<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 201 to 215.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/ijlt-cis-law-essay"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/cc-salon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/access-to-online-information-and-knowledge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/publications/pupfip/why-no-pupfip"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/witfor-2009"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/civil-society-letter-against-trips-plus-ip-enforcement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/letter-from-civil-society-organizations-to-cii"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/piracy-boils-down-to-convenience"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/response-to-ficcis-call-for-review-of-the-copyright-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-draft-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/consumers-international-ip-watch-list-2009"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/a2k/blogs/ijlt-cis-law-essay">
    <title>IJLT-CIS Law Essay Competition</title>
    <link>https://cis-india.org/a2k/blogs/ijlt-cis-law-essay</link>
    <description>
        &lt;b&gt;The Indian Journal of Law and Technology and CIS are conducting a legal essay competition to encourage law students across India to think critically about the techno-legal issues facing us today.  Students can write on any of the four themes, with the top prize being Rs. 7500 and an internship at CIS.&lt;/b&gt;
        &lt;p&gt;The &lt;a class="external-link" href="http://www.ijlt.in"&gt;Indian Journal of Law and Technology&lt;/a&gt; (IJLT) is an annual law journal published by the Law and Technology Committee of the National Law School of India University, Bangalore. IJLT aims to provide a platform for promoting discussion on issues relating to the interface between law and technology, particularly from the perspective of the developing world.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a leading research organisation that engages with issues of digital pluralism, public accountability and pedagogic practices, in relation to the field of Internet and Society, with special emphasis towards South-South dialogue and exchange.&amp;nbsp; IJLT and CIS are proud to announce the 1st IJLT-CIS Annual Law Essay Competition 2009, which is a competition open to undergraduate law students across India. The competition seeks to encourage creative thinking and promote research and writing about crucial legal issues in the field of Information Technology and the Internet.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="http://www.nls.ac.in/ijlt.pdf"&gt;&lt;img src="http://dl.dropbox.com/u/2350052/Essay%20competition%20header.jpg" alt="IJLT ESSAY COMPETITION" height="104" width="379" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Themes&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Criminality and Second Life: Dr. Jekyll and Mr. Hyde&lt;/li&gt;&lt;li&gt;Trademark and the Internet: Cybersquatting and the Google Adwords-Consim Controversy -- Reasonable Limits to Trademark Protection&lt;/li&gt;&lt;li&gt;3G Services and Spectrum Allocation: Fair Competition, Welfare and Freedom of Speech and Commerce on the Airwaves&lt;/li&gt;&lt;li&gt;Easier to Be Criminals: Judicial and Legislative Responses to Cyber Crime in India.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Judging&lt;/h3&gt;
&lt;p&gt;The winning law essays shall be determined through a blind review by a panel of eminent academicians in the field of law and technology.&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Prizes&lt;/h3&gt;
&lt;p&gt;Ist Prize: Rs. 7500 and an internship at CIS&lt;/p&gt;
&lt;p&gt;2nd Prize: Rs. 5000&lt;/p&gt;
&lt;p&gt;3rd Prize: Rs. 4000&lt;/p&gt;
&lt;p&gt;Please note that the terms of the above internship shall be decided by CIS on its own initiative, and as such shall not be negotiable. The winning law essay shall be considered for publication in the next issue of IJLT in accordance with the Editorial Policy of IJLT.&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Eligibility&lt;/h3&gt;
&lt;p&gt;The competition is open to all undergraduate law students in any college/law school in India.&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Submission Guidelines&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;The entries must be between 5000-7500 words inclusive of all footnotes. The entries that fall short of or exceed the above word limit shall be penalised.&lt;/li&gt;&lt;li&gt;Substantive footnoting is not permitted and shall be penalised. The use of endnotes or other citation methods is not permitted.&lt;/li&gt;&lt;li&gt;The entries should be accompanied by a 150-word abstract. The abstract is not counted towards the word limit.&lt;/li&gt;&lt;li&gt;All entries should be in Times New Roman, size 12, 1.5 line spacing. The footnotes used should be in Times New Roman, size 10, single line spacing.&lt;/li&gt;&lt;li&gt;The footnotes used should follow a uniform and complete system of citation. However, the use of the Harvard Blue Book (18th edition) system of citation is encouraged.&lt;/li&gt;&lt;li&gt;The entries must be submitted in the Microsoft Word format and with all identifying information removed from the text of the entries and the file properties. The covering e-mail should contain the name, e-mail address, postal address, institution, course and year of study of the author.&lt;/li&gt;&lt;li&gt;The entries must be submitted via e-mail to essay@ijlt.in.&lt;/li&gt;&lt;li&gt;The deadline for entries is 11:59 P.M., 23rd January, 2010.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For any clarifications, please send an e-mail to editorialboard@ijlt.in.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/ijlt-cis-law-essay'&gt;https://cis-india.org/a2k/blogs/ijlt-cis-law-essay&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Competition</dc:subject>
    

   <dc:date>2011-08-04T04:35:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/cc-salon">
    <title>CC Salon</title>
    <link>https://cis-india.org/events/cc-salon</link>
    <description>
        &lt;b&gt;Creative Commons Casestudies, Featuring Status.Net - The Centre For Internet and Society and JAAGA are organising a CC Salon on 02nd December, 2009 at 7.30pm.&lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;Creative Commons Casestudies, Featuring Status.Net&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;CIS and JAAGA are organising a CC Salon (&lt;a href="http://wiki.creativecommons.org/Salon"&gt;http://wiki.creativecommons.org/Salon&lt;/a&gt;)
by Jon Phillps on Creative Commons Casestudies, Featuring Status.Net&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;Venue: JAAGA&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;Time: 7.30pm&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;The aim of this get together is to share knowledge and
experiences of alternative copyright licensing.&amp;nbsp;
Artists, lawyers dealing with copyright licensing and others are
encouraged to highlight their own work, experiences and queries about Creative
Commons and other alternative licenses.&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;An abstract of the presentation and the bio of Jon
is given below.&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;ABSTRACT:&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;Creative Commons Casestudies, Featuring Status.Net&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;Creative Commons is a well-known nonprofit
organization that increases sharing and improves collaboration. Its key tools
are six licenses that fit between public domain and complete control,
copyright, to give you control over how your work is shared with the world.
This presentation explores high level case studies that use Creative Commons
licenses to make a successful project. The key featured case study is
Status.Net, a new status updating hosted service and open source software that
uses Creative Commons licensing for content.&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;&lt;a href="http://wiki.creativecommons.org/Salon"&gt;http://wiki.creativecommons.org/Salon&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;BIO:&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;Jon Phillips is a community and business developer
contributing to society and building meaningful relationships. In 2002 he
helped launch the open source drawing tool, Inkscape and founded the Open Clip
Art Library. From 2005 until 2008 he built Creative Commons’ community and
business development projects and is currently a Creative Commons Fellow.
