<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 91 to 105.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/enabling-elections"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/train-the-trainer-program"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/spy-files-three"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation">
    <title>The Embodiment of the Right to Privacy within Domestic Legislation</title>
    <link>https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation</link>
    <description>
        &lt;b&gt;The Right to Privacy is a pivotal construct, essential to the actualization of justice, fairness and equity within any democratic society. It is an instrument used to secure the boundaries of an individual’s personal space, in his interaction with not only the rest of society but also the State. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is within this realm of the social transaction that there exists an unending conflict between the Right to Privacy of an individual and the overbearing hand of the State as a facilitator of public interest. This right thus acts as a safety valve providing individuals with a sacred space within which their interactions in their personal capacity have no bearing on their conduct in the public sphere. The preservation of this space is incredibly important in order to ensure a willingness of individuals to engage and cooperate with the State in its fulfillment of public welfare measures that would otherwise be deemed as intrusive. It is in this regard that the Right to Privacy, one of the last sustaining rights that an individual holds against a larger State interest, ought to be protected by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are numerous dimensions to the idea of the Right to Privacy. These include but are not limited to the privacy of person, privacy of communication, personal privacy, transactional privacy, privacy of information and the privacy of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court of India has come to the rescue of individuals, time and again by construing "Right to Privacy" as an extension of the Fundamental Right to “Protection of Life and Personal liberty” under Article 21 of the Constitution. This has been reflected in the adjudicatory jurisprudence of the Constitutional courts in the country. However, there exists no Constitutional remedy to redress the breach of privacy by a nongovernmental actor, except under tortuous liability. The power and authority of public and private institutions to use an individual’s personal data for larger interests of national security or effectuation of socio-economic policies is still under extensive scrutiny. It is in this regard that we have compiled a number of sectoral legislations, regulating domains ranging from Finance and Telecom to Healthcare, Freedom of Expression, Consumer rights and Procedural codes. The highlighted provisions under each Act pertain to the mechanisms embodied within the legislation for the regulation of privacy within their respective sectors. Through this we aim to determine the threshold for permissible collection of confidential data and regulatory surveillance, provided a sufficient need for the same has been established. The determination of such a threshold is imperative to formulating a consistent and effective regime of privacy protection in India.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Click to download the below resources:&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Legislations&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/master-circulars.zip" class="external-link"&gt;Master Circulars&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/finance-and-privacy.zip" class="external-link"&gt;Finance and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cpc-crpc.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-expression.zip" class="external-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-and-privacy.zip" class="internal-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-and-privacy.zip" class="internal-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection-privacy.zip" class="external-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-and-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/healthcare.zip" class="external-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-chapters.zip" class="external-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Laws&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/code-of-civil-procedure.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-expression.zip" class="internal-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-cases.zip" class="external-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-cases.zip" class="external-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection.zip" class="internal-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/health-care.zip" class="internal-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-cases.zip" class="internal-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation'&gt;https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-08T02:37:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/enabling-elections">
    <title>Enabling Elections</title>
    <link>https://cis-india.org/accessibility/blog/enabling-elections</link>
    <description>
        &lt;b&gt;For making the 2014 General Elections in India participatory and accessible for voters with disabilities the Centre for Law and Policy Research and the Centre for Internet and Society have come up with a report. The report addresses the barriers that people with disabilities face during elections and recommends solutions for the same.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Executive Summary&lt;/h2&gt;
&lt;p&gt;The report examines three main areas:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The barriers that people with disabilities face at the time of elections.&lt;/li&gt;
&lt;li&gt;The legal framework around this issue.&lt;/li&gt;
&lt;li&gt;The measures which need to be taken to eliminate the barriers in the pre-voting phase, during voting phase and also post-voting phase, so as to enhance the participation of voters with disabilities.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Access to the public sphere and full political participation is a matter of right for persons with disabilities and the state is constitutionally mandated to enforce this right. The rights of voters with disabilities are examined under the constitutional provisions, the Representation of People’s Act 1951, the relevant directions of the Supreme Court and the international conventions. This report also considers international best practices while making recommendations, to the extent that they are suitable and practical in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report looks at Electoral Participation in two dimensions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;“Pre-electoral Participation” and&lt;/li&gt;
&lt;li&gt;“Actual Electoral Participation”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The report then goes on to make recommendations for enhancing accessibility in both these categories.&lt;/p&gt;
&lt;p&gt;On Pre-electoral Participation, the report inter alia recommends the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Opportunities for people with disabilities to participate in public consultations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Immediate outreach programs for higher voter registrations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Making election material and candidate guides available in different formats such as large print, Braille and audio formats upon request so that voters can have full knowledge of the candidate they want to vote for.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Providing information for voters about locations which have special access, wheelchair facilities, technological assistance for visually impaired, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;On Actual Electoral Participation, we inter alia recommend the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Accessible polling sites.&lt;/li&gt;
&lt;li&gt;Training election staff to be sensitive to diverse needs of voters.&lt;/li&gt;
&lt;li&gt;Enabling privacy and independent voting by persons with disabilities.&lt;/li&gt;
&lt;li&gt;Arranging for mobile polling booths.&lt;/li&gt;
&lt;li&gt;Making EVM’s compatible and accessible such as by providing for Braille, large print.&lt;/li&gt;
&lt;li&gt;Tactile buttons, 'sip and puff' and audio devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The report also recommends the need to monitor participation of voters with disabilities in the forthcoming elections.There is a need to collect data, surveys and studies in the pre-election, election and post-election phases.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/accessibility/blog/enabling-elections.pdf" class="internal-link"&gt;Click here&lt;/a&gt; to download and read the full report (PDF, 4.5 MB)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/enabling-elections'&gt;https://cis-india.org/accessibility/blog/enabling-elections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-05-10T00:12:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune">
    <title>Institute for Internet &amp; Society 2014, Pune</title>
    <link>https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune</link>
    <description>
        &lt;b&gt;Last month, activists, journalists, researchers, and members of civil society came together at the 2014 Institute for Internet &amp; Society in Pune, which was hosted by CIS and funded by the Ford Foundation. The Institute was a week long, in which participants heard from speakers from various backgrounds on issues arising out of the intersection of internet and society, such as intellectual property, freedom of expression, and accessibility, to name a few. Below is an official reporting summarizing sessions that took place.&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;iframe frameborder="0" height="500" src="http://www.slideflickr.com/iframe/J3JYk2bm" width="700"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;Day One&lt;/h1&gt;
&lt;p&gt;February 11, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 9.40 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction: Sunil Abraham, &lt;i&gt;Executive Director Centre for Internet and Society&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00 a.m. – 10.15 a.m.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction of Participants&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.15 a.m. – 12.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Internet Governance and Privacy: Sunil Abraham&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.00 p.m. – 12.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.30 p.m. – 1.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Keynote: Bishakha Datta, &lt;i&gt;Filmmaker and Activist, and Board Member, Wikimedia Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.00 p.m. – 2.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Participant Presentations&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea Break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Histories, Bodies and Debates around the Internet:   Nishant Shah, &lt;i&gt;Director-Research, CIS&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This year’s Internet Institute, hosted by the Centre for Internet &amp;amp; Society (CIS), kicked off in Pune to put a start to a week of learnings and discussions surrounding internet usage and its implications on individuals of society. Twenty two attendees from all over India attended this year, from backgrounds of activism, journalism, research and advocacy work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Attendees were welcomed by&lt;b&gt; Dr. Ravina Aggarwal&lt;/b&gt;, Program Officer for Media Rights &amp;amp; Access at the Ford Foundation, the event’s sponsor, who started off the day by introducing the Foundation’s initiatives in pursuit of bridging the digital divide by addressing issues of internet connectivity.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DSC_0050.JPG/image_preview" title="Pune_Sunil" height="243" width="367" alt="Pune_Sunil" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Governance &amp;amp; Privacy&lt;/b&gt;, Sunil Abraham &lt;br /&gt;The Institute’s first session was led by &lt;b&gt;Sunil Abraham&lt;/b&gt;,  Executive Director of CIS, and engaged with issues of internet  governance and privacy with reference to four stories: 1) a dispute  between tweeters from the US and those in South Africa over the use of  hashtag &lt;a href="http://www.thoughtleader.co.za/khayadlanga/2009/11/05/yesterday-a-short-lived-war-broke-out-between-america-and-south-africa/comment-page-1/"&gt;#thingsdarkiesays&lt;/a&gt;, which is said not to be as racially derogatory as it is in the US; 2) Facebook’s contested policies on &lt;a href="http://www.zdnet.com/blog/facebook/facebook-clarifies-breastfeeding-photo-policy/8791"&gt;photos featuring users breastfeeding&lt;/a&gt;, 3) a lawsuit between &lt;a href="http://www.theguardian.com/environment/2010/jul/26/tata-sue-greenpeace-turtle-game"&gt;Tata and Greenpeace&lt;/a&gt; over the organization’s use of Tata’s logo in a video game created for  public criticism of their environmentally-degrading practices, and  lastly, 4) the case of &lt;a href="http://en.wikipedia.org/wiki/Savita_Bhabhi"&gt;Savita Bhabhi&lt;/a&gt;,  an Indian pornographic cartoon character which had been banned by  India’s High Court and which had served as a landmark case in expanding  the statutory laws for what is considered to be pornographic.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Each of these stories has one major thing in common: due to their nature of taking place over the internet, they are not confined to one geographic location and in turn, are addressed at the international level. The way by which an issue as such is to be addressed cuts across State policies and internet intermediary bodies to create quite a messy case in trying to determine who is at fault. Such complexity illustrates how challenging internet governance can be within today’s society that is no longer restricted to national or geographic boundaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil also goes on in explaining the relationship between privacy, transparency, and power, summing it up in a simple formula; &lt;b&gt;privacy protection s&lt;/b&gt;hould have a &lt;i&gt;reverse&lt;/i&gt; relationship to &lt;b&gt;power&lt;/b&gt;—the more the power, the less the privacy one should be entitled to. On the contrary, a &lt;i&gt;direct correlation&lt;/i&gt; goes for &lt;b&gt;power&lt;/b&gt; and &lt;b&gt;transparency&lt;/b&gt;—the more the power, the more transparent a body should be. Instead of thinking about these concepts as a dichotomy, Sunil suggests to see them as absolute rights in themselves—instrumental in policies and necessary to address power imbalances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Web We Want&lt;/b&gt;, Bishakha Datta&lt;br /&gt;The Institute’s kickoff was also joined by Indian filmmaker and activist, &lt;b&gt;Bishakha Datta&lt;/b&gt;, who had delivered the keynote address. Bishakha bridged together notions of freedom of speech, surveillance, and accessibility, while introducing campaigns that work to create an open and universally accessible web, such as the &lt;a href="https://webwewant.org/"&gt;Web We Want&lt;/a&gt; and &lt;a href="http://www.sexualityanddisability.org/"&gt;Sexuality and Disability&lt;/a&gt;. Bishakha stresses how the internet as a space has altered how we experience societal constructs, which can be easily exhibited in how individuals experience Facebook in the occurrence of a death, for example. Bishakha initiated discussion among participants by posing questions such as, “what is our expectation of privacy in this brave new world?” and “what is the society we want?” to encompass the need to think of privacy in a new way with the coming of the endless possibilities the internet brings with it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Histories, Bodies and Debates around the Internet&lt;/b&gt;, Nishant Shah&lt;br /&gt;CIS Research Director, &lt;b&gt;Nishant Shah&lt;/b&gt;, led a session examining internet as a technology more broadly, and our understandings of it in relation to the human body. Nishant proposes the idea that history is a form of technology, as well as time, itself, for which our understanding only comes into being with the aid of technologies of measurement. Although we are inclined to separate technology from the self, Nishant challenges this notion while suggesting that technology is very integral to being human, and defines a “cyborg” as someone who is very intimate with technology. In this way, we are all cyborgs. While making reference to several literary pieces, including Haraway’s &lt;i&gt;Cyborg: Human, Animus, Technology&lt;/i&gt;; Kevin Warwick’s &lt;i&gt;Living Cyborg&lt;/i&gt;; and Watt’s small world theory, Nishant challenges participants’ previous notions of how one is to understand technology in relation to oneself, as well as the networks we find ourselves implicated within.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also brought forth by Nishant, was the fact that the internet as a technology has become integral to our identities, making &lt;i&gt;us&lt;/i&gt; accessible (rather than us solely making the technology accessible) through online forms of documentation. This digital phenomenon in which we tend to document what we know and experience as a means of legitimizing it can be summed in the modern version of an old fable: “If a tree falls in a lonely forest, and nobody tweets it, has it fallen?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant refers to several case studies in which the use of online technologies has created a sense of an extension of the self and one’s personal space; which can then be subject to violation as one can be in the physical form, and to the same emotional and psychological effect—as illustrated within the 1993 occurrence referred to as “&lt;a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace"&gt;A Rape in Cyberspace&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Attendee Participation&lt;/b&gt;&lt;br /&gt;Participants remained engaged and enthusiastic for the duration of the day, bringing forth their personal expertise and experiences. Several participants presented their own research initiatives, which looked at issues women face as journalists and as portrayed by the media; amateur pornography without the consent of the woman; study findings on the understandings of symptoms of internet addiction; as well as studies looking at how students engage with college confession pages on Facebook.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Two&lt;/h1&gt;
&lt;p&gt;February 12, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wireless Technology: Ravikiran Annaswamy, &lt;i&gt;CEO and Co-founder at Teritree   Technologies&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wired Technology: Ravikiran Annaswamy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Network, Threats and Securing Yourself: Kingsley   John, &lt;i&gt;Independent Consultant&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea Break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Practical Lab: Kingsley John&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;4.45 p.m. – 5.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wrap-up: Sunil Abraham&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Day Two of the Institute entailed a  more technical orientation to “internet &amp;amp; society” across sessions.  Participants listened to speakers introduce concepts related to wired  and wireless internet connectivity devices and their networks, along  with the network of internet users and how one may secure him or herself  while “online.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wireless &amp;amp; Wired Technology&lt;/b&gt;, Ravikiran Annaswamy&lt;br /&gt;Senior industry practitioner, &lt;b&gt;Ravikiran Annaswamy&lt;/b&gt; had aimed to enable the Institute’s participants to “understand the  depth and omnipresent of telecom networks” that we find ourselves  implicated within. Ravikiran went through the basics of these  networks—including fixed line-, mobile-, IP-, and Next Generation  IP-networks—as well as the technical structuring of wired and wireless  broadband. Many participants found this session to be particularly  enriching as their projects aimed to provide increased access to  internet connectivity to marginalized areas in India, and had been  without the know-how to go about it.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/5.JPG/image_preview" alt="Pune_Participants" class="image-inline image-inline" title="Pune_Participants" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Network, Threats and Securing Yourself&lt;/b&gt;, Kinglsey John&lt;br /&gt;An instructional session on how to protect oneself was given by &lt;b&gt;Kingsley John&lt;/b&gt;, beginning with a lesson on IP Addresses—what they are and the different generations of such, and how IP addresses fit into a broader internet network. Following, Kingsley demonstrated and explained &lt;a href="http://www.slideshare.net/lupucosmin/encrypting-emails-using-kleopatra-pgp"&gt;email encryption through the use of software, Kleopatra&lt;/a&gt;, and how it may be used to generate keys to &lt;a href="http://thehackernews.com/2014/01/PGP-encryption-Thunderbird-Enigmail_12.html"&gt;encrypt emails through Thunderbird mail client&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Evening Discussion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A handful of participants voluntarily partook in an evening discussion, looking at the role of big players in the global internet network, such as Google and Facebook, how they collect and utilize users’ data, and what sorts of measures can be taken to minimize the collecting of such. Due to the widely varying backgrounds of interest among participants, those coming from this technical orientation towards the internet were able to inform their peers on relevant information and types of software that may be found useful related to minimizing one’s online presence.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Three&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;February 13, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.30 a.m. –   11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Free Software: Prof. G. Nagarjuna, &lt;i&gt;Chairperson, Free Software Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00 a.m. –   11.15 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Open Data: Nisha Thompson, &lt;i&gt;Independent Consultant&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.45 p.m. –   1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Freedom of Expression: Bhairav Acharya, &lt;i&gt;Advocate and Adviser, Centre for Internet   and Society&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Copyright: Nehaa Chaudhari, &lt;i&gt;Program Officer, Centre for Internet and Society&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The third day of the Internet Institute incorporated themes presented by speakers ranging from free software, to freedom of expression, to copyright.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Free Software&lt;/b&gt;, Prof. G. Nagarjuna&lt;br /&gt;Chairman on the Board of Directors for the Free Software Foundation of India, &lt;b&gt;Professor G. Nagarjuna&lt;/b&gt; shared with the Institute’s participants his personal expertise on &lt;b&gt;software freedom&lt;/b&gt;. Nagarjuna mapped for us the network of concepts related to software freedom, beginning with the origins of the &lt;b&gt;copyleft movement&lt;/b&gt;, and also touching upon the art of hacking, the &lt;b&gt;open source movement&lt;/b&gt;, and what role software freedom plays in an interconnected world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nagarjuna looks at the free software movement as a political movement in the digital space highlighting the &lt;a href="http://www.gnu.org/philosophy/free-sw.html"&gt;user’s freedoms&lt;/a&gt; associated to the use, distribution, and modification of software for the greater good for all. This is said to distinguish this movement from that of Open Source—a technical and more practical development-oriented movement. The free software movement is not set out to compromise the fundamental issues for the sake of being practical and in that sense, ubiquitous. Instead, its objective is “not to make everybody &lt;i&gt;use&lt;/i&gt; the software, but to have them understand &lt;i&gt;why&lt;/i&gt; they are using the software,” so that they may become “authentic citizens that can also resonate &lt;i&gt;why &lt;/i&gt;they’re doing what they’re doing. We want them to understand the ethical and political aspects of doing so,” Nagarjuna says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Data&lt;/b&gt;, Nisha Thompson&lt;br /&gt;Participants learned from &lt;b&gt;Nisha Thompson&lt;/b&gt; on Open Data; what it is, its benefits, and how it is involved in central government initiatives and policy, as well as civil society groups—generally for uses such as serving as evidence for decision making and accountability. Nisha explored challenges concerning the use of open data, such as those pertaining to privacy, legitimacy, copyright, and interoperability. The group looked at the &lt;a href="http://www.indiawaterportal.org/"&gt;India Water Portal&lt;/a&gt; as a case study, which makes accessible more than 300 water-related datasets already available in the public space for use from anything from sanitation and agriculture to climate change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Freedom of Expression&lt;/b&gt;, Bhairav Acharya&lt;br /&gt;&lt;b&gt;Bhairav Acharya&lt;/b&gt;, a constitutional lawyer, traced the development of the freedom of speech and expression in India. Beginning with a conceptual understanding of censorship and the practice of censorship by the state, society, and the individual herself, Bhairav examines the limits traditionally placed by a nation-state on the right to free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, modern free speech and censorship law was first formulated by the colonial British government, which broadly imported the common law to India. However, the colonial state also yielded to the religious and communitarian sensitivities of its subjects, resulting in a continuing close link between communalism and free speech in India today. After Independence, the post-colonial Indian state carried forward Raj censorship, but tweaked it to serve to a nation-building and developmental agenda. Nation-building and nationalism are centrifugal forces that attempt to construct a homogenous 'mainstream'; voices from the margins of this mainstream (the geographical, ethnic, and religious peripheries) and of the marginalised within the mainstream (the poor and disadvantaged), are censored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this narrative, Bhairav located and explained the evolution of the law relating to press censorship, defamation, obscenity, and contempt of court. Free speech law applies equally online. Broadly, censorship on the internet must survive the same constitutional scrutiny that is applied to offline censorship; but, as technology develops, the law must innovate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Copyright&lt;/b&gt;, Nehaa Chaudhari&lt;br /&gt;CIS Programme Officer, &lt;b&gt;Nehaa Chaudhari&lt;/b&gt; examined the concept of Copyright as an intellectual property right in discussing its fundamentals, purpose and origins, and Copyright’s intersection with the internet. Nehaa also explained the different exceptions to Copyright, along with its alternatives, such as opposing intellectual property protection regimes, including the Creative Commons and Copyleft. Within this session, Nehaa also introduced several cases in which Copyright came into play with the use of the internet, including Hunter Moore’s “&lt;a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F"&gt;Is Anyone Up&lt;/a&gt;?” website, which had showcased pornographic pictures obtained by submission bringing rise to the phenomenon of “revenge porn.” Instances as such blur the lines of what is commonly referred to as intellectual property, and what specific requirements enables one to own the rights to such.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Four&lt;/h1&gt;
&lt;p&gt;February 14, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;E-Accessibility and Inclusion: Prashant Naik, &lt;i&gt;Union Bank&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Patents: Nehaa Chaudhari&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 2.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fieldwork Assignment&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DSC_0053.JPG/image_preview" alt="Pune_Rohini" class="image-inline" title="Pune_Rohini" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;Day Four of the Internet Institute introduced concepts of  eAccessibilty and Inclusion on the internet for persons with  disabilities, along with patents as an intellectual property right.  Participants were also assigned a fieldwork exercise as a hands-on  activity in which they were to employ what they’ve learned to initiate  conversation with individuals in public spaces and collect primary data  while doing so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;eAccessibility and Inclusion&lt;/b&gt;, Prashant Naik&lt;/p&gt;
&lt;b&gt;Prashant Naik&lt;/b&gt; started off the  day with his session on E-Accessibility and Inclusion. Prashant  illustrated the importance of accessibility and what is meant by the  term. Participants learned of assistive technologies for different  disability types and how to create more accessible word and PDF  documents, as well as web pages for users. Prashant demonstrated to  participants what it is like to use a computer as a visually impaired  individual, which provided for an enriching experience.&lt;/td&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Patents&lt;/b&gt;, Nehaa Chaudhari&lt;b&gt;&lt;br /&gt;Nehaa Chaudhari &lt;/b&gt;led a second session at the Internet Institute on intellectual property rights—this one looking at patents particularly and their role within statutory law. Nehaa traced the historical origins of patents before examining the fundamentals of them, and addresses the questions, “Why have patents? And is the present system working for everyone?” Nehaa also introduced notions of the Commons along with the Anticommons, and perspectives within the debate around software patents, as well as different means by which the law can address the exploitation of patents or “patent thickets”—such as through patent pools or compulsory licensing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Fieldwork Assignment&lt;/b&gt;, Groupwork&lt;br /&gt;Participants were split into groups and required to carry out a mini fieldwork assignment in approaching individuals in varying public spaces in Pune in attempts to collect primary data. Questions asked to individuals were to be devised by the group, so long as they pertained to themes examined within the Internet Institute. Areas visited by groups included the Pune Central Mall, MG Road, and FC Road.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Five&lt;/h1&gt;
&lt;p&gt;February 15, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.30 a.m. –   11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;E-Governance: Manu Srivastav, &lt;i&gt;Vice President, eGovernments Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00 a.m. –   11.15 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Market Concerns: Payal Malik, &lt;i&gt;Economic Adviser, Competition Commission of India&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.45 p.m. –   1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Digital Natives: Nishant Shah&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fieldwork Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Day Five of the Internet Institute  brought with it sessions related to themes of e-governance, market  concerns of telecommunications, and so called “Digital Natives.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;eGovernance&lt;/b&gt;, Manu Srivastava&lt;br /&gt;Vice President of the eGovernments Foundation, &lt;b&gt;Manu Srivastava&lt;/b&gt; led a session on eGovernance—the utilization of the internet as a means  of delivering government services communicating with citizens,  businesses, and members of government. Manu examined the complexities of  the eGovernance and barriers to implementation of eGovernance  initiatives. Within discussion, participants examined the nuanced  relationship between the government and citizens with the incorporation  of other governing bodies in an eGovernance system, as well as new  spaces for corruption to take place.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/19.JPG/image_preview" alt="Pune_Chatting" class="image-inline image-inline" title="Pune_Chatting" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Market Concerns&lt;/b&gt;, Payal Malik&lt;br /&gt;&lt;b&gt;Payal Malik&lt;/b&gt;, Advisor of the Economics Division of the Competition Commission of India shared her knowledge on market concerns of the telecommunications industry, and exclaimed the importance of competition issues in such an industry as a tool to create greater good for a greater number of people. She demonstrated this importance by stating that affordability as a product of increased access can only be possible once there is enough investment, which generally only happens in a competitive market. In this way, we must set the conditions to make competition possible, as a tool to achieve certain objectives. Payal also demonstrated the economic benefits of telecommunications by stating that for every 10% increase in broadband penetration, increase in GDP of 1.3%. She also examined the broadband ecosystem in India and touched upon future possibilities of increased broadband penetration, such as for formers and the education sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Digital Natives&lt;/b&gt;, Nishant Shah&lt;br /&gt;&lt;b&gt;Nishant Shah&lt;/b&gt; shed some light on one of the areas that the Centre for Internet &amp;amp; Society looks at within their research scope, this being the “&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Native&lt;/a&gt;.” As referred to by Nishant, the Digital Native is not to categorize a specific type of internet user, but can be said for simply any person who is performing a digital action, while doing away with this false dichotomy of age, location, and geography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant examines varying case studies in which “the digital is empowering natives to not merely be benefactors of change, but agents of change,” from the &lt;a href="http://blog.blanknoise.org/2012/07/i-never-ask-for-it.html"&gt;Blank Noise Project&lt;/a&gt;’s “I NEVER Ask for it…” campaign in efforts to rethink sexual violence, to &lt;a href="http://www.wherethehellismatt.com/"&gt;Matt Harding&lt;/a&gt;’s foolish dancing with groups of individuals from all over the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As occurrences in the digital realm, however, these often political expressions may be rewritten by the network when picked up as a growing phenomenon, in order to make it accessible to online consumers by the masses. In doing so, the expression is removed from its political context and is presented in the form of nothing more than a fad. For this reason, Nishant stresses the need to become aware of the potential of the internet in becoming an “echo-chamber”—in which forms of expression are amplified and mimicked, resulting in a restructuring of the dynamics surrounding the subject—whether it be videos of &lt;a href="http://en.wikipedia.org/wiki/Back_Dorm_Boys"&gt;boys lipsyncing to Backstreet Boys&lt;/a&gt; in their dorm room going viral, or a strong and malicious movement to punish the Chinese girl who had taken a video of her heinously and wickedly killing a kitten after locating her using the &lt;a href="http://en.wikipedia.org/wiki/Human_flesh_search_engine"&gt;Human Flesh Search Engine&lt;/a&gt;.&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Fieldwork Presentations&lt;/b&gt;, Groupwork&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To end off the day, participant groups presented findings collated from the prior evening’s fieldwork exercise, in which they were to ask strangers in various public places of Pune questions pertaining to themes looked at from within this year’s Institute. Participants were divided into four groups and visited Pune’s FC Road, Mahatma Gandhi Road, and Central Mall.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Groups found that the majority of those interviews primarily accessed the phone via the mobile. There was also a common weariness of using the internet and concern for one’s privacy while doing so, especially with uploading photos to Facebook and online financial transactions. People were also generally concerned about using cyber cafes for fear of one’s accounts being hacked. Generally people suspected that so long as conversations are “private” (i.e. in one’s Facebook inbox), so too are they secure. Just as well, those interviewed shared a sense of security with the use of a password.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Six&lt;/h1&gt;
&lt;p&gt;February 16, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wikipedia: Dr. Abhijeet Safai&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Open Access: Muthu Madhan (TBC)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Case Studies Groupwork&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Case Studies Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;As the Institute came closer to its end, participants got the opportunity to hear from speakers on topics pertaining the Wikipedia editing in addition to Open Access to scholarly literature.  Participants also worked together in groups to examine specific case studies referenced in previous sessions, and then presented their conclusions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wikipedia&lt;/b&gt;, Dr. Abhijeet Safai&lt;br /&gt;The Institute was joined by Medical Officer of Clinical Research at Pune’s Symbiosis Centre of Health Care, &lt;b&gt;Dr. Abhijeet Safai&lt;/b&gt;, who led a session on Wikipedia. Having edited over 3700 Wikipedia articles, Dr. Abhijeet was able to bring forth his expertise and familiarity in editing Wikipedia to participants so that they would be able to do the same. Introduced within this session were Wikipedia’s different fundamental pillars and codes of conducts to be complied with by all contributors, along with different features and components of Wikipedia articles that one should be aware of when contributing, such as how to cite sources and discuss the contents of an article with other contributors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Access&lt;/b&gt;, Muthu Madhan&lt;br /&gt;&lt;b&gt;Muthu Madhan&lt;/b&gt; joined the Internet Institute while speaking on Open Access (OA) to scholarly literature. Within his session, Muthu examined the historical context within which the scholarly journal had arisen and how the idea of Open Access began within this space. The presence of Open Access in India and other developing nations was also examined in this session, and the concept of Open Data, introduced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Case Studies&lt;/b&gt;, Groupworks&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/11.JPG/image_preview" alt="Pune_Group2" class="image-inline image-inline" title="Pune_Group2" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/8.JPG/image_preview" alt="Pune_Group" class="image-inline image-inline" title="Pune_Group" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Participants were split up into groups and assigned particular case studies looked at briefly in previous sessions. Case studies included &lt;a href="http://siditty.blogspot.in/2009/11/things-darkies-say.html"&gt;&lt;i&gt;#thingsdarkiessay&lt;/i&gt;&lt;/a&gt;&lt;i&gt;,&lt;/i&gt; a once trending Twitter hashtag in South Africa which had offended many Americans for its use of “darkie” as a derogatory term; the literary novel, &lt;a href="http://en.wikipedia.org/wiki/The_Hindus:_An_Alternative_History"&gt;&lt;i&gt;The Hindus&lt;/i&gt;&lt;/a&gt;, which offers an alternative narrative of Hindu history had been banned in India for obscenity; a case in which several users’ avatars had been controlled by another in a virtual community and forced to perform sexual acts, referred to as &lt;a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace"&gt;&lt;i&gt;A Rape Happened in Cyber Space&lt;/i&gt;&lt;/a&gt;; and lastly, a pornographic submission website, &lt;a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F"&gt;Is Anyone Up?&lt;/a&gt;, for which content was largely derived from “revenge porn.” Each group then presented on the various perspectives surrounding the issue at hand.&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Cyborg&lt;/b&gt;, Nishant Shah&lt;br /&gt;Nishant Shah led an off-agenda session in the evening looking more closely at the notion of the human cyborg. Nishant deconstructs humanity’s relationship to technology, in suggesting that we “think of the human as &lt;i&gt;produced&lt;/i&gt; with the technologies… not who &lt;i&gt;produces&lt;/i&gt; technology.” Nishant explores the Digital Native as an attained identity for those who, because of technology, restructure and reinvent his or her environment—offline as well as online. Among other ideas shared, Nishant refers to works by Haraway on the human cyborg in illustrating our dependency on technology and our need to care for these technologies we depend on.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Seven&lt;/h1&gt;
&lt;p&gt;February 17, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Internet Activism: Laura Stein, &lt;i&gt;Associate Professor, University of Texas &lt;/i&gt;and &lt;i&gt;Fulbright Fellow&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Domestic and International Bodies: Chinmayi Arun, &lt;i&gt;Research Director&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Participant Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Hot Question Challenge&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The last day of the week-long Internet Institute examined concepts of Internet Activism and Domestic and International Bodies. Some participants led presentations on topics of personal familiarity, before a final wrap-up exercise, calling upon individuals to share any new formulations resulting from the Institute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Activism&lt;/b&gt;, Laura Stein&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/17.JPG/image_preview" alt="Pune_Laura" class="image-inline image-inline" title="Pune_Laura" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Associate Professor from the University of Texas, &lt;b&gt;Laura Stein&lt;/b&gt;,  spoke on activism on the internet. Laura examined some grassroots  organizations and movements taking place on the online and the benefits  that the internet brings in facilitating their impact, such as its  associated low costs, accessibility and possibility for anonymity.  Despite the positive effects catalyzed by the internet, Laura stresses  that the “laying field is still unequal, and movements are not simply  transformed by technology.” Some of the websites exemplifying online  activism that were examined within this session includes the &lt;a href="http://www.itgetsbetter.org/"&gt;It Gets Better Project&lt;/a&gt;, which aims to give hope to LGBT youth facing harassment, and the national election watch by the &lt;a href="http://adrindia.org/"&gt;Association for Democratic Reforms&lt;/a&gt;.  Additionally, Laura spoke on public communication policy, comparing  that of the US and India, and how this area of policy may influence  media content and practice.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Domestic and International Bodies&lt;/b&gt;, Chinmayi Arun&lt;br /&gt;As the Internet Institute’s final speaker, Research Director for Communication Governance at National Law University&lt;i&gt; &lt;/i&gt;,&lt;b&gt; Chinmayi Arun&lt;/b&gt;, explores the network of factors that affect one’s behavior on the internet—these including: social norms, the law, the markets, and architecture. In referring to Lawrence Lessig’s &lt;a href="http://en.wikipedia.org/wiki/Pathetic_dot_theory"&gt;pathetic dot theory&lt;/a&gt;, Chinmayi illustrates how individual’s—the pathetic dots in question—are functions of the interactions of these factors, and in this sense, regulated, and stresses the essential need to understand the system, in order to effectively change the dynamics within it. It is worth noting that not all pathetic dots are equal, and Google’s dot, for example, will be drastically bigger than a single user’s, having more leveraging power within the network of internet bodies. Also demonstrated, is the fact that we must acknowledge the need for regulation by the law to some extent, otherwise, the internet would be a black box where anything goes, putting one’s security at risk of violation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hot Question Challenge&lt;/b&gt;&lt;br /&gt;The very last exercise of the Institute entailed participants asking each other questions on demand, relating back to different themes looked at within the last week. Participants had the chance, here, to bridge together concepts across sessions, as well as formulate their own opinions, while posing questions to others that they, themselves, were still curious about.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/DSC_0371.JPG/image_large" alt="Pune_Everyone" class="image-inline image-inline" title="Pune_Everyone" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune'&gt;https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>samantha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-04-07T11:31:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3">
    <title>Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 3)</title>
    <link>https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3</link>
    <description>
        &lt;b&gt;In a three-part study, Ananth Padmanabhan examines the "John Doe" orders that courts have passed against ISPs, which entertainment companies have used to block dozens, if not hundreds, of websites.  In this, the third and concluding part, he looks at the Indian law in the Copyright Act and the Information Technology Act, and concludes that both those laws restrain courts and private companies from ordering an ISP to block a website for copyright infringement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the third part of his study, Ananth Padmanabhan looks into the fair use provisions recently introduced in respect of mere conduit intermediaries by the Copyright (Amendment) Act, 2012, and concludes that there is no scope for any general, or specific, access blocking orders at the behest of the plaintiff in a civil suit, in India. He also argues that the &lt;a class="external-link" href="http://eprocure.gov.in/cppp/sites/default/files/eproc/itact2000.pdf"&gt;Information Technology Act, 2000&lt;/a&gt; read with the&lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt; Information Technology (Intermediaries Guidelines) Rules, 2011&lt;/a&gt; do not in any manner permit the Government to override the provisions of the &lt;a class="external-link" href="http://www.ircc.iitb.ac.in/webnew/Indian%20Copyright%20Act%201957.html"&gt;Copyright Act, 1957&lt;/a&gt; (as amended) while facilitating the denial of access to websites on grounds of copyright infringement, because the Copyright Act, 1957, is a complete code by itself.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Fair Use Provisions Introduced by the Copyright (Amendment) Act, 2012&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In 2010, the &lt;a href="https://cis-india.org/a2k/blogs/copyright-bill-analysis" class="external-link"&gt;controversial Copyright (Amendment) Bill&lt;/a&gt; came up for deliberation before the Parliamentary Standing Committee on Human Resource Development headed by Mr. &lt;a class="external-link" href="http://archive.india.gov.in/govt/rajyasabhampbiodata.php?mpcode=173"&gt;Oscar Fernandes&lt;/a&gt;. While a major part of the discussion on this amendment revolved around the altered royalty structure and rights allocation between music composers and lyricists on the one hand and film producers on the other, it can be safely stated that this is the most significant amendment to the Copyright Act, 1957 for more than this one reason. The amendment seeks to reform the Copyright Board, bring in a scheme of statutory licenses, expand the scope of performers’ rights and introduce anti-circumvention measures to check copyright piracy. As part of its ambitious objective, the amendment also attempts a new fair use model to protect intermediaries and file-sharing websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Copyright (Amendment) Act, 2012, which gives expression to this fair use model through Sections 52(1)(b) and (c), reads thus:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;52. Certain acts not to be infringement of copyright&lt;/i&gt;&lt;/b&gt;&lt;i&gt;. - (1) The following acts shall not constitute an infringement of copyright, namely:&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(a) to (ad) - *****&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(b) the transient or incidental storage of a work or performance purely in the technical process of electronic transmission or communication to the public;&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(c) transient or incidental storage of a work or performance for the purpose of providing electronic links, access or integration, where such links, access or integration has not been expressly prohibited by the right holder, unless the person responsible is aware or has reasonable grounds for believing that such storage is of an infringing copy:&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Provided that if the person responsible for the storage of the copy has received a written complaint from the owner of copyright in the work, complaining that such transient or incidental storage is an infringement, such person responsible for the storage shall refrain from facilitating such access for a period of twenty-one days or till he receives an order from the competent court refraining from facilitating access and in case no such order is received before the expiry of such period of twenty-one days, he may continue to provide the facility of such access;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From a plain reading, it is clear that two important exceptions are carved out: one, in respect of the technical process of electronic transmission and the other, in respect of providing electronic links, access or integration. The material distinction between these exceptions is the presence of a take-down &lt;i&gt;proviso &lt;/i&gt;in respect of the latter kind of activity, ie. when providing electronic links, access or integration. This window of opportunity is not provided to the copyright owner when the third party is an ISP involved in the pure technical process of electronic transmission of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;R.K. Productions&lt;/i&gt;, the court was not informed of the introduction of these provisions &lt;i&gt;vide&lt;/i&gt; the Copyright (Amendment) Act, 2012, despite the hearing happening on a date subsequent to the amendment coming into force. This probably influenced the outcome as well, since the court held that ISPs were liable to block access to infringing content, once the specific webpage was brought to the notice of the concerned ISP. Newly introduced Section 52(1)(b) however makes it abundantly clear that ISPs cannot, in any manner, be held liable when they are acting as mere conduit pipes for the transmission of information. This legal position is also materially different from jurisdictions such as the United Kingdom where, the ISPs though not liable for copyright infringement, are statutorily mandated to lend all possible assistance such as take-down or blocking of access upon notice of infringement being furnished to them. This dichotomy between liability for infringement on the one hand and a general duty to assist in the prevention of infringement on the other is explained clearly by the Chancery Division in &lt;i&gt;Twentieth Century Fox Film Corporation v. British Telecommunications Plc.&lt;/i&gt;&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Newzbin2&lt;/i&gt;, the Chancery Division took note of the safe harbour provisions created by the E-Commerce Directive,&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;particularly Articles 12 to 14 that dealt with acting as a “mere conduit”, caching and hosting respectively. The interesting feature with the “mere conduit” exception, which in all other respects is akin to the exception contained in Section 52(1)(b) of the Copyright Act, 1957, is the additional presence of Article 12(3). This provision clarifies that the “mere conduit” exception shall not stand in the way of a court or administrative authority requiring the service provider to terminate or prevent an infringement. Article 18 of this Directive also casts an obligation upon Member States to ensure that court actions available under national law permit the rapid adoption of measures, including interim measures, designed to terminate any alleged infringement and to prevent any further impairment of the interests involved. Similarly, the court looked into the Information Society Directive,&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 8(3) of which provides that “Member States shall ensure that rightholders are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe a copyright or related right.” This Directive was transposed into the domestic law in UK by the Copyright and Related Rights Regulations 2003, SI 2003/2498, resulting in the insertion of Section 97A in the Copyright, Designs and Patents Act 1988. This provision empowers the court to grant an injunction against a service provider who has actual knowledge of another person using their service to infringe copyright, such as where the service provider is given sufficient notice of the infringement. Finally, the Chancery Division also took note of the Enforcement Directive,&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 11 of which provided that Member States shall ensure that copyright owners are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe an intellectual property right. This entire legislative scheme compelled the court in &lt;i&gt;Newzbin2&lt;/i&gt; to conclude that an order of injunction could be granted against ISPs who are “mere conduits”, restraining them from providing access to websites that indulged in mass copyright infringement. The court reasoned that the language used in Section 97A did not require knowledge of any particular infringement but only a more general kind of knowledge about certain persons using the ISPs’ services to infringe copyright. Thus, it is seen that in the United Kingdom, though a “mere conduit” activity is not infringement at all, the concerned ISP can be directed by the court to block access to a website that hosts infringing content on the basis of the above legislative scheme. The enquiry should therefore be directed towards whether India has a similar scheme for copyright enforcement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Information Technology Act – An Inapplicable Scheme for Website Blocking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act, 2000&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;read with certain recently framed guidelines provides for a duty that could be thrust upon even “mere conduit” ISPs to disable access to copyrighted works. This is due to the presence of Section 79(2)(c) of this Act, which makes it clear that an intermediary shall be exempt from liability only where the intermediary observes due diligence as well as complies with the other guidelines framed by the Central Government in this behalf. Moreover, Section 79(3) provides that the intermediary shall not be entitled to the benefit of the exemption in Section 79(1) in a situation where the intermediary, upon receiving actual knowledge that any information, data, or communication link residing in or connected to a computer resource controlled by the intermediary is being used to commit an unlawful act, fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner. In pursuance of Section 79(2)(c), the Central Government has also framed the Information Technology (Intermediaries Guidelines) Rules, 2011, which came into effect on 11.04.2011. Rule 4 of these Rules, when read along with Rule 2(d), casts obligation on an intermediary on whose computer system, copyright infringing content has been &lt;i&gt;stored, hosted or published&lt;/i&gt;, to &lt;i&gt;disable&lt;/i&gt; such information within thirty six hours from when it is brought to actual knowledge of the existence of such content by any affected person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One way of understanding and interpreting in harmonious fashion, the provisions of the IT Act and the Rules therein and the recent amendments to the Copyright Act, is to contend that the issue of infringement of copyright by “mere conduit” ISPs is governed by Section 52(1)(b), which completely absolves them of any liability, while that of enforcement of copyright through the medium of such ISPs is governed by the IT Act. This bifurcation suffers from the difficulty that Section 79 of the IT Act is not an enforcement provision. It is a provision meant to exempt intermediaries from certain kinds of liability, in the same way as Section 52 of the Copyright Act. This provision, read with Section 81, makes it clear that the IT Act does not speak to liability for copyright infringement. From this, it has to necessarily follow that all issues pertaining to liability for such infringement have to be decided by the provisions of the Copyright Act. Therefore, the scheme in the IT Act read with the Intermediaries Guidelines Rules cannot confer additional liability for copyright infringement on ISPs where the Copyright Act exempts them from liability. More to the point, the intermediary cannot be liable for copyright infringement in the event of non-compliance with Section 79(3) or Rule 4 of the Intermediaries Guidelines Rules read with Section 79(1)(c) of the IT Act. Rule 4 of the Intermediaries Guidelines Rules, 2011, to the extent that it renders intermediaries outside the protective ambit of Section 79(1) upon failure to disable access to copyrighted content, is of no relevance as “mere conduits” have already been exempted from liability under Section 52(1)(b). Moreover, since these provisions in the IT Act do not deal with enforcement measures such as injunction orders from the court to disable access to infringing content in particular or infringing websites in general, it would be wrong to contend that the scheme in India is similar to the one in the United Kingdom where the issue of infringement has been divorced from that of enforcement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, Section 52(1)(b) is a blanket “mere conduit” exemption from liability for copyright infringement that stands uninfluenced by the presence of Section 79 of the IT Act or the Intermediaries Guidelines Rules. In the absence of a legislative scheme for enforcement in India akin to Section 97A of the UK Copyright, Designs and Patents Act 1988, Indian Courts cannot grant an injunction directing such “mere conduit” ISPs to block access to websites in general or infringing content in particular and any such action is not even maintainable in law post the insertion of Section 52(1)(b). The decision to the contrary in the &lt;i&gt;R.K.Productions &lt;/i&gt;case is incorrect.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. [2011] EWHC 1981 (Ch.). Hereinafter referred to as &lt;i&gt;Newzbin2.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. European Parliament and Council Directive 2000/31/EC on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (8 June 2000). This Directive was transposed into the domestic law in UK by the Electronic Commerce (EC Directive) Regulations 2002, SI 2002/2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. European Parliament and Council Directive 2001/29/EC on the harmonisation of certain aspects of copyright and related rights in the information society (22 May 2001).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. European Parliament and Council Directive 2004/48/EC on the enforcement of intellectual property rights (29 April 2004). This Directive was transposed into the UK domestic law primarily by the Intellectual Property (Enforcement, etc.) Regulations 2006, SI 2006/1028.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Hereinafter referred to as the IT Act.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3'&gt;https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ananth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-02-14T05:13:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2">
    <title>Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 2)</title>
    <link>https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2</link>
    <description>
