<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 171 to 185.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/exploring-big-data-for-development-an-electricity-sector-case-study-from-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/essays-on-list-selected-abstracts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/enabling-elections"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/education-through-ict"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/e-accessibility-kit-in-russian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-response-dit-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/open-call"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata">
    <title>FinFisher in India and the Myth of Harmless Metadata</title>
    <link>https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou argues that metadata is anything but harmless, especially since FinFisher — one of the world's most controversial types of spyware — uses metadata to target individuals. &lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;In light of PRISM, the Central Monitoring System (CMS) and other such surveillance projects in India and around the world, the question of whether the collection of metadata is “harmless” has arisen.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; In order to examine this question, FinFisher&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; — surveillance spyware — has been chosen as a case study to briefly examine to what extent the collection and surveillance of metadata can potentially violate the right to privacy and other human rights. FinFisher has been selected as a case study not only because its servers have been recently found in India&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; but also because its “remote monitoring solutions” appear to be very pervasive even on the mere grounds of metadata.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;FinFisher in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is spyware which has the ability to take control of target computers and capture even encrypted data and communications. The software is designed to evade detection by anti-virus software and has versions which work on mobile phones of all major brands.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In many cases, the surveillance suite is installed after the target accepts installation of a fake update to commonly used software.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Citizen Lab researchers have found three samples of FinSpy that masquerades as Firefox.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FinFisher is a line of remote intrusion and surveillance software developed by Munich-based Gamma International. FinFisher products are sold exclusively to law enforcement and intelligence agencies by the UK-based Gamma Group.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; A few months ago, it was reported that command and control servers for FinSpy backdoors, part of Gamma International´s FinFisher “remote monitoring solutions”, were found in a total of 25 countries, including India.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The following map, published by the Citizen Lab, shows the 25 countries in which FinFisher servers have been found.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Map.png" alt="Map" class="image-inline" title="Map" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;The above map shows the results of scanning for characteristics of FinFisher command and control servers&lt;/i&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="JUSTIFY"&gt;FinFisher spyware was not found in the countries coloured blue, while the colour green is used for countries not responding. The countries using FinFisher range from shades of orange to shades of red, with the lightest shade of orange ranging to the darkest shade of red on a scale of 1-6,  and with 1 representing the least active servers and 6 representing the most active servers in regards to the use of FinFisher. On a scale of 1-6, India is marked a 3 in terms of actively using FinFisher.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Research published by the Citizen Lab reveals that FinSpy servers were recently found in India, which indicates that Indian law enforcement agencies may have bought this spyware from Gamma  Group and might be using it to target individuals in India.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;According to the Citizen Lab, FinSpy servers in India have been detected through the HostGator operator and the first digits of the IP address are: 119.18.xxx.xxx. Releasing complete IP addresses in the past has not proven useful, as the servers are quickly shut down and relocated, which is why only the first two octets of the IP address are revealed.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Citizen Lab's research reveals that FinFisher “remote monitoring solutions” were found in India, which, according to Gamma Group's brochures, include the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy: &lt;/b&gt;hardware or software which monitors targets that regularly change location, use encrypted and anonymous communications channels and reside in foreign countries. FinSpy can remotely monitor computers and encrypted communications, regardless of where in the world the target is based. FinSpy is capable of bypassing 40 regularly tested antivirus systems, of monitoring the calls, chats, file transfers, videos and contact lists on Skype, of conducting live surveillance through a webcam and microphone, of silently extracting files from a hard disk, and of conducting a live remote forensics on target systems. FinSpy is hidden from the public through anonymous proxies.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinSpy Mobile:&lt;/b&gt; hardware or software which remotely monitors mobile phones. FinSpy Mobile enables the interception of mobile communications in areas without a network, and offers access to encrypted communications, as well as to data stored on the devices that is not transmitted. Some key features of FinSpy Mobile include the recording of common communications like voice calls, SMS/MMS and emails, the live surveillance through silent calls, the download of files, the country tracing of targets and the full recording of all BlackBerry Messenger communications. FinSpy Mobile is hidden from the public through anonymous proxies.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly USB: &lt;/b&gt;hardware which is inserted into a computer and which can automatically install the configured software with little or no user-interaction and does not require IT-trained agents when being used in operations. The FinFly USB can be used against multiple systems before being returned to the headquarters and its functionality can be concealed by placing regular files like music, video and office documents on the device. As the hardware is a common, non-suspicious USB device, it can also be used to infect a target system even if it is switched off.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly LAN: &lt;/b&gt;software which can deploy a remote monitoring solution on a target system in a local area network (LAN). Some of the major challenges law enforcement faces are mobile targets, as well as targets who do not open any infected files that have been sent via email to their accounts. FinFly LAN is not only able to deploy a remote monitoring solution on a target´s system in local area networks, but it is also able to infect files that are downloaded by the target, by sending fake software updates for popular software or to infect the target by injecting the payload into visited websites. Some key features of the FinFly LAN include: discovering all computer systems connected to LANs, working in both wired and wireless networks, and remotely installing monitoring solutions through websites visited by the target. FinFly LAN has been used in public hotspots, such as coffee shops, and in the hotels of targets.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly Web:&lt;/b&gt; software which can deploy remote monitoring solutions on a target system through websites. FinFly Web is designed to provide remote and covert infection of a target system by using a wide range of web-based attacks. FinFly Web provides a point-and-click interface, enabling the agent to easily create a custom infection code according to selected modules. It provides fully-customizable web modules, it can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;FinFly ISP:&lt;/b&gt; hardware or software which deploys a remote monitoring solution on a target system through an ISP network. FinFly ISP can be installed inside the Internet Service Provider Network, it can handle all common protocols and it can select targets based on their IP address or Radius Logon Name. Furthermore, it can hide remote monitoring solutions in downloads by targets, it can inject remote monitoring solutions as software updates and it can remotely install monitoring solutions through websites visited by the target.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Although FinFisher is supposed to be used for “lawful interception”, it has gained notoriety for targeting human rights activists.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; &lt;span&gt;According to &lt;/span&gt;Morgan Marquis-Boire, a security researcher and technical advisor at the Munk School and a security engineer at Google, FinSpy has been used in Ethiopia to target an opposition group called Ginbot.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; Researchers have argued that FinFisher has been sold to Bahrain's government to target activists, and such allegations were based on an examination of malicious software which was emailed to Bahraini activists.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Privacy International has argued that FinFisher has been deployed in Turkmenistan, possibly to target activists and political dissidents.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Many questions revolving around the use of FinFisher and its “remote monitoring solutions” remain   vague, as there is currently inadquate proof of whether this spyware is being used to target individuals by law enforcement agencies in the countries where command and control servers have been found, such as India.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; However, FinFisher's brochures which were circulated in the ISS world trade shows and leaked by WikiLeaks do reveal some confirmed facts: Gamma International claims that its FinFisher products are capable of taking control of target computers, of capturing encrypted data  and of evading mainstream anti-virus software.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; Such products are exhibited in the world's largest surveillance trade show and probably sold to law enforcement agencies around the world.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;This alone unveils a concerning fact: spyware which is so sofisticated that it even evades encryption and anti-virus software is currently in the market and law enforcement agencies can potentially use it to target activists and anyone who does not comply with social conventions.&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;A few months ago, two Indian women were arrested after having questioned the shutdown of Mumbai for Shiv Sena patriarch Bal Thackeray's funeral.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Thus, it remains unclear what type of behaviour is targeted by law enforcement agencies and whether spyware, such as FinFisher, would be used in India to track individuals without a legally specified purpose.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, India lacks privacy legislation which could safeguard individuals from potential abuse, while sections 66A and 69 of the Information Technology (Amendment) Act, 2008, empower Indian authorities with extensive surveillance capabilites.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;While it remains unclear if Indian law enforcement agencies are using FinFisher spy products to unlawfully target individuals, it is a fact that FinFisher control and command servers have been found in India and that, if used, they could potentially have severe consequences on individuals' right to privacy and other human rights.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;The Myth of Harmless Metadata&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;Over the last months, it has been reported that the Central Monitoring System (CMS) is being implemented in India, through which all telecommunications and Internet communications in the country are being centrally intercepted by Indian authorities. This mass surveillance of communications in India is enabled by the omission of privacy legislation and Indian authorities are currently capturing the metadata of communications.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Last month, Edward Snowden leaked confidential U.S documents on PRISM, the top-secret  National Security Agency (NSA) surveillance programme that collects metadata through telecommunications and Intenet communications. It has been reported that through PRISM, the NSA has tapped into the servers of nine leading Internet companies: Microsoft, Google, Yahoo, Skype, Facebook, YouTube, PalTalk, AOL and Apple.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; While the extent to which the NSA is actually tapping into these servers remains unclear, it is certain that the NSA has collected metadata on a global level.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet, the question of whether the collection of metadata is “harmful” remains ambiguous.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to the National Information Standards Organization (NISO), the term “metadata” is defined as “structured information that describes, explains, locates or otherwise makes it easier to retrieve, use or manage an information resource”. NISO claims that metadata is “data about data” or “information about information”.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Furthermore, metadata is considered valuable due to its following functions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Resource discovery&lt;/li&gt;
&lt;li&gt;Organizing electronic resources&lt;/li&gt;
&lt;li&gt;Interoperability&lt;/li&gt;
&lt;li&gt;Digital Identification&lt;/li&gt;
&lt;li&gt;Archiving and preservation&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="JUSTIFY"&gt;Metadata can be used to find resources by relevant criteria, to identify resources, to bring similar resources together, to distinguish dissimilar resources and to give location information. Electronic resources can be organized through the use of various software tools which can automatically extract and reformat information for Web applications. Interoperability is promoted through metadata, as describing a resource with metadata allows it to be understood by both humans and machines, which means that data can automatically be processed more effectively. Digital identification is enabled through metadata, as most metadata schemes include standard numbers for unique identification. Moreover, metadata enables the archival and preservation of large volumes of digital data.&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Surveillance projects, such as PRISM and India's CMS, collect large volumes of metadata, which include the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number, email addresses, IP addresses and browsed webpages.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; However, the fact that such surveillance projects may not have access to content data might potentially create a false sense of security.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; When Microsoft released its report on data requests by law enforcement agencies around the world in March 2013, it revealed that most of the  disclosed data was metadata, while relatively very little content data was allegedly disclosed.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;imilarily, Google's transparency report reveals that the company disclosed large volumes of metadata to law enforcement agencies, while restricting its disclosure of content data.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such reports may potentially provide a sense of security to the public, as they reassure that the content of  personal emails, for example, has not been shared with the government, but merely email addresses – which might be publicly available online anyway. However, is content data actually more “harmful” than metadata? Is metadata “harmless”? How much data does metadata actually reveal?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Guardian recently published an article which includes an example of how individuals can be tracked through their metadata. In particular, the example explains how an individual is tracked – despite using an anonymous email account – by logging in from various hotels' public Wi-Fi and by leaving trails of metadata that include times and locations. This example illustrates how an individual can be tracked through metadata alone, even when anonymous accounts are being used.