Currently, he is growing the media company Fabricatorz with Cantocore Art Exhibitions,
Laoban Open Soundsystems, and is recently assisting with an upcoming re-launch
of Status.Net (Identi.ca). He is known for growing successful open communities globally, leading international business development
in Asia (particularly China), and developing Open Marketing.&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;&lt;a href="http://rejon.org/bio/#images"&gt;http://rejon.org/bio/#images&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;&amp;nbsp;&lt;img src="https://cis-india.org/home-images/Evite%20GI-CC%20New.jpg/image_preview" alt="CC Salon" class="image-inline" title="CC Salon" /&gt;&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p class="MsoPlainText"&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKp7S4A"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/cc-salon'&gt;https://cis-india.org/events/cc-salon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-05T04:21:24Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/access-to-online-information-and-knowledge">
    <title>Access to online information and knowledge – advancing human rights and democracy</title>
    <link>https://cis-india.org/a2k/blogs/access-to-online-information-and-knowledge</link>
    <description>
        &lt;b&gt;An article by Achal Prabhala in GISW 2009 (Global Information Society Watch, 2009) &lt;/b&gt;
        
&lt;p&gt;Information and knowledge are crucial factors in human development. We are reminded of this constantly, from the “knowledge economy” we live in, to the emotional and financial power that information and communications technologies (ICTs) have over our lives. In the words of philosopher Francis Bacon, “Scientia potentia est” – knowledge itself is power. Present-day movements for access to knowledge and the right to information have their origins in this simple and arguably ancient idea. Despite a rich history and wide intellectual acceptance, the right to know is not universally granted, and the right to know on the internet is a particularly bitter struggle in many parts of the world.[1]&lt;/p&gt;
&lt;p&gt;Information, knowledge and access are terms with a multiplicity of meaning. Even as they constitute an ambitious goal that disparate global actors work towards, it is worth considering how these terms are construed in relation to each other.[2]&lt;/p&gt;
&lt;p&gt;“Information” in this context usually refers to government and institutionally held records. Legislation that mandates greater transparency is critical. The earliest example of this kind of legislation was implemented in Sweden as far back as the late 18th century, while countries such as South Africa and India have had theirs enacted as recently as 2000 and 2005 respectively. Freedom of information and the resulting power to make informed decisions are bedrocks of liberal democracy, essential tools for active citizen participation – and the foundation of dominant ideas of the better life, such as that of an open society.&lt;/p&gt;
&lt;p&gt;“Knowledge” in its most instrumental sense usually refers to the elements of learning; to scholarly and artistic work and its tools. The access to knowledge movement [3] for instance, works on copyright law reform and the promulgation of open access. Access to knowledge in its present incarnation is a relatively new frame of reference compared to the right to information, which has been demanded for a longer period of time. But it is worth bearing in mind that the underlying theme has always existed and even been expressed, most notably in the hope and anxiety surrounding every disruptive technological shift, from the printing press to the internet.&lt;/p&gt;
&lt;p&gt;The most frequently misunderstood term in this troika is, perhaps, “access”. The common interpretation of the term is its strict dictionary meaning, which is to use, to consume, to be allowed entry into or contact with. In relation to information and knowledge, however, and especially since the advent of the internet, access is just as much about production as it is about consumption. Knowledge is not something that Northern countries produce and Southern countries consume; it is a vast and porous domain that consists of formal and as yet unrecognised realms, all of which are growing and evolving. To read is a necessary precondition to being able to write; access, by analogy, implies entry not just into the world of knowledge consumption but also knowledge creation.&lt;/p&gt;
&lt;p&gt;One manifestation of this fusion is Wikipedia, the encyclopaedia that is collaboratively produced online. Granted, many more people read Wikipedia than edit it. Nevertheless, for a growing global volunteer base, it is simultaneously a place to read and consume as well as edit and produce. In a similar vein, it is access to information that propels people around the world to intervene in public processes and change laws; without the information, there could be no change.&lt;/p&gt;
&lt;p&gt;With regards to government information, it is important that not only are there mechanisms put in place that facilitate access to it, but also that these mechanisms work. The history of events leading up to the enactment of the Right to Information Act in India provides valuable lessons as to what the scope of government information should be, in how punitive measures can be implemented to guarantee that the process works, and, above all, as to how marginalised citizens can gain the space and the means to use the law to their advantage [4] To a large extent, the rich genealogy of the right to information has naturalised it as an obvious, just and urgent issue. Furthermore, it is an umbrella concern, covering as much as specific local contexts demand.&lt;/p&gt;
&lt;p&gt;In contrast, the movement for access to knowledge works primarily on one crucial barrier, namely, intellectual property. For some, this focus is problematic. If, for instance, knowledge is imparted by education, then isn’t access just as much hampered by the lack of skilled teachers as restrictive intellectual property laws? This is certainly true, and yet, there are at least three good reasons why this narrow focus makes strategic sense. &lt;br /&gt;One: education is a long-standing priority of societies and governments the world over, and there is an inestimably large group of individuals and institutions who work in the area. However, relatively few people are aware of the impact of intellectual property on access to educational material, and even fewer research it. &lt;br /&gt;Two: the advent of the internet has created hitherto unprecedented opportunities in the knowledge domain, opportunities that could turn into unrealised potential if the application of intellectual property online is decided by copyright industries alone. &lt;br /&gt;Three: knowledge is more than just formal education, and the internet provides limitless ways in which it can be redefined and multiplied. The overzealous application of intellectual property significantly limits the manner in which knowledge operates online.&lt;/p&gt;
&lt;p&gt;A chain of events that unfolded in France over the last two years dramatically illustrates the level of threat faced by those seeking information and knowledge online. In 2008, at the insistence of the domestic recording industry, the French government began considering the enactment of a law designed to thwart online piracy. As industry forces pressed on and Nicholas Sarkozy added his support, the effort culminated in a bill that would be popularly known as HADOPI [5] after the enforcement agency it intended to create. HADOPI employed the three strikes principle. If an internet user was found to have committed an act of piracy, the copyright holder in question was entitled to warn the user through HADOPI. No details as to the exact nature of the copyright violation were required to be provided other than that a violation had occurred. After three such warnings, internet service providers (ISPs) in France would be mandated under HADOPI to bar the user from being allowed access to the internet for a period of up to one year.&lt;/p&gt;
&lt;p&gt;The prospect of HADOPI had people up in arms. A broad coalition of internet users, consumers and their allies quickly assembled in France and elsewhere in the world. To users in France, it represented an immediate threat; to users elsewhere in the world, it represented the extent to which their online freedoms could be restricted in the future. Apart from the draconian nature of the punishment meted out by this bill, users were outraged that every kind of misdemeanour – whether deliberate, inadvertent, supposed or even mistaken – would be treated the same, with the benefit of doubt given to the copyright holder. [6]&lt;/p&gt;
&lt;p&gt;Throughout 2009, the bill faced several setbacks, including a complete rejection by the French National Assembly. But its backers pushed on, eventually winning approval after modifications; until 10 June 2009, when the Constitutional Council of France struck down HADOPI on the grounds that it was inconsistent with the country’s Constitution – for going against freedom of expression and the presumption of innocence.&lt;/p&gt;
&lt;p&gt;To involve infrastructure providers (ISPs) in enforcing private copyright disputes and suspend user privileges in the wake of alleged copyright violations, as HADOPI wished to do, was admittedly an extreme step. But there are other, less visibly harmful ways by which access to online information and knowledge is threatened and thwarted, and the problem is that some of these ways appear innocuous – though in fact any investigation of them would provide cause for serious alarm. Of the many concerns that exist, at least a few deserve our immediate attention:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Digital Rights Management (DRM) and Technological Protection Measures (TPMs);&lt;/li&gt;&lt;li&gt;copyright law provisions that affect online education, whether by distance or in a physical classroom setting, or in a library;&lt;/li&gt;&lt;li&gt;the lack of provisions that would meaningfully allow disabled learners and users (particularly the visually disabled) to access information and knowledge online; and&lt;/li&gt;&lt;li&gt;the extent to which users can usefully integrate online copyrighted material into their lives in a manner that would be considered fair.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;A primary anxiety around copyrighted material in the online environment has been, on the part of copyright industries, how to regulate the flow of exchange. Previous to the advent of mass use of the internet, a song or a book was limited in its capacity for exchange by the physical, tangible form it came in. With the proliferation of digital material and peer-to-peer systems, however, the possibility for exchange is virtually boundless, and this makes content industries nervous – for it signals the end of an already outdated business model and the beginning of another. In return, industry retaliation has consisted of a strategy of lockdown. The tools of this strategy are DRM and TPMs – software that regulates what one can do with a digital file, or rather cannot do – and the vehicles by which these are legislated and proliferated around the world are a set of World Intellectual Property Organization (WIPO) agreements collectively known as the WIPO Internet Treaties.[7]&lt;/p&gt;