        &lt;b&gt;In a three-part study, Ananth Padmanabhan examines the "John Doe" orders that courts have passed against ISPs, which entertainment companies have used to block dozens, if not hundreds, of websites.  In this, the second part, he looks at the law laid down by the U.S. Supreme Court and the Delhi High Court on secondary and contributory copyright infringement, and finds that those wouldn't allow Indian courts to grant "John Doe" orders against ISPs.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the second part of his study, Ananth Padmanabhan proceeds to examine applying a general theory of secondary or contributory copyright infringement against ISPs. He traces the basis for holding a third party liable as a contributory by closely examining the decisions of the U.S. Supreme Court in Sony Corp. v Universal City Studios&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;and MGM Studios, Inc. v Grokster, Ltd.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;and concludes that this basis does not hold good in the case of a mere conduit intermediary such as an ISP.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. 464 U.S. 417 (1984). Hereinafter referred to as &lt;i&gt;Betamax&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. 545 U.S. 913 (2005). Hereinafter referred to as &lt;i&gt;Grokster.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Primary and Secondary Infringement&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Liability for copyright infringement can either be primary or secondary in character. In the case of ISPs, liability as primary infringers does not arise at all, and it is in their capacity as conduit pipes facilitating the transmission of information that they could be held secondarily liable. Even in such cases, the contention of copyright owners is that once the ISP is notified of infringing content, it has the primary responsibility of preventing access to such content. This contention is essentially rooted in a theory of secondary infringement based on knowledge and awareness, and the means to prevent further infringement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The controversy around a suitable model of secondary infringement is reflected in two judicial pronouncements – separated by a gap of more than two decades – delivered by the U.S. Supreme Court. In &lt;i&gt;Sony Corp. v Universal City Studios&lt;/i&gt;,[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;] the US Supreme Court held that the manufacturers of home video recording devices known in the market as Betamax would not be liable to copyright owners for secondary infringement since the technology was capable of substantially non-infringing and legitimate purposes. The U.S. Supreme Court even observed that these time-shifting devices would actually enhance television viewership and hence find favour with majority of the copyright holders too. The majority did concede that in an appropriate situation, liability for secondary infringement of copyright could well arise. In the words of the Court, “&lt;i&gt;vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the circumstances in which it is just to hold one individual accountable for the actions of another&lt;/i&gt;”. However, if vicarious liability had to be imposed on the manufactures of the time-shifting devices, it had to rest on the fact that they sold equipment with constructive knowledge of the fact that their customers &lt;i&gt;may&lt;/i&gt; use that equipment to make unauthorized copies of copyrighted material. In the view of the Court, there was no precedent in the law of copyright for the imposition of vicarious liability merely on the showing of such fact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notes of dissent were struck by Justice Blackmun, who wrote an opinion on behalf of himself and three other judges. The learned Judge noted that there was no private use exemption in favour of making of copies of a copyrighted work and hence, unauthorised time-shifting would amount to copyright infringement. He also concluded that there was no fair use in such activity that would exempt it from the purview of infringement. The dissent held the manufacturer liable as a contributory infringer and reasoned that the test for contributory infringement would only be whether the contributory infringer had &lt;i&gt;reason to know or believe &lt;/i&gt;that infringement would take place and &lt;i&gt;not whether he actually knew of the same&lt;/i&gt;. Off-the-air recording was not only a foreseeable use for the Betamax, but also its intended use, for which Sony would be liable for copyright infringement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This dissent has considerably influenced the seemingly contrarian position taken by the majority in the subsequent decision, &lt;i&gt;MGM Studios, Inc. v Grokster, Ltd.&lt;/i&gt;&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; This case called into question the liability of websites that facilitated peer-to-peer (P2P) file-sharing. Re-formulating the test for copyright infringement, the US Supreme Court held that ‘&lt;i&gt;one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties&lt;/i&gt;’. In re-drawing the boundaries of contributory infringement, the Court observed that contributory infringement is committed by any person who intentionally induces or encourages direct infringement, and vicarious infringement is committed by those who profit from direct infringement while declining to exercise their right to limit or stop it. When an article of commerce was good for nothing else but infringement, there was no legitimate public interest in its unlicensed availability and there would be no injustice in presuming or imputing intent to infringe in such cases. This doctrine would at the same time absolve the equivocal conduct of selling an item with substantial lawful as well as unlawful uses and would limit the liability to instances of more acute fault than the mere understanding that some of the products shall be misused, thus ensuring that innovation and commerce are not unreasonably hindered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court distinguished the case at hand from &lt;i&gt;Betamax&lt;/i&gt;, and noted that there was evidence here of active steps taken by the respondents to encourage direct copyright infringement, such as advertising an infringing use or instructing how to engage in an infringing use. This evidence revealed an affirmative intent that the product be used to infringe, and an &lt;i&gt;active &lt;/i&gt;encouragement of infringement. Without reversing the decision in &lt;i&gt;Betamax&lt;/i&gt;, but holding that it was misinterpreted by the lower court, the Court observed that &lt;i&gt;Betamax&lt;/i&gt; was not an authority for the proposition that whenever a product was capable of substantial lawful use, the producer could never be held liable as a contributory for the use of such product for infringing activity by third parties.&lt;i&gt; &lt;/i&gt;In the view of the Court, &lt;i&gt;Betamax &lt;/i&gt;did not displace other theories of secondary liability.&lt;i&gt; &lt;/i&gt;This other theory of secondary liability applicable to the case at hand was held to be the inducement rule, as per which any person who distributed a device with the object of promoting its use to infringe copyright, as evidenced by clear expression or other affirmative steps taken to foster infringement, would be liable for the resulting acts of infringement by third parties. However, the Court clarified that &lt;i&gt;mere knowledge of infringing potential or of actual infringing uses would not be enough&lt;/i&gt; under this rule to subject a distributor to liability. Similarly, ordinary acts incident to product distribution, such as offering customers technical support or product updates, support liability etc. would not by themselves attract the operation of this rule. The inducement rule, instead, premised liability on &lt;i&gt;purposeful, culpable expression and conduct&lt;/i&gt;, and thus did nothing to compromise &lt;i&gt;legitimate&lt;/i&gt; commerce or discourage innovation having a &lt;i&gt;lawful&lt;/i&gt; promise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These seemingly divergent views on secondary infringement expressed by the U.S. Supreme Court are of significant relevance for India, due to the peculiar language used in the Indian Copyright Act, 1957.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 51 of the Act, which defines infringement, bifurcates the two types of infringement – ie. primary and secondary infringement – without indicating so in as many words. While Section 51(a)(i) speaks to primary infringers, 51(a)(ii) and 51(b) renders certain conduct to be secondary infringement. Even here, there is an important distinction between 51(a)(ii) and 51(b). The former exempts the alleged infringer from liability if he could establish that &lt;i&gt;he was not aware and had no reasonable ground for believing that &lt;/i&gt;the communication to the public, facilitated through the use of his “place”, would amount to copyright infringement. The latter on the other hand permits no such exception. Thus, any person, who makes for sale or hire, or by way of trade displays or offers for sale or hire, or distributes for the purpose of trade, or publicly exhibits by way of trade, or imports into India, any infringing copies of a work, shall be liable for infringement, without any specific &lt;i&gt;mens rea&lt;/i&gt; required to attract such liability. It is in the context of the former provision, ie. 51(a)(ii) that the liability of certain file-sharing websites for copyright infringement has arisen.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mere Conduit ISPs – Secondary Infringement Absent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;MySpace&lt;/i&gt;, the Delhi High Court examined the liability for secondary infringement on the part of a website that provides a platform for file-sharing. While holding the website liable, the Single Judge considered material certain facts such as the revenue model of the defendant, which depended largely on advertisements displayed on the webpages, and automatically generated advertisements that would come up for a few seconds before the infringing video clips started playing. Shockingly, the Court even considered relevant the fact that the defendant did provide for safeguards such as hash block filters, take down stay down functionality, and rights management tools operational through fingerprinting technology, to prevent or curb infringing activities being carried on in their website. This, in the view of the Court, made it evident that the defendant had a &lt;i&gt;reasonable apprehension or belief &lt;/i&gt;that the acts which were being carried on in the website &lt;i&gt;could&lt;/i&gt; infringe someone else’s copyright including that of the plaintiff. The logic employed by the Court to attribute liability for secondary infringement on file-sharing websites is befuddling and reveals complete disregard for the degree of regulatory authority available on the internet even where the space, i.e., the website, is supposedly “under the control” of a person. However, a critical examination of this decision is not relevant in understanding the liability of mere conduit ISPs. This is for the reason that none of the factual considerations relied on by the Single Judge to justify imposition of liability on a file-sharing website under Section 51(a)(ii) arise when the defendant is an ISP that only provides the path for content-neutral transmission of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was completely ignored by the Madras High Court in &lt;i&gt;R.K.Productions v. B.S.N.L.&lt;/i&gt;,&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;where the producers of the Tamil film “3”, which enjoyed considerable pre-release buzz due to its song “Kolaveri Di”, sought an omnibus order of injunction against all websites that host torrents or links facilitating access to, or download of, this film. Though this was worded as a John Doe plaint by branding the infringers as unknown administrators of different torrent sites and so on, the real idea was to look to the resources and wherewithal of the known defendants, ie. the ISPs, to block access to the content hosted by the unknown defendants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This prompted the ISPs to file applications under Or. VII, Rule 11 of the Civil Procedure Code, seeking rejection of the plaint on the ground that the suit against them was barred by law. The Single Judge of the Madras High Court dismissed these applications for rejection of the plaint, after accepting the contention that the ISPs are necessary parties to the suit as the act of piracy occurs through the channel or network provided by them. The High Court heavily, and incorrectly, relied on MySpace without appreciating the distinction between a mere conduit ISP and a file-sharing website such as MySpace or YouTube, as regards their respective roles and responsibilities, the differing degrees of regulatory control over content enjoyed by them, and most importantly, the recognition and formalisation of these distinctions in the Copyright Act, 1957, vide the Copyright (Amendment) Act, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. 464 U.S. 417 (1984). Hereinafter referred to as Betamax.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. 545 U.S. 913 (2005). Hereinafter referred to as Grokster.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Hereinafter the Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;Super Cassette Industries Ltd. v MySpace Inc.&lt;/i&gt;, MIPR 2011 (2) 303 (hereinafter referred to as &lt;i&gt;MySpace&lt;/i&gt;). This decision of the Delhi High Court has been rightly criticised. &lt;i&gt;See &lt;/i&gt;&lt;a href="https://cis-india.org/a2k/blogs/super-cassettes-v-my-space"&gt;http://cis-india.org/a2k/blog/super-cassettes-v-my-space&lt;/a&gt; (last accessed on 24.03.2013).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2'&gt;https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ananth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-03-06T16:48:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia">
    <title>CIS-A2K: Work Accomplished on Konkani Wikipedia</title>
    <link>https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society’s Access to Knowledge (CIS-A2K team) is pleased to share with you the key accomplishments about the work it accomplished on Konkani Wikipedia from September to December 2013 in this report. In accordance with the Centre for Internet and Society’s Access to Knowledge Program’s (CIS-A2K) Konkani Work Plan 2013-14 the program has invested time and effort to build Konkani Wikimedia community and projects.&lt;/b&gt;
        &lt;h2&gt;Highlights&lt;/h2&gt;
&lt;h3&gt;Increased editing activity on Konkani Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K has been organising different programs and workshops. The idea is to bring in as many volunteers as possible who can contribute to Konkani Wikipedia for years to come. We have organised these outreach sessions mainly in Devanagari, Romi and Kannada scripts. As a result of these programs we have been able to significantly increase no. of editors, consistently have minimum of 5-6 active editors per month and build a community of volunteers. You can also view level of editing activity on Konkani Wikipedia for the past few months in the chart below:&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/EditsonKonkaniWikipedia.png" alt="Edits on Konkani Wikipedia" class="image-inline" title="Edits on Konkani Wikipedia" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Above: Edits Per Month on Konkani Wikipedia (Mar-13 to Dec-13) (by Nitika Tandon, CC-BY-SA 3.0) &lt;/i&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Increased number of articles on Konkani Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Total number of articles increased from 150 in Sep 2013 to 315 in Nov 2013. The number of articles have doubled over a period of 3 months. We should keep in mind that out of those who edited in Devanagari; 95% of them were completely new to the input method and had to spend considerable time learning and practicing it.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ArticlesonKonkaniWikipedia.png" alt="Articles on Konkani Wikipedia" class="image-inline" title="Articles on Konkani Wikipedia" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Above: No. of articles on Konkani Wikipedia (by Nitika Tandon, CC-BY-SA 3.0)&lt;/i&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Translated Media Wiki messages&lt;/h3&gt;
&lt;p&gt;CIS-A2K organised translation sprint to help translate Media Wiki interface messages. We achieved translating &lt;a class="text external" href="http://translatewiki.net/w/i.php?title=Special:Translate&amp;amp;language=gom-deva&amp;amp;group=core-0-mostused&amp;amp;filter=&amp;amp;action=translate" rel="nofollow"&gt;79% of these messages in Konkani Devanagari&lt;/a&gt; while all &lt;a class="text external" href="http://translatewiki.net/w/i.php?title=Special:Translate&amp;amp;language=gom-latn&amp;amp;group=core-0-mostused&amp;amp;filter=&amp;amp;action=translate" rel="nofollow"&gt;100% messages have already been translated in Romi script&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Re-release of Konkani Vishwaksh under Creative Commons License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Upon CIS-A2K‘s explicit request, Goa University has approved the  re-release of Vishwakosh under Creative Commons License (CC-BY-SA 3.0)  to make it freely available to public, giving them the right to share,  use and even build upon the work that has already been done. This is a  huge step to help preserve Konkani language and culture in the digital  era. Konkani Vishwakosh is a four-volume hard copy encyclopedia (3632  pages) published by Goa University; a work that took over 14 years to  develop. It encompasses the world’s information in a nutshell with  special emphasis and detailed information on Goa, Konkani, Goan culture,  folklore, history, geography etc. To know more about click &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Konkani_Vishwakosh_CC" title="India Access To Knowledge/Events/Konkani Vishwakosh CC"&gt;here&lt;/a&gt; and &lt;a class="text external" href="http://blog.wikimedia.org/2013/11/26/konkani-vishkawosh-free-license/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Initiated &amp;amp; Completed 30% of Konkani Vishwakosh Digitization Project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Goa University in collaboration with the CIS-A2K is digitizing Konkani  Vishwakosh. 37 participants are enrolled in this project who are working  to digitize the encyclopedia in a time bound manner. All 3632 pages of  Konkani Vishwakosh will be digitized. The program started on 19th  October and in just about 2 months 30% of the encyclopedia had already  been digitized. You can monitor the progress of this project on  Wikisource. Here are the links for &lt;a class="text external" href="https://wikisource.org/wiki/Index:Konkani_Viswakosh_Vol1.pdf"&gt;Volume 1&lt;/a&gt;, &lt;a class="text external" href="https://wikisource.org/wiki/Index:Konkani_Viswakosh_Vol2.pdf"&gt;Volume 2&lt;/a&gt;, &lt;a class="text external" href="https://wikisource.org/wiki/Index:Konkani_Viswakosh_Vol3.pdf"&gt;Volume 3&lt;/a&gt; and &lt;a class="text external" href="https://wikisource.org/wiki/Index:Konkani_Vishwakosh_-_Volume_4_Released.pdf"&gt;Volume 4&lt;/a&gt;.  Please note that some of the participants firstly digitize the  encylopedia either in their Sandbox or offline and then move it to  Wikisource. To know more about the project click &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Konkani_Vishwakosh_Digitization" title="India Access To Knowledge/Events/Konkani Vishwakosh Digitization"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Signed an MoU with Goa University&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Goa University entered into a three year MoU with CIS for building Konkani Wikipedia. As part of this partnership, Goa University and CIS-A2K will work together to help build Konkani Wikipedia and community.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;White paper by a Linguist&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="text external" href="https://en.wikipedia.org/wiki/Pratap_Naik"&gt;Fr. Pratap Naik&lt;/a&gt;,  S.J. B.Sc., B.Ed. M.A. (Linguistics), M.Phil. (Linguistics), Ph.D.  (Linguistics) has written a white paper discussing issues faced by  Konkani language and his views on how it should be dealt on Wikimedia  projects. We'll soon upload the white paper on Wikimedia Commons and  make the link available.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;14 Outreach session, over 450 participants, in 3 months&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K organised about 14 outreach sessions and reached out to over 450  people to create awareness about Konkani Wikipedia and the community  between Sep-Dec 2013. Details of these sessions can be found &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Konkani_Wikipedia_@Goa_University/Events" title="India Access To Knowledge/Konkani Wikipedia @Goa University/Events"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Got consensus from field experts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past few months CIS-A2K has spoken with Konkani Wikipedians (such as &lt;a class="text external" href="https://incubator.wikimedia.org/wiki/User:Fredericknoronha"&gt;Frederick Noronha&lt;/a&gt;, &lt;a class="text external" href="https://incubator.wikimedia.org/wiki/User:Deepak_D%27Souza"&gt;Deepak D'Souza&lt;/a&gt;, Seby Fernandes) Konkani linguists (such as Fr. Pratap), professors from Konkani Department at Goa University (&lt;a class="text external" href="https://en.wikipedia.org/wiki/Madhavi_Sardesai"&gt;Dr. Madhavi Sardesai&lt;/a&gt; and &lt;a class="text external" href="http://www.unigoa.ac.in/academic_staff.php?staffid=40&amp;amp;adepid=7&amp;amp;mdepid=1" rel="nofollow"&gt;Dr. Priyadarshini Tadkodkar&lt;/a&gt;), cultural experts (such as Prof. Alito Siqueira and &lt;a href="https://meta.wikimedia.org/wiki/User:Outofindia" title="User:Outofindia"&gt;Harriet Vidyasagar&lt;/a&gt;)  and other experts to propose a solution for Konkani Wikipedia that  faces a problem of usage of multiple scripts. To a great extent we have  got consensus from different field experts that we should strive to  create separate Wikis for each script, at least those which prove to be  active.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedians Speak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the ongoing projects of CIS-A2K is 'Wikipedians Speak' which are small videos of Wikipedians that captures their expereinces, learnings and challenges. As a part of this project CIS-A2K published several videos of Konkani Wikipedians.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/User:Nitika.t/Draft2"&gt;Link to the post published on Wikipedia&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia'&gt;https://cis-india.org/openness/blog-old/work-accomplished-konkani-wikipedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nitika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Konkani Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-12-31T11:48:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013">
    <title>CIS-A2K Narrative Report (September 2012 – June 2013)</title>
    <link>https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013</link>
    <description>
        &lt;b&gt;This narrative report captures the work done by the Access to Knowledge (CIS-A2K) team in the first ten months of the grant. The report also throws some light on the CIS-A2K program strategy in the next one year.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This narrative report was originally published on the Wikipedia page. &lt;a class="external-link" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Reports/CIS-A2K_Narrative_Report:_%28September_2012_%E2%80%93_June_2013%29"&gt;Access it here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: left; "&gt;Background to the Access to Knowledge Programme&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_Foundation"&gt;Wikimedia Foundation&lt;/a&gt; approved a &lt;a href="https://cis-india.org/about/news/wikimedia-foundation-awards-grant-to-cis"&gt;grant&lt;/a&gt; to support the growth of Indian language Wikimedia communities to the &lt;a href="https://cis-india.org/a2k"&gt;Centre for Internet &amp;amp; Society (CIS) &lt;/a&gt;to expand their &lt;a href="https://meta.wikimedia.org/wiki/India_Access_to_Knowledge"&gt;Access to Knowledge program (A2K)&lt;/a&gt; in India. The grant enabled CIS to work with the Wikimedia community of volunteers in India to expand upon Wikimedia’s Indic language free knowledge projects, including Wikipedia in Indic languages. Further, the grant aims to generate improvements in India-relevant free knowledge in Wikimedia’s English projects and wider distribution of Wikimedia’s free knowledge within India.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Section A: Introduction&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Objective of the Narrative Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This narrative report captures the work done by the A2K program during the period of September 2012 to June 2013. It examines projects and activities and its impact and outcomes over a period of the initial Ten months of the Grant. This report will also inform CIS-A2K program’s strategy for the next one year to achieve the goals set out by its donor, Wikimedia Foundation, and &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan"&gt;goals&lt;/a&gt; listed in our &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014"&gt;Work Plans&lt;/a&gt; (which were developed in consultation with the Wikimedia community in India). Importantly, this Narrative Report is critical for the Wikimedia community in India, Global Wikimedia community and the Wikimedia Foundation to get a comprehensive overview of A2K’s work and to critically assess the A2K program’s eligibility for further support.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Context&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though the mandate of the CIS-A2K program was clearly articulated before the commencement of the program, it should be noted, that the context in which the program had to undertake its work was very disturbed. Majority of the Wikimedia community in India saw CIS-A2K as an extension of the India Program as the entire team of the India Program moved into the CIS’s A2K program, except for the Director. Thus the CIS-A2K program inherited the not so conducive image of the India Program that was operational until August 2012. It should be noted that by August 2012, the Wikimedia community in India was extremely critical of the India Program’s work and achievement.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the community explicitly expressed lack of faith and Trust in the India Program’s method of work.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Thus, it is important to note that the CIS-A2K program did not start with a clean slate but had to first address multiple challenges, before it could take on active implementation of various programmatic activities. These challenges include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;building trust with the Wikimedia community in India;&lt;/li&gt;
&lt;li&gt;building a collaborative relationship with Wikimedia India Chapter;&lt;/li&gt;
&lt;li&gt;finding a new leadership to anchor the program that was left vacant in August 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;A2K Program Achievements (September 2012 to June 2013)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS Access to Knowledge (A2K) team started working on facilitating the improvement of Indian language Wikimedia projects with special focus on Indic Wikipedias in September 2012. Some key activities during the period of September 2012 to June 2013 are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Number of newsletters published: 10&lt;/li&gt;
&lt;li&gt; Number of events conducted: 49&lt;/li&gt;
&lt;li&gt; Number of Wikipedia Education Programs conducted: 5&lt;/li&gt;
&lt;li&gt; Number of people reached: about 1314&lt;/li&gt;
&lt;li&gt; Number of women participants: approximately 406 (30.9%)&lt;/li&gt;
&lt;li&gt; Number of community meet-ups &amp;amp; IRCs: 13&lt;/li&gt;
&lt;li&gt; Number of sites across India where Wikimedia events were conducted: 18&lt;/li&gt;
&lt;li&gt; Number of valid usernames: 582&lt;/li&gt;
&lt;li&gt; Number of blogs posted: 58&lt;/li&gt;
&lt;li&gt; Number of Print and Electronic Media mentions: 28&lt;/li&gt;
&lt;li&gt; Number of Hackathons supported: 2&lt;/li&gt;
&lt;li&gt; Number of community celebration events: 7&lt;/li&gt;
&lt;li&gt; Number of Institutional partnerships: 13&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;CIS hired A2K Programme Director, &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;T. Vishnu Vardhan&lt;/a&gt;, through an open and multi-stakeholder process of selection.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;Representatives from Wikimedia India Chapter, Wikimedia community in India and Wikimedia Foundation were actively part of the selection process. This process was extremely critical and ensured participation of the Wikimedia community in India and the WMIN Chapter in deciding the leadership of the program.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Noted academician Dr. Tejaswini Niranjana was hired as Adviser to A2K.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; This was done upon the request of the selection committee that was constituted for the selection of the program Director and in consultation with the WMF.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A2K proactively interacted with the WMIN Chapter Executive Committee and built collaborative working relationship.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Most of the A2K programs executed in collaboration with WMIN Chapter and community.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Began a new project on &lt;a href="http://geohacker.github.io/indicwiki"&gt;visualisation of the growth of Indic Wikipedias &lt;/a&gt;&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Sajjad Anwar and Sumandro are working on this. Two blog posts have been published so far. This was appreciated by the Wikimedia community in India and the WMF. Further, the WMF has expressed interest in extending these visualizations at a global level.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A2K has successfully reached out to the Wikipedians across Indian Language communities through conducting outreach programs, resolving technical bugs, supporting with required logistics, merchandise and media publicity, building public relations and communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014" title="India Access To Knowledge/Work plan April 2013 - June 2014"&gt;Work-plans&lt;/a&gt; for the growth of Indic Wikipedias&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; were developed in a participatory manner with active collaboration from Wikimedia community in India and Wikimedia India Chapter Executive Committee.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Proactive open disclosure of &lt;a class="text external" href="http://commons.wikimedia.org/wiki/File:WMF-A2K_Grant_Budget_and_Utilization_Sept12_-Feb13.pdf"&gt;A2K budget&lt;/a&gt;. and proposed revisions to the budget seeking feedback from the Wikimedia community in India towards building transparency.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS-A2K gave significant media visibility to Indian Language Wikipedias both in print and electronic media.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Section B: A2K Programme Impact&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In discussing the A2K program’s impact we have presented below both the tangible and intangible aspects of our work.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Intangible Impact&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The A2K team has left no stone unturned since the commencement of the program in September 2012 to work in a transparent manner. We have taken the following measures in being transparent:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Periodic publication of A2K work and outcomes through monthly newsletters.&lt;/li&gt;
&lt;li&gt; Circulation of A2K monthly newsletters and notifications on various India related Wikimedia mailing lists.&lt;/li&gt;
&lt;li&gt; Real-time listing and communication of activities on A2K Meta page.&lt;/li&gt;
&lt;li&gt; Active documentation of all events and activities, which were published as blogs on CIS.&lt;/li&gt;
&lt;li&gt; Prior announcements of all the events organized or supported by A2K.&lt;/li&gt;
&lt;li&gt; Open and collaborative process of hiring Program Director.&lt;/li&gt;
&lt;li&gt; Keeping the Wikimedia India Chapter EC in the loop on all programmatic developments since March 2013.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Proactive disclosure of A2K program budget and proposed revised budget to the Indian Wikimedia community.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In addition to this A2K has explored various possibilities of collaboration with the Indian Wikimedia community and Chapter alike. The biggest instance is the A2K Wok Planning exercise for 2013-14, where multiple stakeholders were consulted. These include&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Some English-language Wikimedia community members from India;&lt;/li&gt;
&lt;li&gt;Wikimedia India chapter Executive Committee;&lt;/li&gt;
&lt;li&gt;Indian language Wikimedians and&lt;/li&gt;
&lt;li&gt;A few of the Wikimedia Foundation staff.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Some of the collaborative and community building efforts of A2K were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Support to community-led activities and facilitating community participation and ownership (e.g. &lt;a href="http://blog.wikimedia.org/2013/04/24/indian-wikiwomen-celebrate-womens-history-month/"&gt;Wiki Women’s Month&lt;/a&gt;).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mobilization of the Indian Wikimedia community in organizing mega community events like &lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013"&gt;Telugu Wiki Mahotsavam&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Engagement with WMI Chapter EC and built a collaborative relationship.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Education programs in 4 Indian languages done in collaboration with the local Wikimedia community.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Supporting Wikimedians in conducting outreach events.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Almost all the A2K events since February were done in collaboration with WMI Chapter and the Wikimedia community in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A2K team actively participated in various community meet-ups.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A2K has provided significant media visibility to Indian Language Wikipedias, especially in mainstream English press. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These transparency and collaboration efforts resulted in building trust among the Wikimedia India communities, where in they have begun to constructively engage with the A2K program’s work. This is a significant achievement since the closure of India program in August 2012. However, there are still some Wikimedians who prefer to ignore the A2K program, which indicates that the A2K program still needs to prove its worth. Thus it could be said that the A2K program has been partly successful in winning the faith of the Indian Wikimedia communities and still needs to put in more effort in this direction. The A2K team is committed to achieve this by demonstrating success through its work during the next phase of this program.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tangible Impact&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is difficult for the CIS-A2K program to either take direct credit for the growth or direct blame for the lack of it in the Indian language Wikimedia projects. However, we believe that we have been one of the factors — and sometimes a key factor — in impacting the growth of the Wikimedia projects and communities in India since the commencement of the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the A2K program has done some amount of work with almost all Indian language Wikipedias, the A2K team has had relatively more involvement in 10 Indic languages - Assamese, Bengali, Gujarati, Hindi, Kannada, Malayalam, Marathi, Odia, Punjabi and Telugu - during September 2012 to June 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to this based on the various outreach work done by A2K we have attempted to present an analysis of direct new Wikipedia users that have emerged in languages impacted by the A2K program, keeping in mind that community mobilization will always be an autonomous activity to some extent.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Article1.png" alt="article 1" class="image-inline" title="article 1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Graph 1&lt;/b&gt;: Growth of Articles in Indian Language Wikipedias from September 2012 to June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The growth momentum in Indian languages over the eight month period of September 2012 to June 2013 looks healthy.&lt;/li&gt;
&lt;li&gt; Some language Wikipedias have been growing at a phenomenal rate than others in terms of percentage change since September 2012.&lt;/li&gt;
&lt;li&gt; Punjabi, Assamese and Odia Wikipedias have a growth rate of 82%, 59%, and 37% respectively and are the top 3 Indian language Wikipedia projects during the ten month period.&lt;/li&gt;
&lt;li&gt; In terms of absolute number of articles, Tamil, Malayalam, Punjabi and Hindi Wikipedias have grown by about 5,812; 5,008; 3050; and 2,734 articles respectively.&lt;/li&gt;
&lt;li&gt; However, given the small size of the Wikipedia communities in Punjabi, Nepali, Kannada, Odia and Sanskrit the growth achieved by them is much commendable and all efforts have to be put to ensure that this momentum continues by strengthening these communities and also expanding them.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Article2.png" alt="article 2" class="image-inline" title="article 2" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Graph 2&lt;/b&gt;: Active Editors in Indian Language Wikipedias from September 2012 to June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;There is a fluctuation in the number of active editors in all Indian language Wikipedias.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The active editors on Assamese, Marathi and Gujarati Wikipedias have been consistently coming down, which is a cause of concern.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;It is important to note that Tamil, Telugu, Kannada and Nepali Wikipedias where the number of Active Editors were declining earlier have shown a remarkable turnaround. The efforts of the A2K program, especially in Telugu and Kannada, over the last 4 months could have resulted in this positive change.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;It seems the &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_Nepal/Wiki_Wikipedia_Education_Program_Nepal"&gt;Wikipedia Education Program, Nepal&lt;/a&gt; has been instrumental in bringing &lt;a href="http://blog.wikimedia.org/2013/09/18/nepal-wikipedia-education-program-pilot/"&gt;significant number of new active editors&lt;/a&gt; on Nepali Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Overall the active editors on Malayalam Wikipedia have crossed the 100 mark numerous times, making it the first Indian language Wikipedia to reach this benchmark. However, in month of May and June 2013 this dropped to a 2 digit figure again.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Looking at the trends Tamil Wikipedia may soon reach the 100 active editor mark.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Even Bengali community could cross 100 active editors if concerted efforts are put in.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Assamese Wikipedia, which received support from A2K program until January 2013, had a consistent active editor population which was around 20 people. However, once the support from the A2K dwindled since February a declining trend can be noticed. One could deduce that the A2K program has had critical relevance in the growth of Assamese Wikipedia. The decline over the last 5 months also alerts us to the possibility of building dependencies on the A2K program, which is a concern that we need to address going forward. &lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Article3.png" alt="article 3" class="image-inline" title="article 3" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Graph 3: Monthly growth of New Editors on Indian Language Wikipedias from September 2012 to June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;On an average 94 new editors have joined Indian language Wikipedias every month.&lt;/li&gt;
&lt;li&gt; Bengali, Malayalam and Tamil Wikipedias have consistently seen more than 10 new editors joining almost every month since Jan 2013.&lt;/li&gt;
&lt;li&gt; Hindi, Marathi and Telugu have many new editors joining per month.&lt;/li&gt;
&lt;li&gt; Total of 849 new people have become editors for Indian language Wikipedia since Sep 2012.&lt;/li&gt;
&lt;li&gt; However, the conversion rate of new editors into active editors is still a challenge across all Indian language Wikipedias.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Article4.png" alt="article 4" class="image-inline" title="article 4" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Graph 4: Snapshot of “Page Views” of Indian Language Wikipedias in September 2012 &amp;amp; June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Overall the “Page View” trends of Indian Language Wikipedias until April 2013 look positive. but since the last two months the trend is in the decline. However, it should be noted that the month on month “Page View” trends keep fluctuating.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Bengali, Tamil, Malayalam and Punjabi Wikipedias have shown highest percentage growth in page views since September 2012.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; In absolute numbers Bengali Wikipedia has seen a spectacular growth of 3,000,000 page-views, Tamil and Malayalam Wikipedias witnessed a growth of about 927,150 and 365,913 a page-views respectively.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Based on the the absolute numbers of “Page Views” for Indian Wikipedias it could be speculated that there is a significant increase in demand for knowledge and information in Indian languages on the internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In the below given Graph 5, we have also looked at the direct impact the A2K programme had in cultivating new editors on Indian language Wikipedias through various outreach programs that conducted during September 2012 to June 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Article5.png" alt="article 5" class="image-inline" title="article 5" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Graph 5: New Editors from CIS-A2K Outreach September 2012-June 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that during the 10 month period CIS-A2K reached out to a total of 1,314 participants. This is approximate 130 people per month. However, the username data for more than 700 participants could not be ascertained, due to incorrect inefficient data collection and input. This includes participants giving wrong usernames, trouble with the handwriting of some of the participants, etc. We have already taken note of this issue and have put in measures to efficiently capture the new user data. Hence, we have only presented an analysis of 582 participants, whose usernames are valid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The analysis of this data reveals that more than 120 users have done more than 5 edits, which is about 21 per cent of the participants with valid usernames. Further, 25 participants have done more than 100 edits on English and various Indian language Wikipedias, which constitutes 4 per cent of the total participants that the A2K programme has reached out to. Further 11 users have become very active editors on Indian language Wikipedias with more than 1000 edits to their credit.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Section C: Learning and Challenges&lt;/h2&gt;
&lt;h3&gt;Outreach&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the biggest constraints with the existing outreach efforts across India including that of CIS-A2K's is that they are all based on light-touch model. We have learned that a light touch outreach with no follow up, no hand-holding, no support system will not be able to yield desired results. We need to have a thoroughly thought out well-designed outreach programs where there should be continuous interaction with the participants for a minimum of 2-3 months. CIS-A2K approach to outreach should be different from usual Wikipedia editing training. Further, any outreach with an educational institution on the lines of a "Wikipedia Education Program" requires at least 3-4 months commitment from everyone concerned (i.e. student, institution, community and CISA2K).&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;This in no way means diminish the 	importance of the light-touch model of 1/2 or 1 day Wikipedia 	editing training workshops, as seldom you get institutions/groups 	who are willing to commit to a long-term engagement. Thus a mixed 	approach is more pragmatic, while more energies need to put in 	long-term engagements.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;There is a strand of criticism 	about effectiveness of physical outreach in general. However 	physical outreach for Indian languages is extremely essential as 	this is the lead exercise by which language communities have 	strengthened themselves over the years, though this has been very 	slow. The need to involve human element, face-to-face interaction 	and two-way communication is an extremely important factor of for 	growth of Indian language communities.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;The need for each language 	community is different with respect to outreach. There are some 	communities that are more comfortable with conducting physical 	outreach while other communities are more efficient with outreach on 	social networking sites. For instance the &lt;a href="https://en.wikipedia.org/wiki/or:ପ୍ରଧାନ_ପୃଷ୍ଠା"&gt;Odia 	Wikipedia&lt;/a&gt; community where the average age of the active members 	is less than 25 is more active on Social Media and extensively uses 	it to network among themselves and to also discuss about the 	Wikipedia, whereas the &lt;a href="https://en.wikipedia.org/wiki/te:మొదటి_పేజీ"&gt;Telugu 	Wikipedia&lt;/a&gt; is more comfortable with physical meetings and 	primarily uses Village Pump for all community discussions.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;Based on the interaction with most of the Indian language 	Wikimedia communities, CIS-A2K noticed that except for some 	communities like Malayalam, an institutional partnership is 	something that might not be easily taken up by community members. 	This is so because it requires high level of effort, time and strong 	network, amongst several other things. CIS-A2K has been focusing to 	address this need in general and in the five focus language areas in 	particular.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Work Plan Development and Community Communications&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Even after sending multiple invitations, it took a lot of effort by CIS-A2K to encourage the larger community to engage and participate actively in the development of language focused work plan. CIS-A2K put its best efforts in inviting the community members through meta pages, village pumps, language and city-wide mailing lists, Indian mailing list, India English mailing list, meet-ups, IRCs, social-media channels to give their valuable suggestions and feedback. However, very few community members showed interest and helped in refining the plans. Better feedback could be gathered during physical and informal meetings with the community members.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Less than 10% active volunteers 	across all Indian language communities are active on Meta and even 	less on Indian mailing lists. During some informal conversations 	some community members expressed that it is too much of an 	additional burden to also visit Meta and engage. Taking into 	consideration that most of the language communities have less than 	20 active volunteers, pragmatically speaking it is a huge ask to 	expect them to actively participate on Meta or mailing lists. Thus 	one cannot have a uniform standard and uniform mode of communication 	with different language communities. Thus CIS-A2K needs to explore 	various means of engaging with the Wikimedia community in India and 	should adopt a mixed channel approach of gauging community feedback. 	Though this is requires additional efforts on the team.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The mediums listed show a 	significant effort was made to solicit feedback and participation. 	It's okay and understandable that strategic planning is not for 	everyone, that volunteers economize their time devoted to the 	movement. So CIS-A2K does not necessarily see it as a failure that 	participation was low. What CIS-A2K aimed to do was to make sure 	participation was solicited, encouraged, and made possible. Of 	course ideally we would want higher participation, but CIS-A2K is 	careful not to confuse and turn &lt;b&gt;higher participation in 	strategizing into a goal in itself&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In spite of this CIS-A2K took the 	risk and went ahead with a &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Learning_and_Evaluation"&gt;participatory 	and continuous mode of evaluation&lt;/a&gt;. We foresee a challenge in 	actively involving the community in quarterly evaluation cycles as 	this would require them also to introspect. In the five focus 	language communities such an introspection exercise was not done 	systematically before and a mandatory imposition may not be 	productive either for the Community or for CIS-A2K. The challenge 	would be that in the first 2 quarterly cycles CIS-A2K could miss 	meeting its own evaluation criteria. However, the opportunity here 	is to train the community to systematically introspect, which will 	go a long way in strengthening the Indian language Wikipedias and 	the associated communities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Some programs, especially institutional partnerships, have a 	higher risk of failure than others. Though CIS-A2K committed to a 	very granular break-down of outcomes, it may require significant 	revisions. Hence it is extremely important for CIS-A2K to review and 	revise the plans and goals every 3-4 months.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Community Engagement/Development&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Indian language communities are able to grow and cultivate new editors who come from similar background as their’s. For example, we find that the Telugu community comprises primarily in the age group of 30-50 years, while on the other hand, the Odia community consists of relatively younger editors between the age group of 20-30 years. Hence, it is essential that the community building programs take this aspect into consideration and work to diversify the community mix by engaging with people belonging to varied backgrounds.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency and accountability are essential to build community trust. CIS-A2K has already taken various measures in this direction. However, there are occasions when more demands are placed on CIS-A2K, which consumes a lot of CIS-A2K's time and effort. The challenge is to struck a balance between the demands of transparency and accountability and the actual work they describe.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Meetups, one-on-one meetings/talk with community members are an essential ingredient to build long-term relationship. This is especially very important for nascent language communities with few editors. These kind of personal interactions help community members to know and connect with other Wikipedians. It also helps build trust and working relationship between community members and the A2K team.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;CIS-A2K recognizes the potential role of Wikimedia India Chapter in growing the Wikimedia movement in India. Though CIS-A2K's work doesn't depend on the India Chapter, there is a huge potential for collaboration between the &lt;a href="https://meta.wikimedia.org/wiki/Wikimedia_India"&gt;Wikimedia India Chapter&lt;/a&gt; and CIS-A2K. CIS-A2K has put in its best efforts to build a cordial working relationship with the India Chapter. However, the extent of the collaboration would depend on the India Chapter's capacity and interest.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Section D: Progress Report&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A detailed progress report of the A2K program activities has been presented on a monthly basis below. Most of the activities have been documented as blog posts or news-items on the CIS website. All of the A2K events, blog-posts and news-items can be seen &lt;a href="https://cis-india.org/@@search?Subject%3Alist=Wikipedia"&gt;here.&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Outreach Sessions in September 2012&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Note: Although most of these workshops were conducted prior to the grant period, the reports for all of these were written during September 2012&lt;/i&gt;:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/first-punjabi-wikipedia-workshop"&gt;The First Punjabi Wikipedia Workshop&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 27, 2012). A total of 25 participants came for this workshop. There were 15 new editors (of which 13 were female).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-punjabi-university-patiala"&gt;Punjabi Wikipedia Workshop at Punjabi University, Patiala&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 28, 2012). About 30 participants including students and teachers attended the workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-amritsar"&gt;Punjabi Wikipedia Workshop at Amritsar&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 30, 2012). Nearly 50 participants including students and teachers from eight different schools apart from the students and teachers of Spring Dale School attended the workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/report-of-the-wikipedia-workshop-in-british-library"&gt;Wikipedia Workshop in British Library, Chandigarh&lt;/a&gt; (by Subhashish Panigrahi, September 27, 2012). About 32 participants attended the session on Day 1 and 10 participants attended the session on Day 2.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/kannada-wiki-workshop-tumkur-university"&gt;Kannada Wiki Workshop at Tumkur University&lt;/a&gt; (Tumkur, Karnataka, September 15, 2012). About 30 participants including students and teachers participated in this workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-hyderabad-report"&gt;Wikipedia comes to Hyderabad!&lt;/a&gt; (By Noopur Raval, September 30, 2012). There was coverage in the Hindu on September 28, 2012. About 60 students participated in the event.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in October 2012&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/bengaluru-a-hub-for-kannada-and-sanskrit-wikipedia"&gt;Bengaluru: A Hub for Kannada and Sanskrit Wikipedia and other Wikimedia projects!&lt;/a&gt; (October 7, 2012, Bangalore). Nitika Tandon, Subhashish Panigrahi and Jessie Wild led the session. Seven Kannada wikipedians participated in the event. &lt;/span&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-ghaziabad"&gt;Wikipedia workshop @ Inmantec College, Ghaziabad&lt;/a&gt; (by Nitika Tandon, October 19, 2012). The Access to Knowledge team was approached by Gaurav Prashar, Assistant Dean at Inmantec College, Ghaziabad to organize the workshop. Over 120 participants attended the workshop including MCA, BCA, BBA students and faculty members. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wiki-women-day-2012-pune"&gt;Bridging Gender Gap in Pune: WikiWomenDay 2012 Celebrated with Success!&lt;/a&gt; (organised by Wikipedia Club Pune at PAI International Learning Solutions, Azam Campus, Pune, October 28, 2012). Subhashish Panigrahi shares the experience in a blog post. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/first-pune-odia-wikipedia-organized"&gt;First Pune Odia Wikipedia Workshop Organized!&lt;/a&gt; (Co-organised by CIS and Pune Odia Wikipedia community, Pune, October 27, 2012). The Access to Knowledge team showed the participants the &lt;a href="https://en.wikipedia.org/wiki/or:ଉଇକିପିଡ଼ିଆ:ଚାଟସଭା/ପ୍ରଶ୍ନ"&gt;Chatasabha&lt;/a&gt;, a friendly desk on Odia Wikipedia and demonstrated how they can ask questions and see the answered questions. New wikipedians were connected to &lt;a href="http://facebook.com/groups/OdiaWiki"&gt;Facebook&lt;/a&gt; &lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in November 2012&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wiki-workshop-at-aml"&gt;Odia Wikipedia Workshop at AML&lt;/a&gt; (Academy of Media Learning, Bhubaneswar, November 10, 2012). Odia Wikipedians like &lt;a href="https://meta.wikimedia.org/wiki/User:Ansumang"&gt;Ansuman Giri&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/or:User:ManXiii"&gt;Manoranjan Behera&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/or:User:Guguly18"&gt;Diptiman Panigrahi&lt;/a&gt; participated in this event. &lt;/span&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/follow-up-to-wikipedia-introductory-session-at-bharati%20vidyapeeth"&gt;Follow up to Wikipedia Introductory Session&lt;/a&gt; (Bharati Vidyapeeth, Delhi, November 19, 2012). A Wikipedia introductory session was organised at Bharati Vidyapeeth Engineering College in Delhi early this year and a follow up session was organised by CIS on November 19, 2012. About 15 participants attended the follow up session. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-workshop-organized-in-kmbb-college-bhubaneswar"&gt;An Odia Wikipedia Workshop at KMBB&lt;/a&gt; (co-organized with CIS and with Odia Wikipedians, KMBB College, Bhubaneswar November 18, 2012). The agenda for the two-and-a-half hour session was to educate students about open source movement, journey of Wikipedia and how to contribute to Odia Wikipedia and how it would help them. Nine active Odia Wikipedians joined to support this event. &lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Outreach Sessions in December 2012&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/marathi-wiki-workshop-at-tiss"&gt;Marathi Wiki Workshop at TISS&lt;/a&gt; (co-organised with the Wikimedia India Chapter, Tata Institute of Social Science, Mumbai, December 8, 2012). There were about 25 participants (MA and PhD level) and 5 conductors - Yogesh, Nikita, Moksh, Kartik and Nitika.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait"&gt;Wikipedia Workshop at NMAIT&lt;/a&gt; (NMAIT, Karkala Taluk, Karnataka December 21, 2012, co-organised in association with Metawings Institute). Subhashish Panigrahi led the session. About 170 engineering students took part in this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-srm-chennai"&gt;Wikipedia Workshop at SRM&lt;/a&gt; (SRM University, Chennai, Tamil Nadu, December 17, 2012, co-organised in association with Metawings Institute). Noopur Raval participated in the event. About 40 students from different engineering colleges in Chennai participated in the workshop. &lt;br /&gt;&lt;br /&gt;(&lt;i&gt;Note: The following events were also conducted in December 2012. However, reports for these events were published later in January.&lt;/i&gt;)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/two-day-wiki-workshop-in-goa-university"&gt;Two-day Wiki Workshop in Goa University: An Introduction&lt;/a&gt; (by Nitika Tandon, January 15, 2013). The workshop was conducted on December 12 and 13, 2012 along with the Wikipedia community members for M.A. and Ph.D. students at the Goa University. Over 35 participants attended the two-day workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-in-st-xaviers-college-goa"&gt;Wikipedia in St. Xavier's College, Mapusa, Goa&lt;/a&gt; (by Nitika Tandon, January 19, 2013). The workshop was conducted on December 14, 2012. Over 30 participants attended the session.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/promoting-glam-in-goa"&gt;Promoting GLAM in Goa&lt;/a&gt; (by Nitika Tandon, January 24, 2013). The Access to Knowledge team organised an introductory Galleries, Libraries, Archives, Museums (GLAM) session at Goa State Central Library on December 13, 2012. About 45 people from over 10 different GLAM institutes in Goa participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/konkani-in-wikipedia-incubator"&gt;Konkani in Wikipedia Incubator — Taking it to the Next Level&lt;/a&gt; (by Nitika Tandon, January 25, 2013). An introductory session on Konkani in Wikipedia was conducted at the Konkani Department in Goa University on December 12, 2012. About 30 participants took part in the event.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Session in January 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/wikipedia-workshop-at-rkgit-ghaziabad" class="external text" rel="nofollow"&gt;A Wiki Workshop at Raj Kumar Goel Institute of Technology, Ghaziabad&lt;/a&gt; (RKGIT, Ghaziabad, January 17, 2013). Around 65 mechanical engineering  students from second and third year participated in this workshop.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Session in February 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog-old/digital-literacy-workshop" class="external text" rel="nofollow"&gt;Digital Literacy Workshop at Department of Arts, Delhi University&lt;/a&gt; (University of Delhi, February 5, 2013). A digital literacy workshop  was organised at the Department of Arts, Delhi University for students  pursuing their masters in Modern Indian Languages and Literary Studies  on February 5, 2013. About 30 students and 4 faculty members attended  the workshop.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in March 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-session-at-bits-goa" class="external text" rel="nofollow"&gt;Introductory Wikipedia session at BITS Goa&lt;/a&gt; (organised by CIS, Birla Institute of Technology &amp;amp; Science, Pilani,  Goa, March 7, 2013). The Access to Knowledge team was invited by Nikhil  Dixit, Public Relations Officer at the Birla Institute of Technology  &amp;amp; Science, Pilani – Goa (BITS Goa) to organise Wikipedia session on  March 7, 2013. About 30 people participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/te:%E0%B0%B5%E0%B0%BF%E0%B0%95%E0%B1%80%E0%B0%AA%E0%B1%80%E0%B0%A1%E0%B0%BF%E0%B0%AF%E0%B0%BE:%E0%B0%B8%E0%B0%AE%E0%B0%BE%E0%B0%B5%E0%B1%87%E0%B0%B6%E0%B0%82/%E0%B0%AE%E0%B0%BE%E0%B0%B0%E0%B1%8D%E0%B0%9A%E0%B0%BF_8,_2013_%E0%B0%B8%E0%B0%AE%E0%B0%BE%E0%B0%B5%E0%B1%87%E0%B0%B6%E0%B0%82" title="w:te:వికీపీడియా:సమావేశం/మార్చి 8, 2013 సమావేశం"&gt;Telugu Wikipedia Training Workshop on Women's Day&lt;/a&gt; (organised by CIS, Theatre Outreach Unit, University of Hyderabad,  Hyderabad, March 8, 2013). Telugu Wikipedians Dr. Rajasekhar and  Rahmanuddin alongwith T. Vishnu Vardhan led this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-workshop-for-kannada-science-writers" class="external text" rel="nofollow"&gt;Wikipedia Workshop for Kannada Science Writers&lt;/a&gt; (organised by Wikimedia India Chapter, Karnataka Rajya Vijnana  Parishath and CIS, Karnataka Rajya Vijnana Parishath Conference Hall,  Banashankari 2nd Stage, Bangalore, March 17, 2013). Dr. U.B. Pavanaja  led the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop" class="external text" rel="nofollow"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (organised by CIS, Institution of Engineers, JLB Road, Mysore, March 24, 2013). Dr. U.B. Pavanaja led this workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Indian Languages Workshop at IIT, Bombay (organised by CIS, IIT Mumbai, March 28, 2013). Noopur Raval led the event.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in April 2013&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013#.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80.E0.B0.AA.E0.B1.80.E0.B0.A1.E0.B0.BF.E0.B0.AF.E0.B0.BE_.E0.B0.A4.E0.B1.86.E0.B0.B2.E0.B1.81.E0.B0.97.E0.B1.81_.E0.B0.AE.E0.B0.B9.E0.B1.8B.E0.B0.A4.E0.B1.8D.E0.B0.B8.E0.B0.B5.E0.B0.82.2C_.E0.B0.AE.E0.B1.81.E0.B0.82.E0.B0.A6.E0.B0.B8.E0.B1.8D.E0.B0.A4.E0.B1.81_.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80_.E0.B0.85.E0.B0.95.E0.B0.BE.E0.B0.A1.E0.B1.86.E0.B0.AE.E0.B1.80"&gt;Telugu Wikipedia Workshop&lt;/a&gt; (April 9, 2013 at the Centre for Good Governance, Hyderabad). Telugu Wikipedians Arjunarao, Rahmanuddin and Pavithran along with T. Vishnu Vardhan led this half-day workshop. This was organized as a pre-event to &lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013"&gt;Telugu Wiki-Mahotsavam&lt;/a&gt;. &lt;/span&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013#.E0.B0.AA.E0.B1.8D.E0.B0.B0.E0.B0.BE.E0.B0.A5.E0.B0.AE.E0.B0.BF.E0.B0.95_.