardhan (program Director, A2K, CIS) gave a talk on 'Accessibility to Knowledge'. Joe Justice (Founder WikiSpeed) and Vibhu Srinivasan gave a presentation of WikiSpeed Car project. Chief Guest K.S. Viswanath (Vice President, Industry Initiatives, NASSCOM) gave the welcome address. Noopur Raval participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/knowledge-sharing-through-glam"&gt;Knowledge Sharing through GLAM at Bangalore&lt;/a&gt; (organized by Wikimedia India and Creative Commons, Karnataka Chitrakala Parishad, Kumara Krupa Road, Bangalore, February 25, 2013). Dr. U.B. Pavanaja, Nitika Tandon and Subhashish Panigrahi participated in the event. CIS supported the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-workshop-for-kannada-science-writers"&gt;Wikipedia Workshop for Kannada Science Writers&lt;/a&gt; (organised by Wikimedia Chapter India, Karnataka Rajya Vijnana Parishath and CIS, Karnataka Rajya Vijnana Parishath Conference Hall, Banashankari 2nd Stage, Bangalore, March 17, 2013). Dr. U.B. Pavanaja participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-womens-workshop-bangalore-2013"&gt;Wikipedia Women's Workshop Bangalore 2013&lt;/a&gt; (organised by Wikimedia India, Servelots Infotech, Jayanagar, Bangalore, March 8, 2013). The event was covered by Kannada Prabha on March 9, 2013. Dr. U.B. Pavanaja participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-at-avenir"&gt;Wikipedia at Avenir&lt;/a&gt; (organised by the Wikipedia community, Netaji Subhash Engineering College, Kolkata, West Bengal, March 11, 2013). CIS supported the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Community members helped the Higher Education Innovation and Research Applications program (HEIRA) of CSCS Bangalore organizes a day-long workshop on ‘Digital Literacy’ at Ahmednagar College, Ahmednagar, Maharasthra on January 17, 2013. Tanveer Hasan of HEIRA shares with us the developments in &lt;a href="https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report"&gt;this report&lt;/a&gt;. During this period, CIS established partnerships with the Goa University, Tata Institute of Social Science, Mumbai, Regional Research Centre, Udupi, etc. &lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Section E: Indic Wikipedia Visualisation Project&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/openness/blog-old/IndicWikipedia.png" alt="Indic Wikipedia" class="image-inline" title="Indic Wikipedia" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Given above is a chart depicting the visualization of Indic Wikipedia project&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CIS hired &lt;a href="http://www.ajantriks.net/"&gt;Sumandro Chattapadhyay&lt;/a&gt; and &lt;a href="http://sajjad.in/"&gt;Sajjad Anwar&lt;/a&gt; to work on visualisation of the growth of Indic Wikipedia. Their project takes basic parameters, like page views, total articles and total editors, and compares them over time and across projects: &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;They have looked into the different aspects of the past and present activities of Indic Wikipedias, and divided the visualisation into three different focus areas: &lt;br /&gt; &lt;ol&gt;
&lt;li&gt;&lt;span&gt;Basic parameters &lt;/span&gt; &lt;/li&gt;
&lt;li&gt;Geographic patterns of edits &lt;/li&gt;
&lt;li&gt;Exploring topics that receive greatest number of edits. You can read more about &lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-basic-parameters"&gt;Indic Wikipedia Visualisation Project #1: Visualising Basic Parameters&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;They also worked on visualisation of the page views statistics and the project specific pages. The page views indicate the number of unique visits Wikipedia project concerned has received in one month. You can read more about &lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages"&gt;Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;span&gt;&lt;a href="http://geohacker.github.io/indicwiki/readership"&gt;Readership Dashboard&lt;/a&gt;: The Readership Dashboard combines a line graph showing the movement of page view for a project across the years and bar graphs showing a separate variable for the same project.&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://geohacker.github.io/indicwiki/motion_chart"&gt;Motion Charts&lt;/a&gt;: The motion charts help compare Indic Wikipedia Projects across Languages on various parameters such as new editors, new articles, active editors, total editors etc.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://geohacker.github.io/indicwiki/page-views"&gt;Calendar Charts&lt;/a&gt;: The calendar charts limits each chart section to 12 months allowing the user to focus on more granular movements of the variable concerned, say the number of new editors per month or page views per month, etc.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Section F: The Access to Knowledge Work Plan (2013 – 2014)&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge team assessed 12 of the active Indic-language communities based on the community dynamics, growth patterns in readership, and community and edit contribution for drafting this work plan. In putting together this work plan the Access to Knowledge team has extensively engaged with various stakeholders. These include: a) some Wikimedia community in India members across various Indian-language Wikimedia projects; b) some English-language Wikimedia community members from India; c) Wikimedia India chapter executive committee; d) some potential institutional partners; e) a few like-minded advocates of free knowledge; f) Access to Knowledge program Adviser Dr. Tejaswini Niranjana; and g) a few of the Wikimedia Foundation staff. Five languages were selected as core language areas. These include: Bengali, Kannada, Konkani, Odia and Telegu. Some key factors that determined the selection of languages areas included:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Access to Knowledge team's existing ties with knowledge institutions, groups and individuals.&lt;/li&gt;
&lt;li&gt;Willingness of language community to interact and engage with the Access to Knowledge team.&lt;/li&gt;
&lt;li&gt;Considering Wikimedia India Chapter EC's suggestion that Access to Knowledge team should work on at least one incubation project.&lt;/li&gt;
&lt;li&gt;Access to Knowledge team's familiarity with the languages.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;However, choosing these five languages do not necessarily mean that the A2K program would not focus on the other languages rather there would be more programmatic support and organizational ties to be built.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Language Area Work Plans&lt;/h3&gt;
&lt;p&gt;The language area work plans are linked to the individual meta-pages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Telugu"&gt;Telugu&lt;/a&gt; &lt;/span&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Odia"&gt;Odia&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Kannada"&gt;Kannada&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Konkani"&gt;Konkani (GOM)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Bengali"&gt;Bengali&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Overall_Support_Across_Indian_language_Communities"&gt;Overall Support Across Indian language Communities&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Pilot_Project_–_Performing_Arts_in_India"&gt;Pilot Project – Performing Arts in India&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Learning_and_Evaluation"&gt;Learning and Evaluation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The expected and dream targets for the languages are shown below:&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th colspan="10"&gt;Expected and dream targets for languages&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Parameters&lt;/td&gt;
&lt;td colspan="2"&gt;Telugu&lt;/td&gt;
&lt;td colspan="2"&gt;Odia&lt;/td&gt;
&lt;td colspan="2"&gt;Kannada&lt;/td&gt;
&lt;td colspan="2"&gt;Bengali&lt;/td&gt;
&lt;td&gt;Konkani&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Expected target&lt;/td&gt;
&lt;td&gt;Dream target&lt;/td&gt;
&lt;td&gt;Expected target&lt;/td&gt;
&lt;td&gt;Dream target&lt;/td&gt;
&lt;td&gt;Expected target&lt;/td&gt;
&lt;td&gt;Dream target&lt;/td&gt;
&lt;td&gt;Expected target&lt;/td&gt;
&lt;td&gt;Dream target&lt;/td&gt;
&lt;td&gt;Target&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of Editors&lt;/td&gt;
&lt;td style="text-align: right; "&gt;755&lt;/td&gt;
&lt;td style="text-align: right; "&gt;905&lt;/td&gt;
&lt;td&gt;120&lt;/td&gt;
&lt;td&gt;350&lt;/td&gt;
&lt;td&gt;600&lt;/td&gt;
&lt;td&gt;1000&lt;/td&gt;
&lt;td&gt;930&lt;/td&gt;
&lt;td&gt;1200&lt;/td&gt;
&lt;td&gt;NA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of New editors     &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;200&lt;/td&gt;
&lt;td&gt;350&lt;/td&gt;
&lt;td&gt;35&lt;/td&gt;
&lt;td&gt;100&lt;/td&gt;
&lt;td&gt;300&lt;/td&gt;
&lt;td&gt;700&lt;/td&gt;
&lt;td&gt;30&lt;/td&gt;
&lt;td&gt;100&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of Acitve editors&lt;/td&gt;
&lt;td&gt;25&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;50&lt;/td&gt;
&lt;td&gt;70&lt;/td&gt;
&lt;td&gt;100&lt;/td&gt;
&lt;td&gt;150&lt;/td&gt;
&lt;td&gt;NA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of Aritcles&lt;/td&gt;
&lt;td&gt;54000&lt;/td&gt;
&lt;td&gt;55000&lt;/td&gt;
&lt;td&gt;5000&lt;/td&gt;
&lt;td&gt;6000&lt;/td&gt;
&lt;td&gt;25000&lt;/td&gt;
&lt;td&gt;30000&lt;/td&gt;
&lt;td&gt;27000&lt;/td&gt;
&lt;td&gt;28000&lt;/td&gt;
&lt;td&gt;500&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of Outreach Events     &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;29&lt;/td&gt;
&lt;td&gt;34&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The detailed plan with projection of outcomes and expected impact of the A2K program activities could be accessed &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014"&gt;here.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Overall Community Support&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Besides the specific programs mentioned under individual language area plans, A2K team will provide overall support to all Indian-language Wikipedia communities. This includes but is not limited to:&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Creating awareness through online editing videos, editing guides and digital coverage all in local Indian languages.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Supporting outreach activities&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Capacity building to multiply outreach efforts. This would include training sessions to improve presentation skills, audience engagement skills with mock presentations and video recording for feedback. The first Train-the-Trainer program is being planned in June.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Facilitate more qualitative interactions amongst community members with an aim to foster creation of new project ideas in the form of physical meet-ups, hangouts/Skype calls, and small/large scale conferences.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Organize language specific IRCs where community members from that specific language could discuss their plans, issues, concerns, and anything at all.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Encourage community members to share feedback, suggestions or details of any kind of support on A2K's &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Requests"&gt;Meta help page&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Supporting communities for bug reporting and following up for resolution. A detailed overall community support page can be found &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Overall_Support_Across_Indian_language_Communities"&gt;here&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Section G: Team Orientation and Development&lt;/h2&gt;
&lt;h3&gt;Team’s Professional Development&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A one-day orientation was organized in CIS where Wikimedia board members Bishakha Datta and Achal Prabhala helped the Access to Knowledge team members to develop an agenda for a period of 6-7 months. They helped team members to find overlaps, prioritise and recognize possibilities to make best use of available resources. The board members also shared learnings, principles and concepts from other movements that could be applied to the Access to Knowledge program.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A one-day orientation program was organized with Wikimedia India Chapter Executive Committee Members to find common minimum program on which both the Chapter and the Access to Knowledge team could work together to achieve common objectives. The orientation also helped define overlapping areas and how the two oragnisations will handle them.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A one-day orientation program was organised with Wikimedia community in India Members such as Tinu Cherian who gave a talk on how to leverage mainstream and social media; Gautam John who organized a workshop on organisational procedures for greater transparency and accountability, and Arun Ramarathnam who spoke about best practices for working with Wikipedia community. This orientation was organized as a part of training and skill development for the Access to Knowledge team members.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Since March 2013 CIS-A2K started having weekly Team Learning Sessions on every Wednesday. However, given the hectic schedules of the Team these could not be organized in a regular manner.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Exits and New Hires&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS has an office in New Delhi with a five-member team for the Access to Knowledge program. The team is currently headed by &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;T. Vishnu Vardhan&lt;/a&gt;, Program Director (Access to Knowledge). Other team members include Tejaswini Niranjana (Distinguished Fellow), &lt;a href="https://meta.wikimedia.org/wiki/User:Pavanaja"&gt;Dr. U.B. Pavanaja&lt;/a&gt; (Program Officer, Indian Language Initiatives), &lt;a href="https://meta.wikimedia.org/wiki/User:Nitika.t"&gt;Nitika Tandon&lt;/a&gt; (Program Manager) and &lt;a href="https://meta.wikimedia.org/wiki/User:Psubhashish"&gt;Subhashish Panigrahi&lt;/a&gt; (Program Officer).&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/vishnu.png" alt="Vishnu" class="image-inline" title="Vishnu" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;: Vishnu Vardhan was hired as the new program Director-Access to Knowledge at CIS. Vishnu Vardhan has over the last 11 years worked in various capacities as researcher, grant manager, teacher, project consultant, information architect and translator. Vishnu Vardhan managed the Art, Crafts and Culture portfolio of Sir Ratan Tata Trust and also worked as Research Coordinator at the Centre for the Study of Culture and Society in Bangalore.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Pavanaja.png" alt="Pavanaja" class="image-inline" title="Pavanaja" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; joined the team as program Officer, India Language Initiatives on March 4, 2013. Dr. Pavanaja holds a Master’s degree from Mysore University and Ph.D. from Mumbai University. He was a scientist at Bhabha Atomic Research Centre, Mumbai, for about 15 years. He is one of the earliest editors of Kannada Wikipedia. He has to his credit many firsts, viz., first Kannada website, first Kannada online magazine, first Indian language (Kannada) website to receive Golden Web Award, first Indian language (Kannada) editor for Palm OS, first Indian language (Kannada) editor for WinCE device (HP Jornado 720), first Indian language version (Kannada) of universally popular Logo (programming language for children) software, etc.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/openness/blog-old/Tejaswini.png" alt="Tejaswini" class="image-inline" title="Tejaswini" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/about/people/distinguished-fellows"&gt;Tejaswini Niranjana&lt;/a&gt; is a Senior Fellow at the Centre for the Study of Culture and Society (CSCS), Bangalore, and Visiting Professor at Tata Institute of Social Sciences (TISS), Mumbai joined A2K as an Adviser. She guides the Access to Knowledge team in expanding the Indian language Wikipedias and helps in increasing the number of active editors through strategic partnerships with Higher Education institutions across India.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The following staff left the organisation:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/User:Shijualex"&gt;Shiju Alex&lt;/a&gt;, Program Manager, Access to Knowledge left the organization on November 16, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/User:Noopur28"&gt;Noopur Raval&lt;/a&gt;, Program Officer, Access to Knowledge left the organization on April 24, 2013. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Section H: Additional Links and Data&lt;/h2&gt;