&lt;p&gt;DRM is oblivious of the specific circumstances of the user, and is therefore unaware of both the user’s individual needs as well as her rights – for example, the nuances of copyright law in the country of the user’s residence. It doesn’t matter therefore that a user may be blind, or work for a public library, and that national copyright law in the country might specifically extend provisions to visually disabled people and libraries (for instance, by enabling permission-free format changes and reproductions for research). DRM will still operate on a one-size-fits-all model that supersedes national law. In some countries, fair dealing – or fair use – might allow for ways of personal consumption of copyrighted material that the DRM withdraws, resulting in a situation where the whims of a multinational industry render national law meaningless.&lt;/p&gt;
&lt;p&gt;DRM is software that can be hacked – up to an extent. In this way, it is still possible for users to legitimately exercise their rights with and upon DRM-protected material. Yet, following the model of the Digital Millennium Copyright Act (DMCA) – the United States’ (US) interpretation of the WIPO Internet Treaties – many countries have legislated that such circumvention constitutes a copyright violation. In some cases this renders sections of their own copyright law redundant, and in effect, casts an unnecessarily heavy shroud over certain copyrighted material merely because it happens to be online. More worryingly, the WIPO Internet Treaties themselves do not ask of countries that anti-circumvention provisions apply even when a user is exercising a legitimate right such as fair use, and yet countries around the world have allowed their laws to imply so [8] because of bilateral persuasion, often from the US or the European Union, without a clear understanding of how this can stunt the potential of the internet within their borders.&lt;/p&gt;
&lt;p&gt;It must be noted that copyright law in general – in most countries around the world [9] – generally does not do enough for access to knowledge. To the extent that the majority of the world learns not online but from the printed and spoken word, copyright law in its general application matters tremendously. When considering the potentially limiting aspects of copyright regulation online, one must keep in mind that many countries around the world do not have the kind of provisions that could be limited by new regulation of online material. In fact, most countries do not expressly facilitate distance learning, nor make all the provisions they can for access for the visually disabled, or freedom of information, or even education in general. [10] In part, this is because ever since the globalisation of intellectual property rights, including as recently as the founding of the World Trade Organization (WTO) in 1996 and the instituting of its Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), [11] there has been a distinct shift away from the minimum copyright protection demanded by this trade rule to a maximally protectionist approach.&lt;/p&gt;
&lt;p&gt;In the majority of national circumstances today, copyright law is what is referred to as TRIPS-plus, which is to say, excessively protective of copyright-holders’ interests. The excess is overwhelmingly in favour of copyright industries and at the expense of users of copyrighted material. In such a situation, when copyright as it applies offline is already imbalanced, it is even harder to demand a balanced interpretation of copyright in the online space.&lt;/p&gt;
&lt;p&gt;Finally, it hardly needs repeating that without a strong sovereign commitment to freedom of speech and information – in effect, a guarantee against censorship – any gains made in access rights stand to be nullified. And this commitment, worryingly, is by no means universally evident. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;For one understanding of the right to know, see Stiglitz, J. (2009) On Liberty, the Right to Know, and Public Discourse: The Role of Transparency in Public Life, Oxford Amnesty Lecture, Oxford, UK, 27 January. siteresources. worldbank.org/NEWS/Resources/oxford-amnesty.pdf&lt;br /&gt;For an understanding of how countries restrict access to the full potential of the internet, see Reporters Without Borders’ list of “Internet Enemies”: www.rsf.org/List-of-the-13-Internet-enemies.html&lt;/li&gt;&lt;li&gt;Naturally, all three words offer a wide scope of understanding. The descriptions that follow are only an attempt at clarifying a functional definition, not at fixing definitive meaning.&lt;/li&gt;&lt;li&gt;The movement for access to knowledge (sometimes abbreviated as A2K) refers to a loose grouping of individuals and institutions who work locally as well as on a potential international treaty on access to knowledge; an early draft is available at: www.cptech.org/a2k/a2k_treaty_may9.pdf&lt;/li&gt;&lt;li&gt;For an understanding of the concerns of a key Indian social movement, the Mazdoor Kisan Shakti Sangathan (MKSS), in the years leading up to the enactment of India’s Right to Information Act, see Sampat, P. and Dey, N. (2005) Bare Acts and Collective Explorations, in Narula, M. et al. (eds.) Sarai Reader 05: Bare Acts, Sarai, New Delhi. www.sarai.net/publications/readers/05-bare-acts/02_preeti.pdf&lt;/li&gt;&lt;li&gt;HADOPI: Haute Autorité pour la Diffusion des OEuvres et la Protection des Droits sur Internet (High Authority for the Diffusion of Works and the Protection of Rights on the Internet).&lt;/li&gt;&lt;li&gt;For one account of the story of HADOPI, see O’Brien, D. (2008) The Struggles of France’s Three Strikes Law, Electronic Frontier Foundation. www.eff.org/deeplinks/2008/05/struggles-frances-three-strikes-law&lt;/li&gt;&lt;li&gt;The WIPO Internet Treaties consist of the WIPO Copyright Treaty (WCT) and the WIPO Performances and Phonograms Treaty (WPPT).&lt;/li&gt;&lt;li&gt;For instance, in a recent eight-country study in Africa, it was found that Morocco, Kenya and Egypt all have anti-circumvention provisions enacted into law. See the ACA2K Briefing Paper for the WIPO Development Agenda meetings, April 2009: www.aca2k.org/attachments/180_ACA2K%20Briefing%20Paper1_WIPODevtAgenda-042009.pdf&lt;/li&gt;&lt;li&gt;Among several country studies, regional and international reports, one recent survey that confirms this finding is the Consumers International IP Watch List report for 2009, in which it is reported that in relation to access to knowledge, “no countries adequately took account of consumers’ interests.” &lt;br /&gt;See:a2knetwork.org/sites/default/files/ip-watchlist09.pdf&lt;/li&gt;&lt;li&gt;Ibid.&lt;/li&gt;&lt;li&gt;TRIPs is currently the overarching international trade rule that governs the global sovereign application of intellectual property; for the full text of the TRIPs agreement, see: www.wto.org/english/tratop_e/trips_e/trips_e.htm&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;a class="external-link" href="http://www.giswatch.org/gisw2009/Introduction.html"&gt;Link to the original article&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/access-to-online-information-and-knowledge'&gt;https://cis-india.org/a2k/blogs/access-to-online-information-and-knowledge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-08-04T04:34:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate">
    <title>At the end of the niche optical pirate</title>
    <link>https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate</link>
    <description>
        &lt;b&gt;In this blog post, Siddharth Chaddha goes enquiring into the modus operandi of a video pirate / film lover / businessman in Bangalore's famed National Market.&lt;/b&gt;
        &lt;h3&gt;&lt;strong&gt;Getting to the National Market&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Wading through Majestic Bus Stand,
Flea Markets, Private Bus Stops and vehicles going around in circles,
you could almost miss this board outside one of the shopping plazas.
NATIONAL MARKET, the famed "pirate market" at the heart of
the city. Most of the business here is illegal and the local police
raid the thirty odd shops selling goods, which within the purview of
any multilateral agreement under WIPO or TRIPS regime would be an
infringement of copyright, at least once a
month. The shops run shutter to shutter, each one five by four feet.
Crowded with sellers and customers, all pirate markets typically
smell the same. Pirated DVDs, DVD players, Chinese mobile phones and
PDAs, even VHS players of the yore, smuggled MP3 music systems, fake
Ray-Bans and Police sunglasses, gaming consoles. You name it, and
National Market has it.&lt;/p&gt;
&lt;h3&gt;Meet the Pirate&lt;/h3&gt;
&lt;p&gt;Tall and sporting a stubble, Sooraj
(name changed) is a Malayali who has been in the trade for over 8
years. "Earlier, I used to have the best English Movie
collection ever. But now, its all going away. Most people have
shifted from DVD's to Digital Storage and Bit Torrents", says
Sooraj.  A family comes across the counter. A middle aged man
accompanied by two women in a burqua, one of them carrying a young
baby boy in their hand. "Tom and Jerry!", says the man and
Sooraj's helper brings out a carton full of animated Hollywood films.
Finding Nemo, The Lion King, Madagascar, its all there. "No Tom
and Jerry. This doesn't have Tom and Jerry", growls the stout
customer. Sooraj jumps into the action, hunts out a DVD from a stack
and puts it on the table. "Tom and Jerry Tales - 13 episodes",
reads the the outside with a classic Tom chasing Jerry picture on the
cover. Satisfied, the family puts it aside and goes on to explore
other popular cartoon series. In the end, the man calls for
Maharathi, a recent Bollywood flick. He looks at the cover
intriguingly and I decide to butt in, "Amazing movie. Just saw
it last week. Great plot." The deal is seized and after a bout
of bargaining over the price. As the family dissolves into the market,
Sooraj turns back and says to me, "A lot of customers bargain. I
get a headache. And my shop is the first one in the market, inside
people operate on margins of 5-10 rupees. That just ruins everything
for us. They don't think of the amount of the risk involved."&lt;/p&gt;
&lt;h3&gt;The Business of Piracy&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Sooraj explains to me how Chennai is the biggest market of
the South. "Chennai is a sea. You will get everything there.