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80_.E0.B0.85.E0.B0.95.E0.B0.BE.E0.B0.A1.E0.B0.AE.E0.B1.80"&gt;Telugu Wikipedia Workshop&lt;/a&gt; (April 11, 2013 at the Theatre Outreach Unit, University of Hyderabad, Hyderabad). Telugu Wikipedians Radhkrishna and Rajachandra led this half-day workshop. This was organized as part of the &lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013"&gt;Telugu Wiki-Mahotsavam&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013#.E0.B0.AA.E0.B1.8D.E0.B0.B0.E0.B0.BE.E0.B0.A5.E0.B0.AE.E0.B0.BF.E0.B0.95_.E0.B0.B5.E0.B0.BF.E0.B0.95.E0.B1.80_.E0.B0.85.E0.B0.95.E0.B0.BE.E0.B0.A1.E0.B0.AE.E0.B1.80"&gt;Telugu Wikipedia Advance level Workshop&lt;/a&gt; (April 11, 2013 at the Theatre Outreach Unit, University of Hyderabad, Hyderabad). Telugu Wikipedians Arjunarao and Rahmanuddin led this demonstration. This was organized as part of the &lt;a href="https://en.wikipedia.org/wiki/te:వికీపీడియా:సమావేశం/తెలుగు_వికీపీడియా_మహోత్సవం_2013"&gt;Telugu Wiki-Mahotsavam&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop-udupi-april-29-2013"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (April 29, 2013, Govinda Pai Research Centre, MGM College Udupi). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia. &lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Outreach Sessions in May 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia workshop (May 8, 2013, TISS, Mumbai). T. Vishnu Vardhan conducted the workshop to the students of Post Graduate Diploma in Community Media. A total of 14 students and 1 teacher attended this multi-lingual Wikipedia training workshop.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Outreach Sessions in June 2013&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Kannada Wikipedia Workshop (June 4, 2013, Ramakrishna Vidyalaya, Hassan). Dr. U.B. Pavanaja led the workshop and gave a talk on Kannada Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia workshop (June 10, 2013, Internet Institute, Palm Grove, Bangalore). T. Vishnu Vardhan conducted the workshop. This orientation workshop on Wikipedia was attended by representatives from about 25 Civil Society organizations across India. This was followed up by a hands-on Wikipedia training workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kannada Wikipedia workshop for bloggers (June 24, 2013, Suchitra, Bangalore). Dr U.B. Pavanaja conducted the workshop and gave a presentation on Kannada Wikipedia.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Education Programme Updates&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/launch-of-assamese-wikipedia-education-program"&gt;Launch of Assamese Wikipedia Education program&lt;/a&gt; at Guwahati University (by Nitika Tandon, October 22, 2012). The program was launched on October 14, 2012 with 15 post-graduate students (90 per cent of these are women students) under the guidance of Prof. Dulumoni Goswami, Head of the Department of Education, Guwahati University.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/malayalam-wikipedia-education-program-august-october-update"&gt;Malayalam Wikipedia Education Program: August to October Updates&lt;/a&gt; (by Shiju Alex, October 29, 2012). This program is the first of its kind in an Indic language, and Malayalam community is doing the program in collaboration with the IT@School, a project of the Department of General Education, # &lt;a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition"&gt;Government of Kerala, setup in 2001, to foster the IT education in schools. Gujarati Wikipedia Article Competition&lt;/a&gt; – 10 schools, 200 students, 20 articles on Gujarati Wikipedia (by Noopur Raval, October 31, 2012). This was a competition to raise Wikipedia awareness and help students discover the joy of writing articles in their native language and an attempt to connect producers having knowledge in Gujarati to a wide audience of more than 4,00,000 readers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot"&gt;Gujarat Wikipedia Education program:Rajkot&lt;/a&gt; (by Noopur Raval, October 31, 2012). This report analyses a series of meetings and workshops held in Rajkot, a city in Gujarat, India during the month of October 2012 including students from the Galaxy Education System, Christ College students and members from the Wikipedia community.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/first-odia-wikipedia-education-program-to-be-rolled-out-at-iimc-dhenkanal"&gt;First Odia Wikipedia Education Program to be Rolled Out&lt;/a&gt; (by Subhashish Panigrahi, November 30, 2012). Odia wikipedians launched this program at the Indian Institute of Mass Communications, Dhenkanal on November 8, 2012 to bring students to edit articles on Odia wikipedia through a series of assessments by professors.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/odia-education-program-at-iimc-dhenkanal"&gt;Odia Education Program&lt;/a&gt; (Indian Institute of Mass Communication, Dhenkanal, Orissa, January 26, 2013). This is the first Odia Education Program which ran for three months and 16 students took active part in contributing on various articles on Odia Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-education-program-iimc-dhenkanal"&gt;Odia Wikipedia Community Brings Wikipedia Education Program to IIMC, Dhenkanal&lt;/a&gt; (by Subhashish Panigrahi, February 28, 2013). Sixteen student wikipedians signed up and took part in editing more than a dozen articles on Odia Wikipedia.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Hackathons&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-hackathon-bits-hyderabad"&gt;Wikipedia Hackathon at BITS Hyderabad&lt;/a&gt; (organized by CIS - A2K team and BITS-Pilani, Hyderabad, October 26 – 27, 2012). &lt;/span&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog-old/mini-hackathon-delhi"&gt;A Wikipedia Mini-hackathon in Delhi&lt;/a&gt; (CIS, New Delhi, November 11, 2012) &lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Meetups&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/kolkata-tasting-the-sweetness-of-wikipedia"&gt;Kolkata: Tasting the Sweetness of Wikipedia!&lt;/a&gt; (Kolkata, November 3, 2012). The journeys of three Wikipedians — Jayanta Nath, Deepon Saha and Ashwin Baindur are examined. Subhashish Panigrahi participated in the meeting.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://wiki.wikimedia.in/WikiMeetups/Bangalore/Bangalore51"&gt;Wikivoyage, November 18, 2012&lt;/a&gt;: Ravikiran presented the Wikivoyage project and discussions on Wiki Project Karnataka. A total of 13 participants attended this meeting.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://wiki.wikimedia.in/WikiMeetups/Bangalore/Bangalore52"&gt;Wikidata, December 2, 2012&lt;/a&gt;: &lt;a href="https://en.wikipedia.org/wiki/User:LydiaPintscher"&gt;Lydia Pintscher&lt;/a&gt; presented the Wikidata project. The talk covered history of Wikidata project, state of the project and Wikidata India opportunities. About 13 people attended this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-February/009453.html"&gt;Wikimedia Meet-up, Hyderabad&lt;/a&gt; (7 Hyderabad based Wikimedians attended this meet-up. Abhijith Jayanthi - SIG Hyderabad, Rahimanuddin Shaik - SIG Telugu, Dr. Rajasekhar; Veera Venkata Chowdary, Tausif, Sai Anudeep, and Akhila Thumma came together for a discussion meeting with the CIS-A2K Program Director T. Vishnu Vardhan.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wiki-meet-up-kolkata"&gt;Kolkata Wiki Community Meetup&lt;/a&gt; (organised by CIS and Kolkata Wiki Community, March 14, 2013). Four Wikipedians from Kolkata, Wikimedia Foundation's mobile Developer Yuvaraj Pandian and OPW intern Sucheta Ghoshal joined T. Vishnu Vardhan and Subhashish Panigrahi for this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-cuttack-community-meetup-march-16-2013"&gt;Odia Wikipedia - Cuttack Community Meetup&lt;/a&gt; (organised by CIS and Odia Wiki Community, Cuttack, March 16, 2013). T. Vishnu Vardhan and Subhashish Panigrahi met Odia Wikipedians in Cuttack to discuss about the current state of Odia Wikipedia and understand the community building strategies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-meet-up-bhubaneswar-march-17-2013"&gt;Odia Wikipedia – Bhubaneswar Community Meetup&lt;/a&gt; (organised by CIS and Odia Wiki Community, Bhubaneswar, March 17, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/telegu-wiki-meet-up-at-cis-june-2-2013"&gt;First Telugu Wiki Meetup @ CIS, Bangalore&lt;/a&gt; (co-organised by Telugu Wikipedia community and CIS-A2K on June 2, 2013). &lt;a href="https://en.wikipedia.org/wiki/te:వాడుకరి:Veera.sj"&gt;S.J. Veera&lt;/a&gt; conducted the meet-up.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Celebration and Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary"&gt;Celebrating Odia Wikipedia's Ninth Anniversary&lt;/a&gt; (organized by the Odia Wiki Community with support from CIS and Academy for Media Learning, January 29, 2013, Bhubaneswar). The event attracted good coverage in the local media:&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଓଡ଼ିଶାନ୍&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;: &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;: &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ର‌ୟୋଗ&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;, &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ସମ୍ବାଦ&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;: &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଲିପି ବ୍ୟାକରଣ ଓ ମାନକ ଭାଷାର ପ୍ରୟୋଗ ଜରୁରୀ&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.eindiadiary.com/content/odisha-workshop-organized-9th-anniversary-odia-language-application-odia-language-e-media"&gt;eindiadiary.com&lt;/a&gt;: 	Odisha: Workshop organized on 9th Anniversary of Odia language: 	Application of Odia language in e-media,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://news.fullorissa.com/odia-wikipedias-9th-anniversary"&gt;Fullorissa.com: 	Odia Wikipedia’s 9th anniversary&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://indiaeducationdiary.in/Orissa/Shownews.asp?newsid=19485"&gt;Indiaeducationdiary.in: 	Odisha: Workshop organized on 9th Anniversary of Odia language: 	Application of Odia language in e-media&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.odishaviews.com/odia-language-workshop-organized-on-9th-anniversary-of-odia-wikipedia-application-of-odia-language-in-e-media"&gt;Odishaviews.com:Odia 	language workshop organized on 9th Anniversary of Odia Wikipedia: 	Application of Odia language in e-media&lt;/a&gt; &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-womens-workshop-in-mumbai" class="external text" rel="nofollow"&gt;Wikipedia Women's Workshop in Mumbai&lt;/a&gt; (by Noopur Raval, Vidyalankar Institute of Technology, Wadala, Mumbai, November 4, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/wiki-womens-day-in-goa"&gt;Wiki Women's Day in Goa&lt;/a&gt; (organised by the Wikimedia India Chapter and CIS, Nirmala Institute of Education, Panaji, Goa, March 8, 2013). The workshop was organised on International Women's Day. Rohini Lakshane and Nitika Tandon led the workshop. &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/events/telegu-wiki-mahotsavam-2013"&gt;Telugu Wiki Mahotsavam 2013&lt;/a&gt; (organised by Telugu Wikipedia Community and CIS, Hyderabad, April 9 – 11, 2013). T. Vishnu Vardhan was one of the trainers at the Wikipedia Academy at Centre for Good Governance on April 9, 2013. Vishnu Vardhan spoke about the Access to Knowledge work in one of the sessions of Wikimedia. Meeting with Media Heads on April 10, 2013. Vishnu Vardhan gave a talk on A2K’s plans for the growth of Telegu Wikipedia in 2013-14 at the Telegu Wikipedia general meeting on April 11, 2013. Vishnu Vardhan also gave a talk about Access to Knowledge in the digital era at the Wiki Chaitanya Vedika on April 11, 2013. &lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;span&gt;Events Participated In&lt;/span&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/blog-old/celebrating-the-success-of-wikipedia-in-wikipedia-summit-pune-2013"&gt;Celebrating the success of Wikipedia in Wikipedia Summit Pune 2013&lt;/a&gt; (organized by Wikipedia Club, Pune, January 12 – 13, 2013).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/foss-wikimedia-under-one-roof-gnunify"&gt;GNUnify 2013&lt;/a&gt; (organized by Pune Linux/Unix User Group and Symbiosis Institute of Computer Studies &amp;amp; Research, Pune, February 15 – 17, 2013). Subhashish Panigrahi participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/creative-commons-comes-to-india"&gt;Creative Commons comes to India&lt;/a&gt; (co-organized by Pune Linux/Unix User Group and Symbiosis Institute of Computer Studies &amp;amp; Research in Pune, February 15, 2013, and CIS the Wikimedia India Chapter, Chitrakala Parishad, Bangalore, February 25, 2013).The Access to Knowledge team participated in the CC meetings organized in Bangalore.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/fifty-fourth-bangalore-wikimedia-meetup"&gt;Fifty-fourth Bangalore Wikimedia Meet-up at IIM, Bangalore&lt;/a&gt; (organized by Radhakrishna Arvapally, SIG (Special Interest Group) Chair, Bangalore (a part of the Wikimedia India Chapter) with support from Solutions IQ, Wikimedia India Chapter and CIS, Indian Institute of Management, February 25, 2013). Sudhwana Jogalekar (President, Wikimedia India) spoke on Wikimedia Projects. T. Vishnu Vardhan (program Director, A2K, CIS) gave a talk on 'Accessibility to Knowledge'. Joe Justice (Founder WikiSpeed) and Vibhu Srinivasan gave a presentation of WikiSpeed Car project. Chief Guest K.S. Viswanath (Vice President, Industry Initiatives, NASSCOM) gave the welcome address. Noopur Raval participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/knowledge-sharing-through-glam"&gt;Knowledge Sharing through GLAM at Bangalore&lt;/a&gt; (organized by Wikimedia India and Creative Commons, Karnataka Chitrakala Parishad, Kumara Krupa Road, Bangalore, February 25, 2013). Dr. U.B. Pavanaja, Nitika Tandon and Subhashish Panigrahi participated in the event. CIS supported the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-workshop-for-kannada-science-writers"&gt;Wikipedia Workshop for Kannada Science Writers&lt;/a&gt; (organised by Wikimedia Chapter India, Karnataka Rajya Vijnana Parishath and CIS, Karnataka Rajya Vijnana Parishath Conference Hall, Banashankari 2nd Stage, Bangalore, March 17, 2013). Dr. U.B. Pavanaja participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-womens-workshop-bangalore-2013"&gt;Wikipedia Women's Workshop Bangalore 2013&lt;/a&gt; (organised by Wikimedia India, Servelots Infotech, Jayanagar, Bangalore, March 8, 2013). The event was covered by Kannada Prabha on March 9, 2013. Dr. U.B. Pavanaja participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-at-avenir"&gt;Wikipedia at Avenir&lt;/a&gt; (organised by the Wikipedia community, Netaji Subhash Engineering College, Kolkata, West Bengal, March 11, 2013). CIS supported the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Community members helped the Higher Education Innovation and Research Applications program (HEIRA) of CSCS Bangalore organizes a day-long workshop on ‘Digital Literacy’ at Ahmednagar College, Ahmednagar, Maharasthra on January 17, 2013. Tanveer Hasan of HEIRA shares with us the developments in &lt;a href="https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report"&gt;this report&lt;/a&gt;. During this period, CIS established partnerships with the Goa University, Tata Institute of Social Science, Mumbai, Regional Research Centre, Udupi, etc. &lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Section E: Indic Wikipedia Visualisation Project&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/openness/blog-old/IndicWikipedia.png" alt="Indic Wikipedia" class="image-inline" title="Indic Wikipedia" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Given above is a chart depicting the visualization of Indic Wikipedia project&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CIS hired &lt;a href="http://www.ajantriks.net/"&gt;Sumandro Chattapadhyay&lt;/a&gt; and &lt;a href="http://sajjad.in/"&gt;Sajjad Anwar&lt;/a&gt; to work on visualisation of the growth of Indic Wikipedia. Their project takes basic parameters, like page views, total articles and total editors, and compares them over time and across projects: &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;They have looked into the different aspects of the past and present activities of Indic Wikipedias, and divided the visualisation into three different focus areas: &lt;br /&gt; &lt;ol&gt;
&lt;li&gt;&lt;span&gt;Basic parameters &lt;/span&gt; &lt;/li&gt;
&lt;li&gt;Geographic patterns of edits &lt;/li&gt;
&lt;li&gt;Exploring topics that receive greatest number of edits. You can read more about &lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-basic-parameters"&gt;Indic Wikipedia Visualisation Project #1: Visualising Basic Parameters&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;They also worked on visualisation of the page views statistics and the project specific pages. The page views indicate the number of unique visits Wikipedia project concerned has received in one month. You can read more about &lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages"&gt;Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;span&gt;&lt;a href="http://geohacker.github.io/indicwiki/readership"&gt;Readership Dashboard&lt;/a&gt;: The Readership Dashboard combines a line graph showing the movement of page view for a project across the years and bar graphs showing a separate variable for the same project.&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://geohacker.github.io/indicwiki/motion_chart"&gt;Motion Charts&lt;/a&gt;: The motion charts help compare Indic Wikipedia Projects across Languages on various parameters such as new editors, new articles, active editors, total editors etc.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://geohacker.github.io/indicwiki/page-views"&gt;Calendar Charts&lt;/a&gt;: The calendar charts limits each chart section to 12 months allowing the user to focus on more granular movements of the variable concerned, say the number of new editors per month or page views per month, etc.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Section F: The Access to Knowledge Work Plan (2013 – 2014)&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge team assessed 12 of the active Indic-language communities based on the community dynamics, growth patterns in readership, and community and edit contribution for drafting this work plan. In putting together this work plan the Access to Knowledge team has extensively engaged with various stakeholders. These include: a) some Wikimedia community in India members across various Indian-language Wikimedia projects; b) some English-language Wikimedia community members from India; c) Wikimedia India chapter executive committee; d) some potential institutional partners; e) a few like-minded advocates of free knowledge; f) Access to Knowledge program Adviser Dr. Tejaswini Niranjana; and g) a few of the Wikimedia Foundation staff. Five languages were selected as core language areas. These include: Bengali, Kannada, Konkani, Odia and Telegu. Some key factors that determined the selection of languages areas included:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Access to Knowledge team's existing ties with knowledge institutions, groups and individuals.&lt;/li&gt;
&lt;li&gt;Willingness of language community to interact and engage with the Access to Knowledge team.&lt;/li&gt;
&lt;li&gt;Considering Wikimedia India Chapter EC's suggestion that Access to Knowledge team should work on at least one incubation project.&lt;/li&gt;
&lt;li&gt;Access to Knowledge team's familiarity with the languages.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;However, choosing these five languages do not necessarily mean that the A2K program would not focus on the other languages rather there would be more programmatic support and organizational ties to be built.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Language Area Work Plans&lt;/h3&gt;
&lt;p&gt;The language area work plans are linked to the individual meta-pages:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Telugu"&gt;Telugu&lt;/a&gt; &lt;/span&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Odia"&gt;Odia&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Kannada"&gt;Kannada&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Konkani"&gt;Konkani (GOM)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Bengali"&gt;Bengali&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Overall_Support_Across_Indian_language_Communities"&gt;Overall Support Across Indian language Communities&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Pilot_Project_–_Performing_Arts_in_India"&gt;Pilot Project – Performing Arts in India&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Learning_and_Evaluation"&gt;Learning and Evaluation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The expected and dream targets for the languages are shown below:&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th colspan="10"&gt;Expected and dream targets for languages&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Parameters&lt;/td&gt;
&lt;td colspan="2"&gt;Telugu&lt;/td&gt;
&lt;td colspan="2"&gt;Odia&lt;/td&gt;
&lt;td colspan="2"&gt;Kannada&lt;/td&gt;
&lt;td colspan="2"&gt;Bengali&lt;/td&gt;
&lt;td&gt;Konkani&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Expected target&lt;/td&gt;
&lt;td&gt;Dream target&lt;/td&gt;
&lt;td&gt;Expected target&lt;/td&gt;
&lt;td&gt;Dream target&lt;/td&gt;
&lt;td&gt;Expected target&lt;/td&gt;
&lt;td&gt;Dream target&lt;/td&gt;
&lt;td&gt;Expected target&lt;/td&gt;
&lt;td&gt;Dream target&lt;/td&gt;
&lt;td&gt;Target&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of Editors&lt;/td&gt;
&lt;td style="text-align: right; "&gt;755&lt;/td&gt;
&lt;td style="text-align: right; "&gt;905&lt;/td&gt;
&lt;td&gt;120&lt;/td&gt;
&lt;td&gt;350&lt;/td&gt;
&lt;td&gt;600&lt;/td&gt;
&lt;td&gt;1000&lt;/td&gt;
&lt;td&gt;930&lt;/td&gt;
&lt;td&gt;1200&lt;/td&gt;
&lt;td&gt;NA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of New editors     &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;200&lt;/td&gt;
&lt;td&gt;350&lt;/td&gt;
&lt;td&gt;35&lt;/td&gt;
&lt;td&gt;100&lt;/td&gt;
&lt;td&gt;300&lt;/td&gt;
&lt;td&gt;700&lt;/td&gt;
&lt;td&gt;30&lt;/td&gt;
&lt;td&gt;100&lt;/td&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of Acitve editors&lt;/td&gt;
&lt;td&gt;25&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;50&lt;/td&gt;
&lt;td&gt;70&lt;/td&gt;
&lt;td&gt;100&lt;/td&gt;
&lt;td&gt;150&lt;/td&gt;
&lt;td&gt;NA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of Aritcles&lt;/td&gt;
&lt;td&gt;54000&lt;/td&gt;
&lt;td&gt;55000&lt;/td&gt;
&lt;td&gt;5000&lt;/td&gt;
&lt;td&gt;6000&lt;/td&gt;
&lt;td&gt;25000&lt;/td&gt;
&lt;td&gt;30000&lt;/td&gt;
&lt;td&gt;27000&lt;/td&gt;
&lt;td&gt;28000&lt;/td&gt;
&lt;td&gt;500&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;No. of Outreach Events     &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;29&lt;/td&gt;
&lt;td&gt;34&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The detailed plan with projection of outcomes and expected impact of the A2K program activities could be accessed &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014"&gt;here.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Overall Community Support&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Besides the specific programs mentioned under individual language area plans, A2K team will provide overall support to all Indian-language Wikipedia communities. This includes but is not limited to:&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Creating awareness through online editing videos, editing guides and digital coverage all in local Indian languages.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Supporting outreach activities&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Capacity building to multiply outreach efforts. This would include training sessions to improve presentation skills, audience engagement skills with mock presentations and video recording for feedback. The first Train-the-Trainer program is being planned in June.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Facilitate more qualitative interactions amongst community members with an aim to foster creation of new project ideas in the form of physical meet-ups, hangouts/Skype calls, and small/large scale conferences.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Organize language specific IRCs where community members from that specific language could discuss their plans, issues, concerns, and anything at all.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Encourage community members to share feedback, suggestions or details of any kind of support on A2K's &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Requests"&gt;Meta help page&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Supporting communities for bug reporting and following up for resolution. A detailed overall community support page can be found &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Work_plan_April_2013_-_June_2014/Overall_Support_Across_Indian_language_Communities"&gt;here&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Section G: Team Orientation and Development&lt;/h2&gt;
&lt;h3&gt;Team’s Professional Development&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A one-day orientation was organized in CIS where Wikimedia board members Bishakha Datta and Achal Prabhala helped the Access to Knowledge team members to develop an agenda for a period of 6-7 months. They helped team members to find overlaps, prioritise and recognize possibilities to make best use of available resources. The board members also shared learnings, principles and concepts from other movements that could be applied to the Access to Knowledge program.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A one-day orientation program was organized with Wikimedia India Chapter Executive Committee Members to find common minimum program on which both the Chapter and the Access to Knowledge team could work together to achieve common objectives. The orientation also helped define overlapping areas and how the two oragnisations will handle them.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A one-day orientation program was organised with Wikimedia community in India Members such as Tinu Cherian who gave a talk on how to leverage mainstream and social media; Gautam John who organized a workshop on organisational procedures for greater transparency and accountability, and Arun Ramarathnam who spoke about best practices for working with Wikipedia community. This orientation was organized as a part of training and skill development for the Access to Knowledge team members.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Since March 2013 CIS-A2K started having weekly Team Learning Sessions on every Wednesday. However, given the hectic schedules of the Team these could not be organized in a regular manner.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Exits and New Hires&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS has an office in New Delhi with a five-member team for the Access to Knowledge program. The team is currently headed by &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;T. Vishnu Vardhan&lt;/a&gt;, Program Director (Access to Knowledge). Other team members include Tejaswini Niranjana (Distinguished Fellow), &lt;a href="https://meta.wikimedia.org/wiki/User:Pavanaja"&gt;Dr. U.B. Pavanaja&lt;/a&gt; (Program Officer, Indian Language Initiatives), &lt;a href="https://meta.wikimedia.org/wiki/User:Nitika.t"&gt;Nitika Tandon&lt;/a&gt; (Program Manager) and &lt;a href="https://meta.wikimedia.org/wiki/User:Psubhashish"&gt;Subhashish Panigrahi&lt;/a&gt; (Program Officer).&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/vishnu.png" alt="Vishnu" class="image-inline" title="Vishnu" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;: Vishnu Vardhan was hired as the new program Director-Access to Knowledge at CIS. Vishnu Vardhan has over the last 11 years worked in various capacities as researcher, grant manager, teacher, project consultant, information architect and translator. Vishnu Vardhan managed the Art, Crafts and Culture portfolio of Sir Ratan Tata Trust and also worked as Research Coordinator at the Centre for the Study of Culture and Society in Bangalore.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Pavanaja.png" alt="Pavanaja" class="image-inline" title="Pavanaja" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; joined the team as program Officer, India Language Initiatives on March 4, 2013. Dr. Pavanaja holds a Master’s degree from Mysore University and Ph.D. from Mumbai University. He was a scientist at Bhabha Atomic Research Centre, Mumbai, for about 15 years. He is one of the earliest editors of Kannada Wikipedia. He has to his credit many firsts, viz., first Kannada website, first Kannada online magazine, first Indian language (Kannada) website to receive Golden Web Award, first Indian language (Kannada) editor for Palm OS, first Indian language (Kannada) editor for WinCE device (HP Jornado 720), first Indian language version (Kannada) of universally popular Logo (programming language for children) software, etc.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/openness/blog-old/Tejaswini.png" alt="Tejaswini" class="image-inline" title="Tejaswini" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/about/people/distinguished-fellows"&gt;Tejaswini Niranjana&lt;/a&gt; is a Senior Fellow at the Centre for the Study of Culture and Society (CSCS), Bangalore, and Visiting Professor at Tata Institute of Social Sciences (TISS), Mumbai joined A2K as an Adviser. She guides the Access to Knowledge team in expanding the Indian language Wikipedias and helps in increasing the number of active editors through strategic partnerships with Higher Education institutions across India.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The following staff left the organisation:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/User:Shijualex"&gt;Shiju Alex&lt;/a&gt;, Program Manager, Access to Knowledge left the organization on November 16, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/User:Noopur28"&gt;Noopur Raval&lt;/a&gt;, Program Officer, Access to Knowledge left the organization on April 24, 2013. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Section H: Additional Links and Data&lt;/h2&gt;
&lt;h3&gt;Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/indic-language-wikipedias-statistical-report-jan-june-2012"&gt;Indic Language Wikipedias – Statistical Report: January – June 2012&lt;/a&gt; (by Shiju Alex, September 25, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/kannada-wiki-workshop-tumkur-university"&gt;Kannada Wiki Workshop at Tumkur University&lt;/a&gt; (by Shiju Alex, September 25, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/first-punjabi-wikipedia-workshop"&gt;The First Punjabi Wikipedia Workshop&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/report-of-the-wikipedia-workshop-in-british-library"&gt;Wikipedia Workshop in British Library, Chandigarh&lt;/a&gt; (by Subhashish Panigrahi, September 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-punjabi-university-patiala"&gt;Punjabi Wikipedia Workshop at Punjabi University, Patiala&lt;/a&gt; (by Shiju Alex and Subhashish Panigrahi, September 28, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/editor-growth-and-contribution-on-telegu-wikipedia"&gt;Editor Growth &amp;amp; Contribution Program on Telugu Wikipedia&lt;/a&gt; (by Nitika Tandon, September 29, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/punjabi-wikipedia-workshop-at-amritsar"&gt;Punjabi Wikipedia Workshop at Amritsar&lt;/a&gt; (by Shiju Alex, September 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-hyderabad-report"&gt;Wikipedia comes to Hyderabad!&lt;/a&gt; (by Noopur Raval, September 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/bengaluru-a-hub-for-kannada-and-sanskrit-wikipedia"&gt;Bengaluru: A Hub for Kannada and Sanskrit Wikipedia and other Wikimedia projects!&lt;/a&gt; (by Subhashish Panigrahi, October 16, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-ghaziabad"&gt;Wikipedia workshop @ Inmantec College, Ghaziabad&lt;/a&gt; (by Nitika Tandon, October 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/launch-of-assamese-wikipedia-education-program"&gt;Launch of Assamese Wikipedia Education Program at Guwahati University&lt;/a&gt; (by Nitika Tandon, October 22, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/malayalam-wikipedia-education-program-august-october-update"&gt;Malayalam Wikipedia Education Program: August to October Updates&lt;/a&gt; (by Shiju Alex, October 29, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wiki-women-day-2012-pune"&gt;Bridging Gender Gap in Pune: WikiWomenDay 2012 Celebrated with Success!&lt;/a&gt; (by Subhashish Panigrahi, October 29, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-education-program-rajkot"&gt;Gujarat Wikipedia Education Program: Rajkot&lt;/a&gt; (by Noopur Raval, October 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/gujarati-wikipedia-article-competition"&gt;Gujarati Wikipedia Article Competition – 10 schools, 200 students, 20 articles on Gujarati Wikipedia&lt;/a&gt; (by Noopur Raval, October 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/first-pune-odia-wikipedia-organized"&gt;First Pune Odia Wikipedia Workshop Organized!&lt;/a&gt; (by Subhashish Panigrahi, October 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wiki-workshop-at-aml"&gt;An Odia Wikipedia Workshop at Academy of Media Learning&lt;/a&gt; (by Subhashish Panigrahi, November 10, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/mini-hackathon-delhi"&gt;A Wikipedia Mini-hackathon in Delhi&lt;/a&gt; (a guest blog post by Yuvraj Pandian, November 11, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-hackathon-hyderabad"&gt;Report on Wikipedia Hackathon held in Hyderabad&lt;/a&gt; (a guest blog post by Yuvi Panda, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-workshop-organized-in-kmbb-college-bhubaneswar"&gt;An Odia Wikipedia Workshop at KMBB College, Bhubaneswar&lt;/a&gt; (by Subhashish Panigrahi, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/follow-up-to-wikipedia-introductory-session-at-bharati-vidyapeeth"&gt;Follow up to Wikipedia Introductory Session at Bharati Vidyapeeth — More Interested and More Involved Participants&lt;/a&gt; (by Nitika Tandon, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/typing-in-indic-languages-from-mobiles"&gt;Typing in Indic Languages from Mobiles made Easy!&lt;/a&gt; (by Subhashish Panigrahi, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-womens-workshop-in-mumbai"&gt;Wikipedia Women's Workshop in Mumbai&lt;/a&gt; (by Noopur Raval, November 21, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/first-odia-wikipedia-education-program-to-be-rolled-out-at-iimc-dhenkanal"&gt;First Odia Wikipedia Education Program to be Rolled Out&lt;/a&gt; (by Subhashish Panigrahi, November 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/kolkata-tasting-the-sweetness-of-wikipedia"&gt;Kolkata: Tasting the Sweetness of Wikipedia!&lt;/a&gt; (by Subhashish Panigrahi, November 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/marathi-wiki-workshop-at-tiss"&gt;Marathi Wiki Workshop at Tata Institute of Social Sciences&lt;/a&gt; (by Subhashish Panigrahi, December 8, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/non-unicode-iscii-text-can-be-converted-to-unicode"&gt;Non Unicode ISCII Text Can be Converted to Unicode Now!&lt;/a&gt; (by Subhashish Panigrahi, December 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-srm-chennai"&gt;A Wikipedia Workshop at SRM University, Chennai&lt;/a&gt; (by Subhashish Panigrahi, December 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/new-avenues"&gt;New Avenues: Media Wiki Groups&lt;/a&gt; (by Noopur Raval, December 27, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-nmait"&gt;A Wikipedia Workshop at NMAIT&lt;/a&gt; (by Subhashish Panigrahi, December 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/two-day-wiki-workshop-in-goa-university"&gt;Two-day Wiki Workshop in Goa University: An Introduction&lt;/a&gt; (by Subhashish Panigrahi, December 30, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/two-day-wiki-workshop-in-goa-university"&gt;Two-day Wiki Workshop in Goa University: An Introduction&lt;/a&gt; (by Nitika Tandon, January 14, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-in-st-xaviers-college-goa"&gt;Wikipedia in St. Xavier's College, Mapusa, Goa&lt;/a&gt; (by Nitika Tandon, January 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/celebrating-the-success-of-wikipedia-in-wikipedia-summit-pune-2013"&gt;Celebrating the success of Wikipedia in Wikipedia Summit Pune 2013&lt;/a&gt; (by Subhashish Panigrahi, January 21, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-workshop-at-rkgit-ghaziabad"&gt;A Wiki Workshop at Raj Kumar Goel Institute of Technology, Ghaziabad&lt;/a&gt; (by Subhashish Panigrahi, January 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/bringing-konkani-encyclopedia-in-public-domain"&gt;Bringing Konkani Encyclopedia in Public Domain&lt;/a&gt; (by Nitika Tandon, January 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/promoting-glam-in-goa"&gt;Promoting GLAM in Goa&lt;/a&gt; (by Nitika Tandon, January 24, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/konkani-in-wikipedia-incubator"&gt;Konkani in Wikipedia Incubator — Taking it to the Next Level&lt;/a&gt; (by Nitika Tandon, January 25, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/digital-literacy-workshop"&gt;Digital Literacy Workshop at Department of Arts, Delhi University&lt;/a&gt; (by Nitika Tandon, February 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/celebrating-odia-wikipedias-ninth-anniversary"&gt;Celebrating Odia Wikipedia's Ninth Anniversary&lt;/a&gt; (by Subhashish Panigrahi, February 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-education-program-iimc-dhenkanal"&gt;Odia Wikipedia Community Brings Wikipedia Education Program to IIMC, Dhenkanal&lt;/a&gt; (by Subhashish Panigrahi, February 28, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-session-at-bits-goa"&gt;Introductory Wikipedia session at BITS Goa&lt;/a&gt; (by Nitika Tandon, March 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/ahmednagar-marathi-wikipedia-workshop-report"&gt;Ahmednagar — Marathi Wikipedia Workshop&lt;/a&gt; (by Tanveer Hasan, March 18, 2013). This is a report contributed by the Centre for Study of Culture and Society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wiki-womens-day-in-goa"&gt;Wiki Women's Day in Goa&lt;/a&gt; (by Nitika Tandon, March 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-basic-parameters"&gt;Indic Wikipedia Visualisation Project #1: Visualising Basic Parameters&lt;/a&gt; (by Sajjad Anwar and Sumandro Chattapadhyay, March 26, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-cuttack-community-meetup-march-16-2013"&gt;Odia Wikipedia - Cuttack Community Meetup&lt;/a&gt; (by Subhashish Panigrahi, April 3, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-meet-up-bhubaneswar-march-17-2013"&gt;Odia Wikipedia - Bhubaneswar Community Meetup&lt;/a&gt; (by Subhashish Panigrahi, April 4, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages"&gt;Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages&lt;/a&gt; (by Sajjad Anwar and Sumandro Chattapadhyay, April 22, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/indian-wiki-women-history-month"&gt;Indian WikiWomen celebrate Women’s History Month&lt;/a&gt; (by Netha Hussain, April 29, 2013). This is a guest blog post by Netha Hussain.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/odia-wikipedia-needs-assessment"&gt;Odia Wikipedia: Needs Assessment&lt;/a&gt; (by Subhashish Panigrahi, May 11, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/access-to-knowledge-work-plan-synopsis-of-feedback-by-wikipedians"&gt;Access to Knowledge Work Plan: Synopsis of Feedback by Wikipedians&lt;/a&gt; (by Nitika Tandon, May 20, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/wikipedia-introductory-session"&gt;Wikipedia Introductory Session organized for Data and India portal consultants&lt;/a&gt; (by Subhashish Panigrahi, May 30, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/cis-tiss-mou"&gt;CIS Signs MOU with TISS, Mumbai&lt;/a&gt; (May 31, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/telugu-wiki-meet-up-at-cis-june-2-2013"&gt;A Telugu Wiki Meetup @ CIS, Bangalore (April 2013 - June 2014)&lt;/a&gt; (a guest blog post by S J Veera, June 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/resources/access-to-knowledge-work-plan"&gt;Access To Knowledge Work Plan (April 2013 - June 2014)&lt;/a&gt; (by T Vishnu Vardhan, June 10, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/my-first-wikipedia-training-workshop"&gt;My First Wikipedia Training Workshop – Theatre Outreach Unit, University of Hyderabad&lt;/a&gt; (by T Vishnu Vardhan, June 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/visual-editor.pdf"&gt;Wikipedia Visual Editor&lt;/a&gt; (by Nitika Tandon, June 27, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog-old/kannada-wikipedia-workshop-bloggers"&gt;A 'Kannada' Wikipedia Workshop for Bloggers&lt;/a&gt; (by U B Pavanaja, June 28, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Press Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.orissadiary.com/ShowEvents.asp?id=37463"&gt;Odisha: Odia Wikipedia workshop organized in Pune to promote Odia language&lt;/a&gt; (OdishaDiary.com, October 31, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/bangalore-mirror-article-kalyan-subramani-nov-15-2012-some-indian-laws-could-be-challenging"&gt;‘Some Indian laws could be challenging’&lt;/a&gt; (by Kalyan Subramani, Bangalore Mirror, November 15, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-sambad"&gt;A Report of the Odia Wikipedia Workshop held in KMBB College of Engineering, Bhubaneswar&lt;/a&gt; (Sambad, November 19, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/orissa-diary-november-23-2012-pravuprasad-routray"&gt;OdishaDiary conferred prestigious Odisha Youth Inspiration Award 2012 to Odia Wikipedia team&lt;/a&gt; (by Pravuprasad Routray, Orissa Diary, November 23, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/report-of-odia-wikipedia-workshop-in-iit-kharagpur"&gt;A Report of Odia Wikipedia Workshop at IIT, Kharagpur&lt;/a&gt; (Samaja, Odia daily, Kolkata edition, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/article-in-cybersafar"&gt;વિકિપીડિયા ગુજરાતી માં પણ છે&lt;/a&gt; (by Harsh Kothari, Cybersafar, November 28, 2012).A Report of Odia Wikipedia Workshop at IIT, Kharagpur (Samaja, Odia daily, Kolkata edition, December 3, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/orissa-diary-january-27-2013-first-odia-wikipedia-education-program-concludes-at-iimc"&gt;First Odia Wikipedia Education Program concludes at IIMC, Dhenkanal&lt;/a&gt; (OdishaDiary Bureau, January 27, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/sambad-e-paper-january-30-2013-odia-wikipedia-workshop-coverage"&gt;Odia Wikipedia's 9th Anniversary and Workshop on Application of Odia in Media&lt;/a&gt; (Sambad, January 30, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନ‌ବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା&lt;/a&gt;&lt;a href="http://odishan.com/?p=2534"&gt;: ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ର‌ୟୋଗ&lt;/a&gt; (Odishan.com, February 4, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://sambadepaper.com/Details.aspx?id=36615&amp;amp;boxid=23625437"&gt;ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନ‌ବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା&lt;/a&gt;&lt;a href="http://sambadepaper.com/Details.aspx?id=36615&amp;amp;boxid=23625437"&gt;: ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ର‌ୟୋଗ&lt;/a&gt; (Sambad, February 4, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.odishaviews.com/odia-language-workshop-organized-on-9th-anniversary-of-odia-wikipedia-application-of-odia-language-in-e-media/"&gt;Odia language workshop organized on 9th Anniversary of Odia Wikipedia: Application of Odia language in e-media&lt;/a&gt; (Odishaviews.com, February 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.eindiadiary.com/content/odisha-workshop-organized-9th-anniversary-odia-language-application-odia-language-e-media"&gt;Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media&lt;/a&gt; (Odishaviews.com, March 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://indiaeducationdiary.in/Orissa/Shownews.asp?newsid=19485"&gt;Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media&lt;/a&gt; (India Education Diary.com, March 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/kannada-wikipedia-workshop-report-in-prajavani"&gt;Kannada Wikipedia Workshop, Mysore — Coverage in Prajavani&lt;/a&gt; (Prajavani, March 25, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/prajavani-may-24-2013-report-on-cis-celebrates-5-years"&gt;CIS Celebrates 5 Years: A Report in Prajavani&lt;/a&gt; (Prajavani, May 24, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/udayavani-may-25-2013-cis-celebrates-5-years"&gt;CIS Celebrates 5 Years: A Report in Udayavani&lt;/a&gt; (Prajavani, May 24, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hmtv-may-30-2013-wikipedia-and-telugu-wikipedians"&gt;A Feature on Wikipedia and Telugu Wikipedians on HMTV&lt;/a&gt; (Prajavani, May 30-31, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-live-phone-in-programme"&gt;Wikipedia Live Phone-in Programme on HMTV&lt;/a&gt; (Prajavani, June 1, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/prajavani-june-5-2013-kannada-wikipedia-workshop-coverage"&gt;Kannada Wikipedia Workshop at Hasan&lt;/a&gt; (Prajavani, June 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/samyukta-karnataka-june-5-2013-kannada-wikipedia-workshop-coverage"&gt;Kannada Wikipedia Workshop at Hasan&lt;/a&gt; (Samyukta Karnataka, June 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/vijaya-karnataka-june-5-2013-report-of-kannada-wikipedia-workshop-in-hasan"&gt;Kannada Wikipedia Workshop at Hasan&lt;/a&gt; (Vijaya Karnataka, June 5, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/suvarna-news-june-13-2013-wiki-rahasya-panel-discussion"&gt;Wiki Rahasya: Panel Discussion on Suvarna News&lt;/a&gt; (Suvarna News 24x7, June 13, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.timeoutbengaluru.net/bangalore-beat/features/wiki-donors"&gt;Wiki donors&lt;/a&gt; (TimeOut Bengaluru, June 21, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Newsletters&lt;/h3&gt;
&lt;p&gt;The following newsletters have been published:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-september-2012-bulletin"&gt;September 2012 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-october-2012-bulletin"&gt;October 2012 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-november-2012"&gt;November 2012 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-december-2012"&gt;December 2012 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-january-2013"&gt;January 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-february-2013"&gt;February 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-march-2013"&gt;March 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-april-2013"&gt;April 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-may-2013"&gt;May 2013 Bulletin&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/newsletters/access-to-knowledge-bulletin-june-july-2013"&gt;June and July 2013 Bulletin&lt;/a&gt; (During this month the CIS-A2K Newsletter was redesigned based on feedback from the community and thus the June Newsletter was clubbed with July 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Talk @ CIS&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-state-of-tech-talk-by-erik-moeller"&gt;Wikipedia: State of Tech — A Talk by Erik Moeller&lt;/a&gt; (CIS, Bangalore, November 12, 2012). Erik Moeller, Vice President of Engineering and Product Development at the Wikimedia Foundation gave a talk on Wikipedia. &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Section I: Budget Utilization&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; Currency in INR&lt;/th&gt;&lt;th&gt;2012-13&lt;br /&gt;(Per month)&lt;/th&gt;&lt;th&gt;1st Year&lt;br /&gt;(10 months)&lt;/th&gt;&lt;th&gt;Budget Utilization&lt;br /&gt;(Sept. 2012 to June 2013)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr style="text-align: left; "&gt;
&lt;td&gt;&lt;b&gt;People&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prg. Manager&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,17,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,170,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,170,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prg. Officer&lt;/td&gt;
&lt;td style="text-align: right; "&gt;58,800&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,88,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;580,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Prg. Officer&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,44,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;14,40,000&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1,008,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Communications role&lt;/td&gt;
&lt;td&gt;60,000&lt;/td&gt;
&lt;td&gt;6,00,000&lt;/td&gt;
&lt;td&gt;2,20,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;New Prg. Director&lt;/td&gt;
&lt;td&gt;2,00,000&lt;/td&gt;
&lt;td&gt;2,000,000&lt;/td&gt;
&lt;td&gt;1,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Consultant&lt;/td&gt;
&lt;td&gt;34,500&lt;/td&gt;
&lt;td&gt;3,45,000&lt;/td&gt;
&lt;td&gt;2,76,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Benefits – All&lt;/td&gt;
&lt;td&gt;6,250&lt;/td&gt;
&lt;td&gt;62,500&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Staff costs&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6,20,550&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6,205,500&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;4,262,000&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Rent&lt;/td&gt;
&lt;td&gt;47,300&lt;/td&gt;
&lt;td&gt;4,73,000&lt;/td&gt;
&lt;td&gt;5,70,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Janitorial&lt;/td&gt;
&lt;td&gt;2,750&lt;/td&gt;
&lt;td&gt;27,500&lt;/td&gt;
&lt;td&gt;48,634&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Utilities&lt;/td&gt;
&lt;td&gt;7,500&lt;/td&gt;
&lt;td&gt;75,000&lt;/td&gt;
&lt;td&gt;61,836&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Telephone&lt;/td&gt;
&lt;td&gt;4,000&lt;/td&gt;
&lt;td&gt;40,000&lt;/td&gt;
&lt;td&gt;47,819&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Office pantry&lt;/td&gt;
&lt;td&gt;5,000&lt;/td&gt;
&lt;td&gt;50,000&lt;/td&gt;
&lt;td&gt;38,765&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Office space&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;66,550&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6,65,500&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;7,67,054&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Travel&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;SF travel&lt;/td&gt;
&lt;td&gt;77,726&lt;/td&gt;
&lt;td&gt;7,77,257&lt;/td&gt;
&lt;td&gt;1,81,887&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Wikimania travel&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Domestic travel&lt;/td&gt;
&lt;td&gt;1,10,000&lt;/td&gt;
&lt;td&gt;1,100,000&lt;/td&gt;
&lt;td&gt;1,373,469&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Travel&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,87,726&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,877,257&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,555,356&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Printed materials&lt;/td&gt;
&lt;td&gt;50,000&lt;/td&gt;
&lt;td&gt;5,00,000&lt;/td&gt;
&lt;td&gt;38,800&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Design, Creative&lt;/td&gt;
&lt;td&gt;55,000&lt;/td&gt;
&lt;td&gt;5,50,000&lt;/td&gt;
&lt;td&gt;1,25,400&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td&gt;Volunteer development&lt;/td&gt;
&lt;td&gt;50,000&lt;/td&gt;
&lt;td&gt;500,000&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Postage &amp;amp; Mailing&lt;/td&gt;
&lt;td&gt;2,500&lt;/td&gt;
&lt;td&gt;25,000&lt;/td&gt;
&lt;td&gt;5,800&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Office supplies&lt;/td&gt;
&lt;td&gt;7,500&lt;/td&gt;
&lt;td&gt;75,000&lt;/td&gt;
&lt;td&gt;50,192&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;General expenses&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1,65,000&lt;/td&gt;
&lt;td&gt;1,650,000&lt;/td&gt;
&lt;td&gt;&lt;b&gt;2,20,192&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Total before fees&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,039,826&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;10,398,257&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;6,804,602&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Admin fee&lt;/td&gt;
&lt;td style="text-align: right; "&gt;51,991&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,19,913&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,19,913&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Program fee&lt;/td&gt;
&lt;td style="text-align: right; "&gt;51,991&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,19,913&lt;/td&gt;
&lt;td style="text-align: right; "&gt;5,19,913&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;&lt;b&gt;Total&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;1,143,808&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;11,438,082&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;7,844,428&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;div id="_mcePaste"&gt;&lt;/div&gt;
&lt;p&gt;Notes:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The above table gives a picture of the A2K program budget utilization (un-audited) for the period Sept. 2012 to June 2013. Thus it is important that these figures be read as provisional figures, which could change post the statutory audit as per the Indian laws binding a Registered Society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Approximately there is a 31% underspending of the Budget during the ten month period. This is mainly because of the transition of the program to CIS took sometime along with delays in the recruitment of the New Program Director. CIS-A2K has requested the WMF for a reallocation of the Budget since then.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Footnotes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:India_Education_Program/Analysis/Independent_Report_from_Tory_Read"&gt;Independent Report from Tory Read&lt;/a&gt; on &lt;a href="https://en.wikipedia.org/wiki/India_Education_Program"&gt;India Education Program&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2011-November/004958.html"&gt;Death and Post-mortem of Indian Education Program pilot&lt;/a&gt;. Wikimedia-India Mail archive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2012-December/008929.html"&gt;Most recent updates on the hiring of the Programme Director for the A2K programme&lt;/a&gt;. Wikimedia-India mail archive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-February/009418.html"&gt;The Access to Knowledge - Bulletin - January '13&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-basic-parameters"&gt;Indic Wikipedia Visualisation Project #1: Visualising Basic Parameters&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;a href="https://cis-india.org/openness/blog-old/indic-wikipedia-visualisation-project-visualising-page-views-and-project-pages"&gt;Indic Wikipedia Visualisation Project #2: Visualising Page Views and Project Pages&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-April/009867.html"&gt;CIS-A2K Work Plan (Draft)&lt;/a&gt;. Wikimedia-India mail archive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a href="http://lists.wikimedia.org/pipermail/wikimediaindia-l/2013-May/009900.html"&gt;CIS-A2K Budget, Utilization Report and proposed revision&lt;/a&gt;. Wikimedia-India mail archive&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013'&gt;https://cis-india.org/openness/blog-old/cis-access-to-knowledge-narrative-report-september-2012-june-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vishnu Vardhan, Nitika Tandon and Subhashish Panigrahi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-11-30T11:18:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/train-the-trainer-program">
    <title>Train the Trainer Program</title>
    <link>https://cis-india.org/openness/blog-old/train-the-trainer-program</link>
    <description>
        &lt;b&gt;Wikipedians, about 20 of them, from 10 different cities, speaking 8 different languages, joined together for the first ever four days "Train the Trainer Program" organised by the Centre for Internet and Society's Access to Knowledge (CIS-A2K) team in Bangalore from October 3 to 6, 2013.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/TTT"&gt;Read the original published on the Wikipedia meta page&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan"&gt;CIS-A2K&lt;/a&gt; organised the residency training program to build capacities amongst different language Wikimedia communities. A good diversity of Wikipedians from various language communities such as Bengali, Gujarati, Sanskrit, Malayalam, Hindi, Marathi, Telugu, Odia, came over for the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K identified two prominent reasons for organizing the event: (1) Limitations of a virtual sphere, and (2) Limited number of Wikipedians leading outreach activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Limitations of a virtual sphere&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Most open source communities face problem of a lack of time and space for sharing ideas in a non-virtual sphere. Similary Wikipedians, who are voluntary contributors and authors of the articles posted on Wikipedia merely get time and opportunity to meet fellow editors because of the limitations of a virtual platform on which Wikipedia is built. There are twelve active Indian language Wikimedia communities that are spread across the world and moving the bandwagon of collaborating with each other and carving their historic mark of compiling the world's largest encyclopaedia and its other sister projects. To keep this movement alive there is a need of cross-sharing ideas of working together for a common goal and strengthening the leaders of these communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Limited number of Wikipedians leading outreach activities&lt;br /&gt; &lt;/b&gt;&lt;/span&gt;Only a handful of Wikipedians devote their time in leading outreach activities and bringing new blood to the community. Indian language Wikimedia communities are in need of empowering Wikipedians who would lead outreach sessions in order to expand their editor community and strengthen their language projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inception of this program began with the discussion of organizing a training program for the Wikipedians who are willing to conduct more activities in their home cities. Finally on October 3, 2013, Bangalore heard the voices of prominent Wikipedians from Punjab, West Bengal, Odisha, Andhra Pradesh, Gujarat, Maharashtra, Karnataka and Kerala. The Wikipedians delivered presentations on various topics such as — why Wikipedia is needed for the society, why Wikipedia in Indian languages, importance of starting new Wiki projects and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Their presentation delivery skills were judged by &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;Vishnu Vardhan&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/User:Nitika.t"&gt;Nitika Tandon&lt;/a&gt; and all other community members present. They gave individual assessments and feedback for improvement towards the end of the day. Personal trainer Sachin Nagarajappa spent time with Wikipedians discussing mistakes that trainers do while conducting workshops and gradual improvement techniques for impactful outreach. Wikipedia is built on the concept of crowdsourcing and Malayalam Wikimedian &lt;a href="https://ml.wikipedia.org/wiki/User:Viswaprabha"&gt;Viswanathan Prabhakaran&lt;/a&gt; carried out a session about “Crowd Sourcing from the Future” explaining the various layers of crowdsourced projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first day ended with a task where different language Wikipedians formed groups to prepare presentations for the following day.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_TraintheTrainer.png" alt="Train the Trainer 1" class="image-inline" title="Train the Trainer 1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above: Wikipedians Satdeep Gill, Shyamal Lakshminarayan and Shubha during at the CIS-A2K Train-the-Trainer Program (by Subhashish Panigrahi, CC-BY-SA 3.0)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Groups were given a challenge of imagining the audience as new wikipedians. Five groups presented on the second day. Sachin conducted an advanced presentation skill improvement workshop based on the inputs from the participants and the assessment of the group presentations. Veteran Wikipedian &lt;a href="https://kn.wikipedia.org/wiki/ಸದಸ್ಯ:HPNadig"&gt;Hari Prasad Nadig&lt;/a&gt; shared learnings from Challenges &amp;amp; Opportunities in building an Indian Language Community online. Open source activist and CIS's Executive Director &lt;a href="https://cis-india.org/about/people/our-team"&gt;Sunil Abraham&lt;/a&gt; conducted two sessions — a spectrogram based activity to simplify the "Criticality of Neutral Point of View" and an interactive session called “Speed Geeking” on offline and online outreach followed by a one-on-one discussion on the presentation skill improvement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Typing in Indian languages is not easy especially when it comes to multiple typing layout standards followed in the public and private sectors in India. &lt;a href="https://meta.wikimedia.org/wiki/User:Pavanaja"&gt;Dr. U.B.Pavanaja&lt;/a&gt; conducted a session on Unicode standard for Indian languages and its usefulness with a brief context on the fonts and their different operating systems. Social media expert and Wikimedian &lt;a href="https://en.wikipedia.org/wiki/User:Tinucherian"&gt;Tinu Cherian&lt;/a&gt; shared the secrets of popularizing Indian language Wikipedias and bringing outstanding contributors to the limelight, how media played an important role in showcasing initiatives for free encyclopaedic content contribution in India and tips of social media. With fun activities &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;Vishnu Vardhan&lt;/a&gt; shared case studies of making Wikipedia workshops interesting. Wikimedia Foundation board member  and writer &lt;a href="https://meta.wikimedia.org/wiki/User:Aprabhala"&gt;Achal Prabhala&lt;/a&gt; shared stories of documenting Oral traditions in Kerala and South Africa for Wikipedia referencing and how copyright laws evolved in the context of copyright issues that Wikipedia contributors face. Achal also threw light on content donation on WikiSource and other platforms that would be useful for people to consume for knowledge production on diverse platforms where Wikipedia could play a central role. Viswanathan and &lt;a href="https://meta.wikimedia.org/wiki/User:Psubhashish"&gt;Subhashish Panigrahi&lt;/a&gt; demonstrated how to set up a handheld digital camera based prop to easily digitize books without using any scanner and then create electronic books.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most vital part of Wikipedia articles is referencing. Wikimedian &lt;a href="https://en.wikipedia.org/wiki/User:Shyamal"&gt;Shyamal Lakshminarayan&lt;/a&gt; demonstrated how finding sources of references and citing them for the facts on Wikipedia  could be made easier through detailed research and by using several tools available. &lt;a href="https://wiki.wikimedia.in/"&gt;Wikimedia India&lt;/a&gt;'s founding member and veteran Telugu Wikipedian &lt;a href="https://te.wikipedia.org/wiki/వాడుకరి:Arjunaraoc"&gt;Arjuna Rao Chavala&lt;/a&gt; gave a talk about the history and future plans of Wikimedia India. Wikipedians then went to M.G. Road boulevard to see the weaving work by Gandhians, Philately exhibition on Gandhi and spent some time with Namma Metro's staff to know  about the metro operation. Dr. U.B. Pavanaja and Kannada Wikipedian &lt;a href="https://kn.wikipedia.org/wiki/ಸದಸ್ಯ:Omshivaprakash"&gt;Om Shivaprakash&lt;/a&gt; guided Wikipedians to the office of Deccan Herald Prajavani where they got to see the entire newspaper production and spent time with the technical staff to learn about the use of Kannada Unicode fonts for newspaper printing. Editors and staff at Prajavani got to know about the use of WikiCommons as a free image repository.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The four action filled days involved learning new concepts, training on presentation skills, collaborating to create outreach documents, sharing stories from different language communities, understanding new mediums of outreach, meeting Wikipedians from different cities and also having lots of fun. Wikipedians left Bangalore city with happy faces and we hope to cultivate new editors in their communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;List of Participants&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:AbhiSuryawanshi" title="en:user:AbhiSuryawanshi"&gt;Abhishek Suryawanshi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:AnkitaS" title="en:user:AnkitaS"&gt;Ankita Sinha&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Charan_Gill" title="en:user:Charan Gill"&gt;Charan Gill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:jayantanth" title="en:user:jayantanth"&gt;Jayanta Nath&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Kasyap" title="en:user:Kasyap"&gt;Kasyap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Niraj_Suryawanshi" title="en:user:Niraj Suryawanshi"&gt;Niraj Suryawanshi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://te.wikipedia.org/wiki/user:pranayraj1985" title="te:user:pranayraj1985"&gt;pranayraj vangari&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Satdeep_gill" title="en:user:Satdeep gill"&gt;Satdeep Gill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://sa.wikipedia.org/wiki/user:shubha"&gt;Shubha&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Rangilo_Gujarati" title="en:user:Rangilo Gujarati"&gt;Rangilo Gujarati&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://ml.wikipedia.org/wiki/User:Manojk" title="ml:User:Manojk"&gt;Manoj K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/User:MKar" title="en:User:MKar"&gt;Mrutyunjaya Kar&lt;/a&gt; (&lt;a class="extiw" href="https://or.wikipedia.org/wiki/User:MKar" title="or:User:MKar"&gt;Odia Wiki&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://or.wikipedia.org/wiki/User:Subas_Chandra_Rout" title="or:User:Subas Chandra Rout"&gt;Subas Chandra Rout&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Nikhil.kawale" title="en:user:Nikhil.kawale"&gt;Nikhil Kawale&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:%E0%B0%B5%E0%B0%BF%E0%B0%B6%E0%B1%8D%E0%B0%B5%E0%B0%A8%E0%B0%BE%E0%B0%A7%E0%B1%8D.%E0%B0%AC%E0%B0%BF.%E0%B0%95%E0%B1%86." title="te:వాడుకరి:విశ్వనాధ్.బి.కె."&gt;Viswanadh.b.k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://hi.wikipedia.org/wiki/user:Hindustanilanguage" title="hi:user:Hindustanilanguage"&gt;Muzammil&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:John_Noronha" title="en:user:John Noronha"&gt;John Noronha&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/train-the-trainer-program'&gt;https://cis-india.org/openness/blog-old/train-the-trainer-program&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-11-18T07:52:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/spy-files-three">