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Wired published an article which states that metadata can potentially be more harmful than content data because “unlike our words, metadata doesn't lie”. In particular, content data shows what an individual says – which may be true or false – whereas metadata includes what an individual does. While the validity of the content within an email may potentially be debateable, it is undeniable that an individual logged into specific websites – if that is what that individuals' IP address shows. Metadata, such as the browsing habits of an individual, may potentially provide a more thorough and accurate profile of an individual than that individuals' email content, which is why metadata can potentially be more harmful than content data.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, voice content is hard to process and written content in an email or chat communication may not always be valid. Metadata, on the other hand, provides concrete patterns of an individuals' behaviour, interests and interactions. For example, metadata can potentially map out an individuals' political affiliation, interests, economic background, institution, location, habits and the people that individual interacts with. Such data can potentially be more valuable than content data, because while the validity of email content is debateable, metadata usually provides undeniable facts. Not only is metadata more accurate than content data, but it is also ideally suited to automated analysis by a computer. As most metadata includes numeric figures, it can easily be analysed by data mining software, whereas content data is more complicated.&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, provide solid proof that the collection of metadata can potentially be “harmful”. In particular, FinFly LAN can be deployed in a target system in a local area network (LAN) by infecting files that are downloaded by the target, by sending fake software updates for popular software or by infecting the payload into visited websites. The fact that FinFly LAN can remotely install monitoring solutions through websites visited by the target indicates that metadata alone can be used to acquire other sensitive data.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;FinFly Web can deploy remote monitoring solutions on a target system through websites. Additionally, FinFly Web can be covertly installed into every website and it can install the remote monitoring system even if only the email address is known.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt; FinFly ISP can select targets based on their IP address or Radius Logon Name. Furthermore, FinFly ISP can remotely install monitoring solutions through websites visited by the target, as well as inject remote monitoring solutions as software updates.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt; In other words, FinFisher products, such as FinFly LAN, FinFly Web and FinFly ISP, can target individuals, take control of their computers and their data, and capture even encrypted data and communications with the help of metadata alone.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The example of FinFisher products illustrates that metadata can potentially be as “harmful” as content data, if acquired unlawfully and without individual consent.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; Thus, surveillance schemes, such as PRISM and India's CMS, which capture metadata without individuals' consent can potentially pose a major threat to the right to privacy and other human rights.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt; Privacy can be defined as the claim of individuals, groups or institutions to determine when, how and to what extent information about them is communicated to others.&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; Furthermore, privacy is at the core of human rights because it protects individuals from abuse by those in power.&lt;a href="#fn48" name="fr48"&gt;[48]&lt;/a&gt; The unlawful collection of metadata exposes individuals to the potential violation of their human rights, as it is not transparent who has access to their data, whether it is being shared with third parties or for how long it is being retained.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;It is not clear if Indian law enforcement agencies are actually using FinFisher products, but the Citizen Lab did find FinFisher command and control servers in the country which indicates that there is a high probability that such spyware is being used.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This probability is highly concerning not only because the specific spy products have such advanced capabilities that they are even capable of capturing encrypted data, but also because India currently lacks privacy legislation which could safeguard individuals.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Thus, it is recommended that Indian law enforcement agencies are transparent and accountable if they are using spyware which can potentially breach their citizens' human rights and that privacy legislation is enacted into law. Lastly, it is recommended that all surveillance technologies are strictly regulated with regards to the protection of human rights and that Indian authorities adopt the principles on communication surveillance formulated by the Electronic Frontier Foundation and Privacy International.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; The above could provide a decisive first step in ensuring that India is the democracy it claims to be.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Robert Anderson (2013), &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;a class="external-link" href="http://bit.ly/fnkGF3"&gt;http://bit.ly/fnkGF3&lt;/a&gt;&lt;a href="http://www.finfisher.com/FinFisher/en/index.php"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Michael Lewis, &lt;i&gt;“FinFisher Surveillance Spyware Spreads to Smartphones”, &lt;/i&gt;&lt;span&gt;The Star: Business, 30 August 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sF2IQ"&gt;http://bit.ly/14sF2IQ&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Marcel Rosenbach, &lt;i&gt;“Troublesome Trojans: Firm Sought to Install Spyware Via Faked iTunes Updates”, &lt;/i&gt;&lt;span&gt;Der Spiegel, 22 November 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14sETVV"&gt;http://bit.ly/14sETVV&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Intercept Review, &lt;i&gt;Mozilla to Gamma: stop disguising your FinSpy as Firefox, &lt;/i&gt;&lt;span&gt;02 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/131aakT"&gt;http://bit.ly/131aakT&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Intercept Review, &lt;i&gt;LI Companies Review (3) – Gamma, &lt;/i&gt;&lt;span&gt;05 April 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/Hof9CL"&gt;http://bit.ly/Hof9CL&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy Mobile: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19pPObx"&gt;http://bit.ly/19pPObx&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly USB: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cJSu4h"&gt;http://bit.ly/1cJSu4h&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Jeremy Kirk, &lt;i&gt;“FinFisher Spyware seen Targeting Victims in Vietnam, Ethiopia”, &lt;/i&gt;&lt;span&gt;Computerworld: IDG News, 14 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J8BwW"&gt;http://bit.ly/14J8BwW&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Reporters without Borders: For Freedom of Information (2012), &lt;i&gt;The Enemies of the Internet: Special Edition: Surveillance, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/10FoTnq"&gt;http://bit.ly/10FoTnq&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Privacy International, &lt;i&gt;FinFisher Report, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/QlxYL0"&gt;http://bit.ly/QlxYL0&lt;/a&gt;&lt;span&gt;&lt;a href="https://www.privacyinternational.org/finfisherreport"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;“You Only Click Twice: FinFisher's Global Proliferation”, &lt;/i&gt;&lt;span&gt;The Citizen Lab, 13 March 2013,&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/YmeB7I"&gt;http://bit.ly/YmeB7I&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinSpy: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/zaknq5"&gt;http://bit.ly/zaknq5&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Adi Robertson, &lt;i&gt;“Paranoia Thrives at the ISS World Cybersurveillance Trade Show”, &lt;/i&gt;&lt;span&gt;The Verge, 28 December 2011, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/tZvFhw"&gt;http://bit.ly/tZvFhw&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Gerry Smith, &lt;i&gt;“FinSpy Software Used To Surveil Activists Around The World, Reports Says”, &lt;/i&gt;&lt;span&gt;The Huffington Post, 13 March 2013, &lt;/span&gt;&lt;a class="external-link" href="http://huff.to/YmmhXI"&gt;http://huff.to/YmmhXI&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. BBC News, &lt;i&gt;“India arrests over Facebook post criticising Mumbai shutdown”, &lt;/i&gt;&lt;span&gt;19 November 2012, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/WoSXkA"&gt;http://bbc.in/WoSXkA&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Indian Ministry of Law, Justice and Company Affairs, &lt;i&gt;The Information Technology (Amendment) Act, 2008, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/19pOO7t"&gt;http://bit.ly/19pOO7t&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Phil Muncaster, &lt;i&gt;“India introduces Central Monitoring System”, &lt;/i&gt;&lt;span&gt;The Register, 08 May 2013,&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZOvxpP"&gt;http://bit.ly/ZOvxpP&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Glenn Greenwald &amp;amp; Ewen MacAskill, &lt;i&gt;“NSA PRISM program taps in to user data of Apple, Google and others”, &lt;/i&gt;&lt;span&gt;The Guardian, 07 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1baaUGj"&gt;http://bit.ly/1baaUGj&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. BBC News, &lt;i&gt;“Google, Facebook and Microsoft seek data request transparency”, &lt;/i&gt;&lt;span&gt;12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bbc.in/14UZCCm"&gt;http://bbc.in/14UZCCm&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. National Information Standards Organization (2004), &lt;i&gt;Understanding Metadata, &lt;/i&gt;&lt;span&gt;NISO Press, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/LCSbZ"&gt;http://bit.ly/LCSbZ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. The Hindu, &lt;i&gt;“In the dark about 'India's PRISM'”, &lt;/i&gt;&lt;span&gt;16 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bJCXg3"&gt;http://bit.ly/1bJCXg3&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;&lt;/a&gt; ; Glenn Greenwald, &lt;/span&gt;&lt;i&gt;“NSA collecting phone records of millions of Verizon customers daily”, &lt;/i&gt;&lt;span&gt;The Guardian, 06 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/16L89yo"&gt;http://bit.ly/16L89yo&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Microsoft: Corporate Citizenship, &lt;i&gt;2012 Law Enforcement Requests Report,&lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/Xs2y6D"&gt;http://bit.ly/Xs2y6D&lt;/a&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Google, &lt;i&gt;Transparency Report&lt;/i&gt;&lt;span&gt;, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J7hKp"&gt;http://bit.ly/14J7hKp&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Guardian US Interactive Team, &lt;i&gt;A Guardian Guide to your Metadata, &lt;/i&gt;&lt;span&gt;The Guardian, 12 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZJLkpy"&gt;http://bit.ly/ZJLkpy&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Matt Blaze, &lt;i&gt;“Phew, NSA is Just Collecting Metadata. (You Should Still Worry)”, &lt;/i&gt;&lt;span&gt;Wired, 19 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1bVyTJF"&gt;http://bit.ly/1bVyTJF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly LAN: Remote Monitoring &amp;amp; Infection Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/14J70Hi"&gt;http://bit.ly/14J70Hi&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly Web: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/19fn9m0"&gt;http://bit.ly/19fn9m0&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. Gamma Group, FinFisher IT Intrusion, &lt;i&gt;FinFly ISP: Remote Monitoring &amp;amp; Intrusion Solutions, &lt;/i&gt;&lt;span&gt;WikiLeaks: The Spy Files,&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt; &lt;/a&gt;&lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/13gMblF"&gt;http://bit.ly/13gMblF&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Robert Anderson, &lt;i&gt;“Wondering What Harmless 'Metadata' Can Actually Reveal? Using Own Data, German Politician Shows Us”, &lt;/i&gt;&lt;span&gt;The CSIA Foundation, 01 July 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/1cIhu7G"&gt;http://bit.ly/1cIhu7G&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Shalini Singh, &lt;i&gt;“India's surveillance project may be as lethal as PRISM”, &lt;/i&gt;&lt;span&gt;The Hindu, 21 June 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/15oa05N"&gt;http://bit.ly/15oa05N&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. Cyberspace Law and Policy Centre, &lt;i&gt;Privacy, &lt;/i&gt;&lt;a class="external-link" href="http://bit.ly/14J5u7W"&gt;http://bit.ly/14J5u7W&lt;/a&gt;&lt;span&gt;&lt;a href="http://www.cyberlawcentre.org/genl0231/privacy.htm"&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Bruce Schneier, &lt;i&gt;“Privacy and Power”, &lt;/i&gt;&lt;span&gt;Schneier on Security, 11 March 2008, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/i2I6Ez"&gt;http://bit.ly/i2I6Ez&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri &amp;amp; John Scott-Railton, &lt;i&gt;For Their Eyes Only: The Commercialization of Digital Spying, &lt;/i&gt;&lt;span&gt;Citizen Lab and Canada Centre for Global Security Studies, Munk School of Global Affairs, University of Toronto, 01 May 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/ZVVnrb"&gt;http://bit.ly/ZVVnrb&lt;/a&gt;&lt;/p&gt;
&lt;p class="sdfootnote" style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. Elonnai Hickok, &lt;i&gt;“Draft International Principles on Communications Surveillance and Human Rights”, &lt;/i&gt;&lt;span&gt;The Centre for Internet and Society, 16 January 2013, &lt;/span&gt;&lt;a class="external-link" href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata'&gt;https://cis-india.org/internet-governance/blog/fin-fisher-in-india-and-myth-of-harmless-metadata&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-13T11:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet">
    <title>Fill The Gap: Global Discussion on Digital Natives</title>
    <link>https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet</link>
    <description>
        &lt;b&gt;More often than not people don't understand the new practices inspired by Internet and digital technologies. As such a series of accusations have been leveled against the Digital Natives.  Educators, policy makers, scholars, and parents have all raised their worries without hearing out from the people they are concerned about. Hivos has initiated an online global discussion about Digital Natives. So, to voice your opinion, start tweeting with us now #DigitalNatives.&lt;/b&gt;
        
&lt;div class="content-view-full"&gt;
&lt;div class="class-event"&gt;
&lt;div class="pagecontent"&gt;
&lt;h2&gt;If you cannot attend Fill The Gap, you can also join us in a global discussion on some of the issues being discussed at #DigitalNatives&lt;br /&gt;&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Are
you an apolitical consumer, or do you have ambitions?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNatives" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNatives&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Are
you a little prince or princess, who only wants to talk to like minded people
or are you different?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesPrincess" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesPrincess&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Is
Wikipedia your bible or do you really know something?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesWiki" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesWiki&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Are
you a digital dinosaur? They say you don’t know anything about ICT!&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalDinosaur" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalDinosaur&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Why
use the Internet, why don’t you march the streets?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesProtest" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesProtest&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Plans
to change the world? What do you need?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesChanceTheWorld" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesChanceTheWorld&lt;/a&gt;&lt;/p&gt;
&lt;br /&gt;If you are in Amsterdam, here is the information you will need to attend the event:&lt;br /&gt;
&lt;h2&gt;Fill the Gap! - 7&lt;/h2&gt;
&lt;h3&gt;
R U Online?&lt;/h3&gt;
&lt;div class="date"&gt;Date: 				15 January 2010 				&amp;nbsp;&lt;/div&gt;
&lt;div class="date"&gt;Time: 									 12.30 											until
					
											17.00 hour&lt;/div&gt;
&lt;div class="date"&gt;Location: Het Sieraad, Postjesweg 1, Amsterdam&lt;/div&gt;
&lt;br /&gt;
			
			&lt;strong&gt;&lt;/strong&gt;The seventh edition of Fill the Gap! is all about the power of youth
and IT in developing countries. How can their skills be strengthened
and put to use for a better world? Hivos, apart from cohosting the
event, will be involving digital natives to hear their stories about
ICT and engagement. 