Once you take a dive in that ocean, it's all there." When I ask
him of the chain of distribution, he says, "No one will say that
I print the covers of fake DVDs or I copy prints. For me, I just
call my distributor and everything comes from Chennai. I don't ask
beyond that. The stock comes in the price range of 25-35-40 Rupees.
Now, there is only one quality of stock. The market is dying. No one
has good stock. Earlier, we used to sell DVDs for Rs.70-80. Now,
there is no demand. Even the wholesale business is at a low.'' I ask
him, "So what are you going to do, now that soon DVDs will be
gone?" Sooraj is not flustered. "We will shut this and start
a new business," he says. I quietly step back, as another
customer comes asking for audio CDs. He doesn't deal in those.&lt;/p&gt;
&lt;h3&gt;Enforcement Threat&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;When the customer is gone, I ask him,
"How often does the police raid this market?" He smiles and
replies, "Not often anymore. The business is almost dead. But
yes, they come sometimes. Then you are taken away and a case ensues."
I decide to ask him candidly, "How many times have you been
booked?" He smiles again. "5-7 times. I have a few cases
pending, dates that I have to go and visit the court. They arrest you
for a day but that's all they can do. After all this is not a big
crime." He continues dealing with customers who have various
demands for music and films. Some he sells to, he guides others to
the inside shops. "I sell about a 1000 DVDs everyday. Earlier,
the figure used to be much higher. Mostly English. Hindi, Tamil and
Telugu too. No Kannada," he volunteers. I probe further, "Why
no Kannada?" He says that that he supports protection for their
own industry. "And the market price for Kannada films is
appropriate. Some are Rupees 60, 90, 110. That's reasonable. We do not
need to pirate it."&lt;/p&gt;
I ask him for Tamil titles. He asked if
I wanted &lt;em&gt;Ghajani&lt;/em&gt;. “I saw it when it released. Give me something
that's worth watching.” He picks out two. &lt;em&gt;Saroja&lt;/em&gt; and &lt;em&gt;Subramaniya
Puram&lt;/em&gt;. He doesn't make a profit in this deal but something tells me
that he is happy to spread the love of good films. "Can I click
a picture?" He refuses, saying it would not be a good idea. I
shake his hand. Until next time.


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate'&gt;https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>siddharth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    

   <dc:date>2011-08-04T04:44:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/publications/pupfip/why-no-pupfip">
    <title>Arguments Against the PUPFIP Bill</title>
    <link>https://cis-india.org/a2k/publications/pupfip/why-no-pupfip</link>
    <description>
        &lt;b&gt;The Protection and Utilisation of Public Funded Intellectual Property Bill (PUPFIP Bill) is a new legislation being considered by Parliament, which was introduced in the 2008 winter session of the Rajya Sabha. It is modelled on the American Bayh-Dole Act (University and Small Business Patent Procedures Act) of 1980.  On this page, we explore some of the reasons that the bill is unnecessary, and how it will be harmful if passed.&lt;/b&gt;
        
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a title="How is the legislation unnecessary?" href="#how-is-the-legislation"&gt;How is the legislation
unnecessary?&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;&lt;a title="1) The Indian government
does not have vast reserves of underutilized patents, as the U.S. did
in 1980." href="#1-the-indian-government"&gt;The Indian government does not have vast reserves of underutilized patents, as the U.S. did in 1980.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="2) Technology transfer is very important, but pushing IPRs aggressively is not the best way of ensuring technology transfer." href="#2-technology-transfer-is"&gt;Technology transfer is very important, but pushing IPRs aggressively is not the best way of ensuring technology transfer.&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a title="How is the legislation
harmful?" href="#how-is-the-legislation-1"&gt;How is the legislation
harmful?&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;&lt;a title="1) It's very foundation
is flawed and unproven: excessive patenting lead to gridlocks and
retard innovation." href="#1-it-s-very"&gt;Excessive patenting lead to
	gridlocks and retards innovation. 
	&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="2) The legislation makes
mandatory that which is optional now, and is anyway being followed in
many institutions." href="#2-the-legislation-makes"&gt;The legislation
	makes mandatory that which is optional now, and is anyway being
	followed in many institutions.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="3) Copyright, trademark,
etc., seem to be covered under the definition of public funded
IP." href="#3-copyright-trademark-etc"&gt;Copyright,
	trademark, etc., seem to be covered under the definition of “public
	funded IP”.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="4) It will result in
a form of	double taxation for research, and will increase the consumer cost of
	all products based on publicly-funded..." href="#4-it-will-result"&gt;It will result in
a form of	double taxation for research, and will increase the consumer cost of
	all products based on publicly-funded research.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="5) It could have
unintended consequences of varied kinds, including discouraging
fundamental research as well as discouraging industrial..." href="#5-it-could-have"&gt;It could have
	unintended consequences of varied kinds, including discouraging
	fundamental research as well as discouraging industrial research.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="6) Non-disclosure
	requirements in the Bill restricts the dissemination of research within the academic community, and curtails freedom of..." href="#6-non-disclosure-requirements"&gt;Non-disclosure
	requirements in the Bill restricts the dissemination of research within the academic community, and curtails freedom of speech.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="7) Exclusive licensing enables restriction on the dissemination of
academic research in the marketplace, and increase in cost of products..." href="#7-exclusive-licensing-enables"&gt;Exclusive
	licensing enables restriction on the dissemination of academic research in the marketplace, and increase in cost of products based on public-funded research.&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 align="justify"&gt;&lt;a title="Additional Resources" href="#additional-resources"&gt;Additional resources&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;&lt;a title="On the PUPFIP Bill" href="#on-the-pupfip-bill"&gt;On the PUPFIP Bill&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="On Bayh-Dole" href="#on-bayh-dole"&gt;On Bayh-Dole&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h2 align="justify"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 align="justify"&gt;Arguments&lt;br /&gt;&lt;/h2&gt;
&lt;h2 align="justify"&gt;&lt;a name="how-is-the-legislation"&gt;&lt;/a&gt;How is the legislation unnecessary?&lt;br /&gt;&lt;/h2&gt;
&lt;h3 align="justify"&gt;&lt;a name="1-the-indian-government"&gt;&lt;/a&gt;1) The Indian government
does not have vast reserves of underutilized patents, as the U.S. did
in 1980.&lt;/h3&gt;
&lt;p align="justify"&gt;The idea behind the
Bayh-Dole Act was that the research funded by the government (and
owned, in the US, by the government) was being underutilized. In 1980, over 28,000 unlicensed patents lay with the U.S. government.[1] The Act shifted the title of such works
from the government to the University or small business that
conducted the research, thus allowing them to take out patents on the
research outputs.  In India, under present laws, the researcher(s)
own the rights over their research whether they be government-funded
or not.  Usually, due to employment contracts, the research
institutes already have the right to patent their inventions.  Thus,
currently, there is no need for an enabling legislation in this
regard, as there was in the U.S.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;In fact, currently, the Council of
Scientific and Industrial Research (CSIR) has over 5173 patents
(counting both those in force and those under dispute), while only
222 patents are licensed (with 68 of them being under dispute). 