&lt;h3&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/indic-language-wikipedias-statistical-report-jan-june-2012"&gt;Indic Language Wikipedias – Statistical Report: January – June 2012&lt;/a&gt; (by Shiju Alex, September 25, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/kannada-wiki-workshop-tumkur-university"&gt;Kannada Wiki Workshop at Tumkur University&lt;/a&gt; (by Shiju Alex, September 25, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/first-punjabi-wikipedia-workshop"&gt;The First Punjabi Wikipedia Workshop&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/report-of-the-wikipedia-workshop-in-british-library"&gt;Wikipedia Workshop in British Library, Chandigarh&lt;/a&gt; (by Subhashish Panigrahi, September 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-punjabi-university-patiala"&gt;Punjabi Wikipedia Workshop at Punjabi University, Patiala&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 28, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/editor-growth-and-contribution-on-telegu-wikipedia"&gt;Editor Growth &amp;amp; Contribution Program on Telugu Wikipedia&lt;/a&gt; (by Nitika Tandon, September 29, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-amritsar"&gt;Punjabi Wikipedia Workshop at Amritsar&lt;/a&gt; (by Shiju Alex, September 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-hyderabad-report"&gt;Wikipedia comes to Hyderabad!&lt;/a&gt; (by Noopur Raval, September 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/bengaluru-a-hub-for-kannada-and-sanskrit-wikipedia"&gt;Bengaluru: A Hub for Kannada and Sanskrit Wikipedia and other Wikimedia projects!&lt;/a&gt; (by Subhashish Panigrahi, October 16, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-ghaziabad"&gt;Wikipedia workshop @ Inmantec College, Ghaziabad&lt;/a&gt; (by Nitika Tandon, October 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/launch-of-assamese-wikipedia-education-program"&gt;Launch of Assamese Wikipedia Education Program at Guwahati University&lt;/a&gt; (by Nitika Tandon, October 22, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/malayalam-wikipedia-education-program-august-october-update"&gt;Malayalam Wikipedia Education Program: August to October Updates&lt;/a&gt; (by Shiju Alex, October 29, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wiki-women-day-2012-pune"&gt;Bridging Gender Gap in Pune: WikiWomenDay 2012 Celebrated with Success!&lt;/a&gt; (by Subhashish Panigrahi, October 29, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot"&gt;Gujarat Wikipedia Education Program: Rajkot&lt;/a&gt; (by Noopur Raval, October 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition"&gt;Gujarati Wikipedia Article Competition – 10 schools, 200 students, 20 articles on Gujarati Wikipedia&lt;/a&gt; (by Noopur Raval, October 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/first-pune-odia-wikipedia-organized"&gt;First Pune Odia Wikipedia Workshop Organized!&lt;/a&gt; (by Subhashish Panigrahi, October 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wiki-workshop-at-aml"&gt;An Odia Wikipedia Workshop at Academy of Media Learning&lt;/a&gt; (by Subhashish Panigrahi, November 10, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/mini-hackathon-delhi"&gt;A Wikipedia Mini-hackathon in Delhi&lt;/a&gt; (a guest blog post by Yuvraj Pandian, November 11, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-hackathon-hyderabad"&gt;Report on Wikipedia Hackathon held in Hyderabad&lt;/a&gt; (a guest blog post by Yuvi Panda, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-workshop-organized-in-kmbb-college-bhubaneswar"&gt;An Odia Wikipedia Workshop at KMBB College, Bhubaneswar&lt;/a&gt; (by Subhashish Panigrahi, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/follow-up-to-wikipedia-introductory-session-at-bharati-vidyapeeth"&gt;Follow up to Wikipedia Introductory Session at Bharati Vidyapeeth — More Interested and More Involved Participants&lt;/a&gt; (by Nitika Tandon, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/typing-in-indic-languages-from-mobiles"&gt;Typing in Indic Languages from Mobiles made Easy!&lt;/a&gt; (by Subhashish Panigrahi, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-womens-workshop-in-mumbai"&gt;Wikipedia Women's Workshop in Mumbai&lt;/a&gt; (by Noopur Raval, November 21, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/first-odia-wikipedia-education-program-to-be-rolled-out-at-iimc-dhenkanal"&gt;First Odia Wikipedia Education Program to be Rolled Out&lt;/a&gt; (by Subhashish Panigrahi, November 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/kolkata-tasting-the-sweetness-of-wikipedia"&gt;Kolkata: Tasting the Sweetness of Wikipedia!&lt;/a&gt; (by Subhashish Panigrahi, November 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/marathi-wiki-workshop-at-tiss"&gt;Marathi Wiki Workshop at Tata Institute of Social Sciences&lt;/a&gt; (by Subhashish Panigrahi, December 8, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/non-unicode-iscii-text-can-be-converted-to-unicode"&gt;Non Unicode ISCII Text Can be Converted to Unicode Now!&lt;/a&gt; (by Subhashish Panigrahi, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-srm-chennai"&gt;A Wikipedia Workshop at SRM University, Chennai&lt;/a&gt; (by Subhashish Panigrahi, December 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/new-avenues"&gt;New Avenues: Media Wiki Groups&lt;/a&gt; (by Noopur Raval, December 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait"&gt;A Wikipedia Workshop at NMAIT&lt;/a&gt; (by Subhashish Panigrahi, December 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/two-day-wiki-workshop-in-goa-university"&gt;Two-day Wiki Workshop in Goa University: An Introduction&lt;/a&gt; (by Subhashish Panigrahi, December 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/two-day-wiki-workshop-in-goa-university"&gt;Two-day Wiki Workshop in Goa University: An Introduction&lt;/a&gt; (by Nitika Tandon, January 14, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-in-st-xaviers-college-goa"&gt;Wikipedia in St. Xavier's College, Mapusa, Goa&lt;/a&gt; (by Nitika Tandon, January 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/celebrating-the-success-of-wikipedia-in-wikipedia-summit-pune-2013"&gt;Celebrating the success of Wikipedia in Wikipedia Summit Pune 2013&lt;/a&gt; (by Subhashish Panigrahi, January 21, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-rkgit-ghaziabad"&gt;A Wiki Workshop at Raj Kumar Goel Institute of Technology, Ghaziabad&lt;/a&gt; (by Subhashish Panigrahi, January 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/bringing-konkani-encyclopedia-in-public-domain"&gt;Bringing Konkani Encyclopedia in Public Domain&lt;/a&gt; (by Nitika Tandon, January 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/promoting-glam-in-goa"&gt;Promoting GLAM in Goa&lt;/a&gt; (by Nitika Tandon, January 24, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/konkani-in-wikipedia-incubator"&gt;Konkani in Wikipedia Incubator — Taking it to the Next Level&lt;/a&gt; (by Nitika Tandon, January 25, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/digital-literacy-workshop"&gt;Digital Literacy Workshop at Department of Arts, Delhi University&lt;/a&gt; (by Nitika Tandon, February 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary"&gt;Celebrating Odia Wikipedia's Ninth Anniversary&lt;/a&gt; (by Subhashish Panigrahi, February 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-education-program-iimc-dhenkanal"&gt;Odia Wikipedia Community Brings Wikipedia Education Program to IIMC, Dhenkanal&lt;/a&gt; (by Subhashish Panigrahi, February 28, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-session-at-bits-goa"&gt;Introductory Wikipedia session at BITS Goa&lt;/a&gt; (by Nitika Tandon, March 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report"&gt;Ahmednagar — Marathi Wikipedia Workshop&lt;/a&gt; (by Tanveer Hasan, March 18, 2013). This is a report contributed by the Centre for Study of Culture and Society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wiki-womens-day-in-goa"&gt;Wiki Women's Day in Goa&lt;/a&gt; (by Nitika Tandon, March 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-basic-parameters"&gt;Indic Wikipedia Visualisation Project #1: Visualising Basic Parameters&lt;/a&gt; (by Sajjad Anwar and Sumandro Chattapadhyay, March 26, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-cuttack-community-meetup-march-16-2013"&gt;Odia Wikipedia - Cuttack Community Meetup&lt;/a&gt; (by Subhashish Panigrahi, April 3, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-meet-up-bhubaneswar-march-17-2013"&gt;Odia Wikipedia - Bhubaneswar Community Meetup&lt;/a&gt; (by Subhashish Panigrahi, April 4, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages"&gt;Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages&lt;/a&gt; (by Sajjad Anwar and Sumandro Chattapadhyay, April 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/indian-wiki-women-history-month"&gt;Indian WikiWomen celebrate Women’s History Month&lt;/a&gt; (by Netha Hussain, April 29, 2013). This is a guest blog post by Netha Hussain.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-needs-assessment"&gt;Odia Wikipedia: Needs Assessment&lt;/a&gt; (by Subhashish Panigrahi, May 11, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/access-to-knowledge-work-plan-synopsis-of-feedback-by-wikipedians"&gt;Access to Knowledge Work Plan: Synopsis of Feedback by Wikipedians&lt;/a&gt; (by Nitika Tandon, May 20, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-introductory-session"&gt;Wikipedia Introductory Session organized for Data and India portal consultants&lt;/a&gt; (by Subhashish Panigrahi, May 30, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/cis-tiss-mou"&gt;CIS Signs MOU with TISS, Mumbai&lt;/a&gt; (May 31, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/telugu-wiki-meet-up-at-cis-june-2-2013"&gt;A Telugu Wiki Meetup @ CIS, Bangalore (April 2013 - June 2014)&lt;/a&gt; (a guest blog post by S J Veera, June 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/resources/access-to-knowledge-work-plan"&gt;Access To Knowledge Work Plan (April 2013 - June 2014)&lt;/a&gt; (by T Vishnu Vardhan, June 10, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop"&gt;My First Wikipedia Training Workshop – Theatre Outreach Unit, University of Hyderabad&lt;/a&gt; (by T Vishnu Vardhan, June 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/visual-editor.pdf"&gt;Wikipedia Visual Editor&lt;/a&gt; (by Nitika Tandon, June 27, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/kannada-wikipedia-workshop-bloggers"&gt;A 'Kannada' Wikipedia Workshop for Bloggers&lt;/a&gt; (by U B Pavanaja, June 28, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Press Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.orissadiary.com/ShowEvents.asp?id=37463"&gt;Odisha: Odia Wikipedia workshop organized in Pune to promote Odia language&lt;/a&gt; (OdishaDiary.com, October 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/bangalore-mirror-article-kalyan-subramani-nov-15-2012-some-indian-laws-could-be-challenging"&gt;‘Some Indian laws could be challenging’&lt;/a&gt; (by Kalyan Subramani, Bangalore Mirror, November 15, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-sambad"&gt;A Report of the Odia Wikipedia Workshop held in KMBB College of Engineering, Bhubaneswar&lt;/a&gt; (Sambad, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/orissa-diary-november-23-2012-pravuprasad-routray"&gt;OdishaDiary conferred prestigious Odisha Youth Inspiration Award 2012 to Odia Wikipedia team&lt;/a&gt; (by Pravuprasad Routray, Orissa Diary, November 23, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-iit-kharagpur"&gt;A Report of Odia Wikipedia Workshop at IIT, Kharagpur&lt;/a&gt; (Samaja, Odia daily, Kolkata edition, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/article-in-cybersafar"&gt;વિકિપીડિયા ગુજરાતી માં પણ છે&lt;/a&gt; (by Harsh Kothari, Cybersafar, November 28, 2012).A Report of Odia Wikipedia Workshop at IIT, Kharagpur (Samaja, Odia daily, Kolkata edition, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/orissa-diary-january-27-2013-first-odia-wikipedia-education-program-concludes-at-iimc"&gt;First Odia Wikipedia Education Program concludes at IIMC, Dhenkanal&lt;/a&gt; (OdishaDiary Bureau, January 27, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/sambad-e-paper-january-30-2013-odia-wikipedia-workshop-coverage"&gt;Odia Wikipedia's 9th Anniversary and Workshop on Application of Odia in Media&lt;/a&gt; (Sambad, January 30, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନ‌ବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା&lt;/a&gt;&lt;a href="http://odishan.com/?p=2534"&gt;: ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ର‌ୟୋଗ&lt;/a&gt; (Odishan.com, February 4, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://sambadepaper.com/Details.aspx?id=36615&amp;amp;boxid=23625437"&gt;ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନ‌ବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା&lt;/a&gt;&lt;a href="http://sambadepaper.com/Details.aspx?id=36615&amp;amp;boxid=23625437"&gt;: ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ର‌ୟୋଗ&lt;/a&gt; (Sambad, February 4, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.odishaviews.com/odia-language-workshop-organized-on-9th-anniversary-of-odia-wikipedia-application-of-odia-language-in-e-media/"&gt;Odia language workshop organized on 9th Anniversary of Odia Wikipedia: Application of Odia language in e-media&lt;/a&gt; (Odishaviews.com, February 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.eindiadiary.com/content/odisha-workshop-organized-9th-anniversary-odia-language-application-odia-language-e-media"&gt;Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media&lt;/a&gt; (Odishaviews.com, March 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://indiaeducationdiary.in/Orissa/Shownews.asp?newsid=19485"&gt;Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media&lt;/a&gt; (India Education Diary.com, March 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/kannada-wikipedia-workshop-report-in-prajavani"&gt;Kannada Wikipedia Workshop, Mysore — Coverage in Prajavani&lt;/a&gt; (Prajavani, March 25, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/prajavani-may-24-2013-report-on-cis-celebrates-5-years"&gt;CIS Celebrates 5 Years: A Report in Prajavani&lt;/a&gt; (Prajavani, May 24, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/udayavani-may-25-2013-cis-celebrates-5-years"&gt;CIS Celebrates 5 Years: A Report in Udayavani&lt;/a&gt; (Prajavani, May 24, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hmtv-may-30-2013-wikipedia-and-telugu-wikipedians"&gt;A Feature on Wikipedia and Telugu Wikipedians on HMTV&lt;/a&gt; (Prajavani, May 30-31, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-live-phone-in-programme"&gt;Wikipedia Live Phone-in Programme on HMTV&lt;/a&gt; (Prajavani, June 1, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/prajavani-june-5-2013-kannada-wikipedia-workshop-coverage"&gt;Kannada Wikipedia Workshop at Hasan&lt;/a&gt; (Prajavani, June 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/samyukta-karnataka-june-5-2013-kannada-wikipedia-workshop-coverage"&gt;Kannada Wikipedia Workshop at Hasan&lt;/a&gt; (Samyukta Karnataka, June 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/vijaya-karnataka-june-5-2013-report-of-kannada-wikipedia-workshop-in-hasan"&gt;Kannada Wikipedia Workshop at Hasan&lt;/a&gt; (Vijaya Karnataka, June 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/suvarna-news-june-13-2013-wiki-rahasya-panel-discussion"&gt;Wiki Rahasya: Panel Discussion on Suvarna News&lt;/a&gt; (Suvarna News 24x7, June 13, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.timeoutbengaluru.net/bangalore-beat/features/wiki-donors"&gt;Wiki donors&lt;/a&gt; (TimeOut Bengaluru, June 21, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Newsletters&lt;/h3&gt;