&lt;br /&gt;
&lt;p&gt;
An Open Space event on the potential of new (mobile) media and youth in
developing countries. For everyone in politics, the profit and the
non-profit sectors who is interested in ICT and international
development cooperation.&lt;/p&gt;
&lt;p&gt;
The use of new (mobile) technology is the most natural thing in the world for the youth of today.&lt;/p&gt;
&lt;p&gt;
Shaped by the digital era and at ease with creativeity, these
innovators use new media to change the world. Just think of the Twitter
revolution in Iran. What can the international development sector learn
from this? How could international development cooperation use the
potential power of youth to tackle development problems?&lt;/p&gt;
&lt;p&gt; The seventh edition of Fill the Gap! is all about the power of
youth and IT in developing countries. How can their skills be
strengthened and put to use for a better world? The kick-off will be
hosted by Jennifer Corriero, co-founder of Taking IT Global: the
international platform for youth and the use of new media for a better
world. Then the floor is open to discuss your own ideas with people
from new media, the business world and the international development
sector during the Open Space sessions. Join in: come to Amsterdam on
Friday January 15th and be inspired during Fill the Gap!&lt;br /&gt;
 &lt;br /&gt; Registration is free. The programme is in English.&lt;/p&gt;
&lt;br /&gt;&lt;a href="http://www.fill-the-gap.nl/Fill_the_gap_7?" target="_blank"&gt;» Fill the Gap&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet'&gt;https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Agency</dc:subject>
    
    
        <dc:subject>Youth</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>New Pedagogies</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2010-01-22T10:54:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq">
    <title>FAQ on the Aadhaar Project and the Bill</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq</link>
    <description>
        &lt;b&gt;This FAQ attempts to address the key questions regarding the Aadhaar/UIDAI project and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 (henceforth, Bill). This is neither a comprehensive list of questions, nor does it contain fully developed answers. We will continue to add questions to this list, and edit/expand the answers, based on our ongoing research. We will be grateful to receive your comments, criticisms, evidences, edits, suggestions for new answers, and any other responses. These can either be shared as comments in the document hosted on Google Drive, or via tweets sent to the information policy team at @CIS_InfoPolicy. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;To comment on and/or download the file, click &lt;a href="https://docs.google.com/document/d/1ib5bQUgZZ7PABurMHlzmfwZK6932DFQI6hUlad-vwfI/edit?usp=sharing" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="https://docs.google.com/document/d/1ib5bQUgZZ7PABurMHlzmfwZK6932DFQI6hUlad-vwfI/pub?embedded=true" height="500" width="100%"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq'&gt;https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-04-13T14:06:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates">
    <title>Fallacies, Lies, and Video Pirates</title>
    <link>https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates</link>
    <description>
        &lt;b&gt;At a recent conference on counterfeiting and piracy, industry representatives variously pushed for stiffer laws for IP violation, more stringent enforcement of existing IP laws, and championed IP as the most important thing for businesses today.  This blog post tries to show how their arguments are flawed.&lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://www.cii.in"&gt;Confederation of Indian Industry&lt;/a&gt; (CII) organized its third annual conference on counterfeiting and piracy, with support from the United States Embassy and the Quality Brands Protection Committee of China (&lt;a class="external-link" href="http://www.apcoworldwide.com/Content/client_success/client_success.aspx?pid=0&amp;amp;csid=67a9334f-184b-4866-8ddc-975ca6ff485d"&gt;a body comprising more than 80 multinational companies&lt;/a&gt;).&amp;nbsp; Last week we &lt;a href="https://cis-india.org/../news/letter-from-civil-society-organizations-to-cii" class="internal-link" title="Letter from Civil Society Organizations to CII"&gt;criticised the conference in an open letter&lt;/a&gt;.&amp;nbsp; This week, we examine a few of the recurring themes that came up at the conference.&lt;/p&gt;
&lt;h3&gt;Something being substandard is not the same as something being counterfeit.&lt;/h3&gt;
&lt;p&gt;This was a mistake made by many whenever they invoked 'counterfeit' in the sense of something that is violative of one's patent and trademark rights.&amp;nbsp; The Indian Drugs and Cosmetics Act itself distinguishes between 'misbranded', 'adulterated', and 'spurious' drugs, thus recognizing that something that is made without proper authorization from rights owners isn't necessarily of a bad quality.&amp;nbsp; Indeed, this was substantiated by an audience member, a lawyer from Dr. Reddy's Lab.&amp;nbsp; She spoke of a &lt;em&gt;mandi&lt;/em&gt; in Agra where they seized medicines being sold under the Dr. Reddy's name, but produced by local manufacturers.&amp;nbsp; Upon lab testing, it turned out, much to their surprise, that the medicines were of the highest quality and were not substandard.&amp;nbsp; Similarly, many large companies including trusted FMCG companies like Hindustan Unilever and ITC are upbraided by authorities for violations of the Drugs and Cosmetics Act (for the cosmetics they produce) as well as the Prevention of Food Adulteration Act.&amp;nbsp; Thus, even legitimate businesses can produce substandard products.&amp;nbsp; Thus, a product can be unauthorized but not substandard, just as a product can be substandard but not counterfeit.&lt;/p&gt;
&lt;p&gt;This distinction becomes very important when we talk about patents, and especially drug patents.&amp;nbsp; A generic drug is &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Generic_drug"&gt;by definition&lt;/a&gt; identical or within an acceptable bio-equivalent range to the brand name counterpart with respect to pharmacokinetic and pharmacodynamic properties.&amp;nbsp; Thus, this entire category of high-quality drugs is often sought to be made illegal or counterfeit by large pharma companies.&amp;nbsp; Some countries like Kenya have capitulated.&amp;nbsp; But so far the World Health Assembly has been forced by developing countries to keep the issue of substandard medicines separate from patent-bypassing medicines.&lt;/p&gt;
&lt;p&gt;The industry, for all their talk about "out of the box" thinking on the issue, still only consider metrics such the number of piracy raids conducted as measures of success.&amp;nbsp; A question was put forth by Manisha Shridhar of the Intellectual Property &amp;amp; Trade Unit of the World Health Organization upon learning of the quality of the drugs seized at the Agra &lt;em&gt;mandi&lt;/em&gt;: Why not cut a licensing deal with those manufacturers, who obviously have excellent production facilities?&amp;nbsp; That kind of thinking, which helped HMV in India in the 1980s, and copying innovative features from video pirates and pricing their products competitively has helped an Indian company, Moserbaer, do extremely well.&lt;/p&gt;
&lt;h3&gt;Counterfeiters and pirates are not always seeking to fool consumers.&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Only lawyers hired by the industry would think that a consumer aspiring towards a Rolex watch would actually think that the one he purchased off the streets for one-hundredth the original's price was in fact original.&amp;nbsp; Street-side DVD hawkers are not thought by the general public to be selling original wares.&amp;nbsp; Still, despite knowing the difference between the original and the fake, consumers many times opt for the latter.&lt;/p&gt;
&lt;p&gt;Having said that, counterfeiting, by using someone else's trademark and trying to pass off fake goods as real ones, is quite obviously wrong.&amp;nbsp; It harms customers, and it harms the manufacturers.&amp;nbsp; Thus, a distinction deserves to be made here between the counterfeiters who try to deceive consumers (for instance by copying authenticity marks, like holograms, etc.) and those who are just providing them with highly cheaper alternatives (pirated DVDs, etc.).&amp;nbsp; In this light, it is also important here to distinguish between counterfeiting, traditionally taken to be trademark violation, and piracy, traditionally taken to be a violation of international law, but now generally meaning a large-scale violation of copyright law.&amp;nbsp; While the former can lead to consumer confusion, the latter scarcely ever does.&amp;nbsp; This is ignored by industry people who evoke the image of the consumer quite often, but only when it helps them, and not in any meaningful manner.&amp;nbsp; They negate consumer choice when it comes to consciously purchasing pirated goods, and &lt;a class="external-link" href="http://a2knetwork.org"&gt;consumer freedoms when it comes to usage of copyrighted materials&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;While commercial film piracy funds terrorists, so does pretty much every business activity.&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;A favourite of the MPAA (and by association, the MPA) is the RAND report on &lt;a href="http://www.rand.org/pubs/monographs/2009/RAND_MG742.pdf" target="_blank"&gt;Film Piracy and its Connection to Organized Crime and Terrorism&lt;/a&gt;.&amp;nbsp; This report, which was funded by the MPAA, predictably concludes that film piracy funds organized crime and terrorism.&amp;nbsp; Even if we are to believe its findings wholesale, it leaves us wondering whether all business activities from which terrorists derive funds should be banned.&lt;/p&gt;
&lt;p&gt;In India, there is a substantiated link between organized crime and film and music production, and terrorists have been said to make money off the stock market.&amp;nbsp; If the MPA's arguments are taken to their logical conclusions, then film production and equity trading should also be prosecuted.&amp;nbsp; Furthermore, while the mafia and terrorists are the ostensible targets, the laws that are brought about to tackle it affect poor roadside vendors and non-commercial online file sharers.&amp;nbsp; To tackle the funding of terrorists, roadside piracy shouldn't become the target just as film production &lt;em&gt;per se&lt;/em&gt; shouldn't.&amp;nbsp; The invocation of the RAND report is thus only meant for rhetorical effect, as it is hard to find logic in there.&lt;/p&gt;
&lt;h3&gt;"To copy without authorization is to steal", the death penalty, and drug peddling.&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;At the conference, Dominic Keating of the US Embassy pointed out that "to copy without authorization is to steal" and David Brener of US Customs and Border Protection kept emphasising, on at least two occasions, that "drug peddling merits an automatic death sentence in many countries".&amp;nbsp; There are numerous arguments one can make to show the lack of thought in the former.&amp;nbsp; One could point out that 'stealing' and 'theft' are things that happen to tangible property, and that not only is copyright not tangible, but it is barely property.&amp;nbsp; Copying without authorization creates one more of what existed, without depriving the authorizer (usually a corporation) of its original.&amp;nbsp; This goes against our notion of 'stealing'.&amp;nbsp; If the argument is to be shifted to the terrain of control over one's property/copyright, Mark Lemley in an &lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=582602"&gt;illuminative article&lt;/a&gt; shows how the economic theories behind externalities in property and copyright are vastly different, and that complete control over either has never been, nor should it ever be, an aim of the law.&amp;nbsp; Simply put, someone free riding on your property leaves you worse off than earlier, while someone free riding on your copyright &lt;em&gt;usually&lt;/em&gt; doesn't.&lt;/p&gt;
&lt;p&gt;One could also point out that 'stealing' is endemic in activities involving human creativity.&amp;nbsp; &lt;a class="external-link" href="http://www.bartleby.com/200/sw11.html"&gt;T.S. Eliot notes&lt;/a&gt; that "Immature poets imitate; mature poets steal; bad poets deface what they take, and good poets make it into something better, or at least something different".&amp;nbsp; He does not even consider the possibility that artistic borrowing, whether by imitation or by 'stealing' does not happen.&amp;nbsp; Even Y.S. Rajan, Principal Adviser to CII recognized this when during the conference he noted that "imitation and innovation have an interesting and intertwining philosophical history".&amp;nbsp; If we are to take Mr. Keating's admonishment seriously, we would indeed have a very illustrious list of thieves on our hands, including the &lt;a class="external-link" href="http://www.kimbawlion.com/rant2.htm"&gt;Walt Disney Corporation&lt;/a&gt;, &lt;a class="external-link" href="http://www.theatlantic.com/doc/200204/posner"&gt;William Shakespeare&lt;/a&gt;, &lt;a class="external-link" href="http://www.guardian.co.uk/world/2004/apr/02/books.booksnews"&gt;Vladamir Nabokov&lt;/a&gt;, &lt;a class="external-link" href="http://www.alternet.org/story/18830/"&gt;Public Enemy&lt;/a&gt;, and pretty much every creative person who has ever lived.&amp;nbsp; Books can be written about this (and indeed, numerous books have been), so we shall not dwell on this issue.&lt;/p&gt;
&lt;p&gt;Mr. Brener's repeatedly spoke of how drug peddling attracts death penalty in many countries (though in neither the US nor in India has anyone ever received capital punishment for drug peddling), but he also clarified that he is not advocating for the death penalty for copyright violations.&amp;nbsp; That made one wonder why he was bringing up the death penalty at all.&amp;nbsp; He also made the dubious, non-substantiated claim (noting it as "true fact") that pirating movies is more profitable than selling heroin.&amp;nbsp; This claim &lt;a class="external-link" href="http://www.news.com.au/technology/story/0,25642,24236266-5014108,00.html"&gt;appears in an article about a report&lt;/a&gt; produced by the Australian Federation Against Counterfeit Theft (AFACT), but the original report is &lt;a class="external-link" href="http://www.google.com/search?q=heroin+site%3Aafact.com.au"&gt;nowhere to be found&lt;/a&gt;.&amp;nbsp; The &lt;a class="external-link" href="http://www.news.com.au/technology/story/0,25642,24236266-5014108,00.html"&gt;article about the AFACT report&lt;/a&gt; also claims that the pirates are using their illicit profits promote drug smuggling.&amp;nbsp; The seeming contradiction of film pirates investing in something that is riskier and less profitable doesn't seem to have caught the eye of the writers.&amp;nbsp; One version of the 'drugs are less profitable than pirated DVDs' claim (with marijuana taking heroin's place) was &lt;a class="external-link" href="http://mail.sarai.net/pipermail/commons-law/2009-August/003100.html"&gt;debunked on the Commons Law mailing list&lt;/a&gt;.&amp;nbsp; Pirated DVDs are sold for a fraction of the cost of the original.&amp;nbsp; It would be obvious to anyone that DVDs that are typically sold for Rs.30-50, where the cost of manufacture alone may be estimable to be around Rs. 10, cannot be more profitable than heroin peddling.&amp;nbsp; That apart, most online file sharing (deemed to be "piracy") is non-commercial.&amp;nbsp; Thus the question of profit does not really arise.&amp;nbsp; Still, for the industry, absence of a profit is equal to a loss.&lt;/p&gt;
&lt;p&gt;Thus, the rhetoric of crime, and that too heinous crime, is continually used, despite its being completely inapposite. Why does used to try to make IP enforcement a matter of state concern, rather than a matter of private, and civil, interest.&amp;nbsp; This way, illegitimate statistics and factoids are used to make &lt;a class="external-link" href="http://www.theregister.co.uk/2005/05/06/drinkordie_sentencing/"&gt;individual file-sharers who earn no money get lengthy prison sentences&lt;/a&gt;.&amp;nbsp; This and other ways in which IP enforcement has expanded are carefully documented in &lt;a class="external-link" href="http://www.twnside.org.sg/title2/intellectual_property/development.research/SusanSellfinalversion.pdf"&gt;this paper by Susan Sell&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Repeating false 'statistics' does not make them true.&lt;/h3&gt;
&lt;p&gt;Again, we were subjected to a number of dubious claims during the conference: If only counterfeiting and piracy were eliminated, India's fiscal deficit would disappear; the Indian entertainment industry loses 16000 crore (USD 4 billion) yearly to piracy; 820,000 direct jobs are lost due to film piracy; software piracy costs the industry USD 2.7 billion annually, etc.&amp;nbsp; These reports' methodologies have been thorougly discredited.&amp;nbsp; Even The Economist, a very conservative and pro-industry newspaper, believes that the &lt;a class="external-link" href="http://www.economist.com/displaystory.cfm?story_id=3993427"&gt;BSA-IDC annual reports on software piracy are utterly distorted&lt;/a&gt;.&amp;nbsp; Similarly, in the U.S., the figure of 750,000 jobs (around 8% of the U.S. unemployed in 2008) being lost due to piracy were touted by everyone from the Department of Commerce, the Chamber of Commerce, U.S. Border and Customs Protection, and the MPAA, RIAA, and BSA.&amp;nbsp; The amount of money lost each year in the U.S. due to IP infringement has been estimated to be between USD 200-250 billion (that's more