    <title>Spy Files 3: WikiLeaks Sheds More Light On The Global Surveillance Industry</title>
    <link>https://cis-india.org/internet-governance/blog/spy-files-three</link>
    <description>
        &lt;b&gt;In this article, Maria Xynou looks at WikiLeaks' latest Spy Files and examines the legality of India's surveillance technologies, as well as their potential connection with India's Central Monitoring System (CMS) and implications on human rights. &lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;Last month, WikiLeaks released &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt;“&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt;Spy&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt;Files&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html"&gt; 3”&lt;/a&gt;&lt;/span&gt;, a mass exposure of the global surveillance trade and industry. WikiLeaks first released the Spy Files in December 2011, which entail brochures, presentations, marketing videos and technical specifications on the global trade of surveillance technologies. Spy Files 3 supplements this with 294 additional documents from 92 global intelligence contractors.&lt;/p&gt;

&lt;h2&gt;&lt;b&gt;So what do the latest Spy Files reveal about India?&lt;/b&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;When we think about India, the first issues that probably come to mind are poverty and corruption, while surveillance appears to be a more “Western” and elitist issue. However, while many other developing countries are excluded from WikiLeaks’ list of surveillance technology companies, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;India&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;is&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;once&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;again&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;on&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;the&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;list&lt;/a&gt;&lt;/span&gt; with some of the most controversial spyware.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;ISS World Surveillance Trade Shows&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;The latest Spy Files include a &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;brochure&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;the&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; 2013&lt;/a&gt;&lt;/span&gt; -the so-called “wiretapper’s ball”- which is the world’s largest surveillance trade show. &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;This&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;years&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;’ &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;ISS&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;World&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_ap/"&gt;Asia&lt;/a&gt;&lt;/span&gt; will take place in Malaysia during the first week of December and law enforcement agencies from around the world will have another opportunity to view and purchase the latest surveillance tech. The&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;leaked&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; 2013 &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;brochure&lt;/a&gt;&lt;/span&gt; entails a list of last years’ global attendees. According to the brochure, 53% of the attendees included law enforcement agencies and individuals from the defense, public safety and interior security sectors, 41% of the attendees were ISS vendors and technology integrators, while only 6% of the attendees were telecom operators and from the private enterprise. The brochure boasts that 4,635 individuals from 110 countries attended the ISS World trade shows last year and that the percentage of attendance is increasing.&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;The following table lists the &lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;Indian&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;attendees&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;at&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;last&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;years&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;’ &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;/span&gt;:&lt;/p&gt;
 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Law Enforcement, Defense and Interior Security Attendees&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;th&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Telecom Operators and Private Enterprises Attendees&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;&lt;th&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;ISS Vendors and Technology Integrators Attendees&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Andhra Pradesh India Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;BT&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;AGC Networks&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;CBI Academy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Cogence Investment Bank&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Aqsacom India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Government of India, Telecom Department&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Reliance Communications&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;ClearTrail Technologies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Cabinet Secretariat&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Span Telecom Pvt. Ldt. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Foundation Technologies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Centre for Development of Telematics (C-DOT)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;Kommlabs&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Chandigarh Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Paladion Networks&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Defence Agency&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Polaris Wireless&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India General Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Polixel Security Systems&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Intelligence Department&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Pyramid Cyber Security&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India National Institute of Criminology&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Schleicher Group&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India office LOKAYUKTA NCT DELHI&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Span Technologies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Police Department, A.P.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;TATA India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;India Tamil Nadu Police Department&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Tata Consultancy Services&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Indian Police Service, Vigilance&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Telecommunications India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Indian Telecommunications Authority&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Vehere Interactive&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;NTRO India&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;SAIC Indian Tamil Nadu Police&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; 17                                                        4                                                      15&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

&lt;p align="JUSTIFY"&gt;According to the above table - which is based on data from the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;WikiLeaks&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;’ &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; 2013 &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;brochure&lt;/a&gt;&lt;/span&gt;- the majority of Indian attendees at last years’ ISS World were from the law enforcement, defense and interior security sectors. 15 Indian companies exhibited and sold their surveillance technologies to law enforcement agencies from around the world and it is notable that India’s popular ISP provider, Reliance Communications, attended the trade show too.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In addition to the ISS World 2013 brochure, the Spy Files 3 entail a detailed brochure of a major Indian surveillance technology company: ClearTrail Technologies.&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;ClearTrail Technologies&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt; &lt;/a&gt;&lt;a href="http://www.clear-trail.com/"&gt;Technologies&lt;/a&gt;&lt;/span&gt; is an Indian company based in Indore. The document titled &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Internet&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Suite&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;”&lt;/a&gt;&lt;/span&gt; from ClearTrail Technologies boasts about the company’s mass monitoring, deep packet inspection, COMINT, SIGINT, tactical Internet monitoring, network recording and lawful interception technologies. ClearTrail’s Internet Monitoring Suite includes the following products:&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;1. ComTrail: Mass Monitoring of IP and Voice Networks&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ComTrail&lt;/span&gt;&lt;/a&gt; is an integrated product suite for centralized interception and monitoring of voice and data networks. It is equipped with an advanced analysis engine for pro-active analysis of thousands of connections and is integrated with various tools, such as Link Analysis, Voice Recognition and Target Location.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ComTrail is deployed within a service provider network and its monitoring function correlates voice and data intercepts across diverse networks to provide a comprehensive intelligence picture. ComTrail supports the capture, record and replay of a variety of Voice and IP communications in pretty much any type of communication, including - but not limited to- Gmail, Yahoo, Hotmail, BlackBerry, ICQ and GSM voice calls.&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;Additionally, ComTrail intercepts data from any type of network -whether Wireless, packet data, Wire line or VoIP networks- and can decode hundreds of protocols and P2P applications, including HTTP, Instant Messengers, Web-mails, VoIP Calls and MMS.&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;In short, ComTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Equipped to handle millions of communications per day intercepted over high speed STM &amp;amp; Ethernet Links&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Doubles up as Targeted Monitoring System&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- On demand data retention, capacity exceeding several years&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Instant Analysis across thousands of Terabytes&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Correlates Identities across multiple networks&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Speaker Recognition and Target Location&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;2. xTrail: Targeted IP Monitoring&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;xTrail&lt;/span&gt;&lt;/a&gt; is a solution for interception, decoding and analysis of high speed data traffic over IP networks and independently monitors ISPs/GPRS and 3G networks. xTrail has been designed in such a way that it can be deployed within minutes and enables law enforcement agencies to intercept and monitor targeted communications without degrading the service quality of the IP network. This product is capable of intercepting all types of networks -including wireline, wireless, cable, VoIP and VSAT networks- and acts as a black box for “record and replay” targeted Internet communications.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Interestingly enough, xTrail can filter based on a “pure keyword”, a URL/Domain with a keyword, an IP address, a mobile number or even with just a user identity, such as an email ID, chat ID or VoIP ID. Furthermore, xTrail can be integrated with link analysis tools and can export data in a digital format which can allegedly be presented in court as evidence.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, xTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Pure passive probe&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Designed for rapid field operations at ISP/GPRS/Wi-Max/VSAT Network Gateways&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Stand-alone solution for interception, decoding and analysis of multi Gigabit IP traffic&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Portable trolley based for simplified logistics, can easily be deployed and removed from any network location&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Huge data retention, rich analysis interface and tamper proof court evidence&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Easily integrates with any existing centralized monitoring system for extended coverage&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;3. QuickTrail: Tactical Wi-Fi Monitoring&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;Some of the biggest IP monitoring challenges that law enforcement agencies face include cases when targets operate from public Internet networks and/or use encryption.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;QuickTrail&lt;/span&gt;&lt;/a&gt; is a device which is designed to gather intelligence from public Internet networks, when a target is operating from a cyber cafe, a hotel, a university campus or a free Wi-Fi zone. In particular, QuickTrail is equipped with multiple monitoring tools and techniques that can help intercept almost any wired, Wi-Fi or hybrid Internet network so that a target communication can be monitored. QuickTrail can be deployed within fractions of seconds to intercept, reconstruct, replay and analyze email, chat, VoIP and other Internet activities of a target. This device supports real time monitoring and wiretapping of Ethernet LANs.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;According to ClearTrail’s brochure, QuickTrail is a “all-in-one” device which can intercept secured communications, know passwords with c-Jack attack, alert on activities of a target, support active and passive interception of Wi-Fi and wired LAN and capture, reconstruct and replay. It is noteworthy that QuickTrail can identify a target machine on the basis of an IP address, MAC ID, machine name, activity status and several other parameters. In addition, QuickTrail supports protocol decoding, including HTTP, SMTP, POP3 and HTTPS. This device also enables the remote and central management of field operations at geographically different locations.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, QuickTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Conveniently housed in a laptop computer&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Intercepts Wi-Fi and wired LANs in five different ways&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Breaks WEP, WPA/WPA2 to rip-off secured Wi-Fi networks&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Deploys spyware into a target’s machine&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Monitor’s Gmail, Yahoo and all other HTTPS-based communications&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Reconstructs webmails, chats, VoIP calls, news groups and social networks&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;4. mTrail: Off-The-Air Interception&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;mTrail&lt;/span&gt;&lt;/a&gt; offers active and passive ‘off-the-air’ interception of GSM 900/1800/1900 Mhz phone calls and data to meet law enforcement surveillance and investigation requirements. The mTrail passive interception system works in the stealth mode so that there is no dependence on the network operator and so that the target is unaware of the interception of its communications.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The mTrail system has the capability to scale from interception of 2 channels (carrier frequencies) to 32 channels. mTrail can be deployed either in a mobile or fixed mode: in the mobile mode the system is able to fit into a briefcase, while in the fixed mode the system fits in a rack-mount industrial grade chassis.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Target location identification is supported by using signal strength, target numbers, such as IMSI, TIMSI, IMEI or MSI SDN, which makes it possible to listen to the conversation on so-called “lawfully intercepted” calls in near real-time, as well as to store all calls. Additionally, mTrail supports the interception of targeted calls from pre-defined suspect lists and the monitoring of SMS and protocol information.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, mTrail’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Designed for passive interception of GSM communications&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Intercepts Voice and SMS “off-the-air”&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Detects the location of the target&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Can be deployed as a fixed unit or mounted in a surveillance van&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- No support required from GSM operator&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;b&gt;5. Astra: Remote Monitoring and Infection framework&lt;/b&gt;&lt;/p&gt;

&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Astra&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;”&lt;/a&gt;&lt;/span&gt; is a remote monitoring and infection framework which incorporates both conventional and proprietary infection methods to ensure bot delivery to the targeted devices. It also offers a varied choice in handling the behavior of bots and ensuring non-traceable payload delivery to the controller.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The conventional methods of infection include physical access to a targeted device by using exposed interfaces, such as a CD-ROM, DVD and USB ports, as well as the use of social media engineering techniques. However, Astra also supports bot deployment &lt;i&gt;without&lt;/i&gt; requiring any physical access to the target device.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In particular, Astra can push bot to &lt;i&gt;any&lt;/i&gt; targeted machine sharing the &lt;i&gt;same&lt;/i&gt; LAN (wired, wi-fi or hybrid). The SEED is a generic bot which can identify a target’s location, log keystrokes, capture screen-shots, capture Mic, listen to Skype calls, capture webcams and search the target’s browsing history. Additionally, the SEED bot can also be remotely activated, deactivated or terminated, as and when required. Astra allegedly provides an un-traceable reporting mechanism that operates without using any proxies, which overrules the possibility of getting traced by the target.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Astra’s key features include the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Proactive intelligence gathering&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- End-to-end remote infection and monitoring framework&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Follow the target, beat encryption, listen to in-room conversations, capture keystrokes and screen shots&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Designed for centralized management of thousands of targets&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- A wide range of deployment mechanisms to optimize success ration&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Non-traceable, non-detectable delivery mechanism&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Intrusive yet stealthy&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Easy interface for handling most complex tasks&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Successfully tested over the current top 10 anti-virus available in the market&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- No third party dependencies&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Free from any back-door intervention&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Technologies&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;argue&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;that&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;they&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;meet&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;lawful&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;interception&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;regulatory&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;requirements&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;/span&gt;across the globe. In particular, they claim that their products are compliant with &lt;a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"&gt;&lt;span style="text-decoration: underline;"&gt;ETSI&lt;/span&gt;&lt;/a&gt; and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;CALEA&lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt; &lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;regulations&lt;/a&gt;&lt;/span&gt; and that they are efficient to cater to region specific requirements as well.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The latest Spy Files also include data on foreign  surveillance technology companies operating in India, such as &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Telesoft&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Technologies&lt;/a&gt;&lt;/span&gt;, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"&gt;AGT&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/AGTINTERNATIONAL-2011-UrbaManaSolu-fr.pdf"&gt;International&lt;/a&gt;&lt;/span&gt; and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Verint&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;Systems&lt;/a&gt;&lt;/span&gt;. In particular, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://verint.com/"&gt;Verint&lt;/a&gt;&lt;a href="http://verint.com/"&gt; &lt;/a&gt;&lt;a href="http://verint.com/"&gt;Systems&lt;/a&gt;&lt;/span&gt; has its headquarters in New York and offices all around the world, including Bangalore in India. Founded in 1994 and run by Dan Bodner, Verint Systems produces a wide range of surveillance technologies, including the following:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Impact 360 Speech Analytics&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Impact 360 Text Analytics&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Video Management Software (VMS)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Physical Security Information Management (PSIM)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Network Video Recorders (NVRs)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Video Business Intelligence (VBI)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva Surveillance Analytics&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- Nextiva IP cameras&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- CYBERVISION Network Security&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- ENGAGE suite&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- FOCAL-INFO (FOCAL-COLLECT &amp;amp; FOCAL-ANALYTICS)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- RELIANT&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;- STAR-GATE&lt;/p&gt;
&lt;p&gt;- VANTAGE&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://verint.com/"&gt;Verint&lt;/a&gt;&lt;a href="http://verint.com/"&gt; &lt;/a&gt;&lt;a href="http://verint.com/"&gt;Systems&lt;/a&gt;&lt;/span&gt; claims to be in compliance with ETSI, CALEA and other worldwide lawful interception and standards and regulations, it remains unclear whether such products successfully help law enforcement agencies in tackling crime and terrorism, without violating individuals’ right to privacy and other human rights. After all, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;Verint&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;Systems&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;has&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;participated&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;in&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;ISS&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;World&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;Trade&lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt; &lt;/a&gt;&lt;a href="http://www.issworldtraining.com/iss_europe/"&gt;shows&lt;/a&gt;&lt;/span&gt; which exhibit some of the most controversial spyware in the world, used to target individuals and for mass surveillance.&lt;/p&gt;

&lt;h2&gt;&lt;b&gt;And what do the latest Spy Files mean for India?&lt;/b&gt;&lt;/h2&gt;

&lt;p align="JUSTIFY"&gt;Why is it even important to look at the latest Spy Files? Well, for starters, they reveal data about which Indian law enforcement agencies are interested in surveillance and which companies are interested in selling and/or buying the latest spy gear. And why is any of this important? I can think of three main reasons:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. The Central Monitoring System (CMS)&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. Is any of this surveillance even legal in India?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. Can such surveillance result in the violation of human rights?&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Spy Files 3...and the Central Monitoring System (CMS)&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;Following the &lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt;Mumbai&lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt; 2008 &lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt;terrorist&lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt; &lt;/a&gt;&lt;a href="http://www.noeman.org/gsm/hindi/71159-26-november-2008-mumbai-terrorist-attacks.html"&gt;attacks&lt;/a&gt;, the Telecom Enforcement, Resource and Monitoring (TREM) cells and the Centre for Development of Telematics (C-DOT) started preparing the &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Central&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;Monitoring&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;System&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; (&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;)&lt;/a&gt;. As of April 2013, this project is being manned by the Intelligence Bureau, while agencies which are planned to have access to it include the Research &amp;amp; Analysis Wing (RAW) and the Central Bureau of Investigation (CBI). ISP and Telecom operators are required to&lt;b&gt; &lt;/b&gt;&lt;span&gt;install the gear which enables law enforcement agencies to carry&lt;/span&gt; out the Central Monitoring System under the &lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Unified&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Access&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Services&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; (&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;) &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;Agreement&lt;/a&gt;.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Central Monitoring System aims at centrally monitoring all telecommunications and Internet communications in India and its estimated cost is &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;Rs&lt;/a&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;. 4 &lt;/a&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;billion&lt;/a&gt;&lt;/span&gt;. In addition to &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;equipping&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;government&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;agencies&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;/span&gt;with Direct Electronic Provisioning, filters and alerts on the target numbers, the CMS will also enable Call Data Records (CDR) analysis and data mining to identify personal information of the target numbers. The CMS supplements&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;regional&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Internet&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Monitoring&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Systems&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;, &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;such&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;as&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;that&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.assampolice.gov.in/tenders/20092012/EOI_IMS_20092012.pdf"&gt;Assam&lt;/a&gt;&lt;/span&gt;, by providing a nationwide monitoring of telecommunications and Internet communications, supposedly to assist law enforcement agencies in tackling crime and terrorism.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;However, data monitored and collected through the CMS will be stored in a&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt; &lt;/a&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt;centralised&lt;/a&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt; &lt;/a&gt;&lt;a href="http://www.globalpost.com/dispatch/news/regions/asia-pacific/india/130509/india-central-monitoring-system-government-internet-access"&gt;database&lt;/a&gt;&lt;/span&gt;, which could potentially increase the probability of centralized cyber attacks and thus increase, rather than reduce, threats to national security. Furthermore, some basic rules of statistics indicate that &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;bigger&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;amount&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;of&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;data&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;, &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;bigger&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;probability&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;of&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;an&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;error&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;in&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;matching&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;profiles&lt;/a&gt;&lt;/span&gt;, which could potentially result in innocent people being charged with crimes they did not commit. And most importantly: the CMS currently lacks adequate legal oversight, which means that it remains unclear how monitored data will be used. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;regarding&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;the&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;CMS&lt;/a&gt;&lt;/span&gt; mandates mass surveillance by requiring ISPs and Telecom operators to enable the monitoring and interception of communications. However, targeted and mass surveillance through the CMS not only raises serious questions around its legality, but also creates the potential for abuse of the right to privacy and other human rights.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Interestingly enough, Indian law enforcement agencies which attended &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;last&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;years&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;’ &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;ISS&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;World&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;trade&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/ISS-2013-Sche2013-en.pdf"&gt;shows&lt;/a&gt;&lt;/span&gt; are linked to the Central Monitoring System. In particular, last years’ law enforcement, defense and interior security attendees include the Centre for Development of Telematics (C-DOT) and the Department of Telecommunications, both of which prepared the Central Monitoring System. The list of attendees also includes India’s Intelligence Bureau, which is manning the CMS, as well as the &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;agencies&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;which&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;will&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;have&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;access&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;to&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;the&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt; &lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;CMS&lt;/a&gt;&lt;/span&gt;: the Central Bureau of Investigation (CBI), the Research and Analysis Wing (RAW), the National Technical Research Organization (NTRO) and various other state police departments and intelligence agencies.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Furthermore, Spy Files 3 entail a &lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;list&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;of&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;last&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;years&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;’ &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;ISS&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;World&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;security&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;company&lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt; &lt;/a&gt;&lt;a href="http://wikileaks.org/spyfiles3.html#an1"&gt;attendees&lt;/a&gt;, which includes several Indian companies. Again, interestingly enough, many of these companies may potentially be aiding law enforcement with the technology to carry out the Central Monitoring System. ClearTrail Technologies, in particular, provides &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;solutions&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;for&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;targeted&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;and&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;mass&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;monitoring&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;of&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;IP&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;and&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;voice&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;networks&lt;/a&gt;, as well as remote monitoring and infection frameworks - all of which would potentially be perfect to aid the Central Monitoring System.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In fact, ClearTrail states in its brochure that its &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ComTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;product&lt;/a&gt; is equipped to handle millions of communications per day, while its &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;xTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;product&lt;/a&gt; can easily be integrated with any existing centralised monitoring system for extended coverage. And if that’s not enough, ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Astra&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;” &lt;/a&gt;is designed for the centralized management of thousands of targets. While there may not be any concrete proof that ClearTrail is indeed aiding the Centralized Monitoring System, the facts speak for themselves: ClearTrail is an Indian company which sells target and mass monitoring products to law enforcement agencies. The Centralized Monitoring System is currently being implemented. What are the odds that ClearTrail is &lt;i&gt;not &lt;/i&gt;equipping the CMS? &lt;span&gt;And what are the odds that such technology is &lt;/span&gt;&lt;i&gt;&lt;span&gt;not&lt;/span&gt;&lt;/i&gt;&lt;span&gt; being used for other mass electronic surveillance programmes, such as the Lawful Intercept and Monitoring (LIM)?&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Spy Files 3...and the legality of India’s surveillance technologies&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;ClearTrail Technologies’ &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;brochure&lt;/span&gt;&lt;/a&gt; -the only leaked document on Indian surveillance technology by the latest Spy Files- states that the company complies with &lt;a href="http://www.etsi.org/technologies-clusters/technologies/regulation-legislation"&gt;&lt;span style="text-decoration: underline;"&gt;ETSI&lt;/span&gt;&lt;/a&gt; and &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;CALEA&lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt; &lt;/a&gt;&lt;a href="http://cryptome.org/laes/calea-require.pdf"&gt;regulations&lt;/a&gt;&lt;/span&gt;. While it’s clear that the company complies with U.S. and European regulations on the interception of communications to attract more customers in the international market, such regulations don’t really apply &lt;i&gt;within&lt;/i&gt; India, which is part of ClearTrail’s market. Notably enough, ClearTrail does not mention any compliance with Indian regulations in its brochure. So let’s have a look at them.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;India has five laws which regulate surveillance:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;1. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 1885&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;2. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Post&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Office&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 1898&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;3. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Wireless&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Telegraphy&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 1933&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;4. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;Code&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; &lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;of&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; &lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;Criminal&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; &lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;Procedure&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt; (&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;CrPc&lt;/a&gt;&lt;a href="http://www.delhidistrictcourts.nic.in/CrPC.htm"&gt;)&lt;/a&gt;&lt;/span&gt;, 1973: Section 91&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;5. The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt;, 2008&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Post&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Offices&lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt; does not cover electronic communications and the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Wireless&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Telegraphy&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://tdsat.nic.in/New%20Compendium19.11.2008/TD%20Set%20Vol-1%20PDF/53-58.pdf"&gt; &lt;/a&gt;&lt;/span&gt;lacks procedures which would determine if surveillance should be targeted or not. Neither the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Indian&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt; nor the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; (&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Amendment&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;) &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;/span&gt; cover mass surveillance, but are both limited to targeted surveillance. Moreover, targeted interception in India according to these laws requires case-by-case authorization by either the home secretary or the secretary department of information technology. In other words, unauthorized, limitless, mass surveillance is not technically permitted by law in India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The Indian Telegraph Act mandates that the interception of communications can only be carried out on account of &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;a&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;public&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;emergency&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;or&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;for&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;public&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;safety&lt;/a&gt;. However, in 2008, the Information Technology Act copied most of the interception provisions of the Indian Telegraph Act, but removed the preconditions of public emergency or public safety, and instead expanded the power of the government to order interception for the “investigation of any offense”.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The interception of Internet communications is mainly covered by the &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;2009 &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Rules&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;under&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;the&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Information&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Technology&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Act&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; 2008 &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;and&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;Sections&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; 69 &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;and&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; 69&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;B&lt;/a&gt; are particularly noteworthy. According to these Sections, an Intelligence Bureau officer who leaked national secrets may be imprisoned for up to three years, while Section 69 not only allows for the interception of any information transmitted through a computer resource, but also requires that users disclose their encryption keys upon request or face a jail sentence of up to seven years.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;While these laws allow for the interception of communications and can be viewed as widely controversial, they do not technically permit the &lt;i&gt;mass&lt;/i&gt; surveillance of  communications. In other words, ClearTrail’s products, such as &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ComTrail&lt;/span&gt;&lt;/a&gt;, which enable the mass interception of IP networks, lack legal backing. However, the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Unified&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Access&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Services&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; (&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;) &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt;&lt;/span&gt; regarding the Central Monitoring System mandates mass surveillance and requires ISP and Telecom operators to comply.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Through the licenses of the Department of Telecommunications, Internet service providers, cellular providers and telecoms are required to provide the Government of India direct access to all communications data and content &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;even&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;without&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;a&lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt; &lt;/a&gt;&lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;warrant&lt;/a&gt;, which is not permitted under the laws on interception. These licenses also require cellular providers to have ‘bulk encryption’ of less than 40 bits, which means that potentially any person can use off-the-air interception to monitor phone calls. However, such licenses do not regulate the capture of signal strength, target numbers like IMSI, TIMSI, IMEI or MSI SDN, which can be captured through ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;mTrail&lt;/span&gt;&lt;/a&gt; product.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span&gt;More importantly, following &lt;a class="external-link" href="http://www.financialexpress.com/news/states-begin-to-surrender-offair-phone-snooping-equipment/957859"&gt;allegations&lt;/a&gt; that the National Technical Research Organization (NTRO) had been using off-the-air interception equipment to snoop on politicians in 2011, the Home Ministry issued a directive to ban the possession or use of all off-the-air phone interception gear. As a result, the Indian Government asked the Customs Department to provide an inventory of all all such equipment imported over a ten year period, and it was uncovered that as many as 73,000 pieces of equipment had been imported. Since, the Home Ministry has informed the heads of law enforcement agencies that there has been a &lt;a class="external-link" href="http://m.indianexpress.com/news/state-govts-hand-over-few-offair-phonetapping-sets-to-centre/1185166/"&gt;compete ban on use of such equipment&lt;/a&gt; and that all those who possess such equipment and fail to inform the Government will face prosecution and imprisonment. In short, ClearTrail's product, mTrail, which undertakes off-the-air phone monitoring is illegal and Indian law enforcement agencies are prohibited from using it. &lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;“&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;Astra&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;”&lt;/a&gt; product is capable of remote infection and monitoring, which can push bot to any targeted machine sharing the same LAN. While India’s ISP and telecommunications licenses generally provide some regulations, they appear to be inadequate in regulating specific surveillance technologies which have the capability to target machines and remotely monitor them. Such &lt;a href="http://www.dot.gov.in/licensing/access-services"&gt;&lt;span style="text-decoration: underline;"&gt;licenses&lt;/span&gt;&lt;/a&gt; mandate mass surveillance, but legally, wireless communications are completely unregulated, which raises the question of whether the interception of public Internet networks is allowed. In other words, it is not clear if ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;QuickTrail&lt;/span&gt;&lt;/a&gt; is technically legal or not. The &lt;a class="external-link" href="http://www.auspi.in/policies/UASL.pdf"&gt;UAS License agreement&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;mandates mass surveillance, and while the law does not prohibit it, it does not mandate mass surveillance either. This remains a grey area.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The issue of data retention arises from &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;leaked&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;brochure&lt;/a&gt;. In particular, ClearTrail states in its brochure that ComTrail - which undertakes mass monitoring of IP and Voice networks - retains data upon request, with a capacity that exceeds several years. xTrail - for targeted IP monitoring - has the ability to retain huge volumes of data which can potentially be used as proof in court. However, India currently lacks privacy legislation which would regulate data retention, which means that data collected by ClearTrail could potentially be stored indefinitely.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;a class="external-link" href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Section 7 of the Information Technology (Amendment) Act, 2008&lt;/a&gt;, deals with the retention of electronic records. However, this section does not state a particular data retention period, nor who will have authorized access to data during its retention, who can authorize such access, whether retained data can be shared with third parties and, if so, under what conditions. Section 7 of the Information Technology (Amendment) Act, 2008, appears to be incredibly vague and to fail to regulate data retention adequately.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Data retention requirements for service providers are included in the &lt;a href="https://cis-india.org/internet-governance/blog/data-retention-in-india" class="external-link"&gt;ISP and UASL licenses&lt;/a&gt; and, while they clarify the type of data they retain, they do not specify adequate conditions for data retention. Due to the lack of data protection legislation in India, it remains unclear how long data collected by companies, such as ClearTrail, would be stored for, as well as who would have authorized access to such data during its retention period, whether such data would be shared with third parties and disclosed and if so, under what conditions.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;India currently lacks specific regulations for the use of various types of technologies, which makes it unclear whether &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;spy&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;products&lt;/a&gt;&lt;/span&gt; are technically legal or not. It is clear that ClearTrail’s mass interception products, such as ComTrail, are not legalized - since Indian laws allow for targeted interception- but they are mandated through the &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;agreement&lt;/a&gt;&lt;/span&gt; regarding the Central Monitoring System.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In short, the legality of ClearTrail’s surveillance technologies remains ambiguous. While India’s ISP and telecom licenses and the &lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;UAS&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;License&lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.dot.gov.in/sites/default/files/DOC231013-004.pdf"&gt;Agreement&lt;/a&gt; mandate mass surveillance, the laws - particularly the 2009 Information Technology Rules- mandate targeted surveillance and remain silent on the issue of mass surveillance. Technically, this does not constitute mass surveillance legal or illegal, but rather a grey area. Furthermore, while &lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;India&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Telegraph&lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;Act&lt;/a&gt;, &lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Information&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Technology&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt;Act&lt;/a&gt;&lt;a href="http://police.pondicherry.gov.in/Information%20Technology%20Act%202000%20-%202008%20%28amendment%29.pdf"&gt; &lt;/a&gt;and 2009 Rules allow for the interception, monitoring and decryption of communications and surveillance in general, they do not explicitly regulate the various types of surveillance technologies, but rather attempt to “legalize” them through the blanket term of surveillance.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;One thing is clear: India’s license agreements ensure that all ISPs and telecom operators are a part of the surveillance regime. The lack of regulations for India’s surveillance technologies appear to create a grey zone for the expansion of mass surveillance in the country. According to &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;Saikat&lt;/a&gt;&lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt; &lt;/a&gt;&lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;Datta&lt;/a&gt;&lt;/span&gt;, an investigative journalist, a senior privacy telecom official stated:&lt;/p&gt;
&lt;blockquote class="italized"&gt;“&lt;i&gt;Do you really think a private telecom company can stand up to the government or any intelligence agency and cite law if they want to tap someone’s phone?” &lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;﻿&lt;/p&gt;

&lt;h3&gt;&lt;b&gt;Spy Files 3...and human rights in India&lt;/b&gt;&lt;/h3&gt;

&lt;p align="JUSTIFY"&gt;The facts speak for themselves. The latest Spy Files confirm that the same agencies involved in the development of the Central Monitoring System (CMS) are also interested in the latest surveillance technology sold in the global market. Spy Files 3 also provide data on one of India’s largest surveillance technology companies, &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ClearTrail&lt;/span&gt;&lt;/a&gt;, which sells a wide range of surveillance technologies to law enforcement agencies around the world. And Spy Files 3 show us exactly what these technologies can do.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In particular, ClearTrail’s &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ComTrail&lt;/span&gt;&lt;/a&gt; provides mass monitoring of IP and voice networks, which means that law enforcement agencies using it are capable of  intercepting millions of communications every day through Gmail, Yahoo, Hotmail and others, of correlating our identities across networks and of targeting our location. &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;xTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;/span&gt;enables law enforcement agencies to monitor us based on our “harmless” metadata, such as our IP address, our mobile number and our email ID. Think our data is secure when using the Internet through a cyber cafe? Well &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;QuickTrail&lt;/span&gt;&lt;/a&gt; proves us wrong, as it’s able to assist law enforcement agencies in monitoring and intercepting our communications even when we are using public Internet networks.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And indeed, carrying a mobile phone is like carrying a GPS device, especially since &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;mTrail&lt;/span&gt;&lt;/a&gt; provides law enforcement with off-the-air interception of mobile communications. Not only can mTrail target our location, listen to our calls and store our data, but it can also undertake passive off-the-air interception and monitor our voice, SMS and protocol information. Interestingly enough, mTrail also intercepts targeted calls from a predefined suspect list. The questions though which arise are: who is a suspect? How do we even know if we are suspects? In the age of the War on Terror, potentially anyone could be a suspect and thus potentially anyone’s mobile communications could be intercepted. After all, mass surveillance dictates that &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;we&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;are&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;all&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;suspicious&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;until&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;proven&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;innocent&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;. &lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And if anyone can potentially be a suspect, then potentially anyone can be remotely infected and monitored by &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;Astra&lt;/span&gt;&lt;/a&gt;. Having physical access to a targeted device is a conventional surveillance mean of the past. Today, Astra can &lt;i&gt;remotely&lt;/i&gt; push bot to our laptops and listen to our Skype calls, capture our Webcams, search our browsing history, identify our location and much more. And why is any of this concerning? Because contrary to mainstream belief, &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;we&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;should&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;all&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;have&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;something&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;to&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;hide&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;! &lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;Privacy&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;protects&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;us&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;from&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;abuse&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;from&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;those&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;in&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt;power&lt;/a&gt;&lt;a href="https://www.schneier.com/blog/archives/2008/03/privacy_and_pow.html"&gt; &lt;/a&gt;&lt;/span&gt;and safeguards our individuality and autonomy as human beings. If we are opposed to the idea of the police searching our home without a search warrant, we should be opposed to the idea of our indiscriminate mass surveillance. After all, mass surveillance - especially the type undertaken by &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;ClearTrail&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;’&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;s&lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;products&lt;/a&gt;&lt;/span&gt; -  can potentially result in the access, sharing, disclosure and retention of data much more valuable than that acquired by the police searching our home. Our credit card details, our photos, our acquaintances, our personal thoughts and opinions, and other sensitive personal information can usually be found in our laptops, which potentially can constitute much more incriminating information than that found in our homes.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;And most importantly: even if we think that we have nothing to hide, it’s really not up to us to decide: it’s up to data analysts. While we may think that our data is “harmless”, a data analyst linking our data to various other people and search activities we have undertaken might indicate otherwise. Five years ago, &lt;span style="text-decoration: underline;"&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;a&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;UK&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;student&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;studying&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;Islamic&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;terrorism&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;for&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;his&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;Masters&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;dissertation&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;was&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;detained&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;for&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;six&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt; &lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;days&lt;/a&gt;&lt;a href="http://www.timeshighereducation.co.uk/402844.article"&gt;.&lt;/a&gt;&lt;/span&gt; The student may not have been a terrorist, but his data said this: “Young, male, Muslim... who is downloading Al-Qaeda’s training material” - and that was enough for him to get detained. Clearly, the data analysts mining his online activity did not care about the fact that the only reason why he was downloading Al-Qaeda material was for his Masters dissertation. The fact that he was a male Muslim downloading terrorist material was incriminating enough.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;This incident reveals several concerning points: The first is that he was clearly already under surveillance, prior to downloading Al-Qaeda’s material. However, given that he did not have a criminal record and was “just a Masters student in the UK”, there does not appear to be any probable cause for his surveillance in the first place. Clearly he was on some suspect list on the premise that he is male and Muslim - which is a discriminative approach. The second point is that after this incident, it is likely that some male Muslims may be more cautious about their online activity - with the fear of being on some suspect list and eventually being prosecuted because their data shows that “they’re a terrorist”. Thus, mass surveillance today appears to also have implications on freedom of expression. The third point is that this incident reveals the extent of mass surveillance, since even a document downloaded by a Masters student is being monitored.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;This case proves that innocent people can potentially be under surveillance and prosecuted, as a result of mass, indiscriminate surveillance. Anyone can potentially be a suspect today, and maybe for the wrong reasons. It does not matter if we think our data is “harmless”, but what matters is who is looking at our data, when and why.  Every bit of data potentially hides several other bits of information which we are not aware of, but which will be revealed within a data analysis. We should always &lt;span style="text-decoration: underline;"&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;“&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;have&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;something&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;to&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt; &lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;hide&lt;/a&gt;&lt;a href="https://www.aclu.org/blog/national-security/you-may-have-nothing-hide-you-still-have-something-fear"&gt;”&lt;/a&gt;&lt;/span&gt;, as that is the only way to protect us from abuse by those in power.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;In the contemporary surveillance state, we are all suspects and mass surveillance technologies, such as the ones sold by &lt;a href="http://www.wikileaks.org/spyfiles/docs/CLEARTRAIL-2011-Intemonisuit-en.pdf"&gt;&lt;span style="text-decoration: underline;"&gt;ClearTrail&lt;/span&gt;&lt;/a&gt;, can potentially pose major threats to our right to privacy, freedom of expression and other human rights. And probably the main reason for this is because surveillance technologies in India legally fall in a grey area. Thus, it is recommended that law enforcement agencies in India regulate the various types of surveillance technologies in compliance with the &lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on Communications Surveillance and Human Rights.&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Spy Files 3 show us why our human rights are at peril and why we should fight for our right to be free from suspicion.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p align="JUSTIFY"&gt;This article was &lt;a class="external-link" href="http://www.medianama.com/2013/11/223-spy-files-3-wikileaks-sheds-more-light-on-the-global-surveillance-industry-cis-india/"&gt;cross-posted in Medianama &lt;/a&gt;on 6th November 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/spy-files-three'&gt;https://cis-india.org/internet-governance/blog/spy-files-three&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-11-14T16:21:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report">