&lt;p&gt;The following newsletters have been published:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-september-2012-bulletin"&gt;September 2012 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-october-2012-bulletin"&gt;October 2012 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-november-2012"&gt;November 2012 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-december-2012"&gt;December 2012 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-january-2013"&gt;January 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-february-2013"&gt;February 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-march-2013"&gt;March 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-april-2013"&gt;April 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-may-2013"&gt;May 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-june-july-2013"&gt;June and July 2013 Bulletin&lt;/a&gt; (During this month the CIS-A2K Newsletter was redesigned based on feedback from the community and thus the June Newsletter was clubbed with July 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Talk @ CIS&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-state-of-tech-talk-by-erik-moeller"&gt;Wikipedia: State of Tech — A Talk by Erik Moeller&lt;/a&gt; (CIS, Bangalore, November 12, 2012). Erik Moeller, Vice President of Engineering and Product Development at the Wikimedia Foundation gave a talk on Wikipedia. &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Section I: Budget Utilization&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; Currency in INR&lt;/th&gt;&lt;th&gt;2012-13&lt;br /&gt;(Per month)&lt;/th&gt;&lt;th&gt;1st Year&lt;br /&gt;(10 months)&lt;/th&gt;&lt;th&gt;Budget Utilization&lt;br /&gt;(Sept. 2012 to June 2013)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr style="text-align: left; "&gt;
&lt;td&gt;&lt;b&gt;People&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prg. Manager&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,17,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,170,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,170,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prg. Officer&lt;/td&gt;
&lt;td style="text-align: right; "&gt;58,800&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,88,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;580,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prg. Officer&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,44,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;14,40,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,008,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Communications role&lt;/td&gt;
&lt;td&gt;60,000&lt;/td&gt;
&lt;td&gt;6,00,000&lt;/td&gt;
&lt;td&gt;2,20,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;New Prg. Director&lt;/td&gt;
&lt;td&gt;2,00,000&lt;/td&gt;
&lt;td&gt;2,000,000&lt;/td&gt;
&lt;td&gt;1,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Consultant&lt;/td&gt;
&lt;td&gt;34,500&lt;/td&gt;
&lt;td&gt;3,45,000&lt;/td&gt;
&lt;td&gt;2,76,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Benefits – All&lt;/td&gt;
&lt;td&gt;6,250&lt;/td&gt;
&lt;td&gt;62,500&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Staff costs&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6,20,550&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6,205,500&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;4,262,000&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Rent&lt;/td&gt;
&lt;td&gt;47,300&lt;/td&gt;
&lt;td&gt;4,73,000&lt;/td&gt;
&lt;td&gt;5,70,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Janitorial&lt;/td&gt;
&lt;td&gt;2,750&lt;/td&gt;
&lt;td&gt;27,500&lt;/td&gt;
&lt;td&gt;48,634&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Utilities&lt;/td&gt;
&lt;td&gt;7,500&lt;/td&gt;
&lt;td&gt;75,000&lt;/td&gt;
&lt;td&gt;61,836&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Telephone&lt;/td&gt;
&lt;td&gt;4,000&lt;/td&gt;
&lt;td&gt;40,000&lt;/td&gt;
&lt;td&gt;47,819&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Office pantry&lt;/td&gt;
&lt;td&gt;5,000&lt;/td&gt;
&lt;td&gt;50,000&lt;/td&gt;
&lt;td&gt;38,765&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Office space&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;66,550&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6,65,500&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;7,67,054&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Travel&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;SF travel&lt;/td&gt;
&lt;td&gt;77,726&lt;/td&gt;
&lt;td&gt;7,77,257&lt;/td&gt;
&lt;td&gt;1,81,887&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Wikimania travel&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Domestic travel&lt;/td&gt;
&lt;td&gt;1,10,000&lt;/td&gt;
&lt;td&gt;1,100,000&lt;/td&gt;
&lt;td&gt;1,373,469&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Travel&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,87,726&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,877,257&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,555,356&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Printed materials&lt;/td&gt;
&lt;td&gt;50,000&lt;/td&gt;
&lt;td&gt;5,00,000&lt;/td&gt;
&lt;td&gt;38,800&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Design, Creative&lt;/td&gt;
&lt;td&gt;55,000&lt;/td&gt;
&lt;td&gt;5,50,000&lt;/td&gt;
&lt;td&gt;1,25,400&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td&gt;Volunteer development&lt;/td&gt;
&lt;td&gt;50,000&lt;/td&gt;
&lt;td&gt;500,000&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Postage &amp;amp; Mailing&lt;/td&gt;
&lt;td&gt;2,500&lt;/td&gt;
&lt;td&gt;25,000&lt;/td&gt;
&lt;td&gt;5,800&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Office supplies&lt;/td&gt;
&lt;td&gt;7,500&lt;/td&gt;
&lt;td&gt;75,000&lt;/td&gt;
&lt;td&gt;50,192&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;General expenses&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1,65,000&lt;/td&gt;
&lt;td&gt;1,650,000&lt;/td&gt;
&lt;td&gt;&lt;b&gt;2,20,192&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Total before fees&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,039,826&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;10,398,257&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6,804,602&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Admin fee&lt;/td&gt;
&lt;td style="text-align: right; "&gt;51,991&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,19,913&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,19,913&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Program fee&lt;/td&gt;
&lt;td style="text-align: right; "&gt;51,991&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,19,913&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,19,913&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Total&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,143,808&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;11,438,082&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;7,844,428&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p&gt;Notes:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The above table gives a picture of the A2K program budget utilization (un-audited) for the period Sept. 2012 to June 2013. Thus it is important that these figures be read as provisional figures, which could change post the statutory audit as per the Indian laws binding a Registered Society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Approximately there is a 31% underspending of the Budget during the ten month period. This is mainly because of the transition of the program to CIS took sometime along with delays in the recruitment of the New Program Director. CIS-A2K has requested the WMF for a reallocation of the Budget since then.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Footnotes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:India_Education_Program/Analysis/Independent_Report_from_Tory_Read"&gt;Independent Report from Tory Read&lt;/a&gt; on &lt;a href="https://en.wikipedia.org/wiki/India_Education_Program"&gt;India Education Program&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2011-November/004958.html"&gt;Death and Post-mortem of Indian Education Program pilot&lt;/a&gt;. Wikimedia-India Mail archive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2012-December/008929.html"&gt;Most recent updates on the hiring of the Programme Director for the A2K programme&lt;/a&gt;. Wikimedia-India mail archive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-February/009418.html"&gt;The Access to Knowledge - Bulletin - January '13&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-basic-parameters"&gt;Indic Wikipedia Visualisation Project #1: Visualising Basic Parameters&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages"&gt;Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-April/009867.html"&gt;CIS-A2K Work Plan (Draft)&lt;/a&gt;. Wikimedia-India mail archive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-May/009900.html"&gt;CIS-A2K Budget, Utilization Report and proposed revision&lt;/a&gt;. Wikimedia-India mail archive&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013'&gt;https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vishnu Vardhan, Nitika Tandon and Subhashish Panigrahi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-11-30T11:18:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/train-the-trainer-program">
    <title>Train the Trainer Program</title>
    <link>https://cis-india.org/openness/blog-old/train-the-trainer-program</link>
    <description>
        &lt;b&gt;Wikipedians, about 20 of them, from 10 different cities, speaking 8 different languages, joined together for the first ever four days "Train the Trainer Program" organised by the Centre for Internet and Society's Access to Knowledge (CIS-A2K) team in Bangalore from October 3 to 6, 2013.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/TTT"&gt;Read the original published on the Wikipedia meta page&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan"&gt;CIS-A2K&lt;/a&gt; organised the residency training program to build capacities amongst different language Wikimedia communities. A good diversity of Wikipedians from various language communities such as Bengali, Gujarati, Sanskrit, Malayalam, Hindi, Marathi, Telugu, Odia, came over for the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K identified two prominent reasons for organizing the event: (1) Limitations of a virtual sphere, and (2) Limited number of Wikipedians leading outreach activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Limitations of a virtual sphere&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Most open source communities face problem of a lack of time and space for sharing ideas in a non-virtual sphere. Similary Wikipedians, who are voluntary contributors and authors of the articles posted on Wikipedia merely get time and opportunity to meet fellow editors because of the limitations of a virtual platform on which Wikipedia is built. There are twelve active Indian language Wikimedia communities that are spread across the world and moving the bandwagon of collaborating with each other and carving their historic mark of compiling the world's largest encyclopaedia and its other sister projects. To keep this movement alive there is a need of cross-sharing ideas of working together for a common goal and strengthening the leaders of these communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Limited number of Wikipedians leading outreach activities&lt;br /&gt; &lt;/b&gt;&lt;/span&gt;Only a handful of Wikipedians devote their time in leading outreach activities and bringing new blood to the community. Indian language Wikimedia communities are in need of empowering Wikipedians who would lead outreach sessions in order to expand their editor community and strengthen their language projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inception of this program began with the discussion of organizing a training program for the Wikipedians who are willing to conduct more activities in their home cities. Finally on October 3, 2013, Bangalore heard the voices of prominent Wikipedians from Punjab, West Bengal, Odisha, Andhra Pradesh, Gujarat, Maharashtra, Karnataka and Kerala. The Wikipedians delivered presentations on various topics such as — why Wikipedia is needed for the society, why Wikipedia in Indian languages, importance of starting new Wiki projects and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Their presentation delivery skills were judged by &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;Vishnu Vardhan&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/User:Nitika.t"&gt;Nitika Tandon&lt;/a&gt; and all other community members present. They gave individual assessments and feedback for improvement towards the end of the day. Personal trainer Sachin Nagarajappa spent time with Wikipedians discussing mistakes that trainers do while conducting workshops and gradual improvement techniques for impactful outreach. Wikipedia is built on the concept of crowdsourcing and Malayalam Wikimedian &lt;a href="https://ml.wikipedia.org/wiki/User:Viswaprabha"&gt;Viswanathan Prabhakaran&lt;/a&gt; carried out a session about “Crowd Sourcing from the Future” explaining the various layers of crowdsourced projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first day ended with a task where different language Wikipedians formed groups to prepare presentations for the following day.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_TraintheTrainer.png" alt="Train the Trainer 1" class="image-inline" title="Train the Trainer 1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above: Wikipedians Satdeep Gill, Shyamal Lakshminarayan and Shubha during at the CIS-A2K Train-the-Trainer Program (by Subhashish Panigrahi, CC-BY-SA 3.0)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Groups were given a challenge of imagining the audience as new wikipedians. Five groups presented on the second day. Sachin conducted an advanced presentation skill improvement workshop based on the inputs from the participants and the assessment of the group presentations. Veteran Wikipedian &lt;a href="https://kn.wikipedia.org/wiki/ಸದಸ್ಯ:HPNadig"&gt;Hari Prasad Nadig&lt;/a&gt; shared learnings from Challenges &amp;amp; Opportunities in building an Indian Language Community online. Open source activist and CIS's Executive Director &lt;a href="https://cis-india.org/about/people/our-team"&gt;Sunil Abraham&lt;/a&gt; conducted two sessions — a spectrogram based activity to simplify the "Criticality of Neutral Point of View" and an interactive session called “Speed Geeking” on offline and online outreach followed by a one-on-one discussion on the presentation skill improvement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Typing in Indian languages is not easy especially when it comes to multiple typing layout standards followed in the public and private sectors in India. &lt;a href="https://meta.wikimedia.org/wiki/User:Pavanaja"&gt;Dr. U.B.Pavanaja&lt;/a&gt; conducted a session on Unicode standard for Indian languages and its usefulness with a brief context on the fonts and their different operating systems. Social media expert and Wikimedian &lt;a href="https://en.wikipedia.org/wiki/User:Tinucherian"&gt;Tinu Cherian&lt;/a&gt; shared the secrets of popularizing Indian language Wikipedias and bringing outstanding contributors to the limelight, how media played an important role in showcasing initiatives for free encyclopaedic content contribution in India and tips of social media. With fun activities &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;Vishnu Vardhan&lt;/a&gt; shared case studies of making Wikipedia workshops interesting. Wikimedia Foundation board member  and writer &lt;a href="https://meta.wikimedia.org/wiki/User:Aprabhala"&gt;Achal Prabhala&lt;/a&gt; shared stories of documenting Oral traditions in Kerala and South Africa for Wikipedia referencing and how copyright laws evolved in the context of copyright issues that Wikipedia contributors face. Achal also threw light on content donation on WikiSource and other platforms that would be useful for people to consume for knowledge production on diverse platforms where Wikipedia could play a central role. Viswanathan and &lt;a href="https://meta.wikimedia.org/wiki/User:Psubhashish"&gt;Subhashish Panigrahi&lt;/a&gt; demonstrated how to set up a handheld digital camera based prop to easily digitize books without using any scanner and then create electronic books.