than the &lt;em&gt;combined&lt;/em&gt; 2005 gross domestic revenues of the movie, music, software, and video game industries).&amp;nbsp; In &lt;a class="external-link" href="http://arstechnica.com/tech-policy/news/2008/10/dodgy-digits-behind-the-war-on-piracy.ars"&gt;a lengthy piece in Ars Technica&lt;/a&gt;, Julian Sanchez traces back the history of both these figures, and shows how they are just large numbers used for lobbying, and are not based on actual studies.&amp;nbsp; The industry-commissioned &lt;a class="external-link" href="http://www.ey.com/IN/en/Industries/Media---Entertainment"&gt;Ernst &amp;amp; Young&amp;nbsp; report&lt;/a&gt; ("The Effects of Counterfeiting and Piracy on India's Entertainment Industry") was never made available to the public at large, thereby making it impossible to judge the methodological soundness of the survey and the veracity of the figures.&lt;/p&gt;
&lt;h3&gt;IP expansion and more stringent enforcement is counter-productive.&lt;/h3&gt;
&lt;p&gt;Chander Mohan Lall, copyright lawyer to various film studios (including Warner Bros.) in India, used a number of short film clips in presentation during the conference.&amp;nbsp; Upon being questioned about it, he admitted that he did not have permissions of the copyright holders, but claimed that his use fell under "the education exception" in Indian copyright law.&amp;nbsp; While I wish he were correct (because what he was doing was indeed educational use), as per the law he is wrong.&amp;nbsp; Section 52(1)(i) of the Copyright Act only exempts educational usage of cinematograph film recordings when "audience is limited to such staff and students [of an educational institution], the parents and guardians of the students and persons directly connected with the activities of the institution".&amp;nbsp; While there are other arguments he could seek to use to make his usage of the film clilps non-infringing, being excepted by the educational fair dealings clauses isn't one of them.&amp;nbsp; Thus, more stringent enforcement of IP rights actually engenders such unauthorized, but perfectly legitimate copying and communication to the public such as that done by Mr. Lall.&lt;/p&gt;
&lt;p&gt;Another way in which IP enforcement is being sought to be increased is by way of the so-called Goonda Acts.&amp;nbsp; These are generally statutes aimed at criminals and lumpen elements in society.&amp;nbsp; The Maharastra version, the &lt;a class="external-link" href="http://www.maharashtra.gov.in/english/homedept/pdf/act_1981.pdf"&gt;Maharashtra Prevention of Dangerous Activities of Slumlords, Bootleggers, Drug-Offenders and Dangerous Persons Act, 1981&lt;/a&gt;, just became the &lt;a class="external-link" href="http://maharashtra.gov.in/data/gr/marathi/2009/07/15/20090717184706001.pdf"&gt;Maharashtra Prevention of Dangerous Activities of Slumlords, Bootleggers, Drug-Offenders, Dangerous Persons and Video Pirates Act&lt;/a&gt;.&amp;nbsp; The term "video pirate" is very widely defined, to include any copyright infringement-chargesheeter who is "engaged or is making preparations for engaging in any of his activities as a video pirates, which affect adversely or likely to affect adversely, the maintenance of public order". Public order is deemed to be disturbed by "producing and distributing pirated copies of music or film products, thereby resulting in a loss of confidence in administration".&amp;nbsp; Thus video pirates can possibly be interpreted to include individual sitting at home and using P2P networks to share films.&amp;nbsp; The only requirement is that they should have had a chargesheet lodged against them previously -- they needn't even have been convicted; being chargesheeted suffices.&amp;nbsp; Thus, non-commercial activities of file-sharing are equated to bootleggers and drug smugglers, and preventive detention (an anti-civil rights relic of India's colonial past) is applicable to them.&lt;/p&gt;
&lt;p&gt;IP expansion is happening without the ostensible justifications for IP being kept in mind. That Tirupathi ladoos are going to get GI (geographical indicator) protection was announced at the conference with great pride.&amp;nbsp; Geographical indicators are used to protect consumer interests, to ensure that no one outside a particular region (Champagne) can lay claim to be producing that product (Champagne) if the production of that product is intrinsically linked to special features found in that region (climate, etc.).&amp;nbsp; However, no devout person would want to purchase anything advertised as "Tirupathi ladoo" if it were produced outside the Venkateswara temple at Tirupathi, thus the question of consumer confusion does not arise.&amp;nbsp; What if someone malignantly advertises something as Tirupathi ladoo and claims it was made in Tirupathi (and not just that it tastes like the ladoo made there)?&amp;nbsp; Such a person can be taken to task for deceptive advertising, and there is no need for something to have IP protection to do so.&amp;nbsp; This represents a senseless expansionism of IP.&amp;nbsp; It is now IP for IP's sake.&lt;/p&gt;
&lt;p&gt;One of the speakers, Mr. V.N. Deshmukh, who though pro-stringent IP enforcement, astutely noted that, "When local demand is not met, they [consumers] turn to counterfeiters and pirates."&amp;nbsp; Local demand can be unsatisfied because of lack of supply, or because the supply is overpriced, or because the supply is not easy to access, or because what is supplied is inferior to what is demanded.&amp;nbsp; At the end of the day, as William Patry, Google's lead counsel, has noted, what companies sell to the public are products and services, and not IP.&amp;nbsp; It would thus be wise for businesses to be innovative and compete rather than trying to extend their monopolies and engaging in rent-seeking behaviour that is economical harmful to consumers.&amp;nbsp; They would also do well to remember that IP is not only a product but an input as well, so they are ultimately consumers themselves.&amp;nbsp; All the harsher laws and enforcement mechanisms that they push for right now will have unintended consequences, and come to affect them adversely.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates'&gt;https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-08-04T04:43:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them">
    <title>Facebook Shares 10 Key Facts about Free Basics. Here's What's Wrong with All 10 of Them.</title>
    <link>https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them</link>
    <description>
        &lt;b&gt;Shweta Sengar of Catch News spoke to Sunil Abraham about the recent advertisement by Facebook titled "What Net Neutrality Activists won't Tell You or, the Top 10 Facts about Free Basics". Sunil argued against the validity of all the 'top 10 facts'.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Facebook has rebranded internet.org as Free Basics. After suffering from several harsh blows from the net neutrality activists in India, the social media behemoth is positioning a movement in order to capture user attention.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from a mammoth two page advertisement on Free Basics on 23 December in a leading English daily, we spotted a numerous hoardings across the capital.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Unlike Facebook, Wikipedia has a rather upfront approach for raising funds. You must have noticed a pop-up as you open Wikipedia when they are in need of funds. What Facebook has done is branded Free Basics as 'free' as the basic needs of life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The newspaper advertisement by Facebook was aimed at clearing all the doubts about Free Basics. The 10 facts highlighted a connected India and urging users to take the "first step towards digital equality."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In an interview with &lt;em&gt;Catch&lt;/em&gt;, Sunil Abraham, Executive Director of Bangalore based research organisation, the Centre for Internet and Society, shared his thoughts on the controversial subject. Abraham countered each of Facebook's ten arguments. Take a look:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;01&lt;/strong&gt; Free basics is open to any carriers. Any mobile operator can join us in  connecting India.&lt;/blockquote&gt;
&lt;p&gt;Sunil Abraham: Free Basics was initially exclusive to only one telecom operator in most markets that it was available in.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The non-exclusivity was introduced only after activists in India complained. But now the arrangement is exclusive to Free Basics as a walled garden provider. But discrimination harms remain until other Internet services can also have what Facebook has from telecom operators ie. free access to their destinations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;02&lt;/strong&gt; We do not charge anyone anything for Free Basics. Period.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: As Bruce Schneier says "surveillance is the business model of the Internet". Free basics users are subject to an additional layer of surveillance ie. the data retention by the Facebook proxy server. Just as Facebook cannot say that they are ignoring Data Protection law because Facebook is a free product - they cannot say that Free Basics can violate network neutrality law because it is a free service. For ex. Flipkart should get Flipkart Basic on all Indian ISPs and Telcos.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;03&lt;/strong&gt; We do not pay for the data consumed in Free Basics. Operators participate  because the program has proven to bring more people online. Free Basics has brought new people onto mobile networks on average over 50% faster since launching the service.&lt;/blockquote&gt;
&lt;p&gt;SA: Facebook has been quoting statistics as evidence to influence the policy formulation process. But we need the absolute numbers and we also need them to be independently verifiable. At the very least we need the means to cross verify these numbers with numbers that telcos and ISPs routinely submit to TRAI.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Theoretical harms must be addressed through net neutrality regulation. For example, you don't have to build a single, centralised database of all Indian citizens to know that it can be compromised - from a security design perspective centralisation is always a bad idea. Gatekeeping powers given to any powerful entity will be compromised. While evidence is useful, regulation can already begin based on well established regulatory principles. After scientific evidence has been made available - the regulation can be tweaked.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;04&lt;/strong&gt; Any developer or publisher can have their content on Free Basics. There are  clear technical specs openly published here ... and we have never rejected an app or publisher who has me these tech specs.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Again this was only done as a retrospective fix after network neutrality activists in India complained about exclusive arrangements. For example, the music streaming service Hungama is not a low-bandwidth destination but since it was included the technical specifications only mentions large images and video files. Many of the other sites are indistinguishable from their web equivalents clearly indicating that this was just an afterthought. At the moment Free Basics has become controversial so most developers and publishers are not approaching them so there is no way for us to verify Facebook's claim.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;05&lt;/strong&gt; Nearly 800 developers in India have signed their support for Free Basics.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: I guess these are software developers working in the services industry who don't see themselves as potential competition to Facebook or any of the services within Free Basics. Also since Facebook as been completely disingenuous when it comes to soliciting support for their campaigns it is very hard to believe these claims. It has tried to change the meaning of the phrase "net neutrality" and has framed the debate in an inaccurate manner - therefore I could quite confidently say that these developers must have been fooled into supporting Free Basics.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;06&lt;/strong&gt; It is not a walled garden: In India, 40% of people who come online through Free  Basics are paying for data and accessing the full internet within the first 30 days. In the same time period, 8 times more people are paying versus staying on just&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Again, no absolute numbers and also no granularity in the data that makes it impossible for anyone to verify these numbers. Also there is no way to compare these numbers to access options that are respectful of network neutrality such as equal rating. If the numbers are roughly the same for equal rating and zero-rating then there is no strong case to be made for zero-rating.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;07&lt;/strong&gt; Free Basics is growing and popular in 36 other countries, which have welcomed  the program with open arms and seen the enormous benefits it has brought.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Free Basics was one of the most controversial topics at the last Internet Governance Forum. A gratis service is definitely going to be popular but that does not mean forbearance is the only option for the regulator. In countries with strong civil society and/or a strong regulator, Free Basics has ran into trouble. Facebook has been able to launch Free Basics only in jurisdictions where regulators are still undecided about net neutrality. India and Brazil are the last battle grounds for net neutrality and that is why Facebook is spending  advertising dollar and using it's infrastructure to win the global south.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;08&lt;/strong&gt; In a recent representative poll, 86% of Indians supported Free Basics by  Facebook, and the idea that everyone deserves access to free basic internet services.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: This is the poll which was framed in alarmist language where Indian were asked to choose between perpetuating or bridging the digital divide. This is a false choice that Facebook is perpetuating - with forward-looking positive Network Neutrality rules as advocated by Dr. Chris Marsden it should be possible to bridge digital divide without incurring any free speech, competition, innovation and diversity harms.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;09&lt;/strong&gt; In the past several days, 3.2 million people have petitioned the TRAI in  support of Free Basics.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Obviously - since Free Basics is better than nothing. But the real choice should have been - are you a) against network neutrality ie. would you like to see Facebook play gatekeeper on the Internet OR b) for network neutrality ie. would you like to see Free Basics forced to comply with network neutrality rules  and expand access without harms to consumers and innovators.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;10&lt;/strong&gt; There are no ads in the version of Facebook on Free Basics. Facebook produces  no revenue. We are doing this to connect India, and the benefits to do are clear.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: As someone who has watched the Internet economy since the first dot com boom - it is absolutely clear that consumer acquisition is as important as revenues. They are doing it to connect people to Facebook and as a result some people will also connect to the Internet. But India is the last market on the planet where the walled garden can be bigger than the Internet, and therefore Facebook is manipulating the discourse through it's dominance of the networked public sphere.&lt;/p&gt;
&lt;p&gt;Bravo to TRAI and network neutrality activists for taking Facebook on.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published by &lt;a href="http://www.catchnews.com/tech-news/should-facebook-become-internet-s-gatekeeper-or-free-basics-must-comply-with-net-neutrality-sunil-abraham-has-some-thoughts-1450954347.html" target="_blank"&gt;Catch News&lt;/a&gt;, on December 24, 2015.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them'&gt;https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-12-25T14:59:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape">
    <title>Exploring the Digital Landscape: An Overview</title>
    <link>https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape</link>
    <description>