    <title>Banking and Accessibility in India: A Report by CIS</title>
    <link>https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report</link>
    <description>
        &lt;b&gt;The report gives an analysis of banking accessibility for persons with disabilities in India. Besides a detailed look at the legal provisions and guidelines on banking and technology, the report also provides a view on different disabilities in relation to banking and accessibility in India and contains case studies and guidelines from countries such as New Zealand, Australia, the United States of America, Canada and the Netherlands. The report sums up the analysis with suggestions and recommendations to improve banking accessibility for persons with disabilities in India.&lt;/b&gt;
        &lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India is a signatory to the United Nations Convention on the Rights of Persons with Disabilities (CRPD), and has an obligation to provide equal opportunities and facilities to everyone, irrespective of any disabilities they might suffer from. This is guaranteed in the right to equality and the right to life, which are enshrined in the fundamental rights in the Constitution of India. There are specific Reserve Bank of India (RBI) notifications that mandate banks to offer banking facilities in a non-discriminatory manner to all customers. Nevertheless, there are many problems faced by people with disabilities while accessing banking and financial services in India. For instance, many banks and Automated Teller Machines (ATMs) are not physically accessible, staff has no training or expertise in dealing with customers who have special needs, and despite the existence of technology, and ATMs are not equipped to be used by people with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several international guidelines which can be referred to while formulating policy on banking accessibility, such as guidelines on ATM construction and modification (USA) and guidelines on making websites accessible for people with disabilities (the Web Content Accessibility Guidelines), as well as voluntary standards that have been taken up by banking associations in countries like Australia and New Zealand in order to make banking more accessible to people with disabilities and the elderly population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The adoption of accessibility features and technologies in Indian banks today is very low, despite there being a legislative as well as executive push for the same. Banks which do not follow these guidelines are not meeting their legal requirements, and it is important for them to understand not just their obligations, but also the benefits that will accrue to them if they follow the suggested guidelines. To that end, this report looks at the current notifications and guidelines that govern this area, the problems faced by people with disabilities, and looks at guidelines from other countries to suggest solutions that can be incorporated by different banks in India.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As per the 2001 Census, there are around 2.19 crore persons with disabilities in India. They constitute 2.13 per cent of the total population of the country.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; This includes persons with visual, hearing, speech, locomotor and mental disabilities. Despite these numbers, there is a lack of understanding of their needs, and people with disabilities face a number of obstacles when it comes to living a normal life, and availing banking facilities is a big part of the problem. Consider the fact that only 50 out of the 1.04 lakh Automated Teller Machines (ATMs) in India are accessible to people with disabilities.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; There is a general lack of infrastructure and awareness in India that permits people with disabilities to use banking services. This translates to problems not just in accessing a physical bank and seeking help from a bank official, but also extends to accessing services such as ATM machines and online banking options. The problem is exacerbated by the fact that around 75 per cent of persons with disabilities live in rural areas, and only around 49 per cent of the disabled population is literate and only 34 per cent is employed.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Although one may find some rare cases of disabled-friendly banking options in the metros, in the rural areas, there are neither facilities nor is there any sensitisation towards meeting the needs of the disabled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is a signatory to both the United Nations Convention on the Rights of Persons with Disabilities, 2006&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; (hereinafter, “UNCRPD”) and Biwako Millennium Framework towards an Inclusive, Barrier-free and Rights-based Society for PWDs in Asia and the Pacific, 2002&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; and thus has an international obligation to ensure equal access to all members of the population. This obligation extends to giving people with disabilities the right to conduct banking services. This has been recognised by several Reserve Bank of India (RBI) directives as well, although these guidelines have not been fully implemented so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, it is very difficult for people with disabilities to use banking services in India. If a person who has a hearing disability walks into a branch for a home loan, the branch does not have a person who can understand or interpret sign language. More usually, the branch does not even have the resources or knowledge about whom to contact to facilitate the interaction by interpreting. These obstacles mean that a person with disability/ies always has to latch on to someone who is fully capable to help them. Without such help in the form of guarantors or co-borrowers who are fully capable, the chances of obtaining finance from the banks are low because bank's probably give a person with disability/ies a much lower credit rating based on their own internal criteria. These determinations automatically put the disabled at a disadvantage. A person with a learning disability, for example, dyslexia, will face severe difficulty filling out an application form (or any document for that matter) and banks are not disabled friendly in terms of the attitude of the staff towards such difficulties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Making banking accessible for people with disabilities is both a best practice that should be followed, as well as a sound commercial decision. There are a large number of people in India with differing levels of disability, who would benefit from using banking services. Additionally, the number of people will only increase with time as India’s young population grows old, since incidence of disability increases with age.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; The Internet, above all, is a tool for people with disabilities to bridge the differences between them and others, and all efforts must be made to ensure that they are not at a disadvantage when it comes to using services such as net banking. There is also the consideration that improving accessibility improves access for all users, and makes it possible for them to make use of more services. A lot of accessibility issues (such as the physical accessibility to branches and ATMs, signature mismatches due to hand tremors or strokes) are common to the disabled, the elderly and those with neurological conditions. Taken together, this constitutes a significant percentage of the customer base — so these issues should be addressed by banks for that reason alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report will look at the legal imperatives that govern accessibility in banking services in India, and look at the various problems being faced by people with disabilities when trying to use banks. It will also look at sample guidelines from other countries and suggest best practices for banking institutions, as well as take a look at the various costs that could be incurred in trying to make their banks more accessible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope of this report is restricted to covering only basic banking services in India, and other financial services, such as insurance and loans, have not been dealt with.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Legal Imperatives&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The rights of persons with disabilities have been recognised under various legal instruments, and it has been established that they are to be given the same services and privileges as other members of society.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutional Provisions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Part III of the Constitution of India, which deals with the fundamental rights of citizens, recognizes the principle of equality of all people. Article 14 states that the government must accord equal protection of the law to any person within the territory of India.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;This recognition of the importance of non-discrimination means that the state must ensure that people with disabilities do not suffer disadvantages when it comes to accessing public services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 15, which deals with prohibition of discrimination on various grounds states that no citizen is to be subject to any disability, liability or restriction with regard to access to shops, public restaurants, and other public places.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is evident that this important constitutional protection extends to people with disabilities, and it is their right to gain equal and accessible access to all manner of services, including banking.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Legislation dealing with Disability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There are several national laws that deal with the rights of people with disabilities, though not all of these laws have a direct bearing with banking.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act, 1995&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act, 1995 (“the PWD Act”) was enacted to give effect to the proclamation on the full participation and equality of people with disabilities on both central and state governments. The PWD Act has been enacted under Article 253 of the Constitution.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;It has several provisions for people with disabilities, including education, employment, creation of barrier free environment, social security and similar overlooked areas. It provides for a three tier arrangement:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For evolution of policy for the benefit of persons with disabilities Implementation of the provisions of the Act and laws, policies, etc., and monitoring implementation and redressing grievances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implementation of the Act relies on collaboration between the appropriate governments, which includes various central ministries and departments, state and union territories, and local bodies.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chapter VIII of the Act deals with non-discrimination, and one of the measures it recommends is making buildings accessible by simple measures such as curb cuts and slopes in the pavements for wheelchair users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several problems with the enactment.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; The terms "accessibility" and "disability" are not clearly defined. They are also not provided as a matter of right but are based on the economic capacity of the service provider. It also fails to consider the access to services and information. However, public banks need to be conscious, since they will usually be considered to have sufficient economic capacity, and might be bound to deliver their services to people with disabilities. This has often become an issue in other jurisdictions as well. In 2009, the Royal Bank of Scotland, for example, was forced to pay extensive damages to a disabled student who was unable to access the bank due to a lack of wheelchair lifts.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The National Trust for the Welfare of Persons with Autism, Cerebral Palsy, Mental Retardation and Multiple Disabilities Act, 1999&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The trust is intended to give complete care to people with mental retardation and cerebral palsy, and also manage the properties bequeathed to the trust. The trust supports programmes that promotes independence and address the concerns of these special persons, especially the ones who do not have family support. The trust is also empowered to receive grants, donations, benefactions, requests and transfers.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Mental Health Act, 1987&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The Act consolidates and amends the law relating to the treatment and care of mentally ill persons, in order to make better provisions with respect to their property and affairs, and other incidental matters.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Rehabilitation Council of India Act, 1992&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The Act was created to provide for the constitution of the Rehabilitation Council of India for regulating training of the rehabilitation professionals and maintaining of a central rehabilitation register. It also regulates the recognized rehabilitation qualifications, and prescribes minimum standards of education.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;RBI Notifications&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The most important resource when it comes to banking guidelines is the RBI, which comes out with regular notifications. The RBI has been conferred wide powers under the Banking Regulation Act, 1949 (BRA),&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; under which it can supervise and control the various banking companies, and they are bound to follow its directions. Section 35A of the Act specifies that in public interest or in the interest of banking policy, the RBI can issue such directions as it deems fit, and the banking companies or the banking company, as the case may be, shall be bound to comply with such directions.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;RBI has released several notifications dealing with the rights of the disabled.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Circular on grant of banking facilities to the visually challenged&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;In its Circular DBOD. No. Leg BC. 91 /09.07.005/2007-08 dated June 4, 2008,&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; the RBI mandated that banking facilities (including cheque book facility, operation of ATM, locker, etc.) cannot be denied to the visually challenged as they are legally competent to contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the notification, the RBI recalled the order of the Chief Commissioner for Persons with Disabilities, which had earlier been passed by the Indian Banks’ Association (“IBA”) to its member banks. The Order instructed that banks should offer all the banking facilities including cheque book facility, ATM facility and locker facility to the visually challenged and also assist them in withdrawal of cash. This order has reiterated that there can be no denial of services just because there is an apprehension of risk in operating or using the facility; it said that a similar security threat exists for all members of the population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the RBI notification, the banks are therefore bound to:&lt;br /&gt;Ensure that all the banking facilities such as cheque books are offered to the visually impaired without any discrimination. These facilities should include third party cheques, ATM, net banking, locker, retail loan and credit card facilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Advise their branches to render all possible assistance to the visually impaired for availing the various banking facilities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Circular on making ATMs accessible&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The RBI had been receiving several suggestions to make branches and ATMs easily accessible to people with disabilities by providing ramps so that wheel chair users can access them and the height of the machine is also appropriate for them. It had also been receiving suggestions for installing speaking software and key pads with letters in Braille to facilitate use by persons with visual impairment. After considering these suggestions, the RBI passed a notification, directing the banks to implement such measures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per its Circular DBOD. No. Leg BC. 91 /09.07.005/2007-08 dated June 4, 2008,  RBI has directed all banks to provide:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Ramps to ATMs: Banks have to take necessary steps to provide all existing ATMs or future ATMs with ramps so that wheelchair users or persons with disabilities can easily access them and also make arrangements in such a way that the height of the ATM does not create an impediment in its use by a wheelchair user.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ramps at bank entrances: Banks may also take appropriate steps including providing ramps at the entrance of the bank branches so that the persons with disabilities or wheelchair users can enter the bank branches and conduct business without much difficulty.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accessible ATMs: Banks should make at least one third of new ATMs installed as talking ATMs with Braille keypads and place them strategically &lt;span&gt;in consultation with other banks&lt;/span&gt; to ensure that at least one talking ATM with Braille keypad is generally available in each locality for catering to needs of visually impaired persons.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Information about the ATMs: Banks should also bring the locations of such talking ATMs to the notice of their disabled customers.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Circular on implementation of the guidelines&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;These guidelines were strongly reiterated as recently as September 5, 2012, where the RBI by its notification numbered DBOD.No. Leg.BC. 38/09.07.005/2012-13&lt;a href="#fn20" name="fr20"&gt;[20] &lt;/a&gt;highlighted the abovementioned circulars. It said that it had been brought to their notice by the Office of the Chief Commissioner for Persons with Disabilities that visually challenged persons are facing problems in availing banking facilities like internet banking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Banks were advised under this notification to strictly adhere to instructions contained in the above circulars and extend all banking facilities to persons with blindness, low-vision and other disabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Circular on guardianship certificates&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The RBI, by its Master Circular DBOD.No.Leg.BC.9/ 09.07.006/ 2009-10&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;dated July 1, 2009 on Customer Service, directed banks to accept guardianship certificates issued by local level committees set up under the National Trust Act, enabling persons with disabilities like autism and cerebral palsy to open and operate accounts. Banks were advised to rely on the guardianship certificate issued either by the district court under the Mental Health Act or by the local level committees under the National Trust Act for the purposes of opening and operating bank accounts&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt; by the legal guardians for people with disabilities that is covered under the Act. Banks were also advised to ensure that their branches give proper guidance so that the parents or relatives of the person with disability/ies do not face any difficulties in this regard. It has also directed that information about the opening of such bank accounts be displayed conspicuously, in both English as well as the regional language, in its circular RBI /2009-10/142.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;i&gt; This notification was in response to a Delhi High Court decision that directed banks to put up such information&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Banks are therefore directed to:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Accept guardianship certificates: Banks can accept certificates issued by local level committees set up under the National Trust Act or district court under the Mental Health Act, so that persons with disabilities like autism and cerebral palsy can open and operate accounts.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provide assistance: Banks should ensure that their branches give proper guidance so that the parents or relatives of the person with disability/ies do not face any difficulties.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Display information: Banks should ensure that information about the opening of such bank accounts be displayed conspicuously, in both English as well as the regional language.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;National Policy on Disability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The National Policy for Persons with Disabilities, which was published in 2006, recognizes the extent of problems faced by the disabled in India. The report also discusses the number of citizens who are affected by disability: “According to the Census 2001, there are 2.19 crore persons with disabilities in India who constitute 2.13 per cent of the total population. This includes persons with visual, hearing, speech, locomotor and mental disabilities. Seventy five per cent of persons with disabilities live in rural areas, 49 per cent of disabled population is literate and only 34 per cent are employed. The earlier emphasis on medical rehabilitation has now been replaced by an emphasis on social rehabilitation. There has been an increasing recognition of the abilities of persons with disabilities and emphasis on mainstreaming them in the society based on their capabilities.”&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;The policy endorses accessibility and says that a barrier-free environment enables people with disabilities to move about safely and freely, and use the facilities within the built environment. In the principle areas of intervention identified by the policy, it ensures that banking services are made barrier free and accessible.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Policy is intended to inform the disability plan to be incorporated in the 11th Five Year plan,&lt;a href="#fn26" name="fr26"&gt;[26] &lt;/a&gt;which will have a timeline and funds for programmes which can be allotted through the Finance Commission.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Explaining Disabilities&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There are many problems faced by people with disabilities when they consider banking and financial services. From the very beginning, banks are a complicated route to charter for people with disabilities. Banks often resort to complex schemes and pricing systems, which can be difficult to understand for people with cognitive disabilities.&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;Finding bank branches and ATMs in their neighbourhood which are disabled-friendly and can be accessible to them is another difficulty, especially in a place like India where finding information is often a problem. There might be problems with physical accessibility — lack of ramp which makes it impossible for a wheelchair-bound person to use a bank or uncomfortable height of an ATM which makes it unwieldy for a wheelchair-bound person to access it — which can extend to the virtual realm as well: if a bank’s website is not complying with the standards for web-accessibility (discussed below) and is difficult to use by people with disabilities, they will be unable to take recourse to internet banking, as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In many countries such as Australia&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt; there is great reliance on phone banking, which can be especially helpful to blind customers, or on audio-based telephone devices, which can be used by deaf-blind or the deaf customers. However, neither technology is at present available in India; text-based alternatives or spoken prompts (TTY based telephone banking) are not used by any banks. It is therefore essential that if a customer is using the interactive voice response (“IVR”) system of a bank and speaking to a bank representative on the phone to get a transaction done that the communication be clear, precise and easy to follow — as anyone who has attempted phone banking in India would testify, that is certainly not the case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let us take a look at some specific disabilities and what banks can do to ensure accessibility to their customers:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Problems faced by the hearing impaired while banking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;When a person who cannot hear goes to a bank, the first problem they face is the fact that unless they are proficient at lip reading, they will find it difficult to communicate with the bank officials or tellers even when undertaking simple tasks like withdrawing money or depositing cheques. An important point to remember is that most hearing impaired people are more familiar with sign language than with English, and so can get confused by the complicated language used by the banks in their brochures and information booklets. If a deaf customer is communicating with the bank official by writing out instructions, it could take a longer time than other customers and they might face problems with other customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another problem that might occur is that error messages or other audio cues might not be picked up by customers who are using multimedia based banking services or ATM machines.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; This problem is exacerbated when using customer care services for banks, which are usually available only on the phone. With a lack of technological options for the hearing impaired, they are unable to access the IVR systems, or interact with customer care executives, which make it difficult for them to avail of all banking service facilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What can banks do?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Training: Ensure that the bank staff is sensitised to the needs of the disabled and deaf customers, and know of a sign language translator who can be called if a customer requires it.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ease of understanding: Make the instructions — both in the physical banks as well as in ATMs and websites — simple and precise, so they are easily understood. This will help all customers, not just those with disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technical solutions: One solution available in some countries is using a phone-to-text machine or software that enables hearing impaired customers to use the phone banking and customer care services of a bank. For example, the Royal Bank of Scotland users can use a Typetalk or BT Textdirect service which will enable them to speak to an operator and so convey their messages.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; If a bank feels that sufficient customers will benefit from such a technology, it should invest in it.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sign language interpretation: A more low-tech solution is to offer interpretative services, where customers who need it can be assisted by someone who is proficient in sign language to help relay their point across to the bank.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Problems faced by the visually impaired while banking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Visually impaired customers can find it difficult to navigate and even reach their banks, if the path is not clear and if the building is not provided with enough ramps and clear entrances. Even understanding the terms and conditions of banks and their services are difficult to comprehend, because the language used to describe services and procedures is confusing and complicated. Often, a booklet with the terms and conditions is simply handed over with no concern for how the person is supposed to read them. Visually impaired people might also face problems in distinguishing details on cheques and other financial instruments which, unlike currency, do not have physically distinguishable marks on them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visually impaired customers often face a lot of problems while using ATMs, because the keys are not marked with recognisable lettering in Braille. Even when there is a token raised symbol on the middle key or Braille markings on the keypad for tactile recognition, there is still the problem that what is being displayed on the touchscreen, as well as the instructions on how to proceed with a transaction, are not capable of being communicated. Most ATMs in India are not equipped with an audio jack, and so can’t be used by blind customers who want to connect headphones and hear the display on the screen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also the problem of signature mismatches, especially when it comes to opening accounts and signing cheques. Currently the bank’s solution is to not have the person with disability/ies sign the cheque, which is not a solution that works consistently, especially when a person with disabilities is running a company. There should be a separate process in place to facilitate issuance of cheques by the visually impaired.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first and most obvious problem with the visually impaired using net banking and other services on the internet is that they won’t be able to see the screen. Similarly, when they attempt to use the ATM machines, the screen cannot be read and the keyboard functions are often unclear. The problem is often accentuated for people with low vision, because the improper lighting, low contrast print and other glares make it difficult to make out what the screen says.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Some sites have a security requirement where users have to input CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) codes in order to validate their payment or to register for a particular service; using such security codes can be particularly problematic for blind customers.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; Banks websites might have pop ups or automatic music playing, which makes it difficult for the visually impaired to use their screen readers. Another problem arises in the mobile applications (“apps”) that are used by various banks; the format is not supported by screen readers on smartphones, and so customers with disabilities can’t use the facility made available to others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What can banks do?&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Training: Sensitise the staff to the needs of blind customers, and ensure that there is a customer care executive who is present when a visually impaired customer needs assistance with a particular service.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accessible formats: Printing out bank documents or statements in large size fonts, Braille or in audio script format if required is the first thing that banks can do to assist their visually impaired customers. Banks can also try to migrate towards accessible e-text or DAISY formats for their disabled customers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Banking Guide: Coming out with a bank note guide to help identify the different bank notes and counterfeits, if any, is also important for visually impaired people who rely on their sense of touch. Similarly, an accessible format guide that takes you through the various steps that are involved in withdrawing cash or using an ATM would greatly assist blind customers who are using a new format or type of bank machine for the first time. At the same time, increasing the screen size and resolution of ATM screens would go a long way in improving access to the customers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Templates: Banks can also be encouraged to come out with cheque book templates, so that blind users can familiarise themselves with using such bank documents and the process of writing cheques becomes easier for them.&lt;a href="#fn34" name="fr34"&gt;[34] &lt;/a&gt;Banks should also develop a better solution to the problem of visually impaired customer’s inability to sign cheques.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Open format statements: Banks should also ensure that when they provide customers with statements, they are made available in open formats, such as HTML or RTF, so that they can easily be read by screen readers. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technical solutions: There are some alternatives to the CAPTCHA codes available, such as audio codes or maths questions. Some sites have the option of hearing the codes, instead of just seeing them. There are also human aided accessible CAPTCHA services (such as Solona), where the customer can send a screenshot of the screen to an aide. However, this has several security and privacy implications, and so is not an ideal solution. Multimedia on the websites of banks should be made optional, with a clear possibility of turning the music or animation off, so that users can use the screen reader without any problems. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mobile apps: Banks should work with their technology partners to ensure that their mobile apps are accessible on all devices and can be used by customers using assistive technology. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Improved ATMs: Several banks around the world are switching to ATMs which give output in multiple formats, such as audio and large-font print,&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; making them more user friendly. There are several guidelines in effect in various jurisdictions which describe better design for ATMs, which takes into account the physical needs of disabled customers; newer ATMs which are set up should be asked to conform to such standards. While this is slowly starting to take place, more banks need to expand and improve their building structures keeping such guidelines and needs in mind. This has been discussed in the next section on ATM Guidelines. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sensitisation: Special care should be taken to explain terms and conditions to visually impaired persons — there should be an effort to ensure that the person who is opening an account has understood the various terms and conditions and not just heard them.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Problems faced by those with physical disabilities while banking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;In India, a major problem is the physical accessibility of banks, with hardly any buildings being equipped with ramps and elevators; even if the bank itself is made accessible via these architectural modifications, the area surrounding the bank, for example, the market place, might be difficult to reach for people in wheelchairs, ultimately making it very difficult for them to use banks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;People with physical disabilities might find controlling their limbs for prolonged periods to be a problem, and so would find it difficult to use not just the physical banking services, but also internet services which necessitate controlling a mouse for a long period of time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What can banks do?&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Build ramps: The most important step that needs to be taken by different banking institutions is ensuring that their ATMs and branches are accessible through a ramp, so that it is physically possible to reach from the road or other public area.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Elevators: Where possible, elevators should also be provided.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Special measures: Within the bank, there should be special provisions for people in wheelchairs or crutches, such as a designated queue and teller, so that they do not have to wait in queue for a long period of time.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Problems faced by those with cognitive disabilities while banking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;People with cognitive disabilities might have lower attention spans and might have problems with understanding complicated bank procedures and requirements. If the steps involved in using an ATM or other physical transactions are not logical and simple, people with cognitive disabilities will be unable to handle them. As a lot of Indian banks are rather chaotic and the transactions lack a certain consistency, people with cognitive disabilities could face a lot of problems adjusting. People who have cognitive disabilities might also be relying on their guardians or parents to assist in operating their bank accounts, and legal and bureaucratic hurdles to doing so can be a big hassle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The front staff at banks are often improperly trained and do not have a holistic understanding of how to deal with people with disabilities. It has also been observed that while banks can be helpful while opening accounts, they are not open-minded about granting loans to people with disabilities.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Customers who are autistic have hand function issues which can cause their signatures not to match the ones on record, which again causes problems when it comes to opening accounts or signing cheques which ultimately bounce.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What can banks do?&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Sensitisation: Sensitise the staff to the special needs of customers with cognitive disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Display of information: Information for guardians of such customers, on the requirements for opening bank accounts, should be prominently displayed in the branches of the bank (Refer to Section 4.3.4).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Uniformity in procedures: Banks should make uniform guidelines or procedures to be followed for each transaction, so that there is a certainty and regularity that eases the way for people with cognitive disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clear language: Banks should also ensure that they use extremely simple and clear language in all their transactions as well as literature in order to mitigate confusion.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Identity establishment: There need to be rules put in place to allow those who are unable to sign properly to establish identity in some other manner.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Guidelines on Banking Services and Technology&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The previous section has looked at some of the problems being faced by people with disabilities when they access banking services in India. This section will look at some guidelines and best practices which are aimed at increasing the accessibility of services.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mobile banking&lt;/h3&gt;
&lt;p&gt;There is the possibility of accessing a variety of financial services through mobile devices, which are termed as mobile banking or “m-banking”. This accessibility means that a lot of people with disabilities who live in rural areas, who have earlier not been able to access banks, can now do so using their mobile phones. Mobile banking also makes it much easier for customers with bank accounts to access their details and do transactions — for people with disabilities, this is a big step forward, as it means they do not have to endure the hassle and inconvenience of going to a bank, where they may not find the assistance that they need.&lt;/p&gt;
&lt;p&gt;Currently, mobile banking is not that prevalent in India; less than one per cent of current bank customers are covered under the mobile banking services.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the growth in mobile banking transactions has shown an increasing trend. For example, in the month of June 2012, 3.43 million transactions amounting to Rs. 3067.10 million were processed, as compared to 1.41 million transactions amounting to Rs. 984.66 million processed in June 2011 — an increase of about 143 per cent in volume and approximately 211 per cent in value terms.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Reserve Bank of India has passed some operating guidelines for mobile banking transactions.&lt;a href="#fn40" name="fr40"&gt;[40]&lt;/a&gt; These guidelines specify the technology and security standards, as well as the requirements for interoperability between operators, transaction limits and procedure for grievance redressal. They also tackle customer protection issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Banks should leverage the flexibility and utility of mobile banking in increasing access to their customers who have disabilities, as it would mean lesser expenses for both the banks as well as the customers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Internet banking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Internet banking is increasingly popular with customers, due to its convenience and ease of use; it removes the necessity of physically going to a bank. Since physical banks are often difficult for people with disabilities to navigate, internet banking could provide the best solution (though there are several problems with this medium as well, as have been described in the previous chapter). However, banks can make their websites more accessible and follow the prescribed guidelines to ensure a better banking experience not just for their disabled customers, but for all customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biggest obstacle that comes with developing net banking options which are accessible to all is the wide diversity in the people who are trying to access the banks’ websites, and it is here that universal design comes into play. “The goal of universal design is to have each web page accessible by all people, instead of providing separate web pages for people with disabilities.  This requires, for example, for people who are blind, textual equivalents for all images, and reading order and structure compatible with screen reading; for people who are deaf, visual equivalents such as captions for all audio information; and for people with motor disabilities, means to navigate the page without fine motor control.”&lt;a href="#fn41" name="fr41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are a set of standards in place for website accessibility. The Web Content Accessibility Guidelines (“WCAG”) 2.0 specify the manner in which the material on any website is to be perceivable, operable, understandable and robust.&lt;a href="#fn42" name="fr42"&gt;[42]&lt;/a&gt; Under these four stated principles of web content accessibility, twelve guidelines have been given, which give the web content developers a framework and set of objectives to understand the needs of the disabled. There are also levels of conformance that are defined for each guideline, and a list of sufficient and advisory techniques has also been given.&lt;a href="#fn43" name="fr43"&gt;[43]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The WCAG 2.0 Guidelines includes some basic steps, such as including text alternatives for all non-text objects, including descriptors or captioning for images, audio and animated sequences, and following a style sheet wherever possible, in order to maintain a consistent design. The guidelines deal with visibility and display (using contrasting colours for background and text; using relative sizing so that the text can be increased to upto 200 per cent), functionality (providing skip links such as “Back to Top”; ensuring that animation can be paused or switched off; ensuring keyboard as well as mouse functionality), and formatting (ensuring the text is not justified; setting the language attribute of each page; providing clear navigation mechanisms; ensuring that all mark up is validated and coded correctly), amongst others.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Informatics Centre (NIC) has developed some guidelines for government websites, which contain best practices for accessibility in website design; these guidelines were released in 2009, and are mandated for governmental websites. The guidelines are classified into three categories: mandatory, advisory and voluntary; a compliance matrix has been provided for various departments and organisations to assess their compliance with the guidelines.&lt;a href="#fn45" name="fr45"&gt;[45]&lt;/a&gt; It is crucial that banks comply with these guidelines to ensure that a certain basic minimum standard at web accessibility is met for the banking customers across all websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another dimension which is unique to India is that of regional language; for banking customers who are not comfortable with English, it is recommended that bank websites be provided in major regional languages as well.  The best way to display regional fonts is to use Unicode (UTF-8). Banks should ensure that Unicode is used to display the fonts, as otherwise the fonts can become garbled and a person using a screen reader will not be able to access the written material at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A critical guideline to be followed is that visual information should also be coupled with audio information, and that frequency and volume of the audible cues should be capable of being configured and controlled by the user.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Automated Teller Machines (ATMs)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The number of ATMs and their penetration in India is very low: 63 ATMs and 497 points of sale per million population,&lt;a href="#fn47" name="fr47"&gt;[47]&lt;/a&gt; and a number of regulatory and commercial requirements have led to their relative low (though increasing) use in India. RBI has recently passed guidelines on operating White Label ATMs&lt;a href="#fn48" name="fr48"&gt;[48] &lt;/a&gt;which effectively open up most of the acquiring part of the process to non-bank independent players.&lt;a href="#fn49" name="fr49"&gt;[49] &lt;/a&gt;This should ensure that there is a greater increase in the number and penetration of ATMs in India, which will be beneficial for people with disabilities only if the ATM-makers ensure that minimum guidelines for the disabled are met with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently there are no guidelines in India on how to construct ATMs in accordance with the needs of people with disabilities. However, banks can take guidelines from other jurisdictions as their guide and look at how other countries have handled the issue of making ATMs more accessible. It is hoped that this lacuna in the policy will be filled soon.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The American Department of Justice recently notified a final ruling on the standards of accessibility relating to ATMs under the Americans with Disability Act (“ADA”). Such standards range from requirements that signs be in Braille, a voice guidance system, and input controls for blind users.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt; These standards took effect in March 2011, and had a March 2012 compliance date. All ATM owners are to comply with these guidelines when constructing or altering ATMs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some salient features of these guidelines are:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Height and reach: It is mandated that the ATM’s reach should be between 15 and 48 inches. Further, the graphic area where the touch commands are input needs to be lowered to the desired height. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The input device should be tactile, and so the surface of the keys should be different from the base and this should be apparent by touch. The keypad should also be arranged in a standard 12-key ascending or descending layout, as seen in telephones or computers. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ATMs must be equipped with both voice guidance systems as well as Braille language signage. This would mean adding a headphone jack to the machine, so the audio is heard only by the user and thus ensuring his privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The display in the ATM needs to be clear; from an observation point 40 inches above the floor in front of the machine, the letters should appear in a sans serif font, with a minimum height of 3/16 inches, in a colour contrasting to the background. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There is also a requirement of equal services, which means that all services offered at any location through a bank’s ATM must also be provided by an “accessible” ATM in the same location. For this purpose, each installation is to be considered as a separate location.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Indian Banks’ Association (IBA) has issued a Standards document on Accessible ATMs for customers with disabilities, and has also released a work flow document to be followed by various banks. The IBA Standards documents states that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;“The fundamental principle of an Accessible ATM for development, testing and implementation purposes is to ensure a machine which enable the user to complete all transactions successfully with a blank screen simply through voice guidance for totally blind users, permit independent use through clear screen data for low vision / partially sighted users and effective physical access for wheel chair users.”&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The document specifies different accessibility measures to be taken for each level of accessibility (for example: completely blind users and users with partial sight), with details about the size and measurement of various features that need to be incorporated. It also includes a workflow to be incorporated into the Speaking ATMs for the effective use by people with disabilities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Currency&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For currency to be most effective as a means of payment, all users should have barrier-free access. The ability to conduct financial transactions using bank notes is crucial to independent living.&lt;a href="#fn52" name="fr52"&gt;[52] &lt;/a&gt;Yet this can pose significant challenges for individuals who are blind or partially sighted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Physical currency (both notes and coins) are confusing and often cannot be distinguished from each other by merely feeling them. There is a great similarity between the hundred, five hundred and thousand rupee notes, as well as in the coins which are now completely confusing. Notes should also be discernible to the colour blind, which in their current form is not always possible. Various representations have been made to the Government of India on this regard and the change required is only a small one, though no changes have so far been forthcoming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India can learn from the example of other countries which have experimented in the past with introducing currency which is friendlier to people with disabilities. Whether it is the printing of differently coloured notes, or the development of “raised-texture tactile features,”&lt;a href="#fn53" name="fr53"&gt;[53]&lt;/a&gt; there are several alterations that can be made to the currency. In India, the bank notes come with raised texture shapes to help the visually impaired to identify the different notes, and also come in different colours, though further improvements can be made. This problem is exacerbated in the coins — earlier, there was a differentiation in shape between them, but the newly minted coins of denominations Rs. 1, Rs. 2 and Rs. 5 are all very similar, and differentiating between them is a big problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In countries such as Canada, development of bank notes is based on a “continuous process that relies on scientific and empirical research, together with direct feedback from bank note user groups and experts. The bank consults Canadians living with blindness and low vision, as well as their representative organizations and vision experts, to identify the needs of this community and to explore potential solutions.”&lt;a href="#fn54" name="fr54"&gt;[54] &lt;/a&gt;It is this sort of consultative process that needs to be incorporated in India as well.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Telephone Banking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Telephone banking is in its nascence in India and not all banks provide it. Furthermore, there are no guidelines in place to govern how telephone banking would take place. For people with disabilities, telephone banking could be very useful, if the proper tools are made available to them. Banks can look at the draft guidelines of other countries (refer to section 8 of the Report) which have provisions for phone banking to see what kind of procedure they should follow.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Converting to Accessibility in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Making banking accessible is not just in the commercial interest of the bank but is also in line with its commitments under various legislation and international conventions. In India, this has even been acknowledged by the RBI, which has issued a notification&lt;a href="#fn55" name="fr55"&gt;[55]&lt;/a&gt; suggesting that at least one-third of the new ATMs of all banks must be accessible.&lt;a href="#fn56" name="fr56"&gt;[56]&lt;/a&gt; Dinesh Kaushal has studied&lt;a href="#fn57" name="fr57"&gt;[57]&lt;/a&gt; some examples, such as the Punjab National Bank, which has set up some talking ATMs in Jaipur, or the State Bank of India which in 2010 announced plans of installing 7000 talking ATMs, but there is no news on the status of this goal. Currently the bare minimum target set by RBI is also not being met.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subsequent to the RBI notifications, some positive developments have started taking place. The Union Bank of India has indicated that it will deploy over 100 Voice Guided ATMs — which not only allows access to visually impaired people but also people with physical disabilities through ramps for wheel chair access.&lt;a href="#fn58" name="fr58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Half of these ATMs are to be put up in the banks, and the other half in passport offices. The ‘Talking ATM’ is designed as per Access for All (AFA) standards and comprise of accessible key pads, voice-guidance technology, Braille stickers and multi-lingual capability. When a visually challenged person attaches his headphone set to this ATM, he can hear the instruction which enables him to fill-in the required data using the numeric keypad. Apart from reading aloud screen messages, the machine provides complete orientation making it easy for the customer to use the machine. An important security feature of this ATM is that it provides the person an option to blank out the screen as a safety mechanism to avoid shoulder surfing by any bystander trying to access customer data during the transaction.&lt;a href="#fn59" name="fr59"&gt;[59]&lt;/a&gt; The bank recently completed setting up the 100th such ATM in the building of the National Association for the Blind.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NCR Corporation India, which has a 47.5 per cent share in the country’s ATM business, has stated that it will install 50 ‘talking’ ATMs in various passport offices.&lt;a href="#fn60" name="fr60"&gt;[60] &lt;/a&gt;The company set up India’s first talking ATM in Ahmedabad for the visually impaired under the Union Bank of India initiative described above. Importantly, the managing director of the ATM company stated that while the hardware of the ATMs remains the same, the software customisations depend on the specific needs. Banks do not need to change their entire fleet of ATMs for installation of new solutions.&lt;a href="#fn61" name="fr61"&gt;[61] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One concern that arises when we consider questions of accessibility is: what would be the cost of altering the present technology and infrastructure? If the cost of making banking accessible is too prohibitive, it would not be in the interests of the banks to do so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A talking ATM is the regular ATM with an additional module that allows a blind person to get the information in audio format. A talking ATM could be configured so that when a user plugs in a headphone in the audio jack, the ATM would start talking to the person with audio messages…Installing talking ATM technology is not very expensive. It might range anywhere between Rs. 25,000 and Rs. 50,000.”&lt;a href="#fn62" name="fr62"&gt;[62] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There needs to be an evaluation of the present ATMs to see if merely upgrading the software would suffice in converting them to speaking ATMs — if this is the case, it can be done so with the help of the manufacturer at a low cost. The evaluation would also help the banks identify those machines which can be upgraded by the addition of some simple technology and hardware, while the others could be marked for eventual replacement. At the same time, the new machines that are set up by the banks should be audio-enabled; this should not be difficult as “all new ATM installations are audio enabled, as all major ATM manufacturers now produce talking ATMs including Triton, NCR, Wincor-Nixdorf, Diebold, and Fujitsu.”&lt;a href="#fn63" name="fr63"&gt;[63] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Americans with Disability Act, the determination of when an undue burden is placed on an establishment which has to make its services accessible is to be determined on a case by case basis, and would be considered keeping in mind factors such as the nature and cost of the upgrades, the availability of alternatives and the resources present with the financial institution in question.&lt;a href="#fn64" name="fr64"&gt;[64] &lt;/a&gt;Such a system should be incorporated in India as well, where the ability of the bank is considered when seeing the efforts it needs to make when converting its services to make them more accessible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Union Bank of India’s Accessible and Talking ATM has brought in many initiatives for the first time, like the use of bilingual Indian accent text-to-speech (TTS) voices in English and Hindi, accessible infrastructure for the physically disabled and complete voice guidance support for ATM operation.&lt;a href="#fn65" name="fr65"&gt;[65]&lt;/a&gt; These should set the benchmark for other banks who want to improve the accessibility of their services as per the guidelines set forth by RBI.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Case studies and Guidelines in Other Countries&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Looking at the guidelines that are present in other countries can be helpful in determining how banks in India should go about improving their services. The following countries have specific provisions in place which regulate or instruct how banks should handle their disabled customers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;New Zealand&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The New Zealand Banker’s Association published a set of Voluntary Guidelines to meet the needs of older and disabled customers, which aim to improve access to banking services for such customers.&lt;a href="#fn66" name="fr66"&gt;[66]&lt;/a&gt; The guidelines recognise the increasing importance of older and disabled customers to banks as well as the importance of meeting their needs and demands. The guidelines direct the member banks to give training to the staff in order to better help the disabled customers, as well as to have specific procedures in place in case financial irregularities or abuse occur in bank accounts of people with disabilities. There are directions on improving physical accessibility (such as providing for low tables, ramps in ATMs, queuing aisles wide enough for wheelchairs and so on), as well as giving specific customer care help to those who need it, such as consulting the needs of the disabled when developing new services, having a provision for a reduction in fee if some customers are unable to use certain features, and having a provision for personal banking in special cases at no additional cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are also specific provisions in the Guidelines for things such as ATM construction. Section 5.9 of the Guidelines specifies the factors to be kept in mind while designing ATMs: large screens, audible output, tactile differentiation in the keys, easy prompts in clear language and so on.&lt;a href="#fn67" name="fr67"&gt;[67] &lt;/a&gt;Section 5.10 talks about improving the accessibility of online banking and how bank websites should be designed, and recommends the use of international W3C web accessibility best practice standard, the accessibility-related New Zealand e-government web standards.&lt;a href="#fn68" name="fr68"&gt;[68]&lt;/a&gt; Finally, the Guidelines also talk about basics, such as clear and large font prints in their literature, and providing information in several formats (including Braille, DVD, and audio) wherever possible, to facilitate bank use by people with disabilities.&lt;a href="#fn69" name="fr69"&gt;[69]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Australia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Disability Discrimination Act, 1992 (“DDA”) makes it unlawful to discriminate against a person on the grounds of a disability.&lt;a href="#fn70" name="fr70"&gt;[70]&lt;/a&gt; The objects of the DDA include eliminating, as far as possible, discrimination against people with disabilities and promoting recognition and acceptance within the community that people with disabilities have the same fundamental rights as the rest of the community. The law is administered by the Human Rights and Equal Opportunity Commission and sets out specific areas in which it is unlawful to discriminate. These areas include accommodation, employment, access to premises, and the provision of goods, services&lt;a href="#fn71" name="fr71"&gt;[71]&lt;/a&gt; and facilities. The HREOC administers the legislation, which includes complaints handling, public inquiries, policy development and education and training. The Commission has supported the development of several voluntary guidelines that determine accessibility in the sphere of banking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Australian Bankers’ Association (“ABA”) has worked with the community to produce voluntary Industry Standards in 2002 which aim to improve the accessibility of electronic banking. These standards cover a range of areas: ATMs, Electronic Funds Transfer at the Point of Sale, Automated Phone Banking and Internet banking.&lt;a href="#fn72" name="fr72"&gt;[72]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The voluntary standards for ATMs&lt;a href="#fn73" name="fr73"&gt;[73]&lt;/a&gt; cover a broad range of topics, including their access and location,  their operation, the method of swiping and removing the cards, the  display, the keypad, the output, security and privacy for the users, and  finally, installation and operating instructions. There is a checklist  provided with the recommended detailed standards for each of the above  areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Electronic Funds Transfer at Point of Sale&lt;a href="#fn74" name="fr74"&gt;[74]&lt;/a&gt; occurs when funds are directly transferred from a cardholder's bank account to the retailer, when the cardholder's magnetic stripe card is swiped in an EFTPOS terminal. Cardholder authentication occurs by signature or Personal Identification Number (PIN). These standards cover areas such as access and location of the EFTPOS terminals, process of swiping, inserting or removing the card, operating instructions, display, keypad and output options, amongst others. A helpful checklist has been provided for EFTPOS deployers to assess whether their machines are disabled-friendly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The guidelines on phone banking&lt;a href="#fn75" name="fr75"&gt;[75]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;deal with financial services which are available to the customer via the telephone, that can be used by the customer without having to converse with an employee of the financial institution. The guidelines look at certain design principles, best practices for input and navigation, output, documentation, the role of TTY Communications and Relay Operators, and dealing with timeouts and errors. Like with the other standards, a checklist with the best practices as per the guidelines has been provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standards  on internet banking&lt;a href="#fn76" name="fr76"&gt;[76]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;looks at various aspects of financial transactions taking place on the internet, and prescribe guidelines for design and implementation (for example: compliance with the WCAG1.0 standards), feedback and testing of accessibility, compatibility, enhanced usability (in areas such as navigation, registration, login, information redundancy and so on), consistency and user support. A specification checklist is also provided, so that owners can comfortably see whether their site is compliant with the guidelines or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is an action plan for the above four set of guidelines, to check their implementation and to identify problems and barriers that may arise in the future.&lt;a href="#fn77" name="fr77"&gt;[77]&lt;/a&gt; Though these guidelines are voluntary, it is worthwhile to consider the example of such a detailed action plan, as implementation of any sort of guidelines will only become more efficient if something like this is followed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Australian Banker’s Association has also come up with a set of Guiding Principles for Accessible Authentication, which recognizes that “accessibility issues need to be considered in the deployment of authentication technologies, to ensure that people with disabilities and older people are not disadvantaged… The purpose of the Guiding Principles is to provide a framework for financial institutions to help reach a workable balance between security requirements, commercial strategies and equitable access to banking products and services.”&lt;a href="#fn78" name="fr78"&gt;[78]&lt;/a&gt; The Principles aim to follow certain universal design principles, of equitable and flexible use, minimal effort, simple and intuitive design, amongst others.  They are as follows:&lt;a href="#fn79" name="fr79"&gt;[79]&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Accessibility of authentication technologies:&lt;/span&gt; Financial institutions should ensure that authentication technologies are accessible to all customers, or where this is not possible, a human-based alternative authentication system needs to provide equivalent amenity and convenience.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Customer convenience:&lt;/span&gt; All customers should be able to undertake their personal and business financial activities conveniently and safely.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Authentication planning:&lt;/span&gt; Financial institutions should consider the accessibility needs of customers with disabilities and older customers as part of authentication technology planning.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Authentication testing&lt;/span&gt;: Financial institutions should consult customers with disabilities and older customers as part of planning and testing accessibility of authentication technologies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Registration, login and transaction procedures&lt;/span&gt;: Financial institutions should ensure that registration; login and transaction procedures are as accessible as possible to all customers.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Messages and error recovery&lt;/span&gt;: Financial institutions should ensure that online messages are unambiguous and written in “plain English” and that error recovery processes are efficient and accessible. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Staff and customer training&lt;/span&gt;: Financial institutions should provide relevant customer support staff with appropriate disability awareness training so they are aware of the needs of customers with disabilities and older customers. In addition, financial institutions should provide customers with information and training in the use of available authentication technologies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Raising staff, business and customer awareness:&lt;/span&gt; Financial institutions should develop a strategy for enabling relevant management and staff awareness of these Guiding Principles. In addition, financial institutions should promote the availability of alternative accessible authentication technologies with their customers. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Confidentiality of customer information&lt;/span&gt;: Financial institutions must ensure the confidentiality of information of customers with disabilities and older customers.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;United States of America&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The 2010 Standards under the ADA have set out detailed requirements to make ATMs accessible, as was discussed in the previous section of the paper. These elements are considered by the Department of Justice to be Auxiliary Aids and Services (and not structural elements) and the safe harbour provision does not apply to them.&lt;a href="#fn80" name="fr80"&gt;[80]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though American ATMs have been equipped with text to speech functions and have been subject to height and space requirements for many years, the new rules provide for additional security and instructional features for disabled customers.&lt;a href="#fn81" name="fr81"&gt;[81]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All the ATMs which come under the scope of the ruling will have to be speech enabled; further, there are specifications as to the height requirement (the machine should be between 15 and 48 inches in height). There is a requirement that the input area be not just touchscreen, and it should be tactilely discernible from the surrounding surface; the keypad should be arranged in a manner that is common and easy to remember. Instructions about the use of the ATMs should be given in Braille and equal services should be offered to all customers, irrespective of their disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subsequent to the passing of the ruling, the American Bankers’ Association recommended that banks be aware of the legal requirements under the Americans with Disabilities Act; ABA advocated that banks make a careful audit of their existing machines, and compare them to the standards to which they need to conform. In case the machines need to be upgraded, the machine manufacturers would have to be contacted in order to make alterations, if necessary.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Canada&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Canada has issued standards for “self-service interactive devices”,&lt;a href="#fn82" name="fr82"&gt;[82] &lt;/a&gt;the umbrella term under which ATMs would fall, the purpose of which is to specify minimum accessibility and usability requirements for self-service interactive devices intended for public use. The standard specifies accessibility requirements for automated banking machines (ABMs) — both stand-alone and wall mounted — and ABM sites. There are specifications which give the various minimum dimensions that must be conformed to when constructing such self-service interactive devices. However, the standards do not look at the technological aspect, specifically excluding it from their purview and giving that responsibility to the relevant authority.&lt;a href="#fn83" name="fr83"&gt;[83]&lt;/a&gt; It is interesting to note that the steering committee that ultimately led to the adoption of the standards was pulled together by the Canadian Banker’s Association, and the committee included representatives from the major Canadian banks.&lt;a href="#fn84" name="fr84"&gt;[84]&lt;/a&gt; The committee recommended that there be a mandatory requirement for audible instructions and the provision for attaching headphones to an automated banking machine; it would be the duty of the financial institution to provide the headsets to the disabled customers, along with a list of machines where they could be used. The committee also looked into the issue of the cost of making the machines and other areas more accessible, and though they were waiting for more conclusive research, they were hesitant about the prohibitive cost of major redesigns.&lt;a href="#fn85" name="fr85"&gt;[85]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Netherlands&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2007, the Dutch National Forum on the Payment System produced a document in English on "Guidelines for user-friendly payment terminals". These guidelines include advice on making payment terminals accessible and easy to use for people with disabilities and older people.&lt;a href="#fn86" name="fr86"&gt;[86]&lt;/a&gt; The guidelines describe certain standardised elements of the PIN payment procedure, the user interface and advocates practical values for the same.&lt;a href="#fn87" name="fr87"&gt;[87]&lt;/a&gt; The document then goes on to specify important design principles which must be kept in mind while considering the accessibility of payment gateways and banks; the guideline is designed in such a way that if the design principles are to be kept in mind, the subsequent ergonomic principles which have been described will be easy to meet.&lt;a href="#fn88" name="fr88"&gt;[88]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Suggestions and Recommendations&lt;/h2&gt;
&lt;p&gt;The report illustrates that though banks are mandated to ensure that there is accessibility in banking services in India, there is still a lot that needs to be done. There are several measures that can be taken up by banks, which will not be costly and which will be especially rewarding for customers with disabilities:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Compliance with RBI Guidelines: Banks should ensure a basic minimum compliance with the guidelines set forth by RBI for increasing access to banking services as described in Section 4.3 of the Report. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Compliance with International norms: Banks also need to ensure a basic minimum compliance with international norms, such as the WCAG 2.0 standards for websites, so that people with disabilities can access the bank websites with ease.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Physical Accessibility: Banks need to ensure that as far as possible, there is at least physical accessibility to their branches — which would include building ramps, having wider lifts, and so on. Branches should, even if they cannot be located on the ground floor, at least make reasonable accommodations for the disabled, such as having a person who can assist them up to the branch or come down to meet them. Branches should be organised in an easily navigable manner and there should always be a plan for assistance in place — interpreters, special staff to assist with filling out of forms, physical assistance, and easily available information in the form of maps, diagrams, bold text explanations, etc. Banks should also focus more on creating avenues for disabled customers to use their services. This would include building usable and user-friendly voice  systems, which is currently needed.&lt;a href="#fn89" name="fr89"&gt;[89]&lt;/a&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technical Solutions: Today there are many technological solutions to overcome some of the barriers faced by the visually challenged in the area of banking. Finger print identification technology&lt;a href="#fn90" name="fr90"&gt;[90]&lt;/a&gt; can be effectively explored to allow the use of thumb impressions while operating bank accounts.&lt;a href="#fn91" name="fr91"&gt;[91]&lt;/a&gt; For example, the XRCVC is in the process of developing a 'thumb print recognition software named as "e-Signs" with the help of CMC Ltd. (a TATA Enterprise) which can be applied across the banking system in partnership with the RBI to process cheques.&lt;a href="#fn92" name="fr92"&gt;[92]&lt;/a&gt; Most manufacturers now have accessible ATM models and banks must ensure that new ATMs have these models installed, and that old ATMs are retrofitted to become accessible. Banks should also work with their technology departments to ensure that their mobile apps are accessible on screen reader and other assistive technology software.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Promote the growth of banking services for people with disabilities: State and national governments should encourage opening of bank accounts by the disabled so that any funds or scholarships can be directly transferred into their account as opposed to being given to organisations which may not transfer it to the beneficiaries — this would help curb malpractices. Information on how people with disabilities can open an account — whether joint or single — and the formalities they need to fulfil should be made easily and readily available. This will encourage more people to open accounts for/with the disabled.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Adopt accessible formats for disabled customers: Banks should publish instruction manuals for ATMs as well as banking procedures in accessible formats such as Braille and DAISY. The banks can then take help of various volunteer organisations in producing and distributing the books to the relevant segments of the population. Such materials should also be made available for download, free of cost, on the bank’s website.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Training and sensitisation: Banks should not simply train and sensitise their employees and increase awareness of the various kinds of disability and the services to be provided to the disabled, but actively solicit those with special needs and make it clear that they "understand their needs" and welcome their business. Banks need to consider whether it makes sense to have separate or specially prepared paperwork for the disabled to fill out if the regular forms are difficult to read or understand.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Preferential Treatment: The Ministry of Finance should push for preferential treatment of all persons with disabilities along the same lines as the special rates of interest provided to the elderly. Public sector banks like the State Bank of India have a massive network and such visible and actively advertised preferential treatment will spread awareness not only at the bank level but in society as well. This will really encourage family members of the disabled to help them set up bank accounts and will foster independence.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;“Know Your Customer” (KYC) procedures undertaken by banks should be clarified and made simpler — a one-time verification should take place rather than repeated calls, visits, questions, clarifications and summons to the office or branch.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bank managers and staff should be proactive and watchful enough to monitor and check for abuse of power by those who are 'assisting' or administering the property and money of the disabled, who are even more susceptible to fraud than the average account holder, and therefore should be provided with stronger anti-fraud/theft services, such as more frequent SMS or email alerts for transactions.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The most important aspect&lt;a href="#fn93" name="fr93"&gt;[93] &lt;/a&gt;that financial service providers need to understand is that accessibility— goes much beyond merely providing ramps and the financial service providers do not currently understand the variety of disabilities and the issues which are tied to each kind of disability. Consider ATMs — the way they are currently designed, the machines are too high for users who are in a wheelchair and the doors themselves are inaccessible to the orthopedically challenged; ATMs have neither voice support nor compatible software for the visually challenged. Thus, a basic and fundamental change in the way banks are catering to customers’ needs to take place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Financial service providers should be more encouraging and should engage in outreach to make it easier and more attractive for those with less capability to open and operate accounts with their parents or guardians. Financial independence and control should be offered and facilitated to the maximum extent possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Accessibility should not be treated as a corporate social responsibility measure by the large banks and financial corporations, but as a responsibility to be fulfilled regardless of anything else. Further, public sector banks have the biggest responsibility to implement these measures — while they employ people with disabilities because they have a reservation &lt;a href="#fn94" name="fr94"&gt;[94]&lt;/a&gt; for them, their services are not accessible to their own employees! There needs to be an effort made to ensure that the internal banking software which is used is accessible for people with disabilities and can be accessed by them using the appropriate assistive technology like screen readers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Financial service providers should tailor accessibility solutions to address each kind of disability and the range of problems faced by the persons affected by them; they should look at best practices from around the world and implement solutions on their own steam instead of minimum compliance with the government or RBI requirements. Ultimately, making financial services more accessible will only mean that their customer base will grow. Change needs to be top-down — rules and regulations first, then training, sensitisation, and then infrastructure. Schemes and offers should be put in place to attract the disabled as customers, assure them of good and competent service without discrimination, and incentives to invest or save (by offering special schemes such as those which currently exist for women and the elderly).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building such systems would involve learning more about the customers and their particular situations and needs, and banks can take the help of various organisations that work with the disabled in order to get a better understanding of what they need to deliver.  While there are some voluntary standards that can be used as a guide,&lt;a href="#fn95" name="fr95"&gt;[95] &lt;/a&gt;the most important aspect is to keep the basics in mind: simple and clear language, audible scripts, easy and non-confusing navigation and instructions and the ability to speak to someone in case of an error; these are all elements that will go a long way in ensuring that disabled customers are more equipped to use the financial services offered by a bank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would be helpful if there was a monitoring or evaluating mechanism to see how far banks are complying with the standards or guidelines that have been set forth before them. There needs to be a comparative study about how far, for example, the bank websites are compliant with the WCAG Guidelines on Web Accessibility or how easy it is for people with disabilities to access the bank counters and ATMs in different branches. Such a study would give good empirical evidence and serve as the starting point for improvement on the current scenario.&lt;a href="#fn96" name="fr96"&gt;[96]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the light of the above, some specific suggestions/ recommendations are made to the Department of Banking Operations in order to make banking more inclusive for persons with disabilities and senior citizens as under:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The department may consider coming out with a policy/ Code requiring all banks to make their services accessible to persons with disabilities. The Policy/ Code may also identify good practices to be followed by banks with respect to areas such as websites, ATMs, mobile and phone banking services, website accessibility and customer care.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Department may require RBI to stringently enforce its notification regarding accessibility of ATMs&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Department may ensure that accessibility be incorporated as a key strategy in all future policies and programmes planned by the Department and is also incorporated in any existing policy which is executed by the department.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Department may involve persons with disabilities in executing its accessibility strategy and identify goals/ targets to be achieved over the next 5 years in terms of making banking services accessible in India. &lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Bibliography&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;“Barriers to Using Automatic Teller Machines”, Tim Noonan, available at &lt;a href="http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm"&gt;http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;“Guidelines for Accessible and Usable Web Sites: Observing Users Who Work with Screen Readers”, Mary Theofranos and Janice Redish, available at &lt;a href="http://redish.net/content/papers/interactions.html"&gt;http://redish.net/content/papers/interactions.html&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;“The Banking Experience: How to Make Financial Services Accessible for Blind and Partially Sighted People”, RNIB’s Handbook of Good Practices and Standards, at &lt;a href="http://www.rnib.org.uk/aboutus/Research/reports/2012/Banking_Experience_CP.pdf"&gt;http://www.rnib.org.uk/aboutus/Research/reports/2012/Banking_Experience_CP.pdf&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;“Website Accessibility”, available at &lt;a href="http://www.tiresias.org/research/guidelines/web.htm"&gt;http://www.tiresias.org/research/guidelines/web.htm&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ABA Guiding Principles for Accessible Authentication, available at   &lt;a href="http://www.bankers.asn.au/ArticleDocuments/177/ABA-Guiding_Principles_for_Accessible_Authentication.doc.aspx"&gt;http://www.bankers.asn.au/ArticleDocuments/177/ABA-Guiding_Principles_for_Accessible_Authentication.doc.aspx&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;John Gill, “The Markets for the Adaptation of Self Service Terminals to be Accessible by People with Disabilities”, available at &lt;a href="http://europa.eu/information_society/activities/einclusion/docs/worshop_atm/atm_markets_report.doc"&gt;http://europa.eu/information_society/activities/einclusion/docs/worshop_atm/atm_markets_report.doc&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Carolyn Samuel, “Making Bank Notes Accessible for Canadians Living with Blindness or Low Vision”, available at &lt;a href="http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf"&gt;http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Glossary of Terms&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;ABA - Australian Bankers’ Association&lt;/li&gt;
&lt;li&gt;ABM - Automated Banking Machines&lt;/li&gt;
&lt;li&gt;ADA - Americans with Disability Act&lt;/li&gt;
&lt;li&gt;AFA - Access for All&lt;/li&gt;
&lt;li&gt;BRA - Banking Regulation Act&lt;/li&gt;
&lt;li&gt;BT - British Telecom&lt;/li&gt;
&lt;li&gt;CAPTCHA - Completely Automated Public Turing test to tell Computers and Humans Apart&lt;/li&gt;
&lt;li&gt;DDA - The Disability Discrimination Act (Australia)&lt;/li&gt;
&lt;li&gt;EFTPOS - Electronic Funds Transfer at Point of Sale&lt;/li&gt;
&lt;li&gt;HREOC - Human Rights and Equal Opportunity Commission&lt;/li&gt;
&lt;li&gt;HTML - Hyper Text Markup Language&lt;/li&gt;
&lt;li&gt;IBA - Indian Banks’ Association&lt;/li&gt;
&lt;li&gt;IVR - Interactive Voice Response&lt;/li&gt;
&lt;li&gt;NIC - National Informatics Centre&lt;/li&gt;
&lt;li&gt;PIN - Personal Identification Number&lt;/li&gt;
&lt;li&gt;PWD - People with Disabilities&lt;/li&gt;
&lt;li&gt;PWDA - The People with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) &lt;i&gt;Act&lt;/i&gt;&lt;i&gt;,&lt;/i&gt; 1995&lt;/li&gt;
&lt;li&gt;RBI - Reserve Bank of India&lt;/li&gt;
&lt;li&gt;RTF - Rich Text Format&lt;/li&gt;
&lt;li&gt;TTS - Text to Speech&lt;/li&gt;
&lt;li&gt;UNCRPD  - United Nations Convention on Persons with Disabilities &lt;/li&gt;
&lt;li&gt;WCAG - Web Content Accessibility Guidelines &lt;/li&gt;
&lt;li&gt;XRCVC - Xavier’s Resource Centre for the Visually Challenged&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Annexure 1 – Disability and Accommodations&lt;/h2&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr style="text-align: center; "&gt;
&lt;th style="text-align: justify; "&gt;Disability&lt;/th&gt;&lt;th style="text-align: justify; "&gt;Branch Banking&lt;/th&gt;&lt;th style="text-align: justify; "&gt;Phone Banking&lt;/th&gt;&lt;th style="text-align: justify; "&gt;Internet Banking&lt;/th&gt;&lt;th style="text-align: justify; "&gt;Payment Terminals and Kiosks&lt;/th&gt;&lt;th style="text-align: justify; "&gt;Mobile Banking&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Physical Disability&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Bank branches are inaccessible to people using wheelchairs, as they are not provided with ramps, and often have steps at the entrance&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;The queuing and counter system in place is not friendly for customers with disabilities; desks are not always at a height that can be accessed by someone in a wheelchair&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;The staff is not sensitised to the needs of customers with physical disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Suggested Solution&lt;/b&gt;:&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Conduct sensitisation and training programmes for the staff train them about the needs of customers with disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Construct ramps and walkways so that buildings are accessible by wheelchairs&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Ensure that the bank layout is accessible and as uniform as possible, ensuring ease of access for customers with disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Using websites which are not accessible could be a problem for a person who doesn’t have full use of their limbs&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Suggested Solution&lt;/b&gt;:&lt;br /&gt; 
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Ensure websites are compatible with assistive technologies, such as alternate input devices. Standards such as the WCAG should be followed&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;ATM entrances are not accessible for people with wheelchairs as they are not provided with ramps&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;ATMs are often too high, and cannot be accessed by someone who is sitting in a wheelchair&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Using keypads could be a problem for a person who doesn’t have full use of their limbs&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="left"&gt;&lt;b&gt;Suggested Solution:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;ATMs should be provided with ramps (with the appropriate slope) that can be accessed by customers in a wheelchair&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; ATMs should be at the appropriate height and should be designed keeping in mind the needs of people in wheelchairs&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;Using phone apps could be a problem for a person who doesn’t have full use of their limbs&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Suggested Solution&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mobile apps should have a clean interface, which is not problematic to use and which can be controlled by voice commands&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Visual Disability&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Branches are not laid out in a uniform manner, and are difficult to navigate for someone who can’t see&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The signage is not done in raised texture maps, and so can’t be accessed by someone who can’t see&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Coinage in India is not disabled-friendly, with the coin sizes being very similar to each other and difficult to demarcate&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Bank literature is not available in large print or Braille formats and so can’t be read by people with low or no vision&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="left"&gt;&lt;b&gt;Suggested Solution:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Conduct sensitisation and training programmes for the staff train them about the needs of customers with disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Textured maps and signage should be made readily available at branch locations&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The branch layout should be simplified so that someone with a visual disability is not at a disadvantage&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;In case the customer desires, bank literature, statements and other documents should be made available in alternate formats (eg: large print, Braille, PDF)&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;Websites are often not accessible using assistive technologies like screen readers, and are not navigable using non-traditional input devices&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="left"&gt;&lt;b&gt;Suggested Solution:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Websites need to be made accessible and should comply with the Web Content Accessibility Guidelines (WCAG) which clearly specify how best to make the web interface usable for people with disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;There aren’t many speaking ATMs with audio jacks which can be used by people who can’t use the touchscreen&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The number pad display is not uniform amongst various banks, and so can be problematic for people relying on tactile memory&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="left"&gt;&lt;b&gt;Suggested Solution:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Banks should introduce more speaking ATMs, which have an audio jack that can be plugged into a listening device, which helps a customer with visual disability use an ATM&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;Mobile banking apps are not accessible using phone screen reading software&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;&lt;b&gt;Suggested Solution:&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Phone apps need to be made accessible and should comply with the W3C Guidelines which specify how best to make the mobile interface usable for people with disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hearing Disability&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;Branch officials have not been sensitised to the requirements of someone who is hearing impaired, who might require them to write down their statements&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Sign language interpreters are not on call to help translate in case a person with disability needs them&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Alert and announcements in banks are usually based on sound notifications, and so can often be missed by customers with hearing disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Suggested Solution:&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Conduct sensitisation and training programmes for the staff train them about the needs of customers with disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Designated branches should have a sign language interpreter on call for assistance of customers with hearing disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Notifications and announcements, such as at a teller, should be accompanied by a visual alert as well (eg: a blinking light, or a number flashing on a screen)&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;There is great reliance on spoken directions and no option for a deaf customer to have a conversation about phone banking with their bank&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;No provision for options such as text relay that can be used by deaf customers to do banking transactions&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The options on an automated VRS system at a bank’s call centre are often not clear and are incomprehensible&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="left"&gt;&lt;b&gt;Suggested Solution:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Banks should attempt to introduce text relay services, which can be used by deaf customers to communicate with bank officials via the phone&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; The VRS system should be in clear, understandable and audible tones for the ease of customers&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;Alerts and notifications in an ATM are usually in the form of a loud noise or a beep, which will be missed by a person with hearing disability&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Suggested Solution:&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;ATMs should have a light which flashes in case of a notification, which will come to the attention of the user&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cognitive Disability&lt;/td&gt;
&lt;td style="text-align: left; "&gt;
&lt;ul&gt;
&lt;li&gt;Bank literature and documents are complicated and the language is not easy to comprehend; this could be a problem for someone with a learning disability&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Banks have a bias against someone with a learning disability and despite rules against this, are reluctant to open account for customers with cognitive disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Suggested Solution:&lt;br /&gt;&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Conduct sensitisation and training programmes for the staff train them about the needs of customers with disabilities&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Bank documents, scheme information and so on should be in clear, easy to understand language &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;The options on an automated VRS system at a bank’s call centre are often not clear and are incomprehensible&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;&lt;b&gt;Suggested Solution&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The VRS system should be in clear, understandable and audible tones for the ease of customers&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Annexure 2 – Banking and Accessibility Guidelines&lt;/h2&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Area of Banking&lt;/th&gt;&lt;th&gt;Guidelines/Recommendations&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Mobile banking&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Web Accessibility Initiatives international guidelines on mobile accessibility: &lt;a href="http://www.w3.org/WAI/mobile/"&gt;http://www.w3.org/WAI/mobile/&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Internet banking&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;The Web Content Accessibility Guidelines lay down the principles for making websites more accessible for people with disabilities: &lt;a href="http://www.w3.org/TR/WCAG/"&gt;http://www.w3.org/TR/WCAG/&lt;/a&gt;&lt;/p&gt;
&lt;p align="left"&gt;Australian Industry Standards for Electronic Banking: &lt;a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-"&gt;http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-&lt;/a&gt;&lt;/p&gt;
&lt;p align="left"&gt;Royal National Institute for the Blind’s Good Practices and Standards for Electronic Banking: &lt;a href="http://www.rnib.org.uk/aboutus/Research/reports/2012/Banking_Experience_CP.pdf"&gt;www.rnib.org.uk/aboutus/Research/reports/2012/Banking_Experience_CP.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ATMs and payment kiosks&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Americans with Disabilities Act ATM Standards, 2010: &lt;a href="http://www.firstdata.com/downloads/thought-leadership/atm_ada_accessibility.pdf"&gt;www.firstdata.com/downloads/thought-leadership/atm_ada_accessibility.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p align="left"&gt;Australian Industry Standards for ATMs: &lt;a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/ATM-Standard"&gt;www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/ATM-Standard&lt;/a&gt;&lt;/p&gt;
&lt;p align="left"&gt;Canadian Guidelines on Self Service Interactive Devices: A summary is available at “Standard B651.1-09”, sourced from &lt;a href="http://hub.eaccessplus.eu/wiki/Canadian_standard_for_accessible_design_for_automated_banking_machines"&gt;http://hub.eaccessplus.eu/wiki/Canadian_standard_for_accessible_design_for_automated_banking_machines&lt;/a&gt;&lt;/p&gt;
&lt;p align="left"&gt;Dutch Guidelines on Payment Terminals: &lt;a href="http://hub.eaccessplus.eu/uploads/a/a1/Dutch_Guidelines_on_payment_systems.pdf"&gt;http://hub.eaccessplus.eu/uploads/a/a1/Dutch_Guidelines_on_payment_systems.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Phone Banking&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;Australian Industry Standards for Automated Phone Banking: &lt;a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Automated-Telephone-Banking-Standard"&gt;http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Automated-Telephone-Banking-Standard&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Branch Banking&lt;/td&gt;
&lt;td&gt;
&lt;p align="left"&gt;New Zealand Banker’s Association Voluntary Guidelines on Meeting Needs of Older and Disabled Customers: &lt;a href="http://www.nzba.org.nz/banking-standards/code-of-banking-practice/voluntary-guidelines-to-assist-banks-to-meet-the-needs-of-older-and-disabled-customers/"&gt;http://www.nzba.org.nz/banking-standards/code-of-banking-practice/voluntary-guidelines-to-assist-banks-to-meet-the-needs-of-older-and-disabled-customers/&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Data taken from &lt;a href="http://www.disabilityindia.com/html/facts.html"&gt;http://www.disabilityindia.com/html/facts.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. “NCR Corp to set up 50 Talking ATMs in Post Offices”, available at &lt;a href="http://lflegal.com/2012/09/ncr-india/"&gt;http://lflegal.com/2012/09/ncr-india/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. More data on disability can be seen at the World Bank Country Profile on Disability for India, available at &lt;a href="http://siteresources.worldbank.org/DISABILITY/Resources/Regions/South%20Asia/JICA_India.pdf"&gt;http://siteresources.worldbank.org/DISABILITY/Resources/Regions/South%20Asia/JICA_India.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Full text available at &lt;a href="http://www.un.org/disabilities/default.asp?id=259"&gt;http://www.un.org/disabilities/default.asp?id=259&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Full text available at &lt;a href="http://www8.cao.go.jp/shougai/english/biwako/contents.html"&gt;http://www8.cao.go.jp/shougai/english/biwako/contents.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. See generally: “Guidelines for Accessible and Usable Web Sites: Observing Users Who Work with Screen Readers”, Mary Theofranos and Janice Redish, available at &lt;a href="http://redish.net/content/papers/interactions.html"&gt;http://redish.net/content/papers/interactions.html&lt;/a&gt;, last viewed on July 26.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Article 14: Equality before law - The State shall not deny to any person equality before the law or the equal protection of the laws within the territory of India (Prohibition of discrimination on grounds of religion, race, caste, sex or place of birth).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Article 15. Prohibition of discrimination on grounds of religion, race, caste, sex or place of birth&lt;br /&gt;(1) The State shall not discriminate against any citizen on grounds only of religion, race, caste, sex, place of birth or any of them&lt;br /&gt;(2) No citizen shall, on grounds only of religion, race, caste, sex, place of birth or any of them, be subject to any disability, liability, restriction or condition with regard to&lt;br /&gt;(a) access to shops, public restaurants, hotels and palaces of public entertainment; or&lt;br /&gt;(b) the use of wells, tanks, bathing ghats, roads and places of public resort maintained wholly or partly out of State funds or dedicated to the use of the general public&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Article 253: Legislation for giving effect to international agreements - Notwithstanding anything in the foregoing provisions of this Chapter, Parliament has power to make any law for the whole or any part of the territory of India for implementing any treaty, agreement or convention with any other country or countries or any decision made at any international conference, association or other body.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. For more details on the legislation, along with the full text, refer to http://socialjustice.nic.in/policiesacts3.php.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. See generally: &lt;a href="http://www.accessability.co.in/access/files/Accessibility-in-India-Issues-Status-Way-Forward.pps"&gt;www.accessability.co.in/access/files/Accessibility-in-India-Issues-Status-Way-Forward.pps&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. “Bank loses accessibility case”, available at &lt;a href="http://www.fm-world.co.uk/news/fm-industry-news/bank-loses-accessibility-case/"&gt;http://www.fm-world.co.uk/news/fm-industry-news/bank-loses-accessibility-case/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Singh, A. &amp;amp; Nizamie, S.H. (2004) Disability: the concept and related Indian legislations. &lt;i&gt;Mental Health Reviews,&lt;/i&gt; accessed from http://www.psyplexus.com/mhr/disability_india.html on September 11, 2012.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Full text of the legislation is available at The Banking Regulation Act, 1949, &lt;a href="http://indiankanoon.org/doc/1129081/"&gt;http://indiankanoon.org/doc/1129081/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Section 35A: Power of the Reserve Bank to give directions-&lt;br /&gt;(1) Where the Reserve Bank is satisfied that-&lt;br /&gt;(a) in the public interest; or&lt;br /&gt;(aa)in the interest of banking policy; or&lt;br /&gt;(b) to prevent the affairs of any banking company being conducted in a manner detrimental to the interests of the depositors or in a manner prejudicial to the interests of the banking company; or&lt;br /&gt;(c) to secure the proper management of any banking company generally; it is necessary to issue directions to banking companies generally or to any banking company in particular, it may, from time to time, issue such directions as it deems fit, and the banking companies or the banking company, as the case may be, shall be bound to comply with such directions.&lt;br /&gt;(2) The Reserve Bank may, on representation made to it or on its own motion, modify or cancel any direction issued under sub- section (1), and in so modifying or cancelling any direction may impose such conditions as it thinks fit, subject to which the modification or cancellation shall have effect.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Available at http://rbi.org.in/scripts/NotificationUser.aspx?Id=4226&amp;amp;Mode=0&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Available at &lt;a href="http://rbi.org.in/scripts/NotificationUser.aspx?Id=4923&amp;amp;Mode=0"&gt;http://rbi.org.in/scripts/NotificationUser.aspx?Id=4923&amp;amp;Mode=0&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Available at &lt;a href="http://www.rbi.org.in/scripts/BS_CircularIndexDisplay.aspx?Id=7548"&gt;http://www.rbi.org.in/scripts/BS_CircularIndexDisplay.aspx?Id=7548&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Available at &lt;a href="http://rbi.org.in/scripts/BS_CircularIndexDisplay.aspx?Id=5071"&gt;http://rbi.org.in/scripts/BS_CircularIndexDisplay.aspx?Id=5071&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. “Banking Made Easier for People with Disabilities”, available at &lt;a href="http://www.autism-india.org/india_legal.html"&gt;http://www.autism-india.org/india_legal.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Available at &lt;a href="http://rbi.org.in/scripts/NotificationUser.aspx?Mode=0&amp;amp;Id=5248"&gt;http://rbi.org.in/scripts/NotificationUser.aspx?Mode=0&amp;amp;Id=5248&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. National Policy for Persons with Disability, available at &lt;a href="http://www.socialjustice.nic.in/nppde.php?format=print"&gt;http://www.socialjustice.nic.in/nppde.php?format=print&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Principle Areas of Intervention VI (x): “Banking system will be encouraged to meet the needs to the persons with disabilities”, &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. See generally: Discussion on disability in the Mid Term Appraisal of the Eleventh Five Year Plan, Page 185, available at &lt;a href="http://planningcommission.nic.in/plans/mta/11th_mta/chapterwise/Comp_mta11th.pdf"&gt;http://planningcommission.nic.in/plans/mta/11th_mta/chapterwise/Comp_mta11th.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Tim Noonan, “Acceptable E-commerce in Australia: A Discussion Paper about the Effects of Electronic Commerce Developments on People With Disabilities”, available at &lt;a href="http://www.timnoonan.com.au/ecrep10.htm"&gt;http://www.timnoonan.com.au/ecrep10.htm&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. “Barriers to Using Automatic Teller Machines”, Tim Noonan, available at &lt;a href="http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm"&gt;http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm&lt;/a&gt;, last viewed on July 26, 2012.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. See generally: Accessibility at the RBS, available at &lt;a href="http://www.bankofscotland.co.uk/accessibility/hearing-impaired/"&gt;http://www.bankofscotland.co.uk/accessibility/hearing-impaired/&lt;/a&gt;, last viewed on July 20.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. In conversation with Mr. George Abraham, CEO, SCORE Foundation. Ms. Radhika Alkazi, Managing Trustee of Aarth-Aastha also pointed out that in many instances, banks often ask persons with disabilities to bring someone else to sign for them (or operate the account on their behalf) even when the person is fully capable of signing and operating the account themselves. There is no fixed basis for the procedure, which varies from bank to bank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. “Barriers to Using Automatic Teller Machines”, Tim Noonan, available at &lt;a href="http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm"&gt;http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm&lt;/a&gt;, last viewed on July 26, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. “The Challenges of Blind Internet Users”, available at &lt;a href="http://www.evengrounds.com/blog/challenges-of-blind-internet-users"&gt;http://www.evengrounds.com/blog/challenges-of-blind-internet-users&lt;/a&gt;, last viewed on July 15.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. See generally: Accessibility at the RBS, available at &lt;a href="http://www.bankofscotland.co.uk/accessibility/visually-impaired/"&gt;http://www.bankofscotland.co.uk/accessibility/visually-impaired/&lt;/a&gt;, last viewed on July 20.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. Consider the development of such ATMs by Wells Fargo bank in the USA; more details are available at https://www.wellsfargo.com/about/diversity/accessibility/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. In conversation with Mr. Anil Joshi, the Programme Director of Human Ability and Accessibility at IBM, who works with parents of children with Down’s Syndrome and other mental disabilities. He also pointed out that given that only a miniscule portion of people with disabilities are able to understand banking concepts, the few who do so invariably use banking facilities with the help of their parents or guardians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. “Barriers to Using Automatic Teller Machines”, Tim Noonan, available at &lt;a href="http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm"&gt;http://www.hreoc.gov.au/disability_rights/inquiries/ecom/atmpaper.htm&lt;/a&gt;, last viewed on July 26, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. “Customising mobile banking in India: issues and challenges”, Address delivered by Shri Harun R. Khan, Deputy Governor, Reserve Bank of India, at the FICCI-IBA (FIBAC) 2012 Conference on-“Sustainable excellence through customer engagement, employee engagement and right use of technology” on September 5, 2012 at Mumbai, available at &lt;a href="http://www.rbi.org.in/scripts/BS_SpeechesView.aspx?id=726"&gt;http://www.rbi.org.in/scripts/BS_SpeechesView.aspx?id=726&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. Available at &lt;a href="http://www.rbi.org.in/Scripts/bs_viewcontent.aspx?Id=1660"&gt;http://www.rbi.org.in/Scripts/bs_viewcontent.aspx?Id=1660&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Leonard R. Kasday, "&lt;a href="http://www.acm.org/pubs/articles/proceedings/chi/355460/p161-kasday/p161-kasday.pdf"&gt;A Tool to Evaluate Universal Web Accessibility&lt;/a&gt;" Posters, Proceedings of the 2000 International Conference on Intelligent User Interfaces 2000, pp. 161-162.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. See generally: “WCAG 2 at a Glance”, available at &lt;a href="http://www.w3.org/WAI/WCAG20/glance/"&gt;http://www.w3.org/WAI/WCAG20/glance/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. See generally: “Website Accessibility”, available at &lt;a href="http://www.tiresias.org/research/guidelines/web.htm"&gt;http://www.tiresias.org/research/guidelines/web.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. For more details, see generally: “Website Accessibility”, available at &lt;a href="http://www.tiresias.org/research/guidelines/web.htm"&gt;http://www.tiresias.org/research/guidelines/web.htm&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. The Compliance Matrix can be accessed at &lt;a href="http://web.guidelines.gov.in/compliance.php"&gt;http://web.guidelines.gov.in/compliance.php&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. “Deaf and Hearing Impaired”, Woei-Jyh Lee, Handbook of Universal Usability in Practice, available at &lt;a href="http://otal.umd.edu/UUPractice/hearing/"&gt;http://otal.umd.edu/UUPractice/hearing/&lt;/a&gt;, last viewed on 23 July, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr47" name="fn47"&gt;47&lt;/a&gt;]. “ATM Usage very low in India, says RBI”, available at http://www.firstpost.com/economy/atm-usage-very-low-in-india-says-rbi-404198.html.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. Available at &lt;a href="http://rbi.org.in/scripts/NotificationUser.aspx?Id=7286&amp;amp;Mode=0"&gt;http://rbi.org.in/scripts/NotificationUser.aspx?Id=7286&amp;amp;Mode=0&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Harsh Vardhan, “White Label ATMs”, available at &lt;a href="http://ajayshahblog.blogspot.in/2012/08/white-label-atms.html"&gt;http://ajayshahblog.blogspot.in/2012/08/white-label-atms.html&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. “Department of Justice finalises New ATM Accessibility Standards”, available at &lt;a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf"&gt;http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf&lt;/a&gt;, last viewed on July 12.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr51" name="fn51"&gt;51&lt;/a&gt;]. “Department of Justice Finalises New ATM Accessibility Standards”, available at &lt;a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf"&gt;http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf&lt;/a&gt;, last viewed on July 12.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr52" name="fn52"&gt;52&lt;/a&gt;]. “Making Bank Notes Accessible for Canadians Living with Blindness or Low Vision”, Carolyn Samuel, available at &lt;a href="http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf"&gt;http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr53" name="fn53"&gt;53&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr54" name="fn54"&gt;54&lt;/a&gt;]. Carolyn Samuel, “Making Bank Notes Accessible for Canadians Living With Blindness or Low Vision”, available at &lt;a href="http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf"&gt;http://www.bankofcanada.ca/wp-content/uploads/2011/08/samuel.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr55" name="fn55"&gt;55&lt;/a&gt;]. (DBOD.No.Leg.BC.123 /09.07.005/2008-09).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr56" name="fn56"&gt;56&lt;/a&gt;]. Refer to Section 4.3 of the Report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr57" name="fn57"&gt;57&lt;/a&gt;]. Dinesh Kaushal, “The Case for Accessible Banking”, available at &lt;a href="https://cis-india.org/accessibility/accessible-banking"&gt;http://cis-india.org/accessibility/accessible-banking&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr58" name="fn58"&gt;58&lt;/a&gt;]. NR Indran, “UBI to deploy Mumbai’s first Talking ATM for the visually challenged”, available at &lt;a href="http://apnnews.com/2012/07/09/ubi-to-deploy-mumbai%E2%80%99s-first%E2%80%98talking-atm%E2%80%99-for-the-visually-challenged-powered-by-ncr/"&gt;http://apnnews.com/2012/07/09/ubi-to-deploy-mumbai%E2%80%99s-first%E2%80%98talking-atm%E2%80%99-for-the-visually-challenged-powered-by-ncr/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr59" name="fn59"&gt;59&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr60" name="fn60"&gt;60&lt;/a&gt;]. “NCR Corp to set up 50 Talking ATMs in passport offices”, available at http://lflegal.com/2012/09/ncr-india/.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr61" name="fn61"&gt;61&lt;/a&gt;]. “NCR Corp to set up 50 Talking ATMs in passport offices”, available at http://lflegal.com/2012/09/ncr-india/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr62" name="fn62"&gt;62&lt;/a&gt;]. Dinesh Kaushal, “The Case for Accessible Banking”, available at &lt;a href="https://cis-india.org/accessibility/accessible-banking"&gt;http://cis-india.org/accessibility/accessible-banking&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr63" name="fn63"&gt;63&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr64" name="fn64"&gt;64&lt;/a&gt;]. “Department of Justice Finalises New ATM Accessibility Standards”, available at &lt;a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf"&gt;http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf&lt;/a&gt;, last viewed on July 12.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr65" name="fn65"&gt;65&lt;/a&gt;]. See more details at &lt;a href="http://www.unionbankofindia.co.in/personal_TalkingATMs.aspx"&gt;http://www.unionbankofindia.co.in/personal_TalkingATMs.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr66" name="fn66"&gt;66&lt;/a&gt;]. These guidelines are available at &lt;a href="http://www.nzba.org.nz/banking-standards/code-of-banking-practice/voluntary-guidelines-to-assist-banks-to-meet-the-needs-of-older-and-disabled-customers/"&gt;http://www.nzba.org.nz/banking-standards/code-of-banking-practice/voluntary-guidelines-to-assist-banks-to-meet-the-needs-of-older-and-disabled-customers/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr67" name="fn67"&gt;67&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr68" name="fn68"&gt;68&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr69" name="fn69"&gt;69&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr70" name="fn70"&gt;70&lt;/a&gt;]. Section 4 of the DDA defines disability in relation to a person as:&lt;br /&gt;a. total or partial loss of the person's bodily or mental functions; or&lt;br /&gt;b. total or partial loss of a part of the body; or&lt;br /&gt;c. the presence in the body of organisms causing disease or illness; or&lt;br /&gt;d. the presence in the body of organisms capable of causing disease or illness; or&lt;br /&gt;e. the malfunction, malformation or disfigurement of a part of the person's body; or&lt;br /&gt;f. a disorder or malfunction that results in the person learning differently from a person without the disorder or malfunction; or&lt;br /&gt;g. a disorder, illness or disease that affects a person's thought processes, perception of reality, emotions or judgment or that results in disturbed behaviour; and includes a disability that:&lt;br /&gt;a.  presently exists; or&lt;br /&gt;b. previously existed but no longer exists; or&lt;br /&gt;c.  may exist in the future; or is imputed to a person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr71" name="fn71"&gt;71&lt;/a&gt;]. Section 4 of the DDA defines a service as relating to, amongst other things, banking, insurance, superannuation and the provision of grants, loans, credit or finance, and including financial and information services provided, for example, through websites, telephones, ATMs and EFTPOS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr72" name="fn72"&gt;72&lt;/a&gt;]. For a full list, please refer to: &lt;a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Industry-Standards---Accessibility"&gt;http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Industry-Standards---Accessibility&lt;/a&gt;, last accessed on 12&lt;sup&gt;th&lt;/sup&gt; August, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr73" name="fn73"&gt;73&lt;/a&gt;]. Refer to &lt;a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/ATM-Standard"&gt;http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/ATM-Standard&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr74" name="fn74"&gt;74&lt;/a&gt;]. Refer to &lt;a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/EFTPOS-Standard"&gt;http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/EFTPOS-Standard&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr75" name="fn75"&gt;75&lt;/a&gt;]. Refer to &lt;a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Automated-Telephone-Banking-Standard"&gt;http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Automated-Telephone-Banking-Standard&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr76" name="fn76"&gt;76&lt;/a&gt;]. ABA Industry Standard on Electronic Banking, available at &lt;a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Internet-Banking-Standard"&gt;http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Internet-Banking-Standard&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr77" name="fn77"&gt;77&lt;/a&gt;]. Refer to &lt;a href="http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Australian-Banking-Industry-E-Commerce-Industry-Action-Plan"&gt;http://www.bankers.asn.au/Industry-Standards/ABAs-Accessibility-of-Electronic-Banking-/Australian-Banking-Industry-E-Commerce-Industry-Action-Plan&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr78" name="fn78"&gt;78&lt;/a&gt;]. “Background to the Guiding Principles”, Section 1.1 of the ABA Guiding Principles for Accessible Authentication, available at   &lt;a href="http://www.bankers.asn.au/ArticleDocuments/177/ABA-Guiding_Principles_for_Accessible_Authentication.doc.aspx"&gt;http://www.bankers.asn.au/ArticleDocuments/177/ABA-Guiding_Principles_for_Accessible_Authentication.doc.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr79" name="fn79"&gt;79&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr80" name="fn80"&gt;80&lt;/a&gt;]. “Department of Justice Finalises New ATM Accessibility Standards”, available at &lt;a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf"&gt;http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf&lt;/a&gt;, last viewed on July 12&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr81" name="fn81"&gt;81&lt;/a&gt;]. See generally: “Department of Justice finalizes new ATM accessibility standards”, available at &lt;a href="http://www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf"&gt;www.diebold.com/solutions/atms/opteva/html/Diebold_AccessibilityStandards.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr82" name="fn82"&gt;82&lt;/a&gt;]. A summary is available at “Standard B651.1-09”, sourced from &lt;a href="http://hub.eaccessplus.eu/wiki/Canadian_standard_for_accessible_design_for_automated_banking_machines"&gt;http://hub.eaccessplus.eu/wiki/Canadian_standard_for_accessible_design_for_automated_banking_machines&lt;/a&gt;, and a full text can be purchased from the Canadian Standards Association website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr83" name="fn83"&gt;83&lt;/a&gt;]. “The extent to which technical requirements are applied is the responsibility of others, such as the authority having jurisdiction.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr84" name="fn84"&gt;84&lt;/a&gt;]. “Barrier Free Banking”, available at &lt;a href="http://www.abilities.ca/agc/article/article.php?pid=&amp;amp;cid=&amp;amp;subid=&amp;amp;aid=429"&gt;http://www.abilities.ca/agc/article/article.php?pid=&amp;amp;cid=&amp;amp;subid=&amp;amp;aid=429&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr85" name="fn85"&gt;85&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr86" name="fn86"&gt;86&lt;/a&gt;]. “Dutch Guidelines for User Friendly payment terminals”, available at &lt;a href="http://hub.eaccessplus.eu/wiki/Dutch_Guidelines_for_user-friendly_payment_terminals"&gt;http://hub.eaccessplus.eu/wiki/Dutch_Guidelines_for_user-friendly_payment_terminals&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr87" name="fn87"&gt;87&lt;/a&gt;]. “Dutch Guidelines for Payment Systems”, available at &lt;a href="http://hub.eaccessplus.eu/uploads/a/a1/Dutch_Guidelines_on_payment_systems.pdf"&gt;http://hub.eaccessplus.eu/uploads/a/a1/Dutch_Guidelines_on_payment_systems.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr88" name="fn88"&gt;88&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr89" name="fn89"&gt;89&lt;/a&gt;]. Building User Friendly Voice Systems, Tim Noonan, available at &lt;a href="http://www.timnoonan.com.au/ivrpap98.htm"&gt;http://www.timnoonan.com.au/ivrpap98.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr90" name="fn90"&gt;90&lt;/a&gt;]. See generally, “What are the possibilities”, the webpage for the Xavier’s Resource Centre for the Visually Challenged, available at &lt;a href="http://www.xrcvc.org/fs_alternatives.php"&gt;http://www.xrcvc.org/fs_alternatives.php&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr91" name="fn91"&gt;91&lt;/a&gt;]. In countries like Japan, even sighted people use what are known as signature stamps, Hanko and Inkan, instead of actual signatures, for signing of official documents. This is a practice that can also be incorporated by banks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr92" name="fn92"&gt;92&lt;/a&gt;]. See generally, “What are the possibilities”, the webpage for the Xavier’s Resource Centre for the Visually Challenged, available at &lt;a href="http://www.xrcvc.org/fs_alternatives.php"&gt;http://www.xrcvc.org/fs_alternatives.php&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr93" name="fn93"&gt;93&lt;/a&gt;]. In conversation with Ms. Anubhuti Mittal, who works for HR Solutions for the Differently Abled, and runs a consultancy which works with people with disabilities, providing recruitment services to the disabled, doing access audits, job mapping, sensitization and training of employees at organisations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr94" name="fn94"&gt;94&lt;/a&gt;]. Pursuant to Section 33 of the PWD Act, which states: Every appropriate government shall appoint in every establishment such percentage of vacancies not less than three per cent for persons or class of persons with disability of which one per cent? each shall be reserved for persons suffering from:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Blindness or low vision;&lt;/li&gt;