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most vital part of Wikipedia articles is referencing. Wikimedian &lt;a href="https://en.wikipedia.org/wiki/User:Shyamal"&gt;Shyamal Lakshminarayan&lt;/a&gt; demonstrated how finding sources of references and citing them for the facts on Wikipedia  could be made easier through detailed research and by using several tools available. &lt;a href="https://wiki.wikimedia.in/"&gt;Wikimedia India&lt;/a&gt;'s founding member and veteran Telugu Wikipedian &lt;a href="https://te.wikipedia.org/wiki/వాడుకరి:Arjunaraoc"&gt;Arjuna Rao Chavala&lt;/a&gt; gave a talk about the history and future plans of Wikimedia India. Wikipedians then went to M.G. Road boulevard to see the weaving work by Gandhians, Philately exhibition on Gandhi and spent some time with Namma Metro's staff to know  about the metro operation. Dr. U.B. Pavanaja and Kannada Wikipedian &lt;a href="https://kn.wikipedia.org/wiki/ಸದಸ್ಯ:Omshivaprakash"&gt;Om Shivaprakash&lt;/a&gt; guided Wikipedians to the office of Deccan Herald Prajavani where they got to see the entire newspaper production and spent time with the technical staff to learn about the use of Kannada Unicode fonts for newspaper printing. Editors and staff at Prajavani got to know about the use of WikiCommons as a free image repository.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The four action filled days involved learning new concepts, training on presentation skills, collaborating to create outreach documents, sharing stories from different language communities, understanding new mediums of outreach, meeting Wikipedians from different cities and also having lots of fun. Wikipedians left Bangalore city with happy faces and we hope to cultivate new editors in their communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;List of Participants&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:AbhiSuryawanshi" title="en:user:AbhiSuryawanshi"&gt;Abhishek Suryawanshi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:AnkitaS" title="en:user:AnkitaS"&gt;Ankita Sinha&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Charan_Gill" title="en:user:Charan Gill"&gt;Charan Gill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:jayantanth" title="en:user:jayantanth"&gt;Jayanta Nath&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Kasyap" title="en:user:Kasyap"&gt;Kasyap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Niraj_Suryawanshi" title="en:user:Niraj Suryawanshi"&gt;Niraj Suryawanshi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://te.wikipedia.org/wiki/user:pranayraj1985" title="te:user:pranayraj1985"&gt;pranayraj vangari&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Satdeep_gill" title="en:user:Satdeep gill"&gt;Satdeep Gill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://sa.wikipedia.org/wiki/user:shubha"&gt;Shubha&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Rangilo_Gujarati" title="en:user:Rangilo Gujarati"&gt;Rangilo Gujarati&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://ml.wikipedia.org/wiki/User:Manojk" title="ml:User:Manojk"&gt;Manoj K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/User:MKar" title="en:User:MKar"&gt;Mrutyunjaya Kar&lt;/a&gt; (&lt;a class="extiw" href="https://or.wikipedia.org/wiki/User:MKar" title="or:User:MKar"&gt;Odia Wiki&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://or.wikipedia.org/wiki/User:Subas_Chandra_Rout" title="or:User:Subas Chandra Rout"&gt;Subas Chandra Rout&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Nikhil.kawale" title="en:user:Nikhil.kawale"&gt;Nikhil Kawale&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:%E0%B0%B5%E0%B0%BF%E0%B0%B6%E0%B1%8D%E0%B0%B5%E0%B0%A8%E0%B0%BE%E0%B0%A7%E0%B1%8D.%E0%B0%AC%E0%B0%BF.%E0%B0%95%E0%B1%86." title="te:వాడుకరి:విశ్వనాధ్.బి.కె."&gt;Viswanadh.b.k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://hi.wikipedia.org/wiki/user:Hindustanilanguage" title="hi:user:Hindustanilanguage"&gt;Muzammil&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:John_Noronha" title="en:user:John Noronha"&gt;John Noronha&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/train-the-trainer-program'&gt;https://cis-india.org/openness/blog-old/train-the-trainer-program&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-11-18T07:52:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/spy-files-three">
    <title>Spy Files 3: WikiLeaks Sheds More Light On The Global Surveillance Industry</title>
    <link>https://cis-india.org/internet-governance/blog/spy-files-three</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou looks at WikiLeaks' latest Spy Files and examines the legality of India's surveillance technologies, as well as their potential connection with India's Central Monitoring System (CMS) and implications on human rights. &lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;Last month, WikiLeaks released &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt;“&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt;Spy&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt;Files&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt; 3”&lt;/a&gt;&lt;/span&gt;, a mass exposure of the global surveillance trade and industry. WikiLeaks first released the Spy Files in December 2011, which entail brochures, presentations, marketing videos and technical specifications on the global trade of surveillance technologies. Spy Files 3 supplements this with 294 additional documents from 92 global intelligence contractors.&lt;/p&gt;

&lt;h2&gt;&lt;b&gt;So what do the latest Spy Files reveal about India?&lt;/b&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;When we think about India, the first issues that probably come to mind are poverty and corruption, while surveillance appears to be a more “Western” and elitist issue. However, while many other developing countries are excluded from WikiLeaks’ list of surveillance technology companies, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;India&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;is&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;once&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;again&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;on&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;the&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;list&lt;/a&gt;&lt;/span&gt; with some of the most controversial spyware.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;ISS World Surveillance Trade Shows&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;The latest Spy Files include a &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;brochure&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;the&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; 2013&lt;/a&gt;&lt;/span&gt; -the so-called “wiretapper’s ball”- which is the world’s largest surveillance trade show. &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;This&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;years&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;’ &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;ISS&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;World&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;Asia&lt;/a&gt;&lt;/span&gt; will take place in Malaysia during the first week of December and law enforcement agencies from around the world will have another opportunity to view and purchase the latest surveillance tech. The&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;leaked&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; 2013 &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;brochure&lt;/a&gt;&lt;/span&gt; entails a list of last years’ global attendees. According to the brochure, 53% of the attendees included law enforcement agencies and individuals from the defense, public safety and interior security sectors, 41% of the attendees were ISS vendors and technology integrators, while only 6% of the attendees were telecom operators and from the private enterprise. The brochure boasts that 4,635 individuals from 110 countries attended the ISS World trade shows last year and that the percentage of attendance is increasing.&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;The following table lists the &lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;Indian&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;attendees&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;at&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;last&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;years&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;’ &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;/span&gt;:&lt;/p&gt;
 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Law Enforcement, Defense and Interior Security Attendees&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;th&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Telecom Operators and Private Enterprises Attendees&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;th&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;ISS Vendors and Technology Integrators Attendees&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Andhra Pradesh India Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;BT&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;AGC Networks&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;CBI Academy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Cogence Investment Bank&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Aqsacom India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Government of India, Telecom Department&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Reliance Communications&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;ClearTrail Technologies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Cabinet Secretariat&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Span Telecom Pvt. Ldt. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Foundation Technologies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Centre for Development of Telematics (C-DOT)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;Kommlabs&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Chandigarh Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Paladion Networks&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Defence Agency&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Polaris Wireless&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India General Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Polixel Security Systems&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Intelligence Department&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Pyramid Cyber Security&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India National Institute of Criminology&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Schleicher Group&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India office LOKAYUKTA NCT DELHI&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Span Technologies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Police Department, A.P.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;TATA India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Tamil Nadu Police Department&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Tata Consultancy Services&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Indian Police Service, Vigilance&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Telecommunications India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Indian Telecommunications Authority&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Vehere Interactive&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;NTRO India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;SAIC Indian Tamil Nadu Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; 17                                                        4                                                      15&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

&lt;p align="JUSTIFY"&gt;According to the above table - which is based on data from the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;WikiLeaks&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;’ &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; 2013 &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;brochure&lt;/a&gt;&lt;/span&gt;- the majority of Indian attendees at last years’ ISS World were from the law enforcement, defense and interior security sectors. 15 Indian companies exhibited and sold their surveillance technologies to law enforcement agencies from around the world and it is notable that India’s popular ISP provider, Reliance Communications, attended the trade show too.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In addition to the ISS World 2013 brochure, the Spy Files 3 entail a detailed brochure of a major Indian surveillance technology company: ClearTrail Technologies.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;ClearTrail Technologies&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt; &lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt;Technologies&lt;/a&gt;&lt;/span&gt; is an Indian company based in Indore. The document titled &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Internet&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Suite&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;”&lt;/a&gt;&lt;/span&gt; from ClearTrail Technologies boasts about the company’s mass monitoring, deep packet inspection, COMINT, SIGINT, tactical Internet monitoring, network recording and lawful interception technologies. ClearTrail’s Internet Monitoring Suite includes the following products:&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;1. ComTrail: Mass Monitoring of IP and Voice Networks&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ComTrail&lt;/span&gt;&lt;/a&gt; is an integrated product suite for centralized interception and monitoring of voice and data networks. It is equipped with an advanced analysis engine for pro-active analysis of thousands of connections and is integrated with various tools, such as Link Analysis, Voice Recognition and Target Location.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ComTrail is deployed within a service provider network and its monitoring function correlates voice and data intercepts across diverse networks to provide a comprehensive intelligence picture. ComTrail supports the capture, record and replay of a variety of Voice and IP communications in pretty much any type of communication, including - but not limited to- Gmail, Yahoo, Hotmail, BlackBerry, ICQ and GSM voice calls.&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;Additionally, ComTrail intercepts data from any type of network -whether Wireless, packet data, Wire line or VoIP networks- and can decode hundreds of protocols and P2P applications, including HTTP, Instant Messengers, Web-mails, VoIP Calls and MMS.&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;In short, ComTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Equipped to handle millions of communications per day intercepted over high speed STM &amp;amp; Ethernet Links&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Doubles up as Targeted Monitoring System&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- On demand data retention, capacity exceeding several years&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Instant Analysis across thousands of Terabytes&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Correlates Identities across multiple networks&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Speaker Recognition and Target Location&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;2. xTrail: Targeted IP Monitoring&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;xTrail&lt;/span&gt;&lt;/a&gt; is a solution for interception, decoding and analysis of high speed data traffic over IP networks and independently monitors ISPs/GPRS and 3G networks. xTrail has been designed in such a way that it can be deployed within minutes and enables law enforcement agencies to intercept and monitor targeted communications without degrading the service quality of the IP network. This product is capable of intercepting all types of networks -including wireline, wireless, cable, VoIP and VSAT networks- and acts as a black box for “record and replay” targeted Internet communications.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Interestingly enough, xTrail can filter based on a “pure keyword”, a URL/Domain with a keyword, an IP address, a mobile number or even with just a user identity, such as an email ID, chat ID or VoIP ID. Furthermore, xTrail can be integrated with link analysis tools and can export data in a digital format which can allegedly be presented in court as evidence.