        &lt;b&gt;One component of the Digital Humanities mapping exercise was a series of six research projects commissioned by HEIRA-CSCS, Bangalore over November 2013-March 2014. These studies attempted to chart various aspects of the digital landscape in India today, with a focus on emerging forms of humanistic enquiry engendered by the Internet and new digital technologies. This blog post presents a broad overview of some of the key learnings from these projects. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The six research studies commissioned by HEIRA-CSCS as part of the collaborative exercise to map the Digital Humanities (DH) were formulated within a broad rubric of exploring changes at the intersection of youth, technology and higher education in India. Apart from existing questions about the digital divide, and the possibilities of increased connectivity and availability of new sources of information due to proliferation of digital tools and access to the Internet, the projects also tried to address in some way the problem of understanding and formulating a research enquiry about the ‘digital’ itself. The digital as a mode of existence or being, or a new ‘social’ or as discussed in the earlier blog-posts, is essentially a premise of the DH discourse as it has emerged in different parts of the world. While the studies focus largely on youth and higher education and so are located with a certain context, they do attempt to address larger questions about understanding the digital landscape in India today, with reference to new and changing practices of interdisciplinary research and scholarship in the humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just to recapitulate from an earlier blog-post; the following were the studies commissioned:&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Survey of Printed Digitised Materials in Bengali&lt;/b&gt;&lt;b&gt; – &lt;/b&gt;an extensive survey and report of printed digitized materials in Bengali across a few selected themes. The objective of this exercise is to map the nature of available digitized materials and explore possibilities of their use in the higher education classroom.&lt;b&gt;&lt;br /&gt;Researcher: Saidul Haque, Jadavpur University, Kolkata&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Confessions in the Digital Age&lt;/b&gt;&lt;b&gt; – &lt;/b&gt;looks at the rising trend of ‘confession pages’ on social media, most of which are located in an educational context, and explores the manner in which the digital space and its assumed anonymity has reconfigured this practice and the interaction between youth and technology.&lt;b&gt;&lt;br /&gt;Researcher: Rimi Nandy, Jadavpur University, Kolkata&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Queer Expression in the Online Space&lt;/b&gt; – this study explores the concept of digital citizenship with a focus on how youth from the LGBTQ community engage with digital technologies such as social media, mobile phones and radio to negotiate questions of identity politics, activism and citizenship in cyberspace.&lt;b&gt;&lt;br /&gt;Researcher: Ditilekha Sharma, Tata Institute of Social Sciences, Mumbai&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Creating Knowledge: Mapping the nature of Content and Processes  on the English Wikipedia&lt;/b&gt; - analyses the nature of content produced on Wikipedia, with a focus on the representation of women and gender-related topics to explore if online knowledge platforms contain and perpetuate a systemic gender-bias.&lt;b&gt;&lt;br /&gt;Researcher:&lt;/b&gt; &lt;b&gt;Sohnee Harshey, Tata Institute of Social Sciences, Mumbai&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;From the Streets to the Web: Feminist Activism on Social Media&lt;/b&gt;&lt;b&gt;– &lt;/b&gt;an ethnographic exploration of social media platforms to explore how feminist activists have engaged with digital technology and if this has allowed for a redefinition of political organization and new forms of activism within the movement.&lt;b&gt;&lt;br /&gt;Researcher: Sujatha Subramanian, Tata Institute of Social Sciences, Mumbai&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This exercise was also an attempt to build on some of the learnings from a four-year programme undertaken by HEIRA-CSCS titled ‘Pathways to Higher Education (supported by the Ford Foundation), which looked at the problem of &lt;i&gt;quality of access&lt;/i&gt; in higher education for students from disadvantaged sections of society, particularly with respect to the digital and linguistic divide. The emphasis therefore was on understanding how young people, who are known as digital natives, negotiate with these rapidly changing modes of communication and learning. The projects therefore are located in institutional spaces and primarily address the demographic of 18 – 35 years, although there are exceptions as in the case of the studies on Wikipedia and the Bengali archival materials. Most of the studies draw from conventional methods of humanities and social sciences research, largely consisting of ethnographic and textual analysis, interviews and surveys. Adapting these methods to the digital domain, or rather formulating new research questions and methodology that is adequate to understand the nuances of the digital sphere was one of the key challenges of this exercise. Some of the learning outcomes from these studies may be summarized under the following themes:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Emergence of the (Digital) Public Sphere&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The advent of the internet and digital technologies has largely been considered enabling, in terms of what it allows you to do and be both in the real and virtual worlds. The growth of online activism in the last couple of years is indicative of this change to a large extent. This has been particularly true of traditional forms of activism that have now adopted the digital space, such as the LGBTQ or feminist movements. A majority of the respondents in the studies focussing on these two themes have endorsed the positive aspect of activism in the online space, in terms of organising people and connecting civil society and the community, and bringing these issues into the mainstream. Most felt that the internet offers a space, and a relatively safe one at that, to talk about issues related to sexuality and gender. Not only in terms of its potential to garner large numbers, disseminate information and create wider transnational networks, the online space can now also be seen as the space where the activism originates, rather than merely supplementing or facilitating traditional on-the-ground movements. As such, the digital has evolved into an alternate critical public sphere were the discourse around identity, citizenship, and socio-political participation has become more varied, even if not yet adequately nuanced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While most of the studies endorse the democratising potential of the internet and digital technology, particularly that of mobile phones which have made these networks and resources accessible to a larger cross-section of people, many have also speak about the replication of several forms of systemic injustice and marginalisation that exist in the real world in the online space. The project on the gender-gap on Wikipedia cites examples of such a politics of exclusion in the knowledge-making process, not just with respect to content on Wikipedia, but also in the inclusion of women in the process of content-generation. Respondents in the other two projects on activism also spoke of instances of gendered violence and abuse, often a repercussion of being vocal online, thus highlighting the problematic duality of the condition of being visible and vulnerable. The imperative of creating safe online spaces to voice opinions, show solidarity or express dissent has been stressed by a majority of respondents in these studies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Being Digital: Visibility and Accessibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Moving from the question of doing to being, a paradox about the online space has been the way in which it accords a certain hyper-visibility, and increasingly makes invisible people and discourses, many a time not by choice. The option of anonymity accorded by the online space has been important for many voices of dissent to find expression, and for non-normative discourse to become visible in mainstream debates. However, the problems of anonymity can be several, as seen in the case of the study on the Facebook confessions. ‘Performance’ is an important aspect of these confessions; whether it is in the nature of a comment on another person or a representation of the self. The creation and performance of identities has been a significant component of studies on digital and cyber culture studies. The internet as facilitating performance of a certain gendered identity, while also in some ways obscuring certain others – as in the case of the marginalisation of lesbian, bisexual or transsexual individuals within the queer community is a case in point. Further the visibility accorded to issues in the online space is also conditional, in terms of what gets viewed, discussed and acted upon. The Wikipedia study discusses this in terms of a ‘covert alliance-building’ of editors or consensus on what goes up online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another positive attribute of the online space as reiterated by most people in the projects was that of increased accessibility - to networks, people and resources. But as is evident from the earlier paragraph, such accessibility often comes with a caveat - the conditions of the access are also as important. In the case of the survey on Bengali materials, the availability of a large corpus of materials in various spaces and the efforts to digitse them is an insufficient measure given the poor accessibility to such digitised materials available online, due to issues of copyright, metadata, technological support and lack of subject expertise. Accessibility is an important aspect of being digital as understood in the project on mapping the digital classroom. While students in most undergraduate classrooms have access to digital devices in one form or the other, the use of these devices in learning is contingent upon several factors such as student and teacher competence and comfort, and the ease to adapt to changing teaching-learning environments given cultural and linguistic divides. More importantly, the perception of the internet or digital technologies as a tool to merely facilitate communication or learning, rather than a space of critical engagement is the predominant understanding, with few notable exceptions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;New Knowledge-making Practices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Combining the being and doing in the online space are the new modes of knowledge formation engendered by this medium. The Wikipedia is illustrative of the process of collaborative knowledge production, and the politics inherent therein. The problems and challenges of digitisation and archival practice as evident in the study of the Bengali digitised materials is also an example of this knowledge vs information conundrum. However the connect with higher education, as in the availability of scholarly materials in regional languages in the latter case, and the need to acknowledge non-traditional sources as scholarly as in the former, are some of the immediate challenges identified by these studies. The model of annotations and referencing, as made possible by collaborative and dynamic knowledge repositories is an important concern of the DH debate as well, in terms of questioning existing hierarchies of authorship and expertise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bringing in of non-normative discourse on sexuality and gender into the mainstream, and the emergence of new issues in some sense has also been facilitated by the online space to some extent, even if within certain exclusive communities or spaces. An example of this is in terms of narratives of pleasure in feminist discussions, which seem to have found a space online but not so much in debates otherwise seen in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Changes in learning and pedagogic practice are an important aspect of new knowledge-making practices, and as mentioned earlier this is apparent in classrooms today given that students and faculty recognise the potential of digital technologies. However, the primacy of textual material in most classrooms, and a certain reluctance to engage with digital media and texts on the part of faculty and students in a substantive way is an attribute of the classroom today. Indeed, ways of reading and writing have changed with the onslaught of technology; as the study on confessions demonstrates communication on social media and mobile phones have evolved a different linguistic forms, both in English and regional languages. This and the problem of an information clutter, or ‘excess’, without the option of verifiability in most cases, is one of the major concerns of faculty with regard to technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the projects in themselves may have only indirectly contributed to our understanding of DH, the process of formulating these questions and trying to find some answers to them have been insightful, particularly with respect to the problems with understanding technology, the importance of form and process, and the growth of alternative spaces of learning, all which are relevant to the DH discourse. For some reflections on the individual projects, see the guest posts by the researchers on CIS-RAW; the complete research reports are available at &lt;a href="http://cscs.res.in/irps/heira/irps/heira/documents"&gt;http://cscs.res.in/irps/heira/irps/heira/documents&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape'&gt;https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-04-14T15:48:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/exploring-big-data-for-development-an-electricity-sector-case-study-from-india">
    <title>Exploring Big Data for Development: An Electricity Sector Case Study from India</title>
    <link>https://cis-india.org/raw/exploring-big-data-for-development-an-electricity-sector-case-study-from-india</link>
    <description>
        &lt;b&gt;This working paper by Ritam Sengupta, Dr. Richard Heeks, Sumandro Chattapadhyay, and Dr. Christopher Foster draws from the field study undertaken by Ritam Sengupta, and is published by the Global Development Institute, University of Manchester. The field study was commissioned by the CIS, with support from the University of Manchester and the University of Sheffield.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the working paper: &lt;a href="http://hummedia.manchester.ac.uk/institutes/gdi/publications/workingpapers/di/di_wp66.pdf" target="_blank"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This paper presents exploratory research into “data-intensive development” that seeks to inductively identify issues and conceptual frameworks of relevance to big data in developing countries.  It presents a case study of big data innovations in “Stelcorp”; a state electricity corporation in India.  In an attempt to address losses in electricity distribution, Stelcorp has introduced new digital meters throughout the distribution network to capture big data, and organisation-wide information systems that store and process and disseminate big data.&lt;/p&gt;
&lt;p&gt;Emergent issues are identified across three domains: implementation, value and outcome. Implementation of big data has worked relatively well but technical and human challenges remain. The advent of big data has enabled some – albeit constrained – value addition in all areas of organisational operation: customer billing, fault and loss detection, performance measurement, and planning.  Yet US$ tens of millions of investment in big data has brought no aggregate improvement in distribution losses or revenue collection.  This can be explained by the wider outcome, with big data faltering in the face of external politics; in this case the electoral politics of electrification. Alongside this reproduction of power, the paper also reflects on the way in which big data has enabled shifts in the locus of power: from public to private sector; from labour to management; and from lower to higher levels of management.&lt;/p&gt;
&lt;p&gt;A number of conceptual frameworks emerge as having analytical power in studying big data and global development.  The information value chain model helps track both implementation and value-creation of big data projects.  The design-reality gap model can be used to analyse the nature and extent of barriers facing big data projects in developing countries.  And models of power – resource dependency, epistemic models, and wider frameworks – are all shown as helping understand the politics of big data.&lt;/p&gt;
&lt;hr /&gt;
&lt;em&gt;Cross-posted from &lt;a href="http://www.gdi.manchester.ac.uk/research/publications/other-working-papers/di/di-wp66/"&gt;University of Manchester&lt;/a&gt;.&lt;/em&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/exploring-big-data-for-development-an-electricity-sector-case-study-from-india'&gt;https://cis-india.org/raw/exploring-big-data-for-development-an-electricity-sector-case-study-from-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-03-16T04:33:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands">
    <title>Expanding the World of Telugu Wikipedia – CIS-A2K and ALC join hands</title>
    <link>https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands</link>
    <description>
        &lt;b&gt;Students and faculty of Andhra Loyola College in Vijayawada aim to enhance Telugu Wikipedia through increased contributions to Wikipedia and make it available under free license.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;The Access to Knowledge &lt;/a&gt;(A2K) programme of the Centre for Internet and Society (&lt;a href="https://en.wikipedia.org/wiki/Centre_for_Internet_and_Society_(India)"&gt;CIS&lt;/a&gt;) in its quest to catalyze the growth of open knowledge movement in Indic languages recently added another feather to its cap by signing a memorandum of understanding (MoU) with &lt;a href="http://www.andhraloyolacollege.ac.in/"&gt;Andhra Loyola College&lt;/a&gt; (ALC) in Vijayawada on August 14, 2014 to work collaboratively to improve &lt;a href="https://te.wikipedia.org/wiki/%E0%B0%AE%E0%B1%8A%E0%B0%A6%E0%B0%9F%E0%B0%BF_%E0%B0%AA%E0%B1%87%E0%B0%9C%E0%B1%80"&gt;Telugu Wikipedia&lt;/a&gt; and &lt;a href="https://te.wikisource.org/wiki/%E0%B0%AE%E0%B1%8A%E0%B0%A6%E0%B0%9F%E0%B0%BF_%E0%B0%AA%E0%B1%87%E0%B0%9C%E0%B1%80"&gt;Telugu Wikisource&lt;/a&gt;.  College Principal Fr. G.A.P. Kishore, Vice-Principals Fr. P. Anil Kumar and Fr. Rex Angelo, correspondent Fr. Raju signed the agreement with CIS-A2K programme director T. Vishnu Vardhan.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The MoU signed with ALC is for a period of five years and encompasses four activities:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Open knowledge creation in Telugu across various disciplines on  Telugu Wikipedia: ALC faculty and students will be trained by CIS-A2K  staff and interested Telugu Wikimedians to understand the principles  that govern Wikipedia in order to generate quality entries. Faculty from  Botany, Physics, Statistics, Ethics, Religion, Telugu Literature, and  Music will work with CIS-A2K. Each of the faculty in the coming months  will come up with a plan to generate open knowledge in Telugu in their  respective disciplines.&lt;/li&gt;