Thus, even with the IP being in the institute's hands, there is a
"problem" situation similar to that which necessitated
Bayh-Dole in the U.S.  Thus, quite contrary to the aims of the Act,
further patenting will only lead to a situation of even more
underutilized patents.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;a name="2-technology-transfer-is"&gt;&lt;/a&gt;2) Technology transfer is very important, but pushing IPRs aggressively is not the best way of ensuring technology transfer.&lt;/h3&gt;
&lt;p align="justify"&gt;At a recent seminar held at NUJS Kolkata on
the PUPFIP Bill, it was revealed that while IIT-Kharagpur’s
TTO-equivalent (called the Sponsored Research &amp;amp; Industrial
Consultancy division - SRIC) currently handles over Rs.300 crores
through 850 projects, only around Rs. 5-15 crores (exact figures
weren't available) are currently made through its patent
portfolio.[2] &amp;nbsp;Thus patents don't seem, on the face of things, to be the
best way of ensuring technology transfer.&amp;nbsp; Indeed, the oft-cited 28,0000 unlicensed patents held by the U.S. government were composed primarily of patents for which industry had refused to take exclusive licences.[3]&lt;/p&gt;
&lt;p align="justify"&gt;Many contend that one of the most important functions of a patent is to get inventors to disclose their inventions rather than keep them as secrets.&amp;nbsp; This reason for awarding a patent is invalidated if stronger protection is granted to trade secrets (no term limit, for instance) than for patents.&amp;nbsp; Secondly, this reason for granting patents is not valid in case of government-funded research in academia and research
institutes.  The culture of publication and the economy of reputation
are sufficient to ensure disclosure.&amp;nbsp; Even without these intrinsic factors, there grant requirements can necessitate publication.&amp;nbsp; If mere publication is believed to be insufficient, then the government would do well to ask for technology dissemination plans before grants are made.&amp;nbsp; At any rate, monopoly rights in the form of patents are
thoroughly unnecessary.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a name="how-is-the-legislation-1"&gt;&lt;/a&gt;How is the legislation
harmful?&lt;/h2&gt;
&lt;h3 align="justify"&gt;&lt;a name="1-it-s-very"&gt;&lt;/a&gt;1) Excessive patenting lead to gridlocks and
retard innovation.&lt;/h3&gt;
&lt;p align="justify"&gt;It sees protection of IPR
as the sole means of encouraging innovation and driving research to
the doorstep of consumers. The trend around the world is that of
exploring alternative forms of spurring innovation.  Even in India,
CSIR has gone for an innovative "&lt;a class="external-link" href="http://www.osdd.net/"&gt;Open Source Drug Discovery&lt;/a&gt;"
project, which has proven very successful so far.  Furthermore, recent literature shows that excessive
patenting is harming research and innovation by creating gridlocks.[4]&amp;nbsp; If platform technologies and basic research (such as SNP) gets mired in patents, then the transaction costs increase (not only in terms of money, but more importantly in administrative terms).&amp;nbsp; This ends up in research clearances getting blocked, and thus retards innovation.&amp;nbsp; It must be remembered that intellectual property is not only an output, but also an input.&amp;nbsp; The more aggressively the outputs are guarded and prevented from being shared, the more the inputs will be affected.&amp;nbsp; The study of patent thickets and gridlocks has reached such a stage that the U.S. law has been changed to reflect this. Firstly, the Bayh-Dole Act was amended in 2000 to state that the objectives of the Bayh-Dole Act were to be carried out "without unduly encumbering future research and discovery".&amp;nbsp; Now, the courts (in the &lt;em&gt;Bilski&lt;/em&gt; case) have increased the standard of obviousness in patent law (which means that less patents will be granted).&amp;nbsp; Furthermore, the&amp;nbsp; U.S.P.T.O.&amp;nbsp; and the U.S. Senate are currently considering means of overhauling the U.S. patent system, which many fear is close to breaking down due to over-patenting.&amp;nbsp; All these are signs that the footsteps we are seeking to follow are themselves turning back.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="2-the-legislation-makes"&gt;&lt;/a&gt;2) The legislation makes
mandatory that which is optional now, and is anyway being followed in
many institutions.&lt;/h3&gt;
&lt;p align="justify"&gt;While the CSIR labs
pursue patents aggressively, they also run the OSSD project.  The latter
might not be permissible if the Act is passed as it stands.&amp;nbsp; 
Furthermore, this would increase the number of underutilized patents,
which is a problem faced currently by CSIR, which has had an
aggressive patent policy since the 1990s.&amp;nbsp; Unlicensed patents constitute around 93% of CSIR's total patent portfolio.&amp;nbsp; (In contrast, MIT averages
around 50% licensing of patents.)&amp;nbsp; If aggressive patenting is made mandatory, it adds substantially to administrative costs of all institutes which receive any grants from the government.&amp;nbsp; These institutes might not be large enough to merit a dedicated team of professionals to handle&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="3-copyright-trademark-etc"&gt;&lt;/a&gt;3) Copyright, trademark,
etc., seem to be covered under the definition of "public funded
IP".&lt;/h3&gt;
&lt;p align="justify"&gt;This leads to a ridiculous need to attempt to commercialise
all government-funded research literature (and the government funds
science research, social sciences, arts, etc.).&amp;nbsp;  Furthermore, while the definition of "public funded IP" includes copyrights, trademarks, etc., yet the substantive provisions seem to only include those forms of IP which have to be registered compulsorily (copyright and trademark don't -- copyright comes into existence when an original work is expressed in a medium, and trademark can come into existence&amp;nbsp; by use).&amp;nbsp; Importantly, seeking to commercialise all copyrighted works of research would hamper
the movement for open access to scholarly literature.&amp;nbsp; The inititative towards open access to scholarly literature is something that National Knowledge Commission has recommended, and is a move that would result in increased dissemination of public-funded research, which seems to be an aim of the PUPFIP Bill as well.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="4-it-will-result"&gt;&lt;/a&gt;4) It will result in
a form of	double taxation for research, and will increase the consumer cost of
	all products based on publicly-funded research.&lt;/h3&gt;
&lt;p align="justify"&gt;This bill would increase the
consumer cost of all products based on publicly-funded research,
because of the additional burden of patent royalties.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;Public funds research -&amp;gt; Institute patents research -&amp;gt; Pharma MNC gets exclusive license over research -&amp;gt; Drug reaches market.&lt;/p&gt;
&lt;p align="justify"&gt;Assuming an exclusive licence: Cost of the drug = cost of manufacturing, storage, etc. + &lt;em&gt;mark-up (monopolistic) cost&lt;/em&gt; + &lt;em&gt;cost of licence&lt;/em&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;Thus, in
effect, the public has to pay twice for the research: it pays once to enable the
scientist to conduct the research, and once again in the form of royalties to have that research brought to the marketplace.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="5-it-could-have"&gt;&lt;/a&gt;5) It could have
unintended consequences of varied kinds, including discouraging
fundamental research as well as discouraging industrial research.&lt;/h3&gt;
&lt;p align="justify"&gt;The former could happen since
institutions and individual scientists have a financial incentive to
&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/2003_5b.htm"&gt;shift their focus away from fundamental research&lt;/a&gt;; the latter,
conversely, because the filings and bureaucracy involved &lt;a class="external-link" href="http://www.spicyip.com/docs/ppt-premnath-pdf.pdf"&gt;could drive
scientists away from reporting or even engaging in industrial
research&lt;/a&gt; [pdf].&amp;nbsp; Faculty and researcher involvement in the business of
licensing is a sub-optimal usage of their talents, and there are
scientists who would rather stay away from business (as is shown by
the intake of former industry-researchers into government-funded labs
such as those of CSIR).&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="6-non-disclosure-requirements"&gt;&lt;/a&gt;6) Non-disclosure