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, xTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Pure passive probe&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Designed for rapid field operations at ISP/GPRS/Wi-Max/VSAT Network Gateways&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Stand-alone solution for interception, decoding and analysis of multi Gigabit IP traffic&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Portable trolley based for simplified logistics, can easily be deployed and removed from any network location&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Huge data retention, rich analysis interface and tamper proof court evidence&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Easily integrates with any existing centralized monitoring system for extended coverage&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;3. QuickTrail: Tactical Wi-Fi Monitoring&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;Some of the biggest IP monitoring challenges that law enforcement agencies face include cases when targets operate from public Internet networks and/or use encryption.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;QuickTrail&lt;/span&gt;&lt;/a&gt; is a device which is designed to gather intelligence from public Internet networks, when a target is operating from a cyber cafe, a hotel, a university campus or a free Wi-Fi zone. In particular, QuickTrail is equipped with multiple monitoring tools and techniques that can help intercept almost any wired, Wi-Fi or hybrid Internet network so that a target communication can be monitored. QuickTrail can be deployed within fractions of seconds to intercept, reconstruct, replay and analyze email, chat, VoIP and other Internet activities of a target. This device supports real time monitoring and wiretapping of Ethernet LANs.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to ClearTrail’s brochure, QuickTrail is a “all-in-one” device which can intercept secured communications, know passwords with c-Jack attack, alert on activities of a target, support active and passive interception of Wi-Fi and wired LAN and capture, reconstruct and replay. It is noteworthy that QuickTrail can identify a target machine on the basis of an IP address, MAC ID, machine name, activity status and several other parameters. In addition, QuickTrail supports protocol decoding, including HTTP, SMTP, POP3 and HTTPS. This device also enables the remote and central management of field operations at geographically different locations.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, QuickTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Conveniently housed in a laptop computer&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Intercepts Wi-Fi and wired LANs in five different ways&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Breaks WEP, WPA/WPA2 to rip-off secured Wi-Fi networks&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Deploys spyware into a target’s machine&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Monitor’s Gmail, Yahoo and all other HTTPS-based communications&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Reconstructs webmails, chats, VoIP calls, news groups and social networks&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;4. mTrail: Off-The-Air Interception&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;mTrail&lt;/span&gt;&lt;/a&gt; offers active and passive ‘off-the-air’ interception of GSM 900/1800/1900 Mhz phone calls and data to meet law enforcement surveillance and investigation requirements. The mTrail passive interception system works in the stealth mode so that there is no dependence on the network operator and so that the target is unaware of the interception of its communications.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The mTrail system has the capability to scale from interception of 2 channels (carrier frequencies) to 32 channels. mTrail can be deployed either in a mobile or fixed mode: in the mobile mode the system is able to fit into a briefcase, while in the fixed mode the system fits in a rack-mount industrial grade chassis.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Target location identification is supported by using signal strength, target numbers, such as IMSI, TIMSI, IMEI or MSI SDN, which makes it possible to listen to the conversation on so-called “lawfully intercepted” calls in near real-time, as well as to store all calls. Additionally, mTrail supports the interception of targeted calls from pre-defined suspect lists and the monitoring of SMS and protocol information.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, mTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Designed for passive interception of GSM communications&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Intercepts Voice and SMS “off-the-air”&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Detects the location of the target&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Can be deployed as a fixed unit or mounted in a surveillance van&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- No support required from GSM operator&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;5. Astra: Remote Monitoring and Infection framework&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Astra&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;”&lt;/a&gt;&lt;/span&gt; is a remote monitoring and infection framework which incorporates both conventional and proprietary infection methods to ensure bot delivery to the targeted devices. It also offers a varied choice in handling the behavior of bots and ensuring non-traceable payload delivery to the controller.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The conventional methods of infection include physical access to a targeted device by using exposed interfaces, such as a CD-ROM, DVD and USB ports, as well as the use of social media engineering techniques. However, Astra also supports bot deployment &lt;i&gt;without&lt;/i&gt; requiring any physical access to the target device.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In particular, Astra can push bot to &lt;i&gt;any&lt;/i&gt; targeted machine sharing the &lt;i&gt;same&lt;/i&gt; LAN (wired, wi-fi or hybrid). The SEED is a generic bot which can identify a target’s location, log keystrokes, capture screen-shots, capture Mic, listen to Skype calls, capture webcams and search the target’s browsing history. Additionally, the SEED bot can also be remotely activated, deactivated or terminated, as and when required. Astra allegedly provides an un-traceable reporting mechanism that operates without using any proxies, which overrules the possibility of getting traced by the target.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Astra’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Proactive intelligence gathering&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- End-to-end remote infection and monitoring framework&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Follow the target, beat encryption, listen to in-room conversations, capture keystrokes and screen shots&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Designed for centralized management of thousands of targets&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- A wide range of deployment mechanisms to optimize success ration&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Non-traceable, non-detectable delivery mechanism&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Intrusive yet stealthy&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Easy interface for handling most complex tasks&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Successfully tested over the current top 10 anti-virus available in the market&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- No third party dependencies&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Free from any back-door intervention&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Technologies&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;argue&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;that&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;they&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;meet&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;lawful&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;interception&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;regulatory&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;requirements&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;/span&gt;across the globe. In particular, they claim that their products are compliant with &lt;a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"&gt;&lt;span style="text-decoration: underline;"&gt;ETSI&lt;/span&gt;&lt;/a&gt; and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;CALEA&lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt; &lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;regulations&lt;/a&gt;&lt;/span&gt; and that they are efficient to cater to region specific requirements as well.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The latest Spy Files also include data on foreign  surveillance technology companies operating in India, such as &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Telesoft&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Technologies&lt;/a&gt;&lt;/span&gt;, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"&gt;AGT&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"&gt;International&lt;/a&gt;&lt;/span&gt; and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Verint&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Systems&lt;/a&gt;&lt;/span&gt;. In particular, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://verint.com/"&gt;Verint&lt;/a&gt;&lt;a href="http://verint.com/"&gt; &lt;/a&gt;&lt;a href="http://verint.com/"&gt;Systems&lt;/a&gt;&lt;/span&gt; has its headquarters in New York and offices all around the world, including Bangalore in India. Founded in 1994 and run by Dan Bodner, Verint Systems produces a wide range of surveillance technologies, including the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Impact 360 Speech Analytics&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Impact 360 Text Analytics&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Video Management Software (VMS)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Physical Security Information Management (PSIM)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Network Video Recorders (NVRs)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Video Business Intelligence (VBI)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Surveillance Analytics&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva IP cameras&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- CYBERVISION Network Security&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- ENGAGE suite&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- FOCAL-INFO (FOCAL-COLLECT &amp;amp; FOCAL-ANALYTICS)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- RELIANT&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- STAR-GATE&lt;/p&gt;
&lt;p&gt;- VANTAGE&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://verint.com/"&gt;Verint&lt;/a&gt;&lt;a href="http://verint.com/"&gt; &lt;/a&gt;&lt;a href="http://verint.com/"&gt;Systems&lt;/a&gt;&lt;/span&gt; claims to be in compliance with ETSI, CALEA and other worldwide lawful interception and standards and regulations, it remains unclear whether such products successfully help law enforcement agencies in tackling crime and terrorism, without violating individuals’ right to privacy and other human rights. After all, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;Verint&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;Systems&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;has&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;participated&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;in&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;ISS&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;World&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;Trade&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;shows&lt;/a&gt;&lt;/span&gt; which exhibit some of the most controversial spyware in the world, used to target individuals and for mass surveillance.&lt;/p&gt;

&lt;h2&gt;&lt;b&gt;And what do the latest Spy Files mean for India?&lt;/b&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;Why is it even important to look at the latest Spy Files? Well, for starters, they reveal data about which Indian law enforcement agencies are interested in surveillance and which companies are interested in selling and/or buying the latest spy gear. And why is any of this important? I can think of three main reasons:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. The Central Monitoring System (CMS)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. Is any of this surveillance even legal in India?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. Can such surveillance result in the violation of human rights?&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Spy Files 3...and the Central Monitoring System (CMS)&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;Following the &lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt;Mumbai&lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt; 2008 &lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt;terrorist&lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt; &lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt;attacks&lt;/a&gt;, the Telecom Enforcement, Resource and Monitoring (TREM) cells and the Centre for Development of Telematics (C-DOT) started preparing the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Monitoring&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;System&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; (&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;)&lt;/a&gt;. As of April 2013, this project is being manned by the Intelligence Bureau, while agencies which are planned to have access to it include the Research &amp;amp; Analysis Wing (RAW) and the Central Bureau of Investigation (CBI). ISP and Telecom operators are required to&lt;b&gt; &lt;/b&gt;&lt;span&gt;install the gear which enables law enforcement agencies to carry&lt;/span&gt; out the Central Monitoring System under the &lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Unified&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Access&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Services&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; (&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;) &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Agreement&lt;/a&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Central Monitoring System aims at centrally monitoring all telecommunications and Internet communications in India and its estimated cost is &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;Rs&lt;/a&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;. 4 &lt;/a&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;billion&lt;/a&gt;&lt;/span&gt;. In addition to &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;equipping&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;government&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;agencies&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;/span&gt;with Direct Electronic Provisioning, filters and alerts on the target numbers, the CMS will also enable Call Data Records (CDR) analysis and data mining to identify personal information of the target numbers. The CMS supplements&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;regional&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Internet&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Systems&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;, &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;such&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;as&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;that&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Assam&lt;/a&gt;&lt;/span&gt;, by providing a nationwide monitoring of telecommunications and Internet communications, supposedly to assist law enforcement agencies in tackling crime and terrorism.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;However, data monitored and collected through the CMS will be stored in a&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt; &lt;/a&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt;centralised&lt;/a&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt; &lt;/a&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt;database&lt;/a&gt;&lt;/span&gt;, which could potentially increase the probability of centralized cyber attacks and thus increase, rather than reduce, threats to national security. Furthermore, some basic rules of statistics indicate that &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;bigger&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;amount&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;of&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;data&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;, &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;bigger&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;probability&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;of&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;an&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;error&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;in&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;matching&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;profiles&lt;/a&gt;&lt;/span&gt;, which could potentially result in innocent people being charged with crimes they did not commit. And most importantly: the CMS currently lacks adequate legal oversight, which means that it remains unclear how monitored data will be used. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;regarding&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;the&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;CMS&lt;/a&gt;&lt;/span&gt; mandates mass surveillance by requiring ISPs and Telecom operators to enable the monitoring and interception of communications. However, targeted and mass surveillance through the CMS not only raises serious questions around its legality, but also creates the potential for abuse of the right to privacy and other human rights.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Interestingly enough, Indian law enforcement agencies which attended &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;last&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;years&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;’ &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;trade&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;shows&lt;/a&gt;&lt;/span&gt; are linked to the Central Monitoring System. In particular, last years’ law enforcement, defense and interior security attendees include the Centre for Development of Telematics (C-DOT) and the Department of Telecommunications, both of which prepared the Central Monitoring System. The list of attendees also includes India’s Intelligence Bureau, which is manning the CMS, as well as the &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;agencies&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;which&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;will&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;have&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;access&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;to&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;/span&gt;: the Central Bureau of Investigation (CBI), the Research and Analysis Wing (RAW), the National Technical Research Organization (NTRO) and various other state police departments and intelligence agencies.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, Spy Files 3 entail a &lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;list&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;of&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;last&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;years&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;’ &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;ISS&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;World&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;security&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;company&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;attendees&lt;/a&gt;, which includes several Indian companies. Again, interestingly enough, many of these companies may potentially be aiding law enforcement with the technology to carry out the Central Monitoring System. ClearTrail Technologies, in particular, provides &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;solutions&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;for&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;targeted&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;and&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;mass&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;monitoring&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;IP&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;and&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;voice&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;networks&lt;/a&gt;, as well as remote monitoring and infection frameworks - all of which would potentially be perfect to aid the Central Monitoring System.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In fact, ClearTrail states in its brochure that its &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ComTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;product&lt;/a&gt; is equipped to handle millions of communications per day, while its &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;xTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;product&lt;/a&gt; can easily be integrated with any existing centralised monitoring system for extended coverage. And if that’s not enough, ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Astra&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;” &lt;/a&gt;is designed for the centralized management of thousands of targets. While there may not be any concrete proof that ClearTrail is indeed aiding the Centralized Monitoring System, the facts speak for themselves: ClearTrail is an Indian company which sells target and mass monitoring products to law enforcement agencies. The Centralized Monitoring System is currently being implemented. What are the odds that ClearTrail is &lt;i&gt;not &lt;/i&gt;equipping the CMS? &lt;span&gt;And what are the odds that such technology is &lt;/span&gt;&lt;i&gt;&lt;span&gt;not&lt;/span&gt;&lt;/i&gt;&lt;span&gt; being used for other mass electronic surveillance programmes, such as the Lawful Intercept and Monitoring (LIM)?&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Spy Files 3...and the legality of India’s surveillance technologies&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;ClearTrail Technologies’ &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;brochure&lt;/span&gt;&lt;/a&gt; -the only leaked document on Indian surveillance technology by the latest Spy Files- states that the company complies with &lt;a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"&gt;&lt;span style="text-decoration: underline;"&gt;ETSI&lt;/span&gt;&lt;/a&gt; and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;CALEA&lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt; &lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;regulations&lt;/a&gt;&lt;/span&gt;. While it’s clear that the company complies with U.S. and European regulations on the interception of communications to attract more customers in the international market, such regulations don’t really apply &lt;i&gt;within&lt;/i&gt; India, which is part of ClearTrail’s market. Notably enough, ClearTrail does not mention any compliance with Indian regulations in its brochure. So let’s have a look at them.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;India has five laws which regulate surveillance:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 1885&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Post&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Office&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 1898&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Wireless&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Telegraphy&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 1933&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;4. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;Code&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; &lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;of&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; &lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;Criminal&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; &lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;Procedure&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; (&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;CrPc&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;)&lt;/a&gt;&lt;/span&gt;, 1973: Section 91&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;5. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 2008&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Post&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Offices&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt; does not cover electronic communications and the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Wireless&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Telegraphy&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;/span&gt;lacks procedures which would determine if surveillance should be targeted or not. Neither the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt; nor the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt; cover mass surveillance, but are both limited to targeted surveillance. Moreover, targeted interception in India according to these laws requires case-by-case authorization by either the home secretary or the secretary department of information technology. In other words, unauthorized, limitless, mass surveillance is not technically permitted by law in India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Indian Telegraph Act mandates that the interception of communications can only be carried out on account of &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;a&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;public&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;emergency&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;or&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;for&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;public&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;safety&lt;/a&gt;. However, in 2008, the Information Technology Act copied most of the interception provisions of the Indian Telegraph Act, but removed the preconditions of public emergency or public safety, and instead expanded the power of the government to order interception for the “investigation of any offense”.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The interception of Internet communications is mainly covered by the &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;2009 &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Rules&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;under&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;the&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Information&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Technology&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Act&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; 2008 &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;and&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Sections&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; 69 &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;and&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; 69&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;B&lt;/a&gt; are particularly noteworthy. According to these Sections, an Intelligence Bureau officer who leaked national secrets may be imprisoned for up to three years, while Section 69 not only allows for the interception of any information transmitted through a computer resource, but also requires that users disclose their encryption keys upon request or face a jail sentence of up to seven years.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While these laws allow for the interception of communications and can be viewed as widely controversial, they do not technically permit the &lt;i&gt;mass&lt;/i&gt; surveillance of  communications. In other words, ClearTrail’s products, such as &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ComTrail&lt;/span&gt;&lt;/a&gt;, which enable the mass interception of IP networks, lack legal backing. However, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Unified&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Access&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Services&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; (&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;) &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt;&lt;/span&gt; regarding the Central Monitoring System mandates mass surveillance and requires ISP and Telecom operators to comply.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Through the licenses of the Department of Telecommunications, Internet service providers, cellular providers and telecoms are required to provide the Government of India direct access to all communications data and content &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;even&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;without&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;a&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;warrant&lt;/a&gt;, which is not permitted under the laws on interception. These licenses also require cellular providers to have ‘bulk encryption’ of less than 40 bits, which means that potentially any person can use off-the-air interception to monitor phone calls. However, such licenses do not regulate the capture of signal strength, target numbers like IMSI, TIMSI, IMEI or MSI SDN, which can be captured through ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;mTrail&lt;/span&gt;&lt;/a&gt; product.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;More importantly, following &lt;a class="external-link" href="http://www.financialexpress.com/news/states-begin-to-surrender-offair-phone-snooping-equipment/957859"&gt;allegations&lt;/a&gt; that the National Technical Research Organization (NTRO) had been using off-the-air interception equipment to snoop on politicians in 2011, the Home Ministry issued a directive to ban the possession or use of all off-the-air phone interception gear. As a result, the Indian Government asked the Customs Department to provide an inventory of all all such equipment imported over a ten year period, and it was uncovered that as many as 73,000 pieces of equipment had been imported. Since, the Home Ministry has informed the heads of law enforcement agencies that there has been a &lt;a class="external-link" href="http://m.indianexpress.com/news/state-govts-hand-over-few-offair-phonetapping-sets-to-centre/1185166/"&gt;compete ban on use of such equipment&lt;/a&gt; and that all those who possess such equipment and fail to inform the Government will face prosecution and imprisonment. In short, ClearTrail's product, mTrail, which undertakes off-the-air phone monitoring is illegal and Indian law enforcement agencies are prohibited from using it. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Astra&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;”&lt;/a&gt; product is capable of remote infection and monitoring, which can push bot to any targeted machine sharing the same LAN. While India’s ISP and telecommunications licenses generally provide some regulations, they appear to be inadequate in regulating specific surveillance technologies which have the capability to target machines and remotely monitor them. Such &lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;&lt;span style="text-decoration: underline;"&gt;licenses&lt;/span&gt;&lt;/a&gt; mandate mass surveillance, but legally, wireless communications are completely unregulated, which raises the question of whether the interception of public Internet networks is allowed. In other words, it is not clear if ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;QuickTrail&lt;/span&gt;&lt;/a&gt; is technically legal or not. The &lt;a class="external-link" href="http://www.auspi.in/policies/UASL.pdf"&gt;UAS License agreement&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;mandates mass surveillance, and while the law does not prohibit it, it does not mandate mass surveillance either. This remains a grey area.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The issue of data retention arises from &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;leaked&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;brochure&lt;/a&gt;. In particular, ClearTrail states in its brochure that ComTrail - which undertakes mass monitoring of IP and Voice networks - retains data upon request, with a capacity that exceeds several years. xTrail - for targeted IP monitoring - has the ability to retain huge volumes of data which can potentially be used as proof in court. However, India currently lacks privacy legislation which would regulate data retention, which means that data collected by ClearTrail could potentially be stored indefinitely.