&lt;li&gt;Content donation and digitization on Telugu Wikisource: ALC through  its networks will help CIS-A2K to bring Telugu content under CC-BY-SA  4.0 license. The Telugu department of the college expressed keen  interest to work with CIS-A2K in digitizing historical Telugu content  and to make it available on Telugu Wikisource. Various competitions will  be planned in the future.&lt;/li&gt;
&lt;li&gt;Creating a free software environment at Andhra Loyola College:  400  machines within various labs on the campus will be converted into FOSS  systems with free and open source software including support for Telugu  and other Indic languages. It should be noted that all the existing  computers of ALC are run on proprietary software. As a pilot initiative  CIS-A2K has already converted 30 systems in a lab and named it as Loyola  FOSS Lab.&lt;/li&gt;
&lt;li&gt;CIS-A2K to revise the FIT (Fundamentals in Information Technology): A  mandatory course for all undergraduate  students which will introduce  students to FOSS, Openness and Wikipedia. This is an outcome of the FOSS  orientation done by T. Vishnu Vardhan and Rahimanuddin Shaik during the  two workshops that were held at ALC.&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K will put every effort to involve Telugu Wikimedians and FOSS community in taking this collaboration with ALC forward. CIS-A2K will also create a project page on Telugu Wikipedia to actively document and publicly share the detailed plans and progress. More updates will also be shared on this website.&lt;/p&gt;
&lt;table class="image-alc"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/alc1.png" alt="ALC and CIS-A2K" class="image-inline" title="ALC and CIS-A2K" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above: Representatives from ALC and CIS-A2K seen during the signing ceremony.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The signing of the MoU was done at a public event  in the presence of students, faculty and management of ALC and various representatives from media. The media covered this event enthusiastically. The Hindu coverage can be found &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-andhrapradesh/alc-signs-mou-for-better-net-access/article6320555.ece"&gt;here&lt;/a&gt; and Eenadu article coverage is &lt;a href="https://cis-india.org/openness/news/cis-mou-with-alc-coverage-in-eenadu" class="external-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands'&gt;https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>T Vishnu Vardhan and Rahmanuddin Shaik</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Telugu Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-09-30T05:11:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/essays-on-list-selected-abstracts">
    <title>Essays on #List — Selected Abstracts </title>
    <link>https://cis-india.org/raw/essays-on-list-selected-abstracts</link>
    <description>
        &lt;b&gt;In response to a recent call for essays that social, economic, cultural, political, infrastructural, or aesthetic dimensions of the #List, we received 11 abstracts. Out of these, we have selected 4 pieces to be published as part of a series titled #List on the r@w blog. Please find below the details of the selected abstracts. The call for essays on #List remains open, and we are accepting and assessing the incoming abstracts on a rolling basis.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;1. &lt;a href="#manisha"&gt;Manisha Chachra&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;2. &lt;a href="#meghna"&gt;Meghna Yadav&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;3. &lt;a href="#sarita"&gt;Sarita Bose&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;4. &lt;a href="#shambhavi"&gt;Shambhavi Madan&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3 id="manisha"&gt;&lt;strong&gt;Manisha Chachra&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;&lt;em&gt;MeToo in Indian journalism: Questioning access to internet among intersectional women and idea of rehabilitative justice in digital spaces&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;The advent of LoSHA and MeToo era witnessed an intriguing intersection of technology, politics and gender. The list and name-shame culture of social media has not only displayed changing power dynamics in digital space but an increasing movement towards engendering of internet spaces. The social, political and economic matrix defined by power relationships -- a patriarchy reflected in internet spaces, percolating in our interactions confronted a major challenge when women rose up to claim the same space. Internet space cannot be called a virtual reality as it is a sharp mirror into what is going in the power dynamics of society and politics. My paper broadly seeks to examine this engendering of spatial reality of digital space by looking at various conversations that took place on Twitter around MeToo in Indian journalism. MeToo has been widely understood as narration of one’s tale and how that experiential reality is connected with other women. However, a universalisation of such an experience often neglects intersectional reality attached to women’s experiences -- belonging to different caste, class, ethnicity and other
kinds of differences. My paper attempts to question how far MeToo in digital space accommodated the differential aspects of woman as a heterogeneous category. The spatial realities of technological spaces function like a double edged sword-- liberating as well as mobility paralysing. I use the term mobility paralysis to denote a contradiction in digital space-- which might be equally available to all sections of women but not fairly accessible. The accessibility is often a reflection of deep rooted patriarchies and kinship relationships that bind women in same
voiceless zone. MeToo in Indian journalism is a case study of how women of different backgrounds access digital spaces in questioning this mobility paralysis and inch towards a certain kind of emancipatory politics. Examining MeToo from the perspective of a social movement emerging on Twitter and Facebook, I aim to scrutinise scope of rehabilitative justice for the accused. The emergence of lists, and claiming of spaces is attached to the question of justice and being guilty or innocent of allegations. Online spaces in the recent times have also emerged as platforms of e-khaps (online khap panchayats with certain gatekeepers of the movement) where screenshot circulation, photoshop technology could be used to garner a public response against a particular person. It is interesting how after MeToo the question was not whether the person is guilty or accused rather how they should abandon their social media accounts and probably go absent virtually. In such a context, it is crucial to question the relationship between justice, one’s digital identity and who owns this identity. If rehabilitative justice is not an option, and apology-seeking is not available, what are we hoping from MeToo? The aim of any name-shame movement must be to reclaim digital space, narrate experiences and also to leave scope for others to respond, and seek justice. The question of justice is also closely linked with how women from intersectional backgrounds access internet, and emancipate
themselves.&lt;/p&gt;
&lt;h3 id="meghna"&gt;&lt;strong&gt;Meghna Yadav&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;For most people, the Internet is now synonymous with social media. Likewise, consumption of content on the Internet has shifted. We’ve moved from an earlier design of explicitly going to content-specific websites, to now, simply “logging in” and being presented with curated content spanning multiple areas. The infrastructure for consuming this content, however, remains predominantly screen based, implying a space constraint. Websites must, hence, decide what content users are to be presented with and in what order. In other words, social media must
generate itself as a ranked list of content.&lt;/p&gt;
&lt;p&gt;In the classical theory of social choice, a set of voters is called to rank a set of alternatives and a social ranking of the alternatives is generated. In this essay, I propose to look at ranking of content as a social choice problem. Ranking rules of different social media platforms can be studied as social welfare functions for how they aggregate the preferences of their voters (i.e. users). Current listings of content could be modelled as the results of previously held rounds of voting. Taking examples, Reddit is built on a structure of outward voting, visceral through ‘upvotes’ and ‘downvotes’, constantly displaying to users the choice they have to alter content ranks on the website. TikTok, on the other hand, relies on taking away most of the voting power of its users.&lt;/p&gt;
&lt;p&gt;As the Internet tends towards centralisation, studying how different list ranking rules aggregate our choices and in turn, alter the choices presented to us, becomes important to design a more democratic Internet.&lt;/p&gt;
&lt;h3 id="sarita"&gt;&lt;strong&gt;Sarita Bose&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;&lt;em&gt;Mapping goes local: A study of how Google Maps tracks user’s footprints and creates a ‘For You’ list&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;The ‘Explore Nearby’ feature in Google Maps has three sections – Explore, Commute and For You. Of this, ‘For You’ section contains ‘Lists based on your local history’ as mentioned by Google itself. The Google Maps auto tracks a user’s movements and creates a digital footprint map and lists up events, programmes, restaurants, shops etc for the user. This research will focus on the ‘For You’ feature of Google Maps and its cultural and social dimensions. The work will focus on how the mapping is done and the logic behind drawing up the list. It will try to find out how the economy of Google Maps works. Why some lists shows up while some doesn’t. What kind of ‘algorithm – economy – user’ matrix is used to make up the list? The work will also try to understand cultural dimensions based on mind mapping techniques of Google. This research will follow three dimensions. The first is the mapping of user’s footprints itself and how the distance covered by a user becomes the user’s own digital existence. The Google Maps automatically asks for reviews of places the user might have visited or passed. The question is what algorithm is Google using to ask for the review? Is it pre-pointed or post-pointed? Thus, we come to the second part. Is Google only listing places that paid it or is it trying to digitally map a user’s area of geographical reach in general. If so, why? This brings us to the third dimension of the research work. What kind of cultural mapping is done of the user? The list the user gets is based on his own history and as more data is added, the more mapping is done. These three dimensions are intricately woven with each other and the work will try to establish this relationship.&lt;/p&gt;
&lt;h3 id="shambhavi"&gt;&lt;strong&gt;Shambhavi Madan&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;&lt;em&gt;List of lists of lists: Technologies of power, infrastructures of memory&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;Lists make infinities comprehensible, and thus controllable. By virtue of the ubiquity of cyberspace and the digitized information infrastructures curating reality within these infinities, we are increasingly subjected to curatorial efforts of individuals as well as codes – algorithmic and architectural.&lt;/p&gt;
&lt;p&gt;Statistical lists are Foucauldian technologies of power in modern societies; tools for the functioning of governmentality – not just in terms of state control over population phenomena but the governmentality of groups or individuals over themselves. The framework of biopolitics identifies a bureaucracy imposed by determining social classifications through listing and categorizing, within which people must situate themselves and their actions (Foucault, 2008). Thus, the authorship of lists is often reflective of power that allows for the perpetuation of hegemonic constructions of social reality, making the lists themselves sites of struggle.&lt;/p&gt;
&lt;p&gt;This paper seeks to contextualize (public-oriented) lists as forms of biopolitical curation that often lie at  points of intersection between collective consciousness and social order, through an approach that problematizes the socio-technics of agency and the subjective objectivity of authorship. Although list-making acts such as the National Population Register, NRC, #LoSHA, the electoral roll, the census, and Vivek Agnihotri’s call for a list of “Urban Naxals” all differ in terms of content, intent, and impact, and contain different asymmetries of power, the lowest common denominator lies in their role as producers of public knowledge and consequently, infrastructures of public memory. This approach allows for a reinterpretation of the fundamental duality of lists of and within publics: &lt;em&gt;the functionality of enforcing/maintaining social order, and the phenomenological practise of publicly self-presenting with a (semi-material) manifestation of a collective identity&lt;/em&gt;. The former sees the use of lists as tools of population management, enacting citizenship and belonging through forms of inclusion and exclusion; the latter is reflective of the workings of self-autonomy – redefining the authorship of justice and punishment – in networked societies. Thus, a secondary theme in this paper would be to question the change and significance in the role of authorship through a phenomenological comparative of lists that are institutionalised practice versus those that are open and collaborative.&lt;/p&gt;
&lt;p&gt;Both the act of list-making and the lists themselves are framed as coalescences of material and imaginary, by juxtaposing the idea of infrastructures as primarily relationalities – i.e. they can’t be theorized in terms of the object alone (Larkin, 2013) – with Latour’s relational ontology of human and non-human actors. The list itself is a non-human object/actant that after emerging as a product of co-construction, takes on an agential role of its own (Latour, 2005). Each of these lists can be considered as a quasi-object, a complex convergence of the technological and the social. Both #LoSHA and the NRC are not mere placeholders being ‘acted upon’, but real and meaningful actors acting as cultural mediators and not intermediaries. The integration of a socio-technical, infrastructural approach with one that emphasizes upon the aesthetics of authorship and public memory allows the subject to be seen as constitutive of an embodied, relational experience as opposed to just existing as a dissociative (re)presentation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Foucault, M. 2008. &lt;em&gt;The Birth of Biopolitics: Lectures at the Collège de France 1978-1979&lt;/em&gt;. Trans. G. Burchell. Basingstoke: Palgrave Macmillan.&lt;/p&gt;
&lt;p&gt;Larkin, B. 2013. "The Politics and Poetics of Infrastructural." &lt;em&gt;Annual Review of Anthropology&lt;/em&gt;. 42:327-343.&lt;/p&gt;
&lt;p&gt;Latour, B. 2005. &lt;em&gt;Reassembling the Social: An Introduction to Actor-Network Theory&lt;/em&gt;. Oxford: Oxford University Press.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/essays-on-list-selected-abstracts'&gt;https://cis-india.org/raw/essays-on-list-selected-abstracts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>List</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    

   <dc:date>2019-09-03T13:38:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/enabling-elections">
    <title>Enabling Elections</title>
    <link>https://cis-india.org/accessibility/blog/enabling-elections</link>
    <description>
        &lt;b&gt;For making the 2014 General Elections in India participatory and accessible for voters with disabilities the Centre for Law and Policy Research and the Centre for Internet and Society have come up with a report. The report addresses the barriers that people with disabilities face during elections and recommends solutions for the same.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Executive Summary&lt;/h2&gt;
&lt;p&gt;The report examines three main areas:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The barriers that people with disabilities face at the time of elections.&lt;/li&gt;
&lt;li&gt;The legal framework around this issue.&lt;/li&gt;
&lt;li&gt;The measures which need to be taken to eliminate the barriers in the pre-voting phase, during voting phase and also post-voting phase, so as to enhance the participation of voters with disabilities.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Access to the public sphere and full political participation is a matter of right for persons with disabilities and the state is constitutionally mandated to enforce this right. The rights of voters with disabilities are examined under the constitutional provisions, the Representation of People’s Act 1951, the relevant directions of the Supreme Court and the international conventions. This report also considers international best practices while making recommendations, to the extent that they are suitable and practical in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report looks at Electoral Participation in two dimensions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;“Pre-electoral Participation” and&lt;/li&gt;
&lt;li&gt;“Actual Electoral Participation”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The report then goes on to make recommendations for enhancing accessibility in both these categories.&lt;/p&gt;
&lt;p&gt;On Pre-electoral Participation, the report inter alia recommends the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Opportunities for people with disabilities to participate in public consultations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Immediate outreach programs for higher voter registrations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Making election material and candidate guides available in different formats such as large print, Braille and audio formats upon request so that voters can have full knowledge of the candidate they want to vote for.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Providing information for voters about locations which have special access, wheelchair facilities, technological assistance for visually impaired, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;On Actual Electoral Participation, we inter alia recommend the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Accessible polling sites.&lt;/li&gt;
&lt;li&gt;Training election staff to be sensitive to diverse needs of voters.&lt;/li&gt;
&lt;li&gt;Enabling privacy and independent voting by persons with disabilities.&lt;/li&gt;
&lt;li&gt;Arranging for mobile polling booths.&lt;/li&gt;
&lt;li&gt;Making EVM’s compatible and accessible such as by providing for Braille, large print.&lt;/li&gt;
&lt;li&gt;Tactile buttons, 'sip and puff' and audio devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The report also recommends the need to monitor participation of voters with disabilities in the forthcoming elections.There is a need to collect data, surveys and studies in the pre-election, election and post-election phases.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/accessibility/blog/enabling-elections.pdf" class="internal-link"&gt;Click here&lt;/a&gt; to download and read the full report (PDF, 4.5 MB)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/enabling-elections'&gt;https://cis-india.org/accessibility/blog/enabling-elections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-05-10T00:12:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/education-through-ict">
    <title>Enabling Access to Education through ICT - A Conference in Delhi</title>
    <link>https://cis-india.org/accessibility/blog/education-through-ict</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS), Bangalore in cooperation with the Global Initiative for Inclusive ICT (G3ICT), a flagship advocacy organization of the UN Global Alliance on ICT and Development (UN-GAID), the International Telecommunications Union (ITU), UNESCO, Digital Empowerment Foundation, Society for Promotion of Alternative Computing and Employment and the Deafway Foundation is organizing an international conference "Enabling Access to Education through ICT" in New Delhi from 27 to 29 October 2010. The event is sponsored by Hans Foundation. &lt;/b&gt;
        &lt;p&gt;How can accessible information and communication and assistive technologies for persons with disabilities be best deployed in schools and universities?&lt;/p&gt;
&lt;h3&gt;Background&lt;/h3&gt;
&lt;p&gt;Education is a fundamental right for all persons. In the information society, access to knowledge and information is of vital importance to ensure that all persons are able to participate as creative and productive members of the society. The UNCRPD recognizes that persons with disabilities also have a right to education and life long learning. Countries around the world have recognized the importance of education and have identified universal primary education as one of the millennium goals to be achieved by them within 2015. While definitive steps are being taken to achieve and promote universal inclusive education, there are still some grey areas remaining with respect to addressing the special needs of some groups like disabled children.  The World Health Organisation estimates that 70 per cent of the world’s disabled live in developing countries like India. The advancement of persons with disabilities is impeded by several factors such as an inadequate legal framework for protecting their rights, lack of financial and skilled human resource to carry on their activities, high cost of assistive technologies, lack of training and capacity building activities, the absence of large networks of disability groups to share resources with each other and above all the lack of awareness and a collective intent on the part of educational institutions to enable the right to education for persons with disabilities. India alone is a large country with 18 official languages and many more regional variances and for any technology and content to reach the masses it has to be made available in several Indian languages. All these factors combined together make it difficult for persons with disabilities to exercise their right to education in developing countries.&lt;/p&gt;
&lt;p&gt;The specific focus of the conference will be to look at various technologies, tools and practices which are necessary to bring education, especially distance and online education within the reach of all children with disabilities.&lt;/p&gt;
&lt;p&gt;Children with disabilities in India are often left out of mainstream schools due to a variety of reasons, primarily the lack of awareness amongst educational organizations and teachers, near absence of infrastructural resources and lack of training in this regard. It is believed that barely two per cent of the 70 million disabled persons have access to education in India. Technological advancement in the form of assistive technologies, ubiquitous Web, multiple platforms, social networks, online libraries and digital resources, etc., have now made it possible for disabled persons to access information in accessible formats. It is therefore, important that students, teachers and educational institutions are adequately equipped to leverage the power of the Internet and ICTs to enable inclusion for persons with disabilities.&lt;/p&gt;
&lt;p&gt;The present conference will focus on highlighting existing problems and challenges for students and educational institutions in developing countries, showcase ICT based solutions which are presently being adopted in different countries, point to existing knowledge resources and emerging trends in education.  This conference is unique in so far as it is probably the first one of its kind on such a large scale in India and involves participation of various UN organizations such as the WIPO, UNESCO, ITU and the G3ICT. Amongst the various deliverables of the conference is also to document some best practice case studies on the use of ICTs in education for the disabled in neighbouring countries like Nepal, Bangladesh, Sri Lanka and Thailand, evolve a set of recommendations for educators on best practices, as well as to evolve a draft for a White paper on education and ICTs for persons with disabilities for governments and educators in different countries.&lt;/p&gt;
&lt;p&gt;A print version of the E-accessibility toolkit for policymakers which was jointly brought out by the G3ICT and ITU earlier this year will be launched for the first time at the conference.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Dates&lt;/b&gt;: October 27, 28 and 29&lt;br /&gt;&lt;b&gt;Venue&lt;/b&gt;: Magnolia Hall, India Habitat Centre, New Delhi&lt;/p&gt;
&lt;p&gt;Download the &lt;a href="https://cis-india.org/accessibility/publications/education-ict" class="internal-link" title="Agenda for the ICT Workshop"&gt;agenda&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For &lt;a class="external-link" href="http://www.digitallearning.in/events/events-details.asp?Title=EDICT2010:-Enabling-Access-to-Education-through-ICT&amp;amp;EventID=732"&gt;further reading&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Videos&lt;br /&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKQyU0A.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKQyU0A"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKQyU0A" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKQyxMA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKQyxMA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKQyxMA" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKQzDsA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKQzDsA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKQzDsA" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKQ0SIA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKQ0SIA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKQ0SIA" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKRvSsA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKRvSsA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKRvSsA" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKRv0cA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKRv0cA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKRv0cA" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKRwj8A.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKRwj8A"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKRwj8A" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKStwUA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKStwUA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKStwUA" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKSxCEA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKSxCEA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKSxCEA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKS4UIA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKS4UIA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKS4UIA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKTgFMA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKTgFMA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKTgFMA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKTpmgA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKTpmgA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKTpmgA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKTqS0A.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKTqS0A"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKTqS0A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKTq34A.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKTq34A"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKTq34A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKT_QIA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKT_QIA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKT_QIA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKUgWIA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKUgWIA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKUgWIA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYKUhEYA.html?p=1" width="250"&gt;&lt;/iframe&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="100" width="100"&gt;
&lt;param name="src" value="http://a.blip.tv/api.swf#AYKUhEYA"&gt;&lt;embed height="100" width="100" src="http://a.blip.tv/api.swf#AYKUhEYA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
&lt;/object&gt;
&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/education-through-ict'&gt;https://cis-india.org/accessibility/blog/education-through-ict&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2013-02-04T09:24:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india">
    <title>Economic, Social and Cultural Rights in India: Opportunities for Advocacy in Intellectual Property</title>
    <link>https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society worked on a three part case study. The first case study on digital protection of traditional knowledge was published by GIS Watch in December 2016. The other two case studies along with the synthesis overview has also been published.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The rights established in the International Covenant on Economic, Social and Cultural Rights (ICESCR) are socioeconomic rights and are easily mapped onto rights to education, work, science and culture. These rights, however, are not as easily mapped onto intellectual property rights. This three-part case study contemplates the ICESCR through aspects of intellectual property in India, namely, mobile patents, free and open source software (FOSS), and India’s Traditional Knowledge Digital Library. Through these, it demonstrates the potential of these technologies in realising ESCRs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A distinguishing factor of the ICESCR is the emphasis on the progressive realisation of rights within the Covenant, which indicates the necessity of parties to take steps for the realisation of ESCRs to the best of their ability given the resources available, with a view to fully realising these rights in the long term. This is particularly relevant in India, where the large population and scarcity of resources require gradual realisation and sustained planning. This case study advocates for the progressive realisation of the rights outlined below, and sheds light on the current state of progress in India, as well as providing an overview of the framework within which these rights will be realised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although these three case studies focus on distinct areas – mobile patents, FOSS and open standards, and traditional knowledge – they can also be understood as tied together through the central theme of a mobile phone. The first case study on mobile patents deals with the hardware of the phone, the second deals with the software in discussing open software and standards, and the third case study on traditional knowledge focuses on the person holding the phone who consumes information-embedded products such as traditional foods and medicines.&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india"&gt;Synthesis Overview&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-opportunities-for-advocacy-in-intellectual-property-rights-access-to-mobile-technology"&gt;Access to Mobile Technology&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-opportunities-for-advocacy-in-intellectual-property-rights-the-traditional-knowledge-digital-library"&gt;Traditional Knowledge Digital Library&lt;/a&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-foss/"&gt;&lt;span class="external-link"&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/files/economic-social-and-cultural-rights-in-india-foss/"&gt;FOSS and Open Standards&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;br /&gt;The report on digital protection of traditional knowledge was &lt;a class="external-link" href="https://www.giswatch.org/sites/default/files/Giswatch2016_web.pdf"&gt;published by GIS Watch&lt;/a&gt; earlier and the rest of the reports have been published by the &lt;a class="external-link" href="https://www.apc.org/en/pubs/economic-social-and-cultural-rights-india-opportun"&gt;Association for Progressive Communications&lt;/a&gt;&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india'&gt;https://cis-india.org/openness/apc-april-23-2017-sunil-abraham-and-vidushi-marda-economic-social-and-cultural-rights-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sunil Abraham and Vidushi Marda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2017-04-23T05:22:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/e-accessibility-kit-in-russian">
    <title>e-Accessibility Policy Handbook for Persons with Disabilities (Russian Version)</title>
    <link>https://cis-india.org/accessibility/e-accessibility-kit-in-russian</link>
    <description>
        &lt;b&gt;The e-Accessibility Policy Handbook for Persons with Disabilities is based upon the online ITU-G3ict e-Accessibility Policy Toolkit for Persons with Disabilities (www.e-accessibilitytoolkit.org) which was released in February 2010. This is the Russian translation of the same.&lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://g3ict.org/resource_center/e-Accessibility%20Policy%20Handbook"&gt;Toolkit&lt;/a&gt; and its companion handbook have contributions from more than 60 experts around the world on ICT accessibility and is a most valuable addition to policy makers and regulators, advocacy and research organisations and persons with disabilities on the implementation of the ICT dispositions of the CRPD.&lt;/p&gt;
&lt;p&gt;The handbook is a joint publication of ITU, G3ict and the Centre for Internet and Society, in cooperation with The Hans Foun­da­tion. The book is com­piled and edit­ed by Nir­mi­ta Narasimhan. Preface by Dr. Hamadoun I. Toure, Sec­re­tary-​Gen­er­al, In­ter­na­tion­al Telecom­mu­ni­ca­tion Union. Introduction by Dr. Sami Al-​Basheer, Di­rec­tor, ITU-D. Foreword by Axel Leblois, Ex­ec­u­tive Di­rec­tor, G3ict.&lt;/p&gt;
&lt;p&gt;UNIC Moscow (United Nations Information Centre - Moscow) has translated the English version of the kit to Russian. For more information on the translation initiative by UNIC Moscow,&lt;a class="external-link" href="http://www.unic.ru/news_inf/viewer.php?uid=164"&gt; click here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Download the Russian version &lt;a href="https://cis-india.org/accessibility/e-accessibility-russian-handbook.pdf" class="internal-link" title="e-Accessibility Policy Handbook (Russian Version)"&gt;here&lt;/a&gt;&amp;nbsp;(PDF, 1045 kb)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/e-accessibility-kit-in-russian'&gt;https://cis-india.org/accessibility/e-accessibility-kit-in-russian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Books</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2012-04-26T10:04:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-response-dit-blocking">
    <title>DIT's Response to RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/blog/rti-response-dit-blocking</link>
    <description>
        &lt;b&gt;For the first time in India, we have a list of websites that are blocked by order of the Indian government.  This data was received from the Department of Information Technology in response to an RTI that CIS filed.  Pranesh Prakash of CIS analyzes the implications of these blocks, as well as the shortcomings of the DIT's response.&lt;/b&gt;
        
&lt;h2&gt;Quick Analysis of DIT's Response to the RTI&lt;br /&gt;&lt;/h2&gt;
&lt;h3&gt;Blocked websites&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The eleven websites that the DIT acknowledges are blocked in India are:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.zone-h.org"&gt;http://www.zone-h.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://donotdial100.webs.com"&gt;http://donotdial100.webs.com&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;http://www.bloggernews.net/124029&lt;/a&gt; [&lt;strong&gt;accessible from Tata DSL, but not from others like Reliance Broadband and BSNL Broadband&lt;/strong&gt;]&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.google.co.in/#h1=en&amp;amp;source=hp&amp;amp;biw=1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=g10&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp;gs_rfai=&amp;amp;fp=e791fe993fa412ba"&gt;http://www.google.co.in/#h1=en&amp;amp;source=hp&amp;amp;biw=1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=g10&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp;gs_rfai=&amp;amp;fp=e791fe993fa412ba&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.cinemahd.net/desktop-enhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html"&gt;http://www.cinemahd.net/desktop-enhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.chakpak.com/find/images/kamasutra-hindi-movie"&gt;http://www.chakpak.com/find/images/kamasutra-hindi-movie&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html"&gt;http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html"&gt;http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.facebook.com/pages/l-Hate-Ambedkar/172025102828076"&gt;http://www.facebook.com/pages/l-Hate-Ambedkar/172025102828076&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.indybay.org"&gt;http://www.indybay.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://arizona.indymedia.org"&gt;http://arizona.indymedia.org&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Of the eleven blocked websites, one was still accessible on a Tata Communications DSL connection.&amp;nbsp; Two of the blocked websites are grassroots news organizations connected to the Independent Media Centre: IndyBay (San Francisco Bay Area IMC) and the Arizona Indymedia website.&amp;nbsp; The Bloggernews.net page that is on the blocked list is in fact an article by N. Vijayashankar (Naavi) from March 12, 2010 titled "Is E2 labs right in getting zone-h.org blocked?", criticising the judicial blocking of Zone-H.org by E2 Labs (with E2 Labs being represented by lawyer Pawan Duggal).&amp;nbsp; The Zone-H.org case is still going through the judicial motions in the District Court of Delhi, but E2 Labs managed to&amp;nbsp; get an &lt;a class="external-link" href="http://www.naavi.org/cl_editorial_10/e2labs_zoneh_org.pdf"&gt;&lt;em&gt;ex parte&lt;/em&gt; (i.e., without Zone-H being heard) interim order from the judge&lt;/a&gt; asking Designated Officer (Mr. Gulshan Rai of DIT) to block access to Zone-H.org.&lt;/p&gt;
&lt;p&gt;As has happened in the past, the government (or the court) &lt;a class="external-link" href="http://support.webs.com/webs/topics/india_problems_seeing_your_site_read_this_first"&gt;accidentally ordered the blocking of all of website host webs.com&lt;/a&gt;, instead of blocking only http://donotdial100.webs.com (which subdomain apparently hosted &lt;a class="external-link" href="http://www.dnaindia.com/mumbai/report_police-still-to-shut-down-fake-account-maligning-force_1419951"&gt;'defamatory' and 'abusive' information about mafia links within the Maharashtra police and political circles&lt;/a&gt;).&lt;/p&gt;
&lt;p&gt;It is interesting to note that for most of the websites on most ISPs one gets a 'request timed out' error 
while trying to access the blocked websites, and not a sign saying: 
"site blocked for XYZ reason on request dated DD-MM-YYYY received from the DIT".&amp;nbsp; On Reliance broadband connections, for some of the above websites an error message appears, which states: "This site has been blocked as per instructions from Department of Telecom".&lt;/p&gt;
&lt;h3&gt;Judicial blocking&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;As per the response of the government, all eleven seem to have been blocked on orders received from the judiciary.&amp;nbsp; While they don't state this directly, this is the conclusion one is led to since the Department admits to blocking eleven websites and also notes that there have been eleven requests for blocking from the judiciary.&amp;nbsp; Normally the judiciary is often thought of as a check on the executive's penchant for banning (seen especially in the recent book banning cases in Maharashtra, for instance, where the Bombay High Court has overturned most of the government's banning orders).&amp;nbsp; However, in these cases the ill-informed lower judiciary seem to be manipulated by lawyers to suppress freedom of speech and expression, even going to the extent of blocking grassroots activist news organizations like the Independent Media Centre.&lt;/p&gt;
&lt;h3&gt;Websites not blocked by DIT&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The DIT also notes that the blocks on Typepad.com was not authorized by it (nor, according to the RTI response received by Nikhil Pahwa of Medianama was the &lt;a class="external-link" href="http://www.medianama.com/2011/04/223-indiablocks-indias-it-depts-response-to-our-rti-request-our-stand/"&gt;Mobango.com block authorised by the DIT&lt;/a&gt;).&amp;nbsp; Typepad.com, Mobango.com, and Clickatell.com don't seem to be blocked currently.&amp;nbsp; However, &lt;a class="external-link" href="http://www.medianama.com/2011/03/223-indian-government-blocks-typepad-mobango-clickatell/"&gt;as was reported by Medianama&lt;/a&gt;, for a while when they were being blocked, some sites and ISPs (such as Typepad.com on Bharti Airtel DSL) showed a message stating that the website was blocked on request from the Department of Telecom, which we don't believe has the authority to order blocking of websites.&amp;nbsp; While we still await a response from the Department of Telecom to the RTI we filed with them on this topic, in a letter to the Hindu, &lt;a class="external-link" href="http://www.thehindu.com/news/national/article1574444.ece"&gt;the Department of Telecom has clarified&lt;/a&gt; that it did not order any block on Typepad.com or any of the other websites.&amp;nbsp; This leaves us unsure as to who ordered these blocks.&amp;nbsp; Further, it points out a lacuna in our information policy that ISPs can &lt;em&gt;suo motu&lt;/em&gt; block websites without justifications (such as violation of terms of use), proper notice to customers, or any kind of repercussions for wrongful blocking.&lt;/p&gt;
&lt;h3&gt;Insufficient information on Committee for Examination of Requests&lt;/h3&gt;
&lt;p&gt;All requests for websites blocking (except those directly from the judiciary) must be vetted by the Committee for Examination of Requests (CER) under Rule 8(4) of the Rules under s.69A of the IT Act.&amp;nbsp; Given that the DIT admits that the Designated Officer (who carries out the blocking) has received 21 requests to date, there should be at least 21 recommendations of the CER.&amp;nbsp; However, the DIT has not provided us with the details of those 21 requests and the 21 recommendations.&amp;nbsp; We are filing another RTI to uncover this information.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Text of the DIT's Response&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Government of India &lt;br /&gt;Ministry of Communications &amp;amp; Information Technology &lt;br /&gt;Department of Information Technology &lt;br /&gt;Electronics Niketan, 6 CGO Complex, &lt;br /&gt;New Delhi-110003&lt;br /&gt;&amp;nbsp;&lt;br /&gt;No : 14(3)/2011-ESD&lt;br /&gt;&lt;br /&gt;Shri Pranesh Prakash &lt;br /&gt;Centre for Internet and Society &lt;br /&gt;194, 2-C Cross, &lt;br /&gt;Domulur Stage II, &lt;br /&gt;Bangalore- 560071.&lt;br /&gt;&lt;br /&gt;Subject: Request for information under RTI Act,&lt;br /&gt;&lt;br /&gt;Sir,&lt;br /&gt;Reference your request dated 28lh February 2011 on the above subject.&lt;br /&gt;The point wise information as received from the custodian of Information is enclosed for your reference and records.&lt;br /&gt;&lt;br /&gt;sd/-&lt;br /&gt;(A.K.Kaushik) &lt;br /&gt;Additional Director &amp;amp; CPIO &lt;br /&gt;Tel: 011-24364803&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Subject : RTI on website blocking requested by Shri Pranesh Prakash&lt;/p&gt;
&lt;blockquote&gt;(i) Did the Department order Airtel to block TypePad under S.69A of the Information Technology Act ("IT Act"), 2000 read with the Information Technology (Procedures and Safeguards for Blocking Access of Information by Public) Rules, 2009 ("Rules") or any other law for the time being in force? If so, please provide a copy of such order or orders. If not, what action, if at all, has been taken by the Department against Airtel for blocking of websites in contravention of S.69A of the IT Act?&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply &lt;/strong&gt;- This Department did not order Airtel to block the said site.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(ii) Has the Department ever ordered a block under s.69A of the IT Act? If so, what was the information that was ordered to be blocked?&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The Department has issued directions for blocking under section 69A for the following websites:&lt;br /&gt;(a) www.zone-h.org.&lt;br /&gt;(b) http://donotdial100.webs.com (IP 216.52.115.50)&lt;br /&gt;(c) www.bloggernews.net/124029&lt;br /&gt;(d) http://www.google.co.in/#h 1 =en&amp;amp;source=hp&amp;amp; biw=1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+ wallpaper&amp;amp;aq=4&amp;amp;aqi=g10&amp;amp;aql =&amp;amp;oq=dr+ babas&amp;amp; gs_rfai=&amp;amp;fp=e791 fe993fa412ba&lt;br /&gt;(e) http://www.cinemahd.net/desktop-enhancements/wallpaper/23945- wallpapers-beautiful-girl-wallpaper.html&lt;br /&gt;(f) http://www.chakpak.com/find/images/ kamasutra-hindi-movie&lt;br /&gt;(g) http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged- to.html&lt;br /&gt;(h) http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta- wardrobe.html.&lt;br /&gt;(i) http://www.facebook.com/pages/l-Hate-Ambedkar/172025102828076&lt;br /&gt;(j) www.indybay.org&lt;br /&gt;(k) www.arizona.indymedia.org&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(iii) How many requests for blocking of information has the Designated Officer received, and how many of those requests have been accepted and how many rejected? How many of those requests were for emergency blocking under Rule 9 of the Rules?&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Designated Officer received 21 request for blocking of information. 11 websites have been blocked on the basis of orders received from court of law. One request has been rejected. For other requests, additional input/information has been sought from the Nodal Officer.&lt;br /&gt;&lt;br /&gt;No request for emergency blocking under rule 9 of the Rules have been received.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(iv) Please provide use the present composition of the Committee for Examination of Requests constituted under Rule 7 of the Rules.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The present composition of the Committee is :&lt;br /&gt;(a) Designated Officer (Group Coordinator - Cyber Law)&lt;br /&gt;(b) Joint Secretary, Ministry of Home Affairs&lt;br /&gt;(c) Joint Secretary, Ministry of Information and Broadcasting&lt;br /&gt;(d) Additional Secretary and Ministry of Law &amp;amp; Justice&lt;br /&gt;(e) Senior Director, Indian Computer Emergency Response Team&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(v) Please provide us the dates and copies of the minutes of all meetings held by the Committee for Examination of Requests under Rule 8(4) of the Rules, and copies of their recommendations.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The Committee had met on 24-08-2010 with respect to request for blocking of website www.betfair.com.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;blockquote&gt;(vi) Please provide us the present composition of the Review Committee constituted under rule 419A of the Indian Telegraph Rules, 1951.&lt;br /&gt;(vii) Please provide us the dates and copies of the minutes of all meetings held by the Review Committee under Rule 14 of the Rules, and copies of all orders issued by the Review Committee.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Reply&lt;/strong&gt; - This Department do not have details for above. The said information may be available with Department of Telecommunications.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-response-dit-blocking'&gt;https://cis-india.org/internet-governance/blog/rti-response-dit-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-08-02T07:13:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/open-call">
    <title>Digital Natives Workshop in Taipei: Only a Few Seats Left!!!</title>
    <link>https://cis-india.org/digital-natives/blog/open-call</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society in collaboration with the Frontier Foundation is holding a three day Digital Natives workshop in Taipei from 16 to 18 August, 2010. The three day workshop will serve as an ideal platform for the young users of technology to share their knowledge and experience of the digital and Internet world and help them learn from each other’s individual experiences.&lt;/b&gt;
        
&lt;p&gt;Everybody has a story to tell, and with the Internet, it is possible to tell the story and be heard. Young people around the world use digital technologies to find a voice, an expression, a creative output and a space for dialogue. Gone are the days when the young were only to be seen and not heard. In the Web 2.0 world, the young are seen, heard and are making a dramatic change in the world that we live in.&lt;/p&gt;
&lt;p&gt;As Internet and digital technologies become more widespread, the world is shrinking, time is replaced by Internet time, we are constantly connected and intricately linked to our contexts, our people, our cultures and our networks. And you, yes YOU are a part of this change. In fact, as &lt;a class="external-link" href="http://www.youtube.com/watch?v=Cz4KoL3jzi0"&gt;Digital Natives&lt;/a&gt; – people who have found technologies as central to their lives – you are directly affecting the lives of many, sometimes even without knowing about it.&lt;/p&gt;
&lt;h3&gt;An Open Call for Participation&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;The Centre for Internet and Society (Bangalore, India) in collaboration with the Frontier Foundation (Taipei, Taiwan) are calling out to young technology users to share stories about how they have tried to change things around them with the use of digital and Internet technologies. Conversely, if you feel that the presence of these technologies has significantly changed you in some way, we want to hear about that too! These can be stories where you have made a significant impact by initiating campaigns or movements for a particular cause, stories where you have used technologies to cope with problems in your personal and social life through your online persona in the virtual World Wide Web or stories where a small blog you started, or a facebook group you created, or a plurk network that you started, or a discussion group that you participated in, led to a change that has a story to tell.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The three day workshop will select 20 participants from all around Asia and in the Middle East to come and share these stories, to interact with facilitators and scholars who have worked in different countries and areas, and to form a network of collaboration and support. We will give your stories a face, a voice and a platform where they can be heard in your own voice, in your own style and in your own formats. Participants can fill in an application form (as given below) and forward it to digitalnatives@cis-india.org by 15th July 2010.&lt;/p&gt;
&lt;p&gt;Simultaneously a website will also be hosted online where the Digital Natives will contribute to the content. Selected participants will be encouraged to document in it. Expenses relevant to the project will be granted to the selected participants.&lt;/p&gt;
&lt;h3&gt;Application Form&lt;br /&gt;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Name:&lt;/li&gt;&lt;li&gt;Gender:&lt;/li&gt;&lt;li&gt;Age:&lt;/li&gt;&lt;li&gt;Primary language of communication:&lt;/li&gt;&lt;li&gt;Other languages you can read and write:&lt;/li&gt;&lt;li&gt;Email:&lt;/li&gt;&lt;li&gt;Postal address:&lt;/li&gt;&lt;li&gt;Describe your Internet related experience / initiative(s) in 300 words. Furnish with URLs where necessary. Optionally, if images and videos are part of the description, then upload them in a high resolution version to a secure website and provide the URL.&lt;/li&gt;&lt;li&gt;Write in a few sentences about your expectation from the workshop.&lt;/li&gt;&lt;li&gt;I declare that the above information is true to the best of my knowledge.&lt;/li&gt;&lt;li&gt;I agree that Digital Natives will use the material I have provided for public use.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;
Please note that the information you provide will be kept for purposes 
of the Digital Natives project. Materials which you submit will be used 
for reporting to sponsors and for public use relevant to the project.&lt;/p&gt;
&lt;p&gt;Dates: 16, 17 and 18 August, 2010&lt;br /&gt;Venue: Taipei (Taiwan)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/open-call'&gt;https://cis-india.org/digital-natives/blog/open-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2011-08-04T10:29:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