&lt;li&gt;Bearing impairment;&lt;/li&gt;
&lt;li&gt;Loco motor disability or cerebral palsy, in the posts identified for each disability: &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Provided that the appropriate Government may, having regard to the type of work carried on in any department or establishment, by notification subject to such conditions, if any, as may be specified in such notification, exempt any establishment from the provisions of this section.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr95" name="fn95"&gt;95&lt;/a&gt;]. For example, the Australian and New Zealand Standards (AS/NZS 4263).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr96" name="fn96"&gt;96&lt;/a&gt;]. A good reference point would be “A Look at Internet Banking Accessibility in Australia”, Sofia Celic, Steven Faulkner, and Andrew Arch, available at &lt;a href="http://ausweb.scu.edu.au/aw04/papers/refereed/celic/paper.html"&gt;http://ausweb.scu.edu.au/aw04/papers/refereed/celic/paper.html&lt;/a&gt;, where the authors have studied the websites of different Australian banks to see how far they are complying with the WCAG1.0 guidelines and have rated them on different criteria. Unfortunately, the team found that “the overall status of the accessibility of Australian banking web sites, using the accessibility of their home pages as an indicator, is less than desirable. None of the banks assessed has met the &lt;acronym&gt;ABA&lt;/acronym&gt; recommended timetable of addressing all applicable &lt;acronym&gt;WCAG&lt;/acronym&gt; 1.0 Priority 1 and Priority 2 checkpoints within 18 months of the Standard being released (April 2002).”&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Contributors:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Nirmita Narasimhan, Policy Director&lt;/li&gt;
&lt;li&gt;Vrinda Maheshwari, Consultant&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/accessibility/blog/banking-accessibility-report.pdf" class="internal-link"&gt;Click to download the entire report &lt;/a&gt;(PDF) 802 Kb&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report'&gt;https://cis-india.org/accessibility/blog/banking-and-accessibility-in-india-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2013-08-13T04:00:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report">
    <title>Institute on Internet &amp; Society: Event Report</title>
    <link>https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report</link>
    <description>
        &lt;b&gt;The Institute on Internet and Society organized by the Centre for Internet and Society (CIS) with grant supported by the Ford Foundation took place from June 8 to 14, 2013 at the Golden Palms Resort in Bangalore.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;A total of 20 participants spent the seven days in a residential institute, learning about the fundamental technologies of the Internet and topics on which CIS has expertise on such as Accessibility, Openness, Privacy, Digital Natives and Internet Governance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants belonged to various stakeholder groups and it provided a common forum (first of its kind in India) to discuss and share ideas. Twenty-four expert speakers from various domains came to share their knowledge and speak about their work, so as to encourage activity in the field and supply resources from which participants could learn to increase their accessibility, range and funding possibilities, as well as network with the speakers and amongst themselves.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Institute has triggered a&amp;nbsp; number of follow-up events — those that the participants organized themselves with the help of CIS staff, including Crypto Parties in Bangalore, Delhi and Mumbai, that taught netizens to keep their online communication private. In addition to that, the CIS Access2Knowledge (A2K) team could rope in eight new Wikipedians who will contribute to Wikipedia in Indic languages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The day wise talks and activities that took place are listed below:&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 1: June 8, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The seven day residential Institute began on Saturday, the 8th of June with a warm welcome by Dr. Ravina Aggarwal and Dr. Nirmita Narasimhan. They outlined the purpose of the residential institute and briefly went over the topics which would get covered over the week long duration. This was followed by each of the participants introducing themselves briefly and also stating their expectations from the Institute, why they were attending the same and what they hope to get at the end.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Session 1: History of the Internet&lt;/h3&gt;
&lt;p&gt;(by Pranesh Prakash and Bernadette Längle)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Pranesh.png/@@images/539b71f7-111a-4700-a90b-17cbdb5589bc.png" alt="" class="image-inline" title="Pranesh Prakash" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Above is a picture of Pranesh Prakash &lt;br /&gt;speaking about the History of the Internet during &lt;br /&gt;the first session on Day 1.&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;The Institute proceedings kicked off with the first session, &lt;strong&gt;History of the Internet&lt;/strong&gt; by Pranesh Prakash and Bernadette Längle. Participants learned where the Internet originally came from and how it is organized, as well as different technologies surrounding the Internet. Pranesh Prakash and Bernadette Längle set the start point of the Internet in the late 50's when the Russians send the first satellite in space (Sputnik) and the US founded the DARPA(&lt;em&gt;Defense Advanced Research Projects Agency&lt;/em&gt;), a research agency that was tasked with creating new technologies for military use. DARPA is credited with development of many technologies which have had a major effect on the world, including computer networking, as well as NLS, which was both the first hypertext system, and an important precursor to the contemporary ubiquitous graphical user interface (GUI). A few years later the first four computers were connected to a network.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;After the Network Control Protocol (NCP, later replaced by the TCP/IP)  was invented in 1970, the first applications were made: email  (connecting people), telnet (connecting computers) and the file  transport protocol (FTP) (connecting information) — all of these are  still in use today. Participants were surprised to learn that the Web,  most commonly used today, known to be invented by one single person in  the 90's, actually existed for a long time prior to the '90s.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/p4iFqDnhNZI" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Domestic Bodies and Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Pranesh Prakash)&lt;br /&gt;After lunch, Pranesh Prakash led the second session about Domestic Bodies and Mechanisms and he started with some of the problems associated with the Domestic Regulatory Bodies:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Lack of coherence and consistency in Internet related policies&lt;/li&gt;
&lt;li&gt;Rather than co-operating, the different agencies compete with each other.&lt;/li&gt;
&lt;li&gt;Communication with the public is of different degrees and openness of different agencies varies.&lt;/li&gt;&lt;/ol&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Department of Electronics and Information Technology (DEITY), is one of the most important public agencies &amp;amp; the CERT-in focuses on issues like malware and content regulation. There is also the STQC (Standard Setting and Quality Setting Body).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The work of these organizations is to govern the Internet, bring about better privacy policies and ensure freedom of speech.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Other governing bodies include DOT (Department of Telecommunications) which governs the telecom and internet policies of India. In India, certain content regulation takes place under a notification as part of the IT Act, 2003.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;TRAI (Telecom Regulatory Authority of India) also looks into the tariff, interconnections and quality of telecom sector, spectrum regulation and so on.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The USOF (Universal Service Obligation Fund) seeks to provide funds for setting up telecom services in rural areas.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Ministry of Information and Broadcasting (MIB) has been extending copyright restrictions to online publications.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VIDEO&lt;br /&gt;&lt;/h3&gt;
&lt;iframe src="//www.youtube.com/embed/e0VlI12fODE" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 3: Emerging trends in Internet usage in India&lt;/h3&gt;
&lt;p&gt;(by Nandini C and Vir Kamal Chopra)&lt;br /&gt;&lt;strong&gt;Emerging Trends in Internet Usage with specific focus on BSNL offerings&lt;/strong&gt; (by Vir Kamal Chopra)&lt;br /&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;In 1995, the VSNL provided internet in 4 metros of India, by 1998 DOT had provided internet in 42 cities.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Some of the facilities internet provides include Tele-education, Tele-medicine, mobile banking, payment of bills via mobile internet, etc.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; BSNL has got maximum broadband market share in India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Present Scenario, there are 900 million mobiles in India, 430 million wireless connections with capability to access data.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The total broadband connections are 15 million in country, 10 million provided by BSNL.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Total internet users are 120 million with a growth rate of 30%.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Public access is not only about network intermediaries but about info-mediaries who understand internet.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; BSNL lost Rs 18,000 crores from 3G license.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G to 3G shifting is not seamless and leads to lot of packet loss, and 3G coverage is not as extensive as 2G. Thus 3G is not efficient however; the government has made a lot of money from selling 3G licenses.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Future trends include technology trends for internet access, optical fiber technologies, fiber to the curb, fibre to the home, metro Ethernet, etc. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet has created an online Public sphere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; In 2000 Parliament passed the Information Technology Act 2000 and the dot.com boom is seen.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Making internet access meaningful in the Indian Context&lt;/strong&gt; (by Nandini.C) &lt;br /&gt;(&lt;a class="external-link" href="http://internet-institute.in/repository/womens-access-to-the-internet"&gt;Click to see the presentation slides&lt;/a&gt;)&lt;br /&gt;Some of the salient points discussed were: &lt;br /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Status of internet access today sees&amp;nbsp;low level of overall penetration of internet, high rate of household mobile penetration and&amp;nbsp;huge rural-urban divide in internet access.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Relationship b/w women and internet in India&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 8.4% of women in India have access to internet in India and 43% of women using internet in India perceived it as being an important part of their life.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Some area of concerns include ensuring adequate access of internet for the women, entrenched patriarchies, contextual relevance, the imaginary of ‘public access’.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The importance of an existing strong social support network, ITC itself cannot open up economic/social empowerment opportunities for women&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; ICT-enabled micro-enterprises may also force the burden of double work on women, who undertake both productive activities for the micro-enterprise and re/productive activities for the household.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The Internet today has created an online public sphere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Countering the threat of online violence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Censorship and content regulation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Women’s rights and the spaces of internet governance.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Arbitrary censorship and self-regulation by the corporate and slide towards an illusory freedom; state is used as a bogeyman by corporate to create an online culture that is suitable to the corporate values.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="http://www.youtube.com/embed/CUaGZh5nNR4" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify;"&gt;&lt;strong&gt;﻿Activity&lt;/strong&gt;&lt;br /&gt;Day 1 featured an interesting activity called the Creative Handshake. The goal of the game was to teach the participants the concept of "Handshake" in Internet terms and why it is important to make sure that integrity of data transferred is maintained.&lt;/div&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 2: June 9, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The focus of the second day was more on the nuts and bolts behind the working of the Internet by Dr. Nadeem Akhtar, Wireless Technologies and a case-study in Air Jaldi by Michael Ginguld, Collaborative Knowledge base building by Vishnu Vardhan and Affordable Devices on the Internet by Ravikiran Annaswamy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points of each of the talks are listed below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: How Internet Works&lt;/h3&gt;
&lt;p&gt;(by Nadeem Akhtar)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/how-internet-works"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Internet structure and hierarchy:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Data Networks comprise of set of nodes, connected by transmission links, for exchange of data between nodes. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Some of the key principles which underpin data networks include digital transmission, multiplexing and data forwarding/routing.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Data networks through ownership include public and private networks.&lt;/li&gt;
&lt;li&gt;Data networks through coverage include local area networks (small area), metro area networks (may comprise of a city) and wide area networks (wide geographic area across cities).&lt;/li&gt;
&lt;li&gt;Protocols include:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Open systems interconnection (OSI) model divides a communication system into smaller parts. Each part is referred to as a layer. Similar communication functions are grouped into logical layers.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;OSI model defines the different stages that data must go through to travel from one device to another over a network &amp;amp; this enables a modular approach towards developing complex system functionality i.e. functionality at layer X does not depend on how layer Y is implemented.&lt;/li&gt;&lt;/ol&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Nadeem.png" alt="" class="image-inline" title="Nadeem Akhtar" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Dr. Nadeem Akhtar speaking on the working of the internet on Day 2&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;
&lt;li&gt;Internet networks or connections.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers on the internet and these data routes are hosted by commercial, government, academic and other high-capacity network centers, the internet exchange points and network access points. The internet back bone is decentralized.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Transit Service - Passing information from small ISP to large ISP.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Peering Service - The passing of information between two similar ISP’s os similar size to let network traffic pass.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Three levels of network Tier1, Tier2 and Tier 3. TATA Company is the only Tier 1 Indian Company.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Backhaul- Transport Links which connects access edge networks with the ‘core’ network. The transmitters have to be mounted on a high level. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/8skb7ykF9jI" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 2: Wireless Technologies&lt;/h3&gt;
&lt;p&gt;(by Michael Ginguld)&lt;br /&gt;&lt;a class="external-link" href="http://prezi.com/tjaiatxtz1ch/walking-on-the-wireless-side/"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We are surrounded by electromagnetic radiation&lt;/li&gt;
&lt;li&gt;All about transmission waves and there are both advantages and disadvantages of the same:&lt;br /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Pros: higher reach for lower price, overcomes topographic challenges, lower maintenance, less to damage/lose&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cons: limited resources, maintenance (energy), physical limitations to transfer rates.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Satellite/VSAT is a very small aperture tech: a small satellite dish that connects to a geo-static satellite.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Strength: globally usable, can connect from anywhere.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Weakness: signal problems, relatively high installation charge, upstream connection is lower than the downstream, transmitter on satellite is extremely expensive, hence limitation on transmission capacity of the satellite.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; VSATs are not scalable. It is a dead-end tech for usages where data transmission volume is expected to grow.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G Technology for mobile connection.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Limitation in transfer of data, due to technology and encryption limitations but great availability and reasonable price.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;3G Technology has a problem in India; low uptake, leading to low investment, leading to low speed, leading to low uptake. The technology allows for high-speed data transfer but the market condition in India still does not make adequate infrastructural support feasible.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;4G license auction.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A company bought the country-wide 4G license in the auction. Mukesh Ambani bought the company after some days.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The present legislation does not allow for VoIP-based Telco operation but that is expected to change soon.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Wifi technology is wireless technology. It is low cost wireless transfer of data.&amp;nbsp; The Public dissemination of the ranges in which data transfer using the WiFi protocol can take place.&amp;nbsp; It was made public in India in January 2005.&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Limitations: needs line of sight, limit to data transfer.&lt;/li&gt;
&lt;li&gt;Strength: cheap, de-licensed spectrum usage, easily deployable. &lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; 2G spectrum, 3G spectrum and now 4G spectrum all are part of the wireless technology.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Air Jaldi started in Dharamshala; building wifi connection spanning campuses.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Three types of consumer categories: (1) no coverage, (2) under-served, and (3) ‘deserving clients’. #2 is the most common group. #3 are people who should be served but cannot pay fully for the service, hence are cross-subsidised by group #2.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Deployed and managed by local staff, trained by AirJaldi.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Customer premise equipment: Rs. 3-4k.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; User charges: Rs 975 per month for 512 kbps, Rs 1500 per month for 1 mbps.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Content: by and large, AirJaldi brings infrastructure on which content can ride on, teams with various content providers (like e-learning, rural BPOs, local e-banking etc) for the content side. The biggest drivers are local BPO, banking and retail. The next big driver coming up is entertainment.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; WiMax includes 4g spectrum. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/btd4MqOSRe0" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Building Knowledge Bases and Platform via Mass Collaboration on the Internet&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://commons.wikimedia.org/wiki/File:Building_Knowledge_Bases_and_Platforms_via_Mass_Collaboration_on_the_Internet.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;The session started off with some physical activity in the form of "Kasa Kasa Warte, Chan Chan Warte" to break off the lunch induced sleep and a mental activity where the participants were divided into two groups and both the groups were asked to collect information on "Water". One group was left to itself while the other had some expert inputs from Vishnu Vardhan on how to collaborate and organize the data. After the activity, both teams presented the information that they had collected on "Water".&lt;/p&gt;
&lt;p&gt;The benefits of collaborative authoring such as "everyone's voice  is heard", "various inputs leading to a multi-dimensional thinking" etc  were evident as against a single dimensional thought process that was  seen from the group that was un-assisted.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Participant.png/@@images/0bd8de0e-6e85-4100-80c7-070dd046fabf.png" alt="" class="image-inline" title="Participants" /&gt;&lt;br /&gt;&lt;em&gt;Given above is a picture of the participants involved in a group activity&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Salient points discussed during the presentation:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed.&amp;nbsp; Print technology shapes what we consider as knowledge, and hence as knowledge platform &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Techno-sociality of knowledge production&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Concept of Knowledge today is not something of modern phenomena, but it is something which has been existent since print culture was developed.&amp;nbsp; Print technology shapes what we consider as knowledge, and hence as knowledge platform &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Techno-sociality of knowledge production&lt;br /&gt;Examples of knowledge platforms:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Baidu baike &lt;/li&gt;
&lt;li&gt; English wikipedia &lt;/li&gt;
&lt;li&gt; Hudong &lt;/li&gt;
&lt;li&gt;Catawiki &lt;/li&gt;
&lt;li&gt;Wikieducator &lt;/li&gt;
&lt;li&gt;Open street map &lt;/li&gt;
&lt;li&gt;Pad.ma &lt;/li&gt;
&lt;li&gt; Sahapedia &lt;/li&gt;
&lt;li&gt; Internet archive &lt;/li&gt;
&lt;li&gt; Jstor &lt;/li&gt;
&lt;li&gt; Dsal &lt;/li&gt;
&lt;li&gt; Dli&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; In 1994 Cunningham developed the ‘Wiki Wiki Web’ also known as the ‘Ward Wiki’. Basically it is a knowledge platform.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Internet since then has been used for dissemination of information especially in the education sector. Digital Archived have developed over the years which provide information across various platforms like Wikipedia.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The spread of the internet has made possible the building of knowledge bases by seamless and mass collaboration. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt; Generic challenges for Wikipedia&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Quality, relevance, consistency of knowledge &lt;/li&gt;
&lt;li&gt;Suitable motivation of the contributors&lt;/li&gt;
&lt;li&gt;Another issue is the scalability&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Some of the problems faced by Indian Wikipedian pages:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Technical infrastructure for Indian languages &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Typing in the regional language &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;OCR: complexity of Indian language scripts&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Various other technical troubles like browser compatibility, font display, etc., which deter new users&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Dearth of quality content available in digital format&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Different standards/formats/generations (gov.in/DLI)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Relative lack of research/academic standards, which is transferred on to Indic wikipedias. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lack of knowledge sharing culture.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Building a mass knowledge platform is the need of the hour.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The platform should be user friendly, easily available and adoptable; offline outreach is key to effective use of online platforms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The programme&amp;nbsp; should have feedback loop key, behavior statistics data, reinvent and replicate the programme, multi-channel awareness, ‘user connect’ programmes.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The people should communicate knowledge sharing objectives, make knowledge sharing fun, appoint ambassadors; virtual volunteer community building looks simple but its complex and leads to failure.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/2cM7CZ2hMeg" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session: 4 Affordable Devices to access the Internet&lt;/h3&gt;
&lt;p&gt;(by Ravikiran Annaswamy)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/MeetMobileInternet.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Ravikiran.png" alt="" class="image-inline" title="Ravikiran Annaswamy" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Ravikiran Annaswamy giving a demo of the low cost Akash tablet&lt;/em&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Overview of Affordable Mobile Phones such as Lava Iris, Karbonn A1, Nokia Asha, etc.&lt;/li&gt;
&lt;li&gt;Overview of Affordable Tablets such as Aakash, Ubislate, Karbonn Smart A34, etc.&lt;/li&gt;
&lt;li&gt; The number of Internet users in India is expected to nearly triple from 125 million in 2011 to 330 million by 2016, says a report by Boston Consulting Group.&lt;/li&gt;
&lt;li&gt; How Internet Penetration impacts society.&lt;/li&gt;
&lt;li&gt; Demo of the devices.&lt;/li&gt;
&lt;li&gt; Need for Mobile Internet&lt;/li&gt;
&lt;li&gt; Sugata Mitra &amp;amp; Arvind Eye Care examples.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/TUcbcFaX-v4" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;hr /&gt;
&lt;h2&gt;Day 3: June 10, 2013&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The third day of the Institute focussed on Wired means of accessing the Internet, the technology involved followed by an assignment time where the participants were introduced to 2 topics and asked to work on an assignment. This was followed by a site visit in the afternoon to MapUnity. &lt;strong&gt;MapUnity&lt;/strong&gt; develops technology to tackle social problems and&amp;nbsp;development challenges. Their GIS, MIS and mobile technologies are&amp;nbsp;used mostly by government departments and civil society&amp;nbsp; organisations and in the R&amp;amp;D initiatives of commercial ventures.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: Wired Access Technology&lt;/h3&gt;
&lt;p&gt;(by Dr. Nadeem Akhtar)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/wired-access-nadeem-akhtar"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Wired and Wireless&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Wired:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Separate communication channel for each users&lt;/li&gt;
&lt;li&gt; Low signal attenuation&lt;/li&gt;
&lt;li&gt; No interference&lt;/li&gt;
&lt;li&gt; Fixed point-of-attachment&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Wireless:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Shared medium of communication&lt;/li&gt;
&lt;li&gt; Signal is attenuated by a number of factors&lt;/li&gt;
&lt;li&gt; Interference between adjacent channels&lt;/li&gt;
&lt;li&gt; Points-of-attachment can be changed on-the-fly&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Ethernet:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; A family of computer networking technologies for LANs which was Invented in 1973 and commercially introduced in 1980.&amp;nbsp; The systems communicating over ethernet divide a stream o data into individual packets called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Ethernet, by definition, is a broadcast protocol&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Any signal can be received by all hosts&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Switching enables individual hosts to communicate&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Digital subscriber line (DSL):&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; DSL uses existing telephone lines to transport data to internet subscribers and the term xDSL is used to refer to a number of similar yet competing forms of DSL technologies which includes ADSL, SDSL, HDSL, HDSL-2, G.SHDL, IDSL, and VDSL.&amp;nbsp; DSL service is delivered simultaneously with wired telephone service on the same telephone line and this is possible because DSL uses higher frequency bands for data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Asymmetric DSL (ADSL):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; ADSL is the most commonly installed technology and an&amp;nbsp;ADSL tech can provide maximum downstream speeds of up to 8 mbps.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Modem and router:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Modem is specific to a technology&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Modem is de/modulator, it takes bits coming from one protocol/technology, demodulates it (converts it into original data), and re-modulated the original data to another protocol/technology.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Router allows creation of a local area network, allowing multiple devices to connect to the network and access internet together through the router. It has very high bitrate DSL (VDSL) and goes up to 52 mbps downstream and 16 mbps upstream. The length of the physical connection is limited to 300 meters and the second generation VDSL (CDSL2) provides data rates up to 100 mbps simultaneously in both direction, but maximum available bit rate is still achieved about 300 meters.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Cable:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; Cable broadband uses existing CATV infrastructure to provide high-access internet access; uses channels specifically reserved for data transfer&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Support simultaneous access to broadband and TV programs&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Cable access tech is built for one-way transmission; hence some congestion takes place for bi-way data transfer, leading to much lower upstream connection relative to downstream connection for data.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Fiber:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; It is a generic term for any broadband network architecture using optical fiber; fiber to the neighborhood; fiber to the curb;&amp;nbsp; the street cabinet is much closer to the user’s premises, typically within 300m, thus allowing ethernet or radio-based connection to the final users; fiber to the basement; fiber to the home (BSNL already providing); fiber to the desktop&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Passive optical networks (PON)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Advantages of fiber:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Immunity to electromagnetic interference.&lt;/li&gt;
&lt;li&gt; Provides very high data rates at long distances.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; When network links run over several 1000s of meters (e.g., metro area networks), fiber significantly outperforms copper.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Replacing at least part of these links with fiber shortens the remaining copper segments and allows them to run much faster.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; The data rate of a fiber link is typically limited by the terminal equipment rather than the fiber itself.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Assignment&lt;/strong&gt;&lt;br /&gt;Participants were given two options for an assignment to work on in the coming days and they could choose either one.&lt;/p&gt;
&lt;p&gt;Assignment A&lt;br /&gt;The Universal Service Obligation Fund of India has put out a Call for Proposals under two schemes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mobile Connectivity and ICT related livelihood skills for womens’ SHGs (&lt;a href="http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf%29"&gt;http://www.usof.gov.in/usof-cms/pdf21may/Concept_Paper.pdf)&lt;/a&gt;, and&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Access to ICTs and ICT enabled services for persons with disabilities in rural India. (&lt;a href="http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf"&gt;http://www.usof.gov.in/usof-cms/usofsub/Concept%20paper_USOF%20Scheme_PwDs_A.G.Gulati.pdf&lt;/a&gt;)&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Your NGO is committed to the task of facilitating access to the Internet&amp;nbsp;for women/ persons with disabilities in rural parts of Kerala and wishes to submit a proposal/ project idea in partnership with a service provider to the USOF.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Assignment B&lt;strong&gt;&lt;br /&gt;You&lt;/strong&gt; are a member of the ancient tribe of Meithis residing in Manipur. Over the years, there is a strong feeling in your community that although the Government has rolled out projects to connect the rural areas throughout India, these have not been successful for your tribe and there is still even a lack of basic fixed telephony, let alone mobile and broadband services. You have hence come to the conclusion that there is a need for focused efforts to target such communities as yours and have decided to submit a concept note to the USOF requesting that ‘ethnic and rural tribal communities’ be specifically included within the mandate of the USOF’s activities by defining them as an ‘underserved community’.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Raveena.png" alt="" class="image-inline" title="Participants in Discussion" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants engaged in a discussion.&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Field Trip - Destination: MapUnity.&lt;/strong&gt; &lt;strong&gt;&lt;br /&gt;MapUnity&lt;/strong&gt; develops technology to tackle social problems and development challenges. Their GIS, MIS and mobile technologies are&amp;nbsp;used&amp;nbsp;mostly by government departments and civil society&amp;nbsp;organisations, and&amp;nbsp;in the R&amp;amp;D initiatives of commercial ventures. MapUnity presented their product offerings to the participants.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYOT%2BQwA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed type="application/x-shockwave-flash" src="http://a.blip.tv/api.swf#AYOT+QwA" style="display:none"&gt;&lt;/embed&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 4: June 11, 2013&lt;/h2&gt;
&lt;h3&gt;Session 1: Universal Access&lt;/h3&gt;
&lt;p&gt;(by Archana Gulati)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/UniversalServiceConceptsandPractices_Archana.G.Gulati.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Archana.png/@@images/a1f18756-20b4-4732-b032-502b59078819.png" alt="" class="image-inline" title="Archana" /&gt;&lt;br /&gt;&lt;br /&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Given above is a picture of Archana Gulati speaking on Universal Access&lt;/em&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;Tuesday revolved around questions of access and openness. The day kicked off with Archana Gulati, a policy expert in access to ICTs for people with disabilities talking on &lt;strong&gt;Universal Access&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Ms. Gulati stressed the importance of ICTs for social development. ICTs are a necessary aid in development structures including education, health and increased citizen participation in national affairs &amp;amp; they provide crucial knowledge inputs into productive activities. However, even with the Telecom boom, there still exists an access gap in India, which cannot be covered by commercially viable systems.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
 &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;This 'actual access gap' exists because of geographic (scattered population, low income, low perceived utility of service, lack of commercial/industrial customers, lack of roads, power, difficult terrain, insurgency), economic (urban poor) and social inequality (gender, disabilities) differences. To achieve Universal Access or Universal Service, additional efforts must be made, so as to include these groups. However, Universal Access and Universal Service, while they may imply the same thing, are very different approaches to deal with the problematic access gap.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Universal service, a term coined by Theodore Vail, president of AT&amp;amp;T in 1906, argued that the government should enforce the usage of only one network. This approach suggests a monopolization of the market and goes against the liberal market principle.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Universal access on the other hand suggests cross-subsidizing the low and no profit service areas by high profit service areas. However, this results in the urban population to get over-charged while the rich rural areas benefit from rural subsidizing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;So how do we enable a fair and inexpensive network to be able to create access for a large number of people equally? &lt;br /&gt;Ms. Archana Gulati went on to introduce the Sanchar Shakti scheme as a contribution to national access in India. It was initiated with the objective of improving rural SHG access skills, knowledge, financial services and markets through mobile connections and involved several stakeholders like NABARD, handset/modem manufacturers, DoT USOF, Mobile VAS Providers, Lead NGOs, Mobile Service Providers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This scheme shows how important is, for the commercial, private and public sector to work together on obtaining accessibility to ITCs.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Free and Open Internet&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Pranesh Prakash) &lt;br /&gt;The following session by Pranesh Prakash on &lt;strong&gt;Free and Open Internet&lt;/strong&gt; showed how the internet can still be a restrictive place which does not allow for internet equality. His talk focussed on the concepts of free and open Internet. Prakash started by stating the Freedom of Speech and Expression Article of the Indian Constitution and in an interactive round it was discussed, how these articles are fundamental for securing other basic human rights. This was demonstrated by an example in which the distribution of food did not proceed equally, as misinformation and restrictions led to an inappropriate hoarding of goods. Therefore, it is important for everyone to have that right. In fact, the Indian constitution formulates Article 19 in a positive way, implying not only everyone should have that right, but that the government must promote the upholding of these rights.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, in the case of Article 66a, the law actually caused a problem with freedom of speech in itself, as it penalizes sending false and offensive messages through communication services. This is a massive impediment on free speech, as outsiders decide upon what is offensive and what is false.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The other side of freedom of speech and expression is censorship. Online, the removal of websites and editing of content often happens quietly and obscures the fact that someone or something is being censored. Unlike book burnings in the past, which were always made a big political spectacle, often websites are simply removed without a trace, or one is faced with a 404 error, when trying to access it. Because of the offensive content law, journals and magazines are quick to remove supposedly offensive content, as it seems more difficult to engage in argument with the people claiming offense. The CIS proposed a counter-law to secure for this to happen less, as freedom of speech includes the freedom to receive that speech.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/SGxYxLEA8OY" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Openness&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Sunil Abraham)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify;"&gt;Next to ensuring freedom of speech and access, the third session of the  day focussed on Openness in terms of Open Source software. Sunil  Abraham, CIS executive director, stated the importance of free software  and open access of data, as they ensure what he called the four freedoms  of internet usage, namely the freedom to use for any purpose, the  freedom to study, to modify and to share (freely or for a fee).  Proprietary software imposes on these freedoms, as it only has  restrictive use and a strong copyright. However, there are alternatives  that have moderate copyrights, or so-called copy centred perspectives,  or even copyleft, including the above mentioned rights into the terms of  the software usage.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Sunil.png/@@images/92ac30ac-90da-4fcd-a0b2-0469aa2ecc75.png" alt="" class="image-inline" title="Sunil Abraham" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Above is a picture of Sunil Abraham speaking on Openness&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;In alignment with Sunil Abraham’s talk Pranesh Prakash criticized copyright law cutting into accessibility rights, as copyright infringements include translation into other languages, audio versions and also integral parts of education. The key is not to have a "one size fits all" copyright solution, as it is impossible to treat twitter content the same as a blockbuster movie. However, the government of India is doing exactly that and needs to interlink questions of access with copyright law.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/vqv7qai5c-s" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 4: Open Content&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Prof. Subbiah Arunachalam)&lt;br /&gt;Prof. Subbiah Arunachalam, who led the next session, discussed &lt;strong&gt;Open Content&lt;/strong&gt;. He had seen during the course of his experience India's poor performance in Science &amp;amp; Technology and outlined the reasons for the same. The lack of access to information essential in scientific research and knowledge production, he said, was the major limiting cause.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/BFJyUTNzYvE" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 5: Quick Talk on Copyright Law and Access&lt;/h3&gt;
&lt;p&gt;This short session dealt with implications of copyright law on internet access.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Activity&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants were divided into two groups, and they were asked build as huge a network as possible with their personal belongings and present their creations. The participants had good ideas. One&amp;nbsp;group placed their mobiles and laptops into the network to&amp;nbsp;have them as nodes. The other group implemented the re-routing around&amp;nbsp;censorship.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/nSLy1eRAndQ" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Network.png" alt="" class="image-inline" title="Networking" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants in an activity making the longest network possible with their personal belongings&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 5: (June 12, 2013)&lt;/h2&gt;
&lt;h3&gt;Session 1: Privacy on the Internet in India&lt;/h3&gt;
&lt;p&gt;(by Sunil Abraham and Elonnai Hickok)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/privacy-on-the-internet-by-elonnai"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Elonnai.png" title="Elonnai" height="211" width="317" alt="" class="image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;em&gt;Given above is a picture of Elonnai Hickock speaking about privacy&lt;/em&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;
&lt;p&gt;The following day, June 12th started off with “Privacy” as the theme. The session Privacy on the Internet in India was led by CIS privacy experts Sunil Abraham and Elonnai Hickock.&lt;/p&gt;
&lt;p&gt;In an exchange of anecdotes, it was made clear how there needs to be a certain degree of state surveillance to secure the citizens safety.&lt;/p&gt;
&lt;p&gt;This can happen through off air interception and active or passive cell phone towers that can track mobile devices.&lt;/p&gt;
&lt;p&gt;However, encryption is an important tool to secure one’s own privacy against cyber espionage.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Off-the Air Interception&lt;/li&gt;
&lt;li&gt; Possible to set up active or passive cell phone tower. &lt;/li&gt;
&lt;li&gt; The signal strength will be strong and everyone looks for it.&lt;/li&gt;
&lt;li&gt; Capacity to identify itself as a service provider. &lt;/li&gt;
&lt;li&gt; Interception can begin with encryption Technology today used by security agencies.&lt;/li&gt;
&lt;li&gt; NTRO- national technical Research Org and Outlook &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/PQWi9hHHSpc" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 2: E-Accessibility&lt;/h3&gt;
&lt;p&gt;(by Nirmita Narasimhan)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/eAccessibility.pdf"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Eaccessibility.png" alt="" class="image-inline" title="E-accessibility" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of Dr. Nirmita Narasimhan speaking on e-accessibility&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The second&lt;strong&gt; &lt;/strong&gt;session was on&lt;strong&gt; “E-Accessibility” &lt;/strong&gt;led by Dr. Nirmita Narasimhan&lt;strong&gt;. &lt;/strong&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Problems arising out of disability&lt;/li&gt;
&lt;li&gt; Accessibility-Infrastructure and ICT&lt;/li&gt;
&lt;li&gt; Assistive technologies for PWD’s.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Reasonable accommodation (not available or cannot be and requires extra effort and putting up an accessible copy up) and universal Design (for both for PWD’s and non-PWD’s).&lt;/li&gt;
&lt;li&gt; Web Content Accessibility is operable and easily understandable. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Accessibility standards include; Daisy (6 types of books including audio and text books) is all about marking up the documents. Really a good way to read but is expensive and time consuming, also need Daisy tools and player to make it work.&lt;/li&gt;
&lt;li&gt; In 1808 the first typewriter was developed to help the blind.&lt;/li&gt;
&lt;li&gt; Considerations involved in Web Accessibility &lt;/li&gt;
&lt;li&gt; Overlap b/w mobile accessibility and web accessibility.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Example- Raku Raku phone captured 60% of market share in Japan. It has many assistive features.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Relay Services has a middle man who passes on the message b/w different PWD’s in many countries, but it is not yet available in India.&lt;/li&gt;
&lt;li&gt; PWD’s communicating with customer care – the issues involved. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Accessibility Policy- very few people are adopting accessible technologies. There is a need to have a strong policy. U.K. and U.S. already have strong policies related to accessible and assistive technology for PWD’s.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;strong&gt; Video&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/vI8mixgTgCM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3&gt;Session 3: International Bodies and Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Tulika Pandey and Gaurab Raj Upadhyay)&lt;br /&gt;&lt;strong&gt;Activity&lt;/strong&gt;&lt;br /&gt;Gaurab incorporated an &lt;strong&gt;Activity&lt;/strong&gt; into his talk to enable the students to have a clearer understanding of International Bodies and Mechanisms.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Gaurab.png" alt="" class="image-inline" title="Gaurab" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Gaurab Raj Upadhaya explaining the International Bodies and Mechanisms&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed during his talk were:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Definition: “Internet Governance is the development and application by Govt., the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures and programmes which shape the evolution and use of internet.”&lt;/li&gt;
&lt;li&gt;It should be multilateral, transparent and democratic&lt;/li&gt;
&lt;li&gt; Enhanced cooperation means to enable govt…&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Technical issues to keep in mind while talking about internet:&lt;br /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li&gt; Critical internet resources&lt;/li&gt;
&lt;li&gt;Root server locations &lt;/li&gt;
&lt;li&gt; Open Standards (CIS leads the initiative) &lt;/li&gt;
&lt;li&gt; Interoperability &lt;/li&gt;
&lt;li&gt; Search Engines &lt;/li&gt;
&lt;li&gt; Internationalized Domain names (in own script &amp;amp; language) &lt;/li&gt;
&lt;li&gt; Content&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Virtual yet real space&amp;nbsp;and most important question to be understood is that whether, the governance of internet is possible?&lt;/li&gt;
&lt;li&gt; Public Policy- to monitor cross-border data flow, Openness vs Privacy&lt;/li&gt;
&lt;li&gt; India’s Outlook in internet policies-Pillars of Internet which is not fully addressed by the Indian government today. &lt;/li&gt;
&lt;li&gt; Established an Inter- Ministerial Group by including various government departments into the arena.&lt;/li&gt;
&lt;li&gt; Layer 0-7 Names and Numbers&lt;/li&gt;
&lt;li&gt; Layer 8 and above&lt;/li&gt;
&lt;li&gt; Applications and Usage &lt;/li&gt;
&lt;li&gt; Legal business, policy, etc.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Session-4: E-Governance&lt;/h3&gt;
&lt;p&gt;(by Tulika Pandey and Sunil Abraham)&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Tulika.png" alt="" class="image-inline" title="Tulika" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the speaker Tulika Pandey speaking about e-Governance&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt; Making policies in India is difficult because the population is huge and implementation at rural level is difficult.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Bombarded by Techno utopians- who believe in technology’s ability to change lives.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Techno determinants- Corruption solved through technology through open government data. More technology is better, the most sophisticated ones are the best are gross misconceptions.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Bhoomi project tried to deal with corruption at village level. Important policy change made all paper work illegal and digitized the land records etc. every action and request will be logged. But this led to creation of new corruption. Bribes were taken even before data was logged!&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; UID Project (Cobra Post Scam) around 20 public sector and 30 private banks were involved in money laundering scams. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt; People who design the systems in Delhi prepare sub-contracts&lt;strong&gt;.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/strong&gt;VIDEO&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/Le3b-kka5Hs" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;hr /&gt;
&lt;h2&gt;Day 6: (June 13, 2013)&lt;/h2&gt;
&lt;h3&gt;Session 1: Critical Perspectives of the Internet&lt;/h3&gt;
&lt;p&gt;(by Dr. Nishant Shah)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/critical-perspectives-of-internet-society-dr-nishant-shah"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;The sixth day of the Institute kicked off with Nishant Shah, director of research at CIS, looking into Critical Perspectives of the Internet.&amp;nbsp; Nishant made a very important distinction between the internet as infrastructure and as social network constructing alternative universes. Nonetheless it was important to stress that technology should not be alienated in the process of this separation but seen as an integral part of it, as the digital is as much part of reality as any other technology and has become essential as a technology of change that it brings about not only in scientific but also in social development. Quoting Michel Foucault, Shah argued that technology becomes influential when it changes life, labour and language, which is why research in the field should involve critical ways of thinking about body, space and community.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Nishant.png/@@images/836aa919-b1aa-4e61-86d2-2e4a6e5fc62f.png" alt="" class="image-inline" title="Nishant Shah" /&gt;&lt;br /&gt;&lt;br /&gt; &lt;em&gt;Above is a picture of Dr. Nishant Shah speaking on Critical Perspectives of the Internet.&lt;/em&gt;  &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The body perception can be perceived through the way bodily agencies change through technology. Technology does not necessarily taint or corrupt the body, but can also be a way to escape its confines. To put it to a point, we are all born into technology and cannot free ourselves from them, as for example pregnancy already starts with nutritional supplements, regulatory diets and exercise and essentially ends with birth technologies that do not necessarily involve only the digital - we must remember, speech is one of the oldest technologies available today.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/HAnwjxLGA-g" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Strategies for Policy Intervention&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Chakshu Roy)&lt;br /&gt;The second session on “Strategies for Policy Intervention” was led by Chakshu Roy. This session dealt with various ways in which policy intervention can be made and the various factors necessary to successfully engage in policy forums.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/B-tiOPu6WaU" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 3: Profile of Internet Service Providers&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Satyen Gupta)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/profile-of-isps-by-satyen-gupta"&gt;Click to view the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/SatyenGupta.png" alt="" class="image-inline" title="Satyen Gupta" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of Satyen Gupta speaking about Internet Service Providers&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Satyen Gupta during his talk on “Profile of Internet Service Providers” discussed the nature, offerings and profile of various ISPs in India, their market share and dynamics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;National Broadband Plans&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Spectrum Issues “Management”&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reality check of Indian ISPs&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Definition &amp;amp; Penetration&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Roadblocks for Broadband in India, Governments Role, Regulation&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Institutional Framework for the Indian Telecom&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Access in India- Technology-Neutrality&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Satellite based DTH Services offer alternate for the Broadband via Receive Only Internet Service (ROIS)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband using DTH for Receive-only Internet&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;VSAT has the potential for significant impact on Broadband Penetration in Remote Areas&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fixed Wireless Access- an important access technology&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Facilitating Radio Spectrum for Broadband Access&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fiscal measures to reduce the cost of access devices, infrastructure and broadband service&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reduction in the cost of connectivity&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;National Internet Exchange of India (NIXI) -National Internet Exchange of India (NIXI) has been set up on recommendation of TRAI by DIT, Government of India to ensure that Internet traffic, originating and destined for India, should be routed within India.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Emerging Broadband Services&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Broadband Commission for Digital Development (BCDD)-UN Targets for Universal Broadband,2015&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;NOFN India-Existing Fiber Infrastructure and Coverage by Various Service Providers&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;National Telecom Policy (NTP) 2012- Salient Features&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;State of Internet Services and ISPs in India:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;India’s Ranking on Key Broadband Indicators&lt;/li&gt;