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a class="external-link" href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Section 7 of the Information Technology (Amendment) Act, 2008&lt;/a&gt;, deals with the retention of electronic records. However, this section does not state a particular data retention period, nor who will have authorized access to data during its retention, who can authorize such access, whether retained data can be shared with third parties and, if so, under what conditions. Section 7 of the Information Technology (Amendment) Act, 2008, appears to be incredibly vague and to fail to regulate data retention adequately.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Data retention requirements for service providers are included in the &lt;a href="https://cis-india.org/internet-governance/blog/data-retention-in-india" class="external-link"&gt;ISP and UASL licenses&lt;/a&gt; and, while they clarify the type of data they retain, they do not specify adequate conditions for data retention. Due to the lack of data protection legislation in India, it remains unclear how long data collected by companies, such as ClearTrail, would be stored for, as well as who would have authorized access to such data during its retention period, whether such data would be shared with third parties and disclosed and if so, under what conditions.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;India currently lacks specific regulations for the use of various types of technologies, which makes it unclear whether &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;spy&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;products&lt;/a&gt;&lt;/span&gt; are technically legal or not. It is clear that ClearTrail’s mass interception products, such as ComTrail, are not legalized - since Indian laws allow for targeted interception- but they are mandated through the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;agreement&lt;/a&gt;&lt;/span&gt; regarding the Central Monitoring System.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, the legality of ClearTrail’s surveillance technologies remains ambiguous. While India’s ISP and telecom licenses and the &lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt; mandate mass surveillance, the laws - particularly the 2009 Information Technology Rules- mandate targeted surveillance and remain silent on the issue of mass surveillance. Technically, this does not constitute mass surveillance legal or illegal, but rather a grey area. Furthermore, while &lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;India&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;, &lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;and 2009 Rules allow for the interception, monitoring and decryption of communications and surveillance in general, they do not explicitly regulate the various types of surveillance technologies, but rather attempt to “legalize” them through the blanket term of surveillance.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;One thing is clear: India’s license agreements ensure that all ISPs and telecom operators are a part of the surveillance regime. The lack of regulations for India’s surveillance technologies appear to create a grey zone for the expansion of mass surveillance in the country. According to &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;Saikat&lt;/a&gt;&lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt; &lt;/a&gt;&lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;Datta&lt;/a&gt;&lt;/span&gt;, an investigative journalist, a senior privacy telecom official stated:&lt;/p&gt;
&lt;blockquote class="italized"&gt;“&lt;i&gt;Do you really think a private telecom company can stand up to the government or any intelligence agency and cite law if they want to tap someone’s phone?” &lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;﻿&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Spy Files 3...and human rights in India&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;The facts speak for themselves. The latest Spy Files confirm that the same agencies involved in the development of the Central Monitoring System (CMS) are also interested in the latest surveillance technology sold in the global market. Spy Files 3 also provide data on one of India’s largest surveillance technology companies, &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ClearTrail&lt;/span&gt;&lt;/a&gt;, which sells a wide range of surveillance technologies to law enforcement agencies around the world. And Spy Files 3 show us exactly what these technologies can do.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In particular, ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ComTrail&lt;/span&gt;&lt;/a&gt; provides mass monitoring of IP and voice networks, which means that law enforcement agencies using it are capable of  intercepting millions of communications every day through Gmail, Yahoo, Hotmail and others, of correlating our identities across networks and of targeting our location. &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;xTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;/span&gt;enables law enforcement agencies to monitor us based on our “harmless” metadata, such as our IP address, our mobile number and our email ID. Think our data is secure when using the Internet through a cyber cafe? Well &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;QuickTrail&lt;/span&gt;&lt;/a&gt; proves us wrong, as it’s able to assist law enforcement agencies in monitoring and intercepting our communications even when we are using public Internet networks.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And indeed, carrying a mobile phone is like carrying a GPS device, especially since &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;mTrail&lt;/span&gt;&lt;/a&gt; provides law enforcement with off-the-air interception of mobile communications. Not only can mTrail target our location, listen to our calls and store our data, but it can also undertake passive off-the-air interception and monitor our voice, SMS and protocol information. Interestingly enough, mTrail also intercepts targeted calls from a predefined suspect list. The questions though which arise are: who is a suspect? How do we even know if we are suspects? In the age of the War on Terror, potentially anyone could be a suspect and thus potentially anyone’s mobile communications could be intercepted. After all, mass surveillance dictates that &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;we&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;are&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;all&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;suspicious&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;until&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;proven&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;innocent&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;. &lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And if anyone can potentially be a suspect, then potentially anyone can be remotely infected and monitored by &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;Astra&lt;/span&gt;&lt;/a&gt;. Having physical access to a targeted device is a conventional surveillance mean of the past. Today, Astra can &lt;i&gt;remotely&lt;/i&gt; push bot to our laptops and listen to our Skype calls, capture our Webcams, search our browsing history, identify our location and much more. And why is any of this concerning? Because contrary to mainstream belief, &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;we&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;should&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;all&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;have&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;something&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;to&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;hide&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;! &lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;Privacy&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;protects&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;us&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;from&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;abuse&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;from&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;those&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;in&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;power&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;/span&gt;and safeguards our individuality and autonomy as human beings. If we are opposed to the idea of the police searching our home without a search warrant, we should be opposed to the idea of our indiscriminate mass surveillance. After all, mass surveillance - especially the type undertaken by &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;products&lt;/a&gt;&lt;/span&gt; -  can potentially result in the access, sharing, disclosure and retention of data much more valuable than that acquired by the police searching our home. Our credit card details, our photos, our acquaintances, our personal thoughts and opinions, and other sensitive personal information can usually be found in our laptops, which potentially can constitute much more incriminating information than that found in our homes.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And most importantly: even if we think that we have nothing to hide, it’s really not up to us to decide: it’s up to data analysts. While we may think that our data is “harmless”, a data analyst linking our data to various other people and search activities we have undertaken might indicate otherwise. Five years ago, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;a&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;UK&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;student&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;studying&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;Islamic&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;terrorism&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;for&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;his&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;Masters&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;dissertation&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;was&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;detained&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;for&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;six&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;days&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;.&lt;/a&gt;&lt;/span&gt; The student may not have been a terrorist, but his data said this: “Young, male, Muslim... who is downloading Al-Qaeda’s training material” - and that was enough for him to get detained. Clearly, the data analysts mining his online activity did not care about the fact that the only reason why he was downloading Al-Qaeda material was for his Masters dissertation. The fact that he was a male Muslim downloading terrorist material was incriminating enough.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;This incident reveals several concerning points: The first is that he was clearly already under surveillance, prior to downloading Al-Qaeda’s material. However, given that he did not have a criminal record and was “just a Masters student in the UK”, there does not appear to be any probable cause for his surveillance in the first place. Clearly he was on some suspect list on the premise that he is male and Muslim - which is a discriminative approach. The second point is that after this incident, it is likely that some male Muslims may be more cautious about their online activity - with the fear of being on some suspect list and eventually being prosecuted because their data shows that “they’re a terrorist”. Thus, mass surveillance today appears to also have implications on freedom of expression. The third point is that this incident reveals the extent of mass surveillance, since even a document downloaded by a Masters student is being monitored.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;This case proves that innocent people can potentially be under surveillance and prosecuted, as a result of mass, indiscriminate surveillance. Anyone can potentially be a suspect today, and maybe for the wrong reasons. It does not matter if we think our data is “harmless”, but what matters is who is looking at our data, when and why.  Every bit of data potentially hides several other bits of information which we are not aware of, but which will be revealed within a data analysis. We should always &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;“&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;have&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;something&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;to&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;hide&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;”&lt;/a&gt;&lt;/span&gt;, as that is the only way to protect us from abuse by those in power.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In the contemporary surveillance state, we are all suspects and mass surveillance technologies, such as the ones sold by &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ClearTrail&lt;/span&gt;&lt;/a&gt;, can potentially pose major threats to our right to privacy, freedom of expression and other human rights. And probably the main reason for this is because surveillance technologies in India legally fall in a grey area. Thus, it is recommended that law enforcement agencies in India regulate the various types of surveillance technologies in compliance with the &lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on Communications Surveillance and Human Rights.&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Spy Files 3 show us why our human rights are at peril and why we should fight for our right to be free from suspicion.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;This article was &lt;a class="external-link" href="http://www.medianama.com/2013/11/223-spy-files-3-wikileaks-sheds-more-light-on-the-global-surveillance-industry-cis-india/"&gt;cross-posted in Medianama &lt;/a&gt;on 6th November 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/spy-files-three'&gt;https://cis-india.org/internet-governance/blog/spy-files-three&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-11-14T16:21:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra">
    <title>An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000  for Adjudication in the State of Maharashtra</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra</link>
    <description>
        &lt;b&gt;This is a brief review of some of the cases related to privacy filed under section 46 of the Information Technology Act, 2000 ("the Act") seeking adjudication for alleged contraventions of the Act in the State of Maharashtra. &lt;/b&gt;
        &lt;h3&gt;Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 46 of the Act grants the Central Government the power to appoint an adjudicating officer to hold an enquiry to adjudge, upon complaints being filed before that adjudicating officer, contraventions of the Act. The adjudicating officer may be of the Central Government or of the State Government [see section 46(1) of the Act], must have field experience with information technology and law [see section 46(3) of the Act] and exercises jurisdiction over claims for damages up to `5,00,00,000 [see section 46(1A) of the Act]. For the purpose of adjudication, the officer is vested with certain powers of a civil court [see section 46(5) of the Act] and must follow basic principles of natural justice while conducting adjudications [see section 46(2) of the Act]. Hence, the adjudicating officer appointed under section 46 is a quasi-judicial authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the quasi-judicial adjudicating officer may impose penalties, thereby vesting him with some of the powers of a criminal court [see section 46(2) of the Act], and award compensation, the quantum of which is to be determined after taking into account factors including unfair advantage, loss and repeat offences [see section 47 of the Act]. The adjudicating officer may impose penalties for any of the offences described in section 43, section 44 and section 45 of the Act; and, further, may award compensation for losses suffered as a result of contraventions of section 43 and section 43A. The text of these sections is reproduced in the Schedule below. Further law as to the appointment of the adjudicating officer and the procedure attendant on all adjudications was made by Information Technology (Qualification and Experience of Adjudicating Officers and the Manner of Holding Enquiry) Rules, 2003.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that the adjudicating officer is vested with significant judicial powers, including the power to enforce certain criminal penalties, and is an important quasi-judicial authority.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Excursus&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset, it is important to understand the distinction between compensation and damages. Compensation is a sum of money awarded by a civil court, before or along with the primary decree, to indemnify a person for injury or loss. It is usually awarded to a person who has a suffered a monetary loss as a result of the acts or omissions of another party. Its quantification is usually guided by principles of equity. [See &lt;i&gt;Shantilal Mangaldas&lt;/i&gt; AIR 1969 SC 634 and &lt;i&gt;Ranbir Kumar Arora&lt;/i&gt; AIR 1983 P&amp;amp;H 431]. On the hand, damages are punitive and, in addition to restoring an indemnitee to wholeness, may be imposed to deter an offender, punish exemplary offences, and recover consequential losses, amongst other objectives. Damages that are punitive, while not judicially popular in India, are usually imposed by a criminal court in common law jurisdictions. They are distinct from civil and equitable actions. [See the seminal case of &lt;i&gt;The Owners of the Steamship Mediana&lt;/i&gt; [1900] AC 113 (HL)].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, section 46 of the Act uses the terms “damage”, “injury” and “compensation” interchangeably without regard for the long and rich jurisprudence that finds them to be different concepts.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Cases related to Privacy&lt;/h3&gt;