	requirements in the Bill restricts the dissemination of research within the academic community, and curtails freedom of speech.&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;This will bring about a shift in science and research which is always done upon others' work.&amp;nbsp; This is why in the U.S., the National Institute of Health (N.I.H.) has sought to ensure (without any legal authority) that it only finances that research that on single nucleotide polymorphism (S.N.P.) which is not patented, and is shared freely amongst scholars.&amp;nbsp; Since this requirement of the N.I.H.'s does not have any legal backing (since it is contradictory to the Bayh-Dole Act), institutions are free to get the grant from N.I.H. and then go ahead and patent their inventions.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="7-exclusive-licensing-enables"&gt;&lt;/a&gt;7) Exclusive licensing enables restriction on the dissemination of
academic research in the marketplace, and increase in cost of products
based on public-funded research.&lt;/h3&gt;
&lt;p&gt;The bill allows for both assignment of licences as well as exclusive licences.&amp;nbsp; Both of these enable monopolistic pricing to be undertaken by the licensee/assignee.&amp;nbsp; There are not even any mechanisms in the Act to ensure, for instance, that a public call is made to ascertain that no parties are willing to consider a non-exclusive licence.&amp;nbsp; Patents are generally said to grant a monopoly right because of the opportunity to recover costs of research and development.&amp;nbsp; When the research is being done by public-funded money, there is no justification for monopoly rights on that research, since there are no excessive costs to recover.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;Footnotes:&lt;/p&gt;
&lt;p align="justify"&gt;[1] See &lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;So et al.&lt;/a&gt; and &lt;a class="external-link" href="http://opensource.mit.edu/papers/Thursby.pdf"&gt;Thursby and Thursby&lt;/a&gt;, quoted in the &lt;a class="external-link" href="http://knowledgecommission.gov.in/downloads/recommendations/LegislationPM.pdf"&gt;National Knowledge Commission's letter to the Prime Minister&lt;/a&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;[2] See Prof. Vivekanandans' presentation "&lt;a class="external-link" href="http://www.spicyip.com/docs/ppt-vivek.pdf"&gt;Patenting and Technology Transfer-the IIT Khargpur Experience&lt;/a&gt;"&lt;/p&gt;
&lt;p align="justify"&gt;[3] See &lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Anthony So et al., &lt;em&gt;Is Bayh-Dole Good for Developing Countries&lt;/em&gt;, 6 PLoS Biol e262 (2008)&lt;/a&gt;&lt;/p&gt;
[4] See &lt;a class="external-link" href="http://www.sciencemag.org/cgi/content/full/280/5364/698"&gt;Michael A. Heller &amp;amp; Rebecca S. Eisenberg, Can Patents Deter Innovation? The Anticommons in Biomedical Research, 280 Science 698 (1998)&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a name="additional-resources"&gt;&lt;/a&gt;Additional Resources&lt;/h2&gt;
&lt;h3&gt;&lt;a name="on-the-pupfip-bill"&gt;&lt;/a&gt;On the PUPFIP Bill&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;February 5, 2004: &lt;a class="external-link" href="http://www.expresspharmaonline.com/20040205/happenings05.shtml"&gt;NIPER holds parallel session of Indian Science Congress (Express Pharma)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;October 27, 2006:&amp;nbsp;&lt;a class="external-link" href="http://bayhdole25.org/node/40"&gt;Susan
 Finston, India to Propose New Technology Transfer Legislation 
(Bayh-Dole 25)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="__citationid396739" class="citation"&gt;January 16, 2007: &lt;a class="external-link" href="http://knowledgecommission.gov.in/downloads/recommendations/LegislationPM.pdf"&gt;National Knowledge Commision's Letter to Indian Prime Minister (National Knowledge Commission)&lt;/a&gt; &lt;/span&gt;&lt;/li&gt;&lt;li&gt;April 15, 2007: &lt;a class="external-link" href="http://www.downtoearth.org.in/full6.asp?foldername=20070415&amp;amp;filename=news&amp;amp;sid=23&amp;amp;page=2&amp;amp;sec_id=50"&gt;Archita Bhatta, Proposed IPR law raises concern (Down to Earth)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;May 31, 2007: &lt;a class="external-link" href="http://www.pib.nic.in/release/release.asp?relid=28342"&gt;Science &amp;amp; Technology needs to be core of the economic development says Kapil Sibal (&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://www.pib.nic.in/release/release.asp?relid=28342"&gt;PIB Press Release)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;November 13, 2007: &lt;a class="external-link" href="http://www.pib.nic.in/release/rel_print_page.asp?relid=32628"&gt;Government Accords Approval to National Biotechnology Development Strategy (PIB Press Release)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 1, 2008: &lt;a class="external-link" href="http://www.sciencemag.org/cgi/content/summary/319/5863/556a"&gt;Yudhijit Bhattacharjee, Indian Government Hopes Bill Will Stimulate Innovation (Science)&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;February 19, 2008: Shamnad Basheer, Exporting Bayh Dole to India: Whither Transparency? &lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/02/exporting-bayh-dole-to-india-whither.html"&gt;(Part 1)&lt;/a&gt; &lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/02/exporting-bayh-dole-to-india-whither_21.html"&gt;(Part 2)&lt;/a&gt; (SpicyIP)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;March 17, 2008: &lt;a class="external-link" href="http://www.business-standard.com/india/storypage.php?autono=317122"&gt;Kalpana Pathak, Varsities may soon own patent rights (Business Standard)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;March 17, 2008: &lt;a class="external-link" href="http://www.thehindubusinessline.com/2008/03/17/stories/2008031751080100.htm"&gt;P.T. Jyothi Datta, Public-funded research may pay dividends for scientists (Business Line)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;March 17, 2008: &lt;a class="external-link" href="http://www.iam-magazine.com/blog/Detail.aspx?g=c2472b7c-0f57-4e16-b1ea-389c44c3b4a6"&gt;Joff Wild, India considers Bayh-Dole style legislation (IAM Magazine)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;April 30, 2008: &lt;a class="external-link" href="http://www.pharmabiz.com/article/detnews.asp?articleid=44083&amp;amp;sectionid=46"&gt;M.K. Unnikrishnan and Pradeepti Nayak, Lessons from Bayh Dole Act and its relevance to India (PharmaBiz)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;July 2008: &lt;a class="external-link" href="http://ssrn.com/abstract=1265343"&gt;Sean M. O'Connor, Historical Context of U.S. Bayh-Dole Act: Implications for Indian Government Funded Research Patent Policy (STEM Newsletter)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;July 7, 2008: Shamnad Basheer,&amp;nbsp;&lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/07/mysterious-indian-bayh-dole-bill.html"&gt;Mysterious Indian "Bayh Dole" Bill: SpicyIP Procures a Copy (SpicyIP)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;July 09, 2008: &lt;a class="external-link" href="http://www.business-standard.com/india/storypage.php?autono=328187"&gt;Latha Jishnu, Does India need a Bayh-Dole Act? (Business Standard)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;September 2008: &lt;a class="external-link" href="http://nopr.niscair.res.in/handle/123456789/2036"&gt;V.C. Vivekanandan, Transplanting Bayh-Dole Act- Issues at Stake Authors (13 Journal of Intell. Prop. 480)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;September 18, 2008: &lt;a class="external-link" href="http://www.scidev.net/en/opinions/indian-patent-bill-let-s-not-be-too-hasty.html"&gt;Shamnad Basheer, Indian Patent Bill: Let's not be too hasty (SciDev.net)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;October 28, 2008: &lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Anthony So et al., &lt;em&gt;Is Bayh-Dole Good for Developing Countries&lt;/em&gt;, 6 PLoS Biol e262 (2008)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;October 31, 2008: &lt;a class="external-link" href="http://pib.nic.in/release/release.asp?relid=44316"&gt;Cabinet gives approval for Protection and Utilization of Public Funded Intellectual Property Bill, 2008 (&lt;/a&gt;&lt;a class="external-link" href="http://pib.nic.in/release/release.asp?relid=44316"&gt;PIB Press Release)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;November 2008: &lt;a class="external-link" href="http://www.essentialmedicine.org/wordpress/wp-content/uploads/2008/11/uaem-white-paper-on-indian-bd-act.pdf"&gt;Annette Lin et al., The Bayh-Dole Act and Promoting the Transfer of Technology of Publicly Funded-Research (UAEM White Paper on the Proposed Indian Bayh-Dole Analogue)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;November 