&lt;li&gt;Regulator’s Report – Growth of Internet in India&lt;/li&gt;
&lt;li&gt;Internet Subscribers Base &amp;amp; Market share of top 10 ISPs&lt;/li&gt;
&lt;li&gt;Technology trends for Internet/Broadband Access&lt;/li&gt;
&lt;li&gt;Internet/broadband Subscribers for top 10 states&lt;/li&gt;
&lt;li&gt;Tariff Plans for USO funded Broadband&lt;/li&gt;
&lt;li&gt;Contribution of Telcos in Development of Internet Services&lt;/li&gt;
&lt;li&gt;Incumbent’s Role in Growth of Broadband&lt;/li&gt;
&lt;li&gt;Plugging rural missing link- BBNL&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Internet Subscribers Base &amp;amp; Market share of top 10 ISPs&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/DOSeo-ASOQ8" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 4: Competition in the Market by Helani Galpaya&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Helani Galpaya during her talk on “Competition in the Market” discussed about what competition meant, &lt;em&gt;Herfindahl–Hirschman&lt;/em&gt; Index to measure how competitive a market is, what are the dangers of monopoly markets and the landscape of the Telecom market in India.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Helani.png" alt="" class="image-inline" title="Helani" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Helani Galpaya speaking about Competition in the Market&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Day 7: (June 14, 2013)&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The final day of the Institute focussed on how the Internet can be used to effect change on society – Activism was the theme.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Session 1: Leveraging Internet for activism&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Ananth Guruswamy)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/LeveragingInternetforActivism.pdf"&gt;Click to read the presentation slides&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/AnanthGuruswamy.png" alt="" class="image-inline" title="Ananth Guruswamy" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a picture of Ananth Guruswamy speaking during the session on leveraging internet for activism&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Some of the salient points discussed were:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Digital Activism&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Target Omar Abdullah. It is about an act called Administrative detention Act. One can be detained without act i.e. The Preventive Detention Act. He directly responded to the threat.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Twitter seems to be a place where the political leaders are actually accessible. This kind of access was not possible in day to day life earlier if one was a common man. This phenomenon is developing. Even in Corporate setup writing a mail directly to the CEO seems possible. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Strengths: Wide reach, Freedom of speech, Data collection is made easy, Issues can be tackled swiftly, Global communities, singular identities have lot of power. Eg: 190 Million people stood up against Poverty; this kind of mobilization impossible without internet.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Besides local issues even Global issues are addressed an collection of funds becomes easy. Onion.com once a struggling publication in U.S., but now with a global audience it is thriving and it has a healthy reader base today. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The Earth Hour helps people connect across space and time.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Weakness: More popularity, more attention; Traditional/Real Protest has become rare and a threat; There is no real action beyond internet, threat of movement is low, there is no real commitment involved in digital activism and just one click is enough to make one ‘feel good’.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Opportunities: Recruitment of protestors for real protests. Diff. b/w real and virtual blurred; anything that affects the mind space is real. The intersection is interesting.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Threats: Total removal of privacy, Government intervention in private issues and there could be misinterpretation of people’s thoughts by certain people.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Traditional vs Digital activism: Traditional fails to provide results whereas clicking a button is as easy as wearing a badge.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Facebook activism: ‘Like Buttons’, People moving away from reading emails, a shift towards use of facebook; creates a sense of belongingness which the traditional activism failed to achieve.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;India against Corruption: used mobile phone effectively.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Social Media has changed the way protests happen globally and in India, one example is Twitter. Change.org is a website which gives freedom to anybody to start a petition without any external source; Awaaz.org another such petition website.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Green Peace launched a Green peace X which was a runaway success. YouTube is another platform for the masses. People today are more interested in watching rather than reading.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Pakistan in 2007: “Flash protests”; Free Fraizan Movement on Twitter.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Something to keep in mind regarding while launching a campaign online is to think who the audience is and what we want them to do and how will the campaign help our objectives?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How to measure success of a social media campaign?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Reach&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Engagement- likes, tweets, comments, etc.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Influence&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Attrition Score&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/PXZE7y1qxlo" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;h3 style="text-align: justify;"&gt;Session 2: Internet Access Activism&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by Parminder Jeet Singh)&lt;br /&gt;The next session on “INTERNET ACCESS” ACTIVISM by Parminder Jeet Singh dealt with how people can contribute to initiatives for improving internet access amongst masses.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/_zyM3_OiUxM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;h3&gt;Session 3: Ensuring Access to the Internet&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;(by A.K. Bhargava)&lt;br /&gt;&lt;a class="external-link" href="http://internet-institute.in/repository/BBNLiis.pdf"&gt;Click to view the presentation&lt;/a&gt;&lt;br /&gt;The last session on “Ensuring Access to the Internet” by A.K. Bhargava discussed strategies to enhance access to the Internet in India with special focus on National Optical Fibre Network.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The salient points discussed were:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Role of Broadband in Nation Building&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy Aspiration of Broadband - How do we meet aspiration?&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Telecom Network Layers‐Gaps in OFC Reach&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; BBNL Interconnection&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; NOFN - Bridging The Gap&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Digital Knowledge Centres (DKCs)&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; Architecture of BBNL&lt;br /&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp; NOFN Impact&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Societal&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Bridging the digital divide&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Business&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Job creation, indigenous industry growth&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Sectoral&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Improved connectivity, data growth&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Technological&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Differentiators&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/4X3WSn1u3WM" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Speaker Presentation Slides&lt;/strong&gt;&lt;br /&gt;All the presentation aids/slide shows barring a few have been uploaded to the website at &lt;a class="external-link" href="http://internet-institute.in/repository"&gt;http://internet-institute.in/repository&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Presentation of Assignments&lt;/strong&gt;&lt;br /&gt;The participants presented their assignments which were given to them to work on the 3rd day. The participants were presented with Wikipedia T-Shirts as a token of appreciation.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Assignments.png" alt="" class="image-inline" title="Assignments" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is a picture of the participants presenting their assignments&lt;/em&gt; &lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participant Feedback&lt;/strong&gt;&lt;br /&gt;All participants were asked to fill a "Session Feedback Form" for each of the sessions and also an "Overall Feedback Form". They were also constantly encouraged to come up with suggestions and inputs on how to make the Institute more interesting.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The key findings from the &lt;strong&gt;Quantitative Feedback&lt;/strong&gt; provided are:&lt;br /&gt;(The figures below are averaged scores (out of 5) provided by participants in the Overall Feedback Forms)&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th&gt;Parameter&lt;/th&gt;
&lt;th&gt;Score (Out of 5)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Relevance of Content&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td style="text-align: justify;"&gt;2&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;Comprehensiveness of Content&lt;/td&gt;
&lt;td&gt;3.44&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Easy to Understand&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.55&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Well Paced&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.33&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Sufficient Breaks&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Duration of Talks&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3.2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Mix between Learning &amp;amp; Activities&lt;/td&gt;
&lt;td style="text-align: right;"&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The key findings from the &lt;strong&gt;Qualitative Feedback&lt;/strong&gt; provided are:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th&gt;Points observed&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Presentations&lt;/strong&gt; – Participants felt sessions with accompanying slides/aids were most helpful. Some felt that accompanying notes could also be useful for future reference.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Use of Examples/Case Studies&lt;/strong&gt; – Participants felt concepts can be better assimilated if case-studies/examples are used. Some also felt that for the technological advancements discussed, it would have been better had the social/economic impact of the same was discussed too.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Implementation Gaps&lt;/strong&gt;– One participant, who is working at the field level in Kolkata had a specific thing to say about the talk about BSNL and its offerings– Although BSNL has so many options available on paper to connect to the Internet, common service centres in West Bengal are mostly run on Tata Indicom’s network even though the board outside says “BSNL” etc. She felt that the reality is far different from what exists on paper.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Interactive sessions&lt;/strong&gt; were most appreciated than speaker led sessions.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;There were many responses to the question “&lt;strong&gt;How will you apply this new information in the future&lt;/strong&gt;” and it is very encouraging.&amp;nbsp; People have given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, to help file RTIs, to adopt more open source software, sharing with students, advocacy efforts, etc&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;The responses to the question “&lt;strong&gt;What did you learn from the session/workshop that was new?&lt;/strong&gt;” elicited more responses for the following sessions&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Domestic Bodies and Mechanisms&lt;/li&gt;
&lt;li&gt;Case-studies such as Air Jaldi&lt;/li&gt;
&lt;li&gt;Low cost devices in India&lt;/li&gt;
&lt;li&gt;USOF&lt;/li&gt;
&lt;li&gt;Free &amp;amp; Open Internet&lt;/li&gt;
&lt;li&gt;Copyright laws&lt;/li&gt;
&lt;li&gt;Privacy&lt;/li&gt;
&lt;li&gt;Accessibility&lt;/li&gt;
&lt;li&gt;Digital Natives&lt;/li&gt;
&lt;li&gt;ISPs&lt;/li&gt;&lt;/ol&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Field Trip&lt;/strong&gt; – One participant said “&lt;em&gt;One or two of the persons from MapUnity could have made the presentation at the institute venue itself. A visit to an underserved or un-served community with interactions with the people there could also have given a good understanding of on-ground challenges and needs.”&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Follow-up Session&lt;/strong&gt; –One participant had ideas about having a follow-up session “&lt;em&gt;A follow-up call [webinar?] after 6 months to see if any of these concepts were useful would be an interesting exercise to take up”&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Assignment – &lt;/strong&gt;Participants felt that the assignments were good but they needed more time to work on the same.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Other Feedback:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The food and the facilities were enjoyed and appreciated by all.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The remote location of the Golden Palms Resort was a concern for most of the participants.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Participation Certificates&lt;/strong&gt;&lt;br /&gt;Participation Certificates (template shown below) have been mailed to all the participants in the third week of July 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Certificate.png" alt="" class="image-inline" title="Certificate of Participation" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Given above is the certificate declaring the successful completion of the event&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify;"&gt;Institute Expenses&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;A total of Rs. 19, 91,889 (Rupees nineteen lakhs ninety one thousand eight hundred and eighty nine only) was spent towards organizing and conducting the Internet Institute. A breakup of the Institute Expenditures is given below:&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;
&lt;th style="text-align: left;"&gt;Type of Expense&lt;/th&gt;
&lt;th style="text-align: left;"&gt;Description&lt;/th&gt;
&lt;th style="text-align: right;"&gt;Total&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Venue – Golden Palms Resort&lt;/td&gt;
&lt;td&gt;Accommodation for participants, speakers and food&lt;/td&gt;
&lt;td style="text-align: right;"&gt;12,91,176&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Travel&lt;/td&gt;
&lt;td&gt;Cost of Air tickets&lt;/td&gt;
&lt;td style="text-align: right;"&gt;2,94,515&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Local Travel&lt;/td&gt;
&lt;td&gt;Airport Pickup/Drop, Local City Travel&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,41,001&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Gifts &amp;amp; Printing&lt;/td&gt;
&lt;td&gt;Gifts for speakers and ad hoc document printing charges&lt;/td&gt;
&lt;td style="text-align: right;"&gt;24,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Infrastructure&lt;/td&gt;
&lt;td&gt;Telephony, Audio, Video, Stage&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,05,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Participant Bags&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right;"&gt;10,650&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Reimbursements&lt;/td&gt;
&lt;td&gt;Reimbursements to participants and speakers&lt;/td&gt;
&lt;td style="text-align: right;"&gt;1,25,547&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: center;" colspan="3"&gt;&lt;strong&gt;Total Expenses&lt;/strong&gt;&lt;/td&gt;
&lt;td style="text-align: right;"&gt;19,91,889&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify;"&gt;What the participants had to say&lt;/h3&gt;
&lt;blockquote class="quoted"&gt;Sangh Priya Rahul – “&lt;em&gt;One of my organisation's work is more or less related to empowerment of rural areas so knowledge about USOF will be useful there&lt;/em&gt;&lt;em&gt;.” &lt;/em&gt;(On USOF)&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="quoted"&gt;Rashmi. M – “&lt;em&gt;Makes me more sensitized towards the disabled people.”&lt;/em&gt; (On e-Accessibility)&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="quoted"&gt;Preethi Ayyaluswamy – “&lt;em&gt;Would help me in strategically planning for an online campaign” &lt;/em&gt;(On digital activism).&lt;/blockquote&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Institute was highly engaging and enabled the participants to explore the various facets of Internet &amp;amp; Society. As was evident from the feedback forms, participants had given thought to contributing to Wikipedia in their mother tongue, take the knowledge to the field work that they are associated with, continue with their research, change their Internet connections, help file RTIs, adopt more open source software, sharing with students, advocacy efforts etc. There was a very high level of expertise amongst speakers at the Institute which was apparent from the participatory discussions and a lot of insightful perspectives were brought forth. There was a common consensus amongst all participants that inclusive growth across all dimensions would take efforts from all stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We hope to learn from the findings of this Institute and work towards a better second Institute.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/GroupPhoto.png" alt="" class="image-inline" title="Group Photo of Participants" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;em&gt;Above is a group picture of all the participants and the organizers&lt;/em&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report'&gt;https://cis-india.org/telecom/knowledge-repository-on-internet-access/institute-on-internet-and-society-event-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>srividya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-10-15T06:48:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway">
    <title>Whose Change is it Anyway?</title>
    <link>https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway</link>
    <description>
        &lt;b&gt;This thought piece is an attempt to reflect critically on existing practices of “making change” and its implications for the future of citizen action in information and network societies. It observes that change is constantly and explicitly invoked at different stages in research, practice, and policy in relation to digital technologies, citizen action, and network societies. &lt;/b&gt;
        
&lt;p&gt;The White Paper by Nishant Shah was &lt;a class="external-link" href="http://www.hivos.net/Hivos-Knowledge-Programme/Themes/Civic-Explorations/Publications/Whose-Change-is-it-anyway"&gt;published by Hivos recently&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;However, we do not have adequate frameworks to address the idea of change. What constitutes change? What are the intentions that make change possible? Who are the actors involved? Whose change is&amp;nbsp; it, anyway?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Drawing on the Hivos Knowledge Programme and on knowledge frameworks  around youth, technology, and change from the last four years, this  thought piece introduces new ways of defining, locating, and figuring  change. In the process, it also helps understand the role that digital&amp;nbsp;  technologies play in shaping and amplifying our processes and practices  of change, and to understand actors of change who are not necessarily  confined to the category of “citizen”, which seems to be understood as  the de facto agent of change in contemporary social upheavals,&amp;nbsp;  political uprisings, and cultural innovations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Methodologically, this thought piece attempts to make three discursive  interventions: It locates digital activism in historical trajectories,  positing that digital activism has deep ties to traditional activism,  when it comes to the core political cause. Simultaneously, it recognises  that new modes of political engagement are demanding and producing  novel practices and introducing new actors and stakeholders. It looks at  contemporary digital and network theories, but also draws on older  philosophical lineages to discuss the crises that we seek to address. It  tries to interject these abstractions and theoretical frameworks back  into the field by producing two case studies that show how engagement  with these questions might help us reflect critically on our past  practices and knowledge as well as on visions for and speculations about  the future, and how these shape contemporary network societies. It  builds a theoretical framework based on knowledge gleaned from  conversations, interviews, and on-the-ground action with different  groups and communities in emerging information societies, and integrates  with new critical theory to&amp;nbsp; build an interdisciplinary and accessible  framework that seeks to inform research, development-based  interventions, and policy structures at the intersection of digital  technologies, citizen action, and change by introducing questions around  change into existing discourse.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/blog/whose-change-is-it-anyway.pdf" class="internal-link"&gt;Click to download the full White Paper here&lt;/a&gt; (PDF, 321 Kb)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway'&gt;https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Youth</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-04-17T10:56:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules">
    <title>CIS Welcomes Standing Committee Report on IT Rules</title>
    <link>https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society welcomes the report by the Standing Committee on Subordinate Legislation, in which it has lambasted the government and has recommended that the government amend the Rules it passed in April 2011 under section 79 of the Information Technology Act.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.prsindia.org/uploads/media/IT%20Rules/IT%20Rules%20Subordinate%20committee%20Report.pdf"&gt;Click to read&lt;/a&gt; the Parliamentary Standing Committee Report on the IT Rules. A modified version was &lt;a class="external-link" href="http://www.ciol.com/ciol/news/185991/cis-welcomes-panels-anti-govt-stand-it-rules"&gt;published in CiOL&lt;/a&gt; on March 27, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;These rules have been noted by many, including CIS, Software Freedom Law Centre, and Society for Knowledge Commons, and many eminent lawyers, as being unconstitutional. The Standing Committee, noting this, has asked the government to make changes to the Rules to ensure that the fundamental rights to freedom of speech and privacy are safeguarded, and that the principles of natural justice are respected when a person’s  freedom of speech or privacy are curtailed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ambiguous and Over-reaching Language&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee has noted the inherent ambiguity of words like "blasphemy", "disparaging", etc., which are used in the Intermediary Guidelines Rules, and has pointed out that unclear language can lead to harassment of people as has happened with Section 66A of the IT Act, and can lead to legitimate speech being removed.  Importantly, the Standing Committee recognizes that many categories of speech prohibited by the Intermediary Guidelines Rules are not prohibited by any statute, and hence cannot be prohibited by the government through these Rules.  Accordingly, the Standing Committee has asked the government to ensure "no new category of crimes or  offences is created" by these Rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Government Confused Whether Rules Are Mandatory or Advisory&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee further notes that there is a discrepancy in the government’s stand that the Intermediary Guidelines Rules are not mandatory, and are only "of advisory nature and self-regulation", and that "it is not mandatory for the Intermediary to disable the information, the rule does not lead to any kind of censorship". The Standing Committee points out the flaw in this, and notes that the language used in the rules is mandatory language (“shall act” within 36 hours). Thus, it rightly notes that there is a "need for clarity on the aforesaid contradiction".  Further, it also notes that there is "there should be safeguards to protect against any abuse", since this is a form of private censorship by intermediaries."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Evidence Needed Against Foreign Websites&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government has told the Standing Committee that "foreign websites repeatedly refused to honour our laws", however, it has not provided any proof for this assertion.  The government should make public all evidence that foreign web services are refusing to honour Indian laws, and should encourage a public debate on how we should tackle this problem in light of the global nature of the Internet.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Cafes Rules Violate Citizens’ Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee also pointed out that the Cyber Cafe Rules violated citizens’ right to privacy in requiring that "screens  of the computers installed other than in partitions and  cubicles should face open space of the cyber café".  Unfortunately, the Standing Committee did not consider the privacy argument against retention of extensive and intrusive logs. Under the Cyber Cafe Rules, cyber cafes are required to retain (for a minimum of one year) extensive logs, including that of "history of websites accessed using computer resource at cyber café" in such a manner that each website accessed can be linked to a person. The Committee only considered the argument that this would impose financial burdens on small cybercafes, and rejected that argument.  CIS wishes the Committee had examined the provision on log maintenance on grounds of privacy as well."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Government’s Half-Truths&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In one response, the government notes that "rules under Section 79 in particular have undergone scrutiny by High Courts in the country. Based on the Rules, the courts have given reliefs to a number of individuals and organizations in the country. No provision of the Rules notified under Sections 43A and 79 of the IT  Act, 2000 have been held &lt;i&gt;ultra vires&lt;/i&gt;."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What the government says is a half-truth.  So far, courts have not struck down any of the IT Rules. But that is because none of the High Court cases in which the vires of the Rules have been challenged has concluded. So it is disingenuous of the government to claim that the Rule have "undergone scrutiny by High Courts".  And in those cases where relief has been granted under the Intermediary Guidelines, the cases have been ex-parte or have been cases where the vires of the Rules have not been challenged.  The government, if it wants to defend the Rules, should point out to any case in which the vires of the Rules have been upheld.  Not a single court till date has declared the Rules to be constitutional when that question was before it.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Lack of Representation of Stakeholders in Policy Formulation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Lastly, the Standing Committee noted that it is not clear whether the Cyber Regulatory Advisory Committee (CRAC), which is responsible for policy guidance on the IT Act, has "members representing the interests of  principally affected or having special knowledge of the  subject matter as expressly stipulated in Section 88(2) of the  IT Act".  This is a problem that we at CIS also noted in November 2012, when the CRAC was reconstituted after having been defunct for more than a decade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS hopes that the government finally takes note of the view of legal experts, the Standing Committee on Delegated Legislation, the Parliamentary motion against the Rules, and numerous articles and editorials in the press, and withdraws the Intermediary Guidelines Rules and the Cyber Cafe Rules, and instead replaces them with rules that do not infringe our constitutional rights.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness, and engages in academic research on digital natives and digital humanities.  It was among the organizations that submitted evidence to the Standing Committee on Subordinate Legislation on the IT Rules&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules'&gt;https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-04-03T10:54:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot">
    <title>Analyzing the Latest List of Blocked URLs by Department of Telecommunications (IIPM Edition)</title>
    <link>https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot</link>
    <description>
        &lt;b&gt;The Department of Telecommunications (DoT) in its order dated February 14, 2013 has issued directions to the Internet Service Providers (ISPs) to block seventy eight URLs. The block order has been issued as a result of a court order. Snehashish Ghosh does a preliminary analysis of the list of websites blocked as per the DoT order.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p&gt;Medianama has &lt;a class="external-link" href="http://www.medianama.com/wp-content/uploads/blocking-instruction-II-14-Feb-2013.pdf"&gt;published the DoT order&lt;/a&gt;, dated February 14, 2013, on its website.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;What has been blocked?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order contains seventy eight URLs. Seventy three URLs are related to the Indian Institute of Planning and Management (IIPM). &amp;nbsp;The other five URLs contain the term “highcourt”. The order also contains links from reputed news websites and news blogs including The Indian Express, Firstpost, Outlook, Times of India, Economic Times, Kafila and Caravan Magazine, and satire news websites Faking News and Unreal Times. The order also directs blocking of a public notice issued by the University Grants Commission (UGC).&lt;/p&gt;
&lt;p&gt;The block order does not contain links to any social media website. However, some content related to IIPM has been removed but it finds no mention in the block order. Pursuant to which order or direction such content has been removed remains unclear. For example, Google has removed search results for the terms &amp;lt;Fake IIPM&amp;gt; pursuant to Court orders and it carries the following notice:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;"In response to a legal request submitted to Google, we have removed 1 result(s) from this page. If you wish, you may &lt;/em&gt;&lt;a href="http://www.chillingeffects.org/notice.cgi?sID=432099"&gt;&lt;em&gt;read more about the request&lt;/em&gt;&lt;/a&gt;&lt;em&gt; at ChillingEffects.org."&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Are there any mistakes in the order?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The direction issued by the DoT is once again inaccurate and mired with errors. In effect, the DoT has blocked sixty one unique URLs and the block order contains numerous repetitions. By its order the DoT has directed the ISPs to block an entire blog [&lt;a class="external-link" href="http://iipmexposed.blogspot.in"&gt;http://iipmexposed.blogspot.in&lt;/a&gt;] along with URLs to various posts in the same blog.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Reasons for Blocking Websites&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://economictimes.indiatimes.com/tech/internet/directed-by-gwalior-court-government-blocks-70-urls-critical-of-iipm/articleshow/18523107.cms"&gt;According to news reports&lt;/a&gt;, the main reason for blocking of websites by the DoT is a Court order issued by a Court in Gwalior. The reason for issuing such a block order might have been a court proceeding with respect to defamation and removal of defamatory content thereof. However, the reasons for blocking of domain names containing the term ‘high court’, which is not at all related to the IIPM Court case&amp;nbsp; is unclear. The DoT by its order has also blocked a link in the website of a internet domain registrar which carried advertisement for the domain name [&lt;a class="external-link" href="http://www.highcourt.com"&gt;www.highcourt.com&lt;/a&gt;].&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Are the blocks legitimate?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order may have been issued by the DoT under Rule 10 of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Court order seems to be an interim injunction in a defamation suit. Generally, Courts exercise utmost caution while granting interim injunction in defamation cases.&amp;nbsp; According to the Bonnard Rule (Bonnard v. Perryman, [1891] 2 Ch 269) in a defamation case, “interim injunction should not be awarded unless a defence of justification by the defendant was certain to fail at trial level.” Moreover, in the case of Woodward and Frasier, Lord Denning noted “that it would be unjust to fetter the freedom of expression, when actually a full trial had not taken place, and that if during trial it is proved that the defendant had defamed the plaintiff, then should they be liable to pay the damages.” &amp;nbsp;&amp;nbsp;The Delhi High Court in &lt;em&gt;&lt;a href="http://www.indiankanoon.org/doc/562656/"&gt;Tata Sons Ltd. v. Green Peace International&lt;/a&gt;&lt;/em&gt; followed the Bonnard Rule and the Lord Denning’s judgements and ruled against the award of interim injunction for removal of defamatory content and stated:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The Court notes that the rule in Bonnard is as applicable in regulating grant of injunctions in claims against defamation, as it was when the judgment was rendered more than a century ago. This is because the Courts, the world over, have set a great value to free speech and its salutary catalyzing effect on public debate and discussion on issues that concern people at large. The issue, which the defendant’s game seeks to address, is also one of public concern. The Court cannot also sit in value judgment over the medium (of expression) chosen by the defendant since in a democracy, speech can include forms such as caricature, lampoon, mime parody and other manifestations of wit.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Therefore, it appears that the Court order has moved away from the settled principles of law while awarding an interim injunction for blocking of content related to&amp;nbsp; IIPM. It is also interesting to note that in &lt;em&gt;Green Peace International&lt;/em&gt;, the Court also answered the question as to whether there should be different standard for posting or publication of defamatory content on the internet. It was observed by the Court that publication is a comprehensive term, ‘embracing all forms and medium – including the Internet’.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Blocking a Public Notice issued by a Statutory Body of Government of India&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order mentions a URL which contains a public notice issued by University Grants Commission (UGC) related to the derecognition of IIPM as a University. The blocking of a public notice issued by the statutory body of the Government of India is unprecedented. A public notice issued by a statutory body is a function of the State. It can only be blocked or removed by a writ order issued by the High Court or the Supreme Court and only if it offends the Constitution. However, so far, ISPs such as BSNL have not enforced the blocking of this URL.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Implementation of the order by the ISPs&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As pointed out in my previous &lt;a href="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii"&gt;blog post&lt;/a&gt; on blocking of websites, the ISPs have again failed to notify their consumers the reasons for the blocking of the URLs. This lack of transparency in the implementation of the block order has a chilling effect on freedom of speech.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot'&gt;https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-02-17T07:35:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs">
    <title>Five Frequently Asked Questions about the Amended ITRs</title>
    <link>https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs</link>
    <description>
        &lt;b&gt;This piece discusses the five major questions that have been the subject of debate after the World Conference on International Telecommunications 2012 (WCIT). The politics surrounding the WCIT are not discussed here but it must be kept in mind that they have played a significant role in the outcome of the conference and in some of the debates about it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Each question is discussed with reference to the text of the treaty, to the minutes of the plenary sessions (which are available via the &lt;a href="http://www.itu.int/en/pages/default.aspx"&gt;ITU website&lt;/a&gt;), a little international law and a few references to other people’s comments on the treaty.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. Do the ITRs apply to content on the internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 1.1 (a) has been amended to add the sentence “These Regulations do not address the content-related aspects of telecommunications”. Although some discussions about the &lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;International Telecommunication Regulations (ITRs)&lt;/a&gt; and content have ignored this altogether, others seem concerned about its interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITU Secretary General has issued &lt;a href="http://www.itu.int/en/wcit-12/Pages/statement-toure.aspx"&gt;a statement&lt;/a&gt; in which he has clarified that “The new ITR treaty does NOT cover content issues and explicitly states in the first article that content-related issues are not covered by the treaty”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentators like &lt;a href="http://tryingtoreason.wordpress.com/2012/12/15/yes-the-new-itrs-do-cover-content-and-the-internet/"&gt;Chuan-Zheng Lee&lt;/a&gt; however, continue to view the treaty with suspicion, on the basis that it is necessary to examine content in order to tell whether it is spam (Lee and &lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt;Chaparro&lt;/a&gt; differ on this question). However, others like &lt;a href="http://www.nytimes.com/2012/12/15/technology/in-a-huff-a-telling-us-walkout.html?pagewanted=all&amp;amp;_r=0"&gt;Eric Pfanner&lt;/a&gt; have pointed to this paragraph in their skepticism about the US refusal to sign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman proposed the addition to Article 1.1(a) at the tenth plenary session. He did this to address concerns that the ITRs text could be interpreted to apply to content on the Internet. The original formulation that he proposed was ‘These regulations do not address and cannot be interpreted as addressing content’. This text was suggested in the middle of an extended discussion on Article 5A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many countries were skeptical of this insertion. Sudan argued that content could not be avoided in telecommunication networks “because it will always be in transit.” The United Arab Emirates seemed concerned about international interference in states’ existing regulation of content, and said “maybe we could actually say this in the minutes of the meeting that this regulation should not be interpreted as on alteration to Member States content regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns about what the term ‘content’ means and whether it would apply broadly were raised by more than one country, including Saudi Arabia. For instance, it was argued that the text proposed by the Chairman might interfere with parts of the treaty that require operators to send tariff information correspondence. More than one country that felt that the insertion of this text would impact several parts of the treaty, and that it would be difficult to determine what amounted to dealing with content. The primary issue appeared to be that the term ‘content’ was not defined, and it therefore remained unclear what was being excluded. In response to these concerns, the Chairman withdrew his proposal for the amendment excluding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, several states then spoke up in favour of the Chairman’s proposal, suggesting that the proposed amendment to Article 1.1 influenced their acceptance of Article 5A (on security and robustness of networks – discussed in detail below). Brazil suggested that an answer to the definitional concerns may be found in the work by Study Group 17, which had a definition available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this, the next day, at the twelfth plenary, the Chairman brought back the Article 1.1 amendment excluding content. He stated explicitly that this amendment might be the way to get Articles 5A and 5B approved. The text he read out was insertion of the words &lt;i&gt;“&lt;/i&gt;to the exclusion of their content”, after ‘’services’ at the end of 1.1A. Interestingly however, the term ‘content’ was never defined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the next plenary session, Iran raised the objection that this phrase was overbroad, and proposed the following formulation instead: “These Regulations do not address the content-related aspects of telecommunications”. This formulation found its way into the amended ITRs as the treaty stands today.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. Does Article 5A on network security legitimize surveillance of Internet content?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A deals with ‘security and robustness of networks’ and requires member states to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks...”.  This may have given rise to concerns about interpretations that may extend the security of networks to malware or viruses, and therefore to content on the Internet. However, Article 5A has to be read with Article 1.1(a), and therefore must be interpreted such that it does not ‘address the content-related aspects of telecommunications’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators continue to see Article 5A as problematic. Avri Doria &lt;a href="http://avri.doria.org/post/38641776703/wcit"&gt;has argued&lt;/a&gt; that the use of the word ‘security’ in addition to ‘robustness’ of telecommunication infrastructure suggests that it means Internet security.   However Emma Llansó of the Centre for Democracy and Technology &lt;a href="https://www.cdt.org/blogs/emma-llanso/2012making-sense-wcit-it%E2%80%99s-complicated"&gt;has noted&lt;/a&gt; that the language used in this paragraph is “ far too vague to be interpreted as a requirement or even a recommendation that countries surveil users on their networks in order to maintain security”. Llansó  has suggested that civil society advocates make it clear to countries which attempt to use this article to justify surveillance, that it does not lend itself to such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A was one of the most controversial parts of the ITRs and was the subject of much debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 11&lt;sup&gt;th&lt;/sup&gt;, in the Chairman’s draft that was being discussed, Article 5A was titled ‘security of networks’, and required members to endeavour to ensure the “security and robustness of international telecommunication networks”.  The Chairman announced that this was the language that came out of Committee 5’s deliberations, and that ‘robustness’ was inserted at the suggestion of CEPT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries like Poland, Australia, Germany and the United States of America were keen on explicitly stating that Article 5A was confined to the physical or technical infrastructure, and either wanted a clarification that to this effect or use of the term ‘robustness’ instead of security. Many other countries, such as Russia and China, were strongly opposed to this suggestion and insisted that the term security must remain in the document (India was one of the countries that preferred to have the document use the term ‘security’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was in the course of this disagreement, during the tenth plenary session, that the Chairman suggested his global solution for Article 1.1 – a clarification that this would not apply to content. This solution was contested by several countries, withdrawn and then reinstated (in the eleventh plenary) after many countries explained that their assent to Article 5A was dependant on the existence of the Article 1 clarification about content (see above for details).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also some debate about whether Article 5A should use the term ‘robustness’ or the term ‘security’ (eg. The United States clarified that its preference was for the use of ‘resilience and robustness’ rather than security). The Secretary General referred to this disagreement, and said that he was therefore using both terms in the draft. The title of Article 5A was changed, in the eleventh plenary, to use both terms, instead of only referring to security.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. Does Article 5B apply to spam content on the Internet? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the amended treaty talks of ‘unsolicited bulk electronic communications’ and does not use the term ‘spam’[Article 5B says that ‘Members should endeavour to take necessary measures to prevent the propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services’].If this phrase is read in isolation, it may certainly be interpreted as being applicable to spam. Commentators like &lt;a href="http://avri.doria.org/tagged/WCIT/page/2"&gt;Avri Doria&lt;/a&gt; have pointed to sources like&lt;a href="http://www.itu.int/osg/csd/intgov/resoultions_2010/PP-10/RESOLUTION_130.pdf"&gt; Resolution 130 of the Plenipotentiary Conference of the International Telecommunication Union&lt;/a&gt; (Guadalajara, 2010) to demonstrate that ‘unsolicited bulk electronic communications’ ordinarily means spam.  However, others like&lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt; Enrique A. Chaparro&lt;/a&gt; argue that it cannot possibly extend to content on the Internet given the language used in Article 1.1(a). Chapparo has explained, that given the exclusion of content, Article 5B it authorizes anti-spam mechanisms that do not work on content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B, which discusses ‘unsolicited bulk electronic communications’, must be read with Article 1, which is the section on purpose and scope of the ITRS. Article 1.1 (a) specifies that the ITRs “do not address the content-related aspects of telecommunications”. Therefore it may be argued that ‘unsolicited bulk electronic communications’ cannot be read as being applicable to content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many continue to be concerned about Article 5B’s applicability to spam on the Internet. Although some of them that their fear is that some states may interpret Article 5B as applying to content, despite the contents of Article 1.1(a), many have failed to engage with the issue in the context of Article 1.1(a).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B is inextricably linked with the amendment to Article 1.1. Mexico asked specifically about what the proposed amendment to Article 1.1 would mean for Article 5B: “I’m referring to the item which we’ll deal with later, namely unsolicited bulk electronic communications.  Could that be referred to as content, perhaps?”.  The Chairman responded saying, “This is exactly will solve the second Article 5B, that we are not dealing with content here.  We are dealing with measures to prevent propagation of unsolicited bulk electronic messages”.&lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment to Article 1.1 was withdrawn soon after it was introduced. Before it was reintroduced, Sweden said (at the eleventh plenary) that it could not see how Article 5B could apply without looking into the content of messages. The United States agreed with this and went on state that the issue of spam was being addressed at the WTSA level, as well as by other organisations. It argued that the spam issue was better addressed at the technical level than by introducing it in treaty text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment excluding content was reintroduced during the twelfth plenary. The Chairman explicitly stated that it might be the way to get Articles 5A and 5B approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The word ‘spam’ was dropped from the ITRs in the eight plenary, and “unsolicited bulk electronic communications” was used instead.  However, in the eleventh plenary, as they listed their reasons for not signing the newly-amended ITRs, Canada and the United States of America referred to ‘spam’ which suggests that they may have viewed the change as purely semantic.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. Does the resolution on Internet Governance indicate that the ITU plans to take over the Internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much controversy has arisen over the plenary resolution ‘to foster an enabling environment for the greater growth of the Internet’. This controversy has arisen partly thanks to the manner in which it was decided to include the resolution, and partly over the text of the resolution. The discussion here focuses on the text of the resolution and then describes the proceedings that have been (correctly) criticized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The history of this resolution, as &lt;a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/"&gt;Wolfgang Kleinwächter&lt;/a&gt; has explained, is that it was part of a compromise to appease the countries which were taking positions on the ITU’s role in Internet governance, that were similar to the &lt;a href="http://files.wcitleaks.org/public/Merged%20UAE%20081212.pdf"&gt;controversial Russian proposal&lt;/a&gt;. The controversial suggestions about Internet governance were excluded from the actual treaty and included instead in a non-binding resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the resolution instructs the Secretary General to “to continue to take the necessary steps for ITU to play an active and constructive role in the development of broadband and the multi-stakeholder model of the Internet as expressed in § 35 of the Tunis Agenda”. This paragraph is particularly controversial since of paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; says “Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.” Kleinwächter has pointed out that this selection leaves out later additions that have taken place with progression towards a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution also resolves to invite member states to “to elaborate on their respective positions on international Internet-related technical, development and public-policy issues within the mandate of ITU at various ITU forums including, inter alia, the World Telecommunication/ICT Policy Forum, the Broadband Commission for Digital Development and ITU study groups”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A little after its introduction, people began expressing concerns such as the &lt;a href="https://www.accessnow.org/blog/2012/12/12/wcit-watch-just-taking-the-temperature-a-late-night-resolution-on-the-inter"&gt;Secretary General may treat the resolution as binding&lt;/a&gt;, While the language may raise cause for concern, it is important to note that resolutions of this nature are not binding and countries are free to opt out of them. Opinions vary about the intentions that have driven the inclusion of this resolution, and what it may mean for the future. However commentators like Milton Mueller have scoffed at these concerns, pointing out that the resolution is harmless and may have been a &lt;a href="http://www.internetgovernance.org/2012/12/13/what-really-happened-in-dubai/"&gt;clever political maneuver&lt;/a&gt; to resolve the basic conflict haunting the WCIT, and that &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;mere discussion of the Internet in the ITU harms no one&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Egypt and Bulgaria suggested that the resolution refer to paragraph 55 of the Tunis agenda instead of paragraph 35, by inserted the following text “”Recognizing that the existing arrangements for Internet Governance have worked effectively to make the Internet the highly robust, dynamic and geographically diverse medium it is today, with the private sector taking the lead in day-to-day operations and with innovation and value creation at the edges.” The US was also quite insistent on this language (although it did also argue that this was the wrong forum to discuss these issues).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman was willing to include paragraph 55 in addition to paragraph 35 but Saudi Arabia objected to this inclusion. Finland suggested that the resolution should be removed since it was not supported by all the countries present and was therefore against the spirit of consensus. The Secretary General defended the resolution, suggesting both that it was harmless and that since it was a key component of the compromise, eliminating it would threaten the compromise. South Africa and Nigeria supported this stand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was during this debate that the procedural controversy arose. Late into the night, the Chairman said there was a long list of countries that wished to speak and said “I just wanted to have the feel of the room on who will accept the draft resolution”. He proceeded to have countries indicate whether they would accept the draft resolution or not, and then announced that the majority of the countries in the room were in favour of retaining the resolution. The resolution was then retained. Upon Spain’s raising the question, the Chairman clarified that this was not a vote. The next day, other countries raised the same question and the Chairman, while agreeing that the resolution was adopted on the basis of the ‘taking of temperature’ insisted that it was not a vote so much as an effort to see what majority of the countries wanted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Does the human rights language used in the preamble, especially the part about states’ access to the Internet, threaten the Internet in any way?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The preamble says “Member States affirm their commitment to implement these Regulations in a manner that respects and upholds their human rights obligations”, and “These Regulations recognize the right of access of Member States to international telecommunication services”. The text of the preamble can be used as an interpretation aid since it is recognized as providing context to, and detailing the object and purpose of, a treaty. However if the meaning resulting from this appears to be ambiguous, obscure, absurd or unreasonable, then supplementary means such as the preparatory work for the treaty and the circumstances for its conclusion may also be taken into account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore anyone who is concerned about the impact of the text inserted in the preamble must (a) identify text within the main treaty that could be interpreted in an undesirable manner using the text in the preamble; and (b) consider preparatory work for the treaty and see whether it supports this worrying interpretation. For example, if there were concerns about countries choosing to interpret the term ‘human rights’ as subordinating political rights to economic rights, it would be important to take note of the Secretary General’s emphasis on the &lt;a href="http://www.un.org/en/documents/udhr/index.shtml"&gt;UDHR&lt;/a&gt; being applicable to all member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, only the first insertion about ‘human rights obligations’ was part of the draft treaty. The second insertion, recognizing states’ rights followed after the discussion about human rights language. Some states argued that it was inconsistent to place human rights obligations on states towards their citizens, but to leave out their cross-border obligations. It was immediately after this text was voted into the draft, that the United States, the United Kingdom and other countries refused to sign the ITRs. This particular insertion is phrased as a right of states rather than that of individuals or citizens, which does not align with the language of international human rights. While it may not be strictly accurate to say that human rights have traditionally been individual centric (since collective rights are also recognized in certain contexts), it is certainly very unusual to treat the rights of states or governments as human rights.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States of America and the Netherlands wanted to include language to state explicitly that states’ international human rights obligations are not altered in anyway. This was to clarify that the inclusion of human rights language was not setting the ITU up as a forum in which human rights obligations are debated. Malaysia objected to the use of human rights language in the preamble right at the outset, on the grounds that the ITRs are the wrong place for this, and that the right place is the ITU Constitution. It even pointed to the fact that jurisprudence is ever-evolving, to suggest that the meaning of human rights obligations might change over time. These were the two major perspectives offered towards the beginning of the discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman underlined the fact that the Universal Declaration of Human Rights is already applicable to all UN countries. He argued that reflection of these principles in the ITRs would help build universal public faith in the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first traces of the states’ access rights can be seen in Cuba’s intervention at the ninth plenary – Cuba argued that limiting states’ access to public information networks amounted to infringement of human rights. At the fourteenth plenary, Nigeria proposed on behalf of the African group that the following text be added to the preamble “And recognize the right of access of all Member States to international telecommunication networks and services." Countries like China which had been ambivalent about the human rights language in the preamble, were happy with this move away from an individual-centric understanding of human rights, to one that sees states as representative of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States was express in its dissent, and said “human rights obligations go to the individual”. Sweden was also not happy with the proposal and argued that it moved away from well-established human rights language that affirmed existing commitments to drafting new human rights language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was an amended version of the African group proposal that finally found its way into the preamble. It was supported by many countries such as China, Nigeria and Sudan, who took the position that group rights are included within human rights, and that governments represent their citizens and therefore have rights on their behalf. This position was strenuously disputed by states like the USA, Switzerland, United Kingdom and Canada.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs'&gt;https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-01-30T05:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