&lt;p&gt;In the State of Maharashtra, there have been a total of 47 cases filed under section 46 of the Act. Of these, 33 cases have been disposed of by the Adjudicating Officer and 14 are currently pending disposal. &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; At least three of these cases before the Adjudicating Officer deal with issues related to privacy of communications and personal data. They are:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Title&lt;/th&gt;&lt;th&gt;Forum&lt;/th&gt;&lt;th&gt;Date&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Vinod Kaushik&lt;/i&gt; v. &lt;i&gt;Madhvika Joshi&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;10.10.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Amit D. Patwardhan&lt;/i&gt; v. &lt;i&gt;Rud India Chains&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio&lt;/i&gt;&lt;br /&gt;Secretary, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;15.04.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; v. &lt;i&gt;Minal Bagherwal&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;26.08.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In all three cases the Adjudicating Officer was called upon to determine and penalise unauthorised access to personal data of the complainants. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; case, the complainants’ emails and chat sessions were accessed, copied and made available to the police for legal proceedings without the permission of the complainants. In the &lt;i&gt;Amit Patwardhan&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; cases, the complainants’ financial information in the form of bank account statements were obtained from their respective banks without their consent and used against them in legal proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Vinod Kaushik&lt;/i&gt; complaint was filed in 2010 for privacy violations committed between 2008 and 2009. The complaint was made against the complainant’s daughter-in-law – the respondent, who was estranged from her husband, the complainant’s son. The respondent had, independent of the proceedings before the Adjudicating Officer, instituted criminal proceedings alleging cruelty and dowry-related harassment against her estranged husband and the complainant. To support some of the claims made in the criminal proceedings, the respondent accessed the email accounts of her estranged husband and the complainant and printed copies of certain communications, both emails and chat transcripts. The complaint to the Adjudicating Officer was made in relation to these emails and chat transcripts that were obtained without the consent and knowledge of the complainant and his son. On 09.08.2010, the then Adjudicating Officer dismissed the complaint after finding that, owing to the marriage between the respondent and the complainant’s son, there was a relation of mutual trust between them that resulted in the complainant and his son consensually sharing their email account passwords with the respondent. This ruling was appealed to the Cyber Appellate Tribunal (&lt;b&gt;"CyAT"&lt;/b&gt;) which, in a decision of 29.06.2011, found irregularities in the complainant’s son’s privity to the proceedings and remanded the complaint to the Adjudicating Officer for re-adjudication. The re-adjudication, which was conducted by Shri Rajesh Aggarwal as Adjudicating Officer, resulted in a final order of 10.10.2011 (&lt;b&gt;"the final order"&lt;/b&gt;) that is the subject of this analysis. The final order found that the respondent had violated the privacy of the complainant and his son by her unauthorised access of their email accounts and sharing of their private communications. However, the Adjudicating Officer found that the intent of the unauthorised access – to obtain evidence to support a criminal proceeding – was mitigatory and hence ordered the respondent to pay only a small token amount in compensation, not to the complainants but instead to the State Treasury. The Delhi High Court, which was moved in appeal because the CyAT was non-functional, upheld the final order in its decision of 27.01.2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Amit Patwardhan&lt;/i&gt; complaint was filed against the complainant’s ex-employer – the respondent, for illegally obtaining copies of the complainant’s bank account statement. The complainant had left the employ of the respondent to work with a competing business company but not before colluding with the competing business company and diverting the respondent’s customers to them. For redress, the respondent filed suit for a decree of compensation and lead the complainant’s bank statements in evidence to prove unlawful gratification. Since the bank statements were obtained electronically by the respondent without the complainant’s consent, the jurisdiction of the Adjudicating Officer was invoked. In his order of 15.04.2013, Shri Rajesh Aggarwal, the Adjudicating Officer, found that the respondent had, by unlawfully obtaining the complainant’s bank account statements which constitute sensitive personal data, violated the complainant’s privacy. The Adjudicating Officer astutely applied the equitable doctrine of clean hands to deny compensation to the complainant; however, because the complainant’s bank was not a party to the complaint, the Adjudicating Officer was unable to make a ruling on the lack of action by the bank to protect the sensitive personal data of its depositors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; complaint bears a few similarities to the preceding two cases. Like the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the issue concerned the manner in which a wife, estranged but still legally married, accessed electronic records of personal data of the complainants; and, like the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter, the object of the privacy violation was the bank account statements of the complainants that constitute sensitive personal data. The respondent was the estranged wife of one of the complainants who, along with his complainant father, managed the third complainant company. To support her claim for maintenance from the complainant and his family in an independent legal proceeding, the respondent obtained certain bank account statements of the complainants without their consent and, possibly, with the collusion of the respondent bank. After reviewing relevant law from the European Union and the United States, and observant of relevant sectoral regulations applicable in India including the relevant Master Circular of the Reserve Bank of India, and further noting preceding consumer case law on the subject, the Adjudicating Officer issued an order on 26.08.2013. The order found that the complainant’s right to privacy was violated by both the respondents but, while determining the quantum of compensation, distinguished between the respondents in respect of the degree of liability; the respondent wife was ordered to pay a token compensation amount while the respondent bank was ordered to pay higher compensation to each of the three complainants individually.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The high quality of each of the three orders bears specific mention. Despite the superb quality of the judgments of the Indian higher judiciary in the decades after independence, the overall quality of judgment-writing appears to have declined. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; In the last decade, several Indian judges have called for higher standards of judgment writing from their fellow judges. &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In this background, it is notable that Shri Rajesh Aggarwal, despite not being a member of the judiciary, has delivered well-reasoned, articulate and clear orders that are cognisant of legal issues and also easily understandable to a non-legal reader.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In each of these cases, the Adjudicating Officer has successfully navigated around the fact that none of the primary parties were interacting and transacting at arm’s length. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matters, the primary parties were estranged but still legally married partners and in the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter the parties were in an employer-employee relationship. The first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter failed, in his order of 09.08.2010, to appreciate that the individual communications of individual persons were privileged by an expectation of privacy, regardless of their relationship. Hence, despite acknowledging that the marital partners in that matter were in conflict with each other, and despite being told by one party that the other party’s access to those private communications was made without consent, the Adjudicating Officer allowed his non-judicial opinion of marriage to influence his order. This mistake was corrected when the matter was remanded for re-adjudication. In the re-adjudication, the new Adjudicating Officer correctly noted that the respondent wife could have chosen to approach the police or a court to follow the proper investigative procedure for accessing emails and other private communications of another person and that her unauthorised use of the complainant’s passwords amounted to a violation of their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Popular conceptions of different types of relationships may affect the (quasi) judicial imagination of privacy. In comparison to the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; and &lt;i&gt;Amit Patwardhan&lt;/i&gt; matters both dealt with unauthorised access to bank account statements, by a wife and by an ex-employer respectively. In any event, the same Adjudicating Officer presided over all three matters and correctly found that the facts in all three matters admitted to contraventions of the privacy of the complainants. The conjecture as to whether the first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter would have applied the same standard of family unity to unauthorised access of bank account statements by an estranged wife who was seeking maintenance remains untested. However, the reliance placed on the decision of the Delhi State Consumer Protection Commission in the matter of &lt;i&gt;Rupa Mahajan Pahwa,&lt;/i&gt; &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; where the Commission found that unauthorised access to a bank pass book by an estranged husband violated the privacy of the wife, would suggest that judges clothe financial information with a standard of privacy higher than that given to emails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emails are a form of electronic communication. The &lt;i&gt;PUCL&lt;/i&gt; case (Supreme Court of India, 1996)&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; while it did not explicitly deal with the standard of protection accorded to emails, held that personal communications were protected by an individual right to privacy that emanated from the protection of personal liberty guaranteed under Article 21 of the Constitution of India. Following the &lt;i&gt;Maneka Gandhi&lt;/i&gt; case (Supreme Court of India, 1978)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;it is settled that persons may be deprived of their personal liberty only by a just, fair and reasonable procedure established by law. As a result, interceptions of private communications that are protected by Article 21 may only be conducted in pursuance of such a procedure. This procedure exists in the form of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 that came into effect on 27 October 2009 (&lt;b&gt;"the Interception Rules"&lt;/b&gt;). The Interception Rules set out a regime for accessing private emails in certain conditions. The powers and procedure of Section 91 of the Code of Criminal Procedure (&lt;b&gt;"CrPC")&lt;/b&gt; may also apply to obtain data at rest, such as emails stored in an inbox or sent-mail folder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the orders of the Adjudicating Officer reveal a well-reasoned and progressive understanding of the law and principles relating to the quantification of compensation. By choosing to impose larger amounts of compensation on the bank that violated the privacy of the complainant in the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matter, the Adjudicating Officer has indicated that the institutions that hold sensitive personal data, such as financial information, are subject to a higher duty of care in relation of it. But, most importantly, the act of imposing monetary compensation of privacy violations is a step forward because, for the first time in India, it recognises that privacy violations are civil wrongs or injuries that demand compensation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. These Rules were issued &lt;i&gt;vide&lt;/i&gt; GSR 220(E), dated 17 March 2003 and published in the Gazette of India, Extraordinary, Part II, Section 3(i). These Rules can be accessed here – &lt;a href="http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF"&gt;http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. These cases and statistics may be viewed here – &lt;a href="http://it.maharashtra.gov.in/1089/IT-Act-Judgements"&gt;http://it.maharashtra.gov.in/1089/IT-Act-Judgements&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See generally, Upendra Baxi “"The Fair Name of Justice": The Memorable Voyage of Chief Justice Chandrachud” in &lt;i&gt;A Chandrachud Reader&lt;/i&gt; (Justice V. S. Deshpande ed., Delhi: Documentation Centre &lt;i&gt;etc.&lt;/i&gt;, 1985) and, Rajeev Dhavan, "Judging the Judges" in &lt;i&gt;Judges and the Judicial Power: Essays in Honour of Justice V. R. Krishna Iyer&lt;/i&gt; (Rajeev Dhavan and Salman Khurshid eds., London: Sweet &amp;amp; Maxwell, 1985).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. See generally, Justice B.G .Harindranath, &lt;i&gt;Art of Writing Judgments&lt;/i&gt; (Bangalore: Karnataka Judicial Academy, 2004); Justice T .S. Sivagnanam, &lt;i&gt;The Salient Features of the Art of Writing Orders and Judgments&lt;/i&gt; (Chennai: Tamil Nadu State Judicial Academy, 2010); and, Justice Sunil Ambwani, “Writing Judgments: Comparative Models” Presentation at the National Judicial Academy, Bhopal (2006) available here – &lt;a href="http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf"&gt;http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf&lt;/a&gt; (visited on 29 Sep 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Appeal No. FA-2008/659 of the Delhi State Consumer Protection Commission, decided on 16 October 2008.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. (1997) 1 SCC 301.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. (1978) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra'&gt;https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-01T15:29:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