1,&amp;nbsp; 2008: &lt;a class="external-link" href="http://www.livemint.com/2008/10/11002336/2008/11/01001052/Not-in-public-interest.html?d=2"&gt;Editorial: Not in Public Interest (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;November 12, 2008: &lt;a class="external-link" href="http://www.genomeweb.com/biotechtransferweek/india-mulls-bill-modeled-bayh-dole-critics-claim-it-may-stifle-innovation"&gt;Ben Butkus, As India Mulls Bill Modeled on Bayh-Dole, Critics Claim It May Stifle Innovation (Biotech Transfer Weekly)&lt;/a&gt;&amp;nbsp; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;December 16, 2008: &lt;a class="external-link" href="http://mail.sarai.net/pipermail/commons-law/2008-December/002973.html"&gt;Pranesh Prakash, Indian "Bayh Dole" Bill before Parliament (Commons Law)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 23, 2009: &lt;a class="external-link" href="http://www.scidev.net/en/editorials/time-to-rethink-intellectual-property-laws-.html"&gt;Editorial: Time to Rethink Intellectual Property Laws (SciDev.net)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;March 12, 2009: &lt;a class="external-link" href="http://www.thehindu.com/seta/2009/03/12/stories/2009031250021400.htm"&gt;Feroz Ali Khader, Does Patenting Research Change the Culture of Science? (The Hindu)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;April 24, 2009: &lt;a class="external-link" href="http://www.indianexpress.com/story-print/450560/"&gt;Sunil Abraham &amp;amp; Pranesh Prakash, Does India Need Its Own Bayh-Dole? (Indian Express)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;September 21, 2009: &lt;a class="external-link" href="http://www.livemint.com/2009/09/20235448/Proposed-patent-Bill-is-flawed.html?h=A1"&gt;C.H. Unnikrishnan, Proposed Patent Bill Is Flawed, Say Experts (Mint)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;September 23, 2009: &lt;a class="external-link" href="http://www.livemint.com/Articles/PrintArticle.aspx?artid=F92B5F6A-A789-11DE-A362-000B5DABF613"&gt;Editorial: An Idea That's A Patent Misfit (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;October 2009: &lt;a class="external-link" href="http://ictsd.org/downloads/2009/11/sampat-policy-brief-5.pdf"&gt;Bhaven N. Sampat, The Bayh-Dole Model in Developing Countries: Reflections on the Indian Bill on Publicly Funded Intellectual Property (UNCTAD - ICTSD Policy Brief No. 5)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;January 2010: &lt;a class="external-link" href="http://www.icrier.org/publication/WorkingPaper244.pdf"&gt;Amit Shovon Ray &amp;amp; Sabyasachi Saha, Patenting Public-Funded Research for Technology Transfer: A Conceptual-Empirical Synthesis of US Evidence and Lessons for India (ICRIER Working Paper No. 244)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 2010: &lt;a class="external-link" href="http://nopr.niscair.res.in/bitstream/123456789/7196/1/JIPR%2015%281%29%2019-34.pdf"&gt;Mrinalini Kochupillai, &lt;em&gt;The Protection and Utilization of Public Funded Intellectual Property Bill, 2008: A Critique in the Light of India's Innovation Environment&lt;/em&gt;, 15 J. Intell. Prop. Rights 19 (2010)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;January 16, 2010: &lt;a class="external-link" href="http://www.financialexpress.com/printer/news/567807/"&gt;Amit Shovon Ray &amp;amp; Sabyasachi Saha, Intellectual Bottlenecks (Financial Express)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;January 21, 2010: &lt;a class="external-link" href="http://www.business-standard.com/india/news/latha-jishnu-perilsthe-us-model/383179/"&gt;Latha Jishnu, Perils of the US Model (Business Standard)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 22, 2010: &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Scientists-fume-over-new-patent-bill/articleshow/5486588.cms"&gt;Rema Nagarajan, Scientists Fume Over New Patent Bill (Times of India)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 26, 2010: &lt;a class="external-link" href="http://www.livemint.com/2010/01/26202909/The-problem-with-patents.html"&gt;Shamnad Basheer, The Problem with Patents (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;February 5, 2010: &lt;a class="external-link" href="http://www.thehindubusinessline.com/2010/02/05/stories/2010020550960900.htm"&gt;Shalini Butani, Public Research May Become More Private (Business Line)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 8, 2010: &lt;a class="external-link" href="http://www.livemint.com/2010/02/07225403/Scientists-want-changes-in-inn.html"&gt;Anika Gupta, Scientists Want Changes in Innovation Bill (Mint)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 9, 2010: &lt;a class="external-link" href="http://www.livemint.com/Articles/PrintArticle.aspx?artid=AD533A7C-15A2-11DF-A92D-000B5DABF636"&gt;C.H. Unnikrishnan, Parliament Panel Wants Govt Review on Innovation Bill (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;February 15, 2010: &lt;a class="external-link" href="http://www.downtoearth.org.in/full6.asp?foldername=20100215&amp;amp;filename=croc&amp;amp;sec_id=10&amp;amp;sid=2"&gt;Leena Menghaney, A Bad Example from the U.S. (Down to Earth)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 19, 2010: &lt;a class="external-link" href="http://www.indianexpress.com/story-print/581701/"&gt;Pranesh Prakash, A Patent Conundrum (Indian Express)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://spicyipindia.blogspot.com/search/label/Bayh%20Dole"&gt;SpicyIP coverage by tag 'Bayh Dole'&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://spicyip.com/ip-resources"&gt;Presentations from NUJS, Kolkata conference on the PUPFIP Bill&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;a name="on-bayh-dole"&gt;&lt;/a&gt;On Bayh-Dole&lt;/h3&gt;
&lt;strong&gt;Newspapers and Magazines&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.nybooks.com/articles/17244"&gt;Marcia Angell, The Truth About the Drug Companies, New York Review of Books, July 15, 2004&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://money.cnn.com/magazines/fortune/fortune_archive/2005/09/19/8272884/index.htm"&gt;Clifton Leaf, The Law of Unintended Consequences, Fortune Magazine, Sept. 19, 2005&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.economist.com/science/PrinterFriendly.cfm?story_id=5327661"&gt;The Bayh-Dole act's 25th birthday, The Economist, Dec. 20, 2005&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.nytimes.com/2008/09/07/technology/07unbox.html?_r=1&amp;amp;pagewanted=print"&gt;Janet Rae-Dupree, When Academia Puts Profit Ahead of Wonder, N.Y. Times, Sept. 7, 2008&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Academic Journals&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.btlj.org/data/articles/20_02_02.pdf"&gt;Amy Kapczynski et al., Addressing Global Health Inequities: An Open Licensing Approach for University Innovation, 20 Berkeley Tech. L.J. 1031 (2005) &lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Anthony So et al., &lt;em&gt;Is Bayh-Dole Good for Developing Countries&lt;/em&gt;, 6 PLoS Biol. e262 (2008)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.law.duke.edu/shell/cite.pl?66+Law+&amp;amp;+Contemp.+Probs.+289+%28WinterSpring+2003%29"&gt;Arti K. Rai &amp;amp; Rebecca S. Eisenberg, &lt;em&gt;Bayh-Dole Reform and the Progress of Biomedicine&lt;/em&gt;, 66 Law &amp;amp; Contemp. Probs. 289 (2003)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;David C. Mowery &amp;amp; Arvids A. Aiedonis, &lt;em&gt;Numbers, Quality, and Entry: How Has the Bayh-Dole Act Affected U.S. University Patenting and Licensing?&lt;/em&gt;, 1 Innovation Pol'y Econ. 187 (2000)&lt;/li&gt;&lt;li&gt;David C. Mowery, et al., &lt;em&gt;Learning to Patent: Institutional Experience, Learning, and the Characteristics of U.S. University Patents After the Bayh-Dole Act, 1981-1992&lt;/em&gt;, 48 Mgmt. Sci. 73 (2002)&lt;/li&gt;&lt;li&gt;Donald Kennedy, &lt;em&gt;Editorial: Enclosing the Research Commons&lt;/em&gt;, 294 Science 2249 (2001)&lt;/li&gt;&lt;li&gt;F.M. Scherer, &lt;em&gt;The Political Economy of Patent Policy Reform in the United States&lt;/em&gt;, 7 Colorado J. Telecomm. High Tech. L. 167 (2009)&lt;/li&gt;&lt;li&gt;Henry Steck, &lt;em&gt;Corporatization of the University: Seeking Conceptual Clarity&lt;/em&gt;, 585 Annals of Am. Acad. Pol. &amp;amp; Soc. Sci. 66 (2003)&lt;/li&gt;&lt;li&gt;Jason Owen-Smith, &lt;em&gt;Trends and Transitions in the Institutional Environment for Public and Private Science&lt;/em&gt;, 49 Higher Educ. 91 (2005)&lt;/li&gt;&lt;li&gt;Jerry G. Thursby &amp;amp; Marie C. Thursby, &lt;em&gt;University Licensing and the Bayh-Dole Act&lt;/em&gt;, 301 Science 1052 (2003)&lt;/li&gt;&lt;li&gt;Jerry G. Thursby &amp;amp; Marie C. Thursby, &lt;em&gt;Who is Selling the Ivory Tower? Sources of Growth in University Licensing&lt;/em&gt;, 48 Mgmt. Sci. 90 (2002)&lt;/li&gt;&lt;li&gt;Josh Lerner,&lt;em&gt; Review of 'Ivory Tower'&lt;/em&gt;, 43 J. Econ. Litt. 510 (2005)&lt;/li&gt;&lt;li&gt;Joshua B. Powers,&lt;em&gt; R&amp;amp;D Funding Source and University Technology Transfer: What is Stimulating Universities to Be More Entrepreneurial?&lt;/em&gt;, 45 Research in Higher Educ. 1 (2004)&lt;/li&gt;&lt;li&gt;Lita Nelsen, &lt;em&gt;The Rise of Intellectual Property Protection in the American University&lt;/em&gt;, 279 Science 1460 (1998)&lt;/li&gt;&lt;li&gt;Marcia Angell &amp;amp; Arnold S. Relman, &lt;em&gt;Patents, Profits &amp;amp; American Medicine: Conflicts of Interest in the Testing &amp;amp; Marketing of New Drugs&lt;/em&gt;, 131 Daedalus 102 (2002)&lt;/li&gt;&lt;li&gt;Maria Jelenik, &lt;em&gt;Review: Two Books on Technology Transfer&lt;/em&gt;, 50 Admin. Sci. Q. 131 (2005) (Review of '&lt;em&gt;Ivory Tower&lt;/em&gt;')&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.sciencemag.org/cgi/content/full/280/5364/698"&gt;Michael
A. Heller &amp;amp; Rebecca S. Eisenberg, Can Patents Deter Innovation? The
Anticommons in Biomedical Research, 280 Science 698 (1998)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Rebecca Henderson, et al., &lt;em&gt;Universities as a Source of Commercia Technology: A Detailed Analsis of University Patenting, 1965-1988&lt;/em&gt;, 80 Rev. Econ. Statistics 119 (1998)&lt;/li&gt;&lt;li&gt;Rebecca S. Eisenberg, &lt;em&gt;Public Research and Private Development: Patents and Technology Transfer in Government-Sponsorded Research&lt;/em&gt;, 82 Virginia L. Rev. 1663 (1996)&lt;/li&gt;&lt;li&gt;Rebecca S. Eisenberg &amp;amp; Richard R. Nelson, &lt;em&gt;Public vs. Proprietary Science: A Fruitful Tension?&lt;/em&gt;, 131 Daedalus 89 (2002)&lt;/li&gt;&lt;li&gt;Richard Jensen &amp;amp; Marie Thursby,&lt;em&gt; Proofs and Prototypes for Sale: The Licensing of University Inventions&lt;/em&gt;, 91 Am. Econ. Rev. 240 (2001)&lt;/li&gt;&lt;li&gt;Roberto Mazzoleni &amp;amp; Richard R. Nelson, &lt;em&gt;Economic Theories about the Benefits and Costs of Patents&lt;/em&gt;, 32 J. Econ. Issues 1031 (1998)&lt;/li&gt;&lt;li&gt;Thomas A. Massaro,&lt;em&gt; Innovation, Technology Transfer, and Patent Policy: The University Contribution&lt;/em&gt;, 82 Virginia L. Rev. 1729 (1996)&lt;/li&gt;&lt;li&gt;Walter W. Powell &amp;amp; Jason Owen-Smith, &lt;em&gt;Universities and the Market for Intellectual Property in the Life Sciences&lt;/em&gt;, 17 J. Pol'y Analysis Mgmt. 253 (1998)&lt;/li&gt;&lt;li&gt;William M. Sage, &lt;em&gt;Funding Fairness: Public Investment, Proprietary Rights and Access to Health Care Technology&lt;/em&gt;, 82 Virginia L. Rev. 1737 (1996)&lt;/li&gt;&lt;li&gt;Zach W. Hall &amp;amp; Christopher Scott, &lt;em&gt;University-Industry Partnership&lt;/em&gt;, 291 Science 553 (2001)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Resources&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/issue2003_5.htm"&gt;TIIP Newsletter: Patents and University Technology Transfer (2003) &lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.bayhdole25.org"&gt;Bay-Dole 25&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="file:///C:/Users/REBECCA/AppData/Local/Temp/moz-screenshot.png" alt="" /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/publications/pupfip/why-no-pupfip'&gt;https://cis-india.org/a2k/publications/pupfip/why-no-pupfip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Bayh-Dole</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Access to Medicine</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>PUPFIP</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2011-09-12T11:03:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/witfor-2009">
    <title>World IT Forum 2009</title>
    <link>https://cis-india.org/a2k/blogs/witfor-2009</link>
    <description>
        &lt;b&gt;At the World IT Forum, Pranesh Prakash made a brief presentation on intellectual property rights, how ill-suited they are to be considered "property" rights, and how they have been foisted upon the developing world.&lt;/b&gt;
        &lt;div class="moz-text-html"&gt;
&lt;div class="moz-text-html"&gt;
&lt;p&gt;At the
recently-concluded World IT Forum, 2009, the Commission on Social, Ethical, and Legal Issues organized three sessions.&amp;nbsp; One
on 'Digital Intellectual Property Rights and Digitisation of Divides',
a second on 'Employment of ICTs Toward Effective Realization of
Millenium Development Goals' and a third on 'E-Governance and
Biometrics: Evaluating Opportunities and Threats'.&amp;nbsp; The individual
sessions had K.M. Gopakumar of Third World Network ("Digital Technology
and Access to Knowledge: Policy Space for the Third World), Naveen
Thayyil ("Digital IPRs: Implications for Divides in New and Emerging
Biotechnologies"), Anita Gurumurthy of IT for Change,("Reimagining the
Digital Opportunity" ), Chat Garcia Ramilo of APC Women's Networking
Support Programme ("Gender Dimensions of ICT Development"), Ajit
Narayanan of AUT ("What Does Your Passport Say About You?"), Sohel
Iqbal of Korea University ("Obligation and SWOT of E-Governance in
Developing Countries") and Dinh Ngoc Vuong of the Institute of
Lexicography and Encyclopedia of Vietnam ("Legal Aspects and Role of
E-Governance in Vietnamese Reforms") speaking.&amp;nbsp; As part of the first
session, I spoke on how IPR as a property regime leads to
mischaracterisation, and how IPR is a foreign system for developing
countries.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Amongst the many reasons that IPR should not be regarded in the same
light as property (even though that conceptual framework is &lt;a class="external-link" href="http://volokh.com/2003_09_07_volokh_archive.html#106337694122641243"&gt;supported
by the likes of Eugene Volokh&lt;/a&gt;) are to be found in David Levine's
rejoinder to Volokh that&amp;nbsp; &lt;a class="external-link" href="http://levine.sscnet.ucla.edu/general/intellectual/coffee.htm"&gt;IPR
are analogous to property&lt;/a&gt;, along with the &lt;a class="external-link" href="http://lsolum.blogspot.com/2003_09_01_lsolum_archive.html#106338119420336709"&gt;two&lt;/a&gt;
&lt;a class="external-link" href="http://lsolum.blogspot.com/2003_09_01_lsolum_archive.html#106349932466050651"&gt;rejoinders&lt;/a&gt;
by Larry Solum.&amp;nbsp; Volokh's main point is that not only control of use
and excludability, but incentives to create are also part of property
law, for both tangible property and intangible "property".&amp;nbsp; This is
questioned not only by David Levine and Larry Solum, but by Mark
Lemley, Wendy Gordon, and a host of other scholars.&amp;nbsp; Three simple
points to note: (1) IP deals with internalisation of positive
externalities, which is not something we normally associate with
property law -- thus, IP actually &lt;a class="external-link" href="http://volokh.com/posts/1173221206.shtml"&gt;does not give me
control over my 'property', but over yours&lt;/a&gt;;
(2) IP deals with a truly non-exhaustable, non-rivalrous good -- ideas
-- which, as shown in the articles linked above, are not suited to
being governed by property regimes; (3) IP goes much beyond what
property law does with tangible property, since it not only governs the
sale of IP and exclusion of others from my IP, but also governs the
subsequent usage of IP.&lt;/p&gt;
&lt;p&gt;Another relevant consideration is the way that IP law has been
spread through the globe through means like colonisation and modern-day
unbalanced trade treaties.&amp;amp;nbsp; India got its first copyright law
in 1914 and &lt;a class="external-link" href="http://www.wipo.int/treaties/en/Remarks.jsp?cnty_id=969C"&gt;signed
the Berne Convention in 1928&lt;/a&gt;,
much before its independence. The TRIPS Agreement of 1995 mandated
things like product patents for pharma products for all countries, even
though an industrialised Western country like Spain only started
recognizing them in 1992, and even though Italy, which was then the
fifth largest manufacturer of pharmaceutical products, was forced to
introduce product patents by a petition of foreign pharma companies in
1978. The benefits of product patents for pharma products have not been
empirically proved, but the &lt;a class="external-link" href="http://news.bbc.co.uk/2/hi/science/nature/7632318.stm"&gt;harms
caused by patents to production of newer medicines&lt;/a&gt;
have been well documented. Given these, it is imperative that
developing countries push back against IP expansionism that is knocking
on their doors through instruments like Free Trade Agreements.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/witfor-2009'&gt;https://cis-india.org/a2k/blogs/witfor-2009&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2011-08-04T04:44:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates">
    <title>Fallacies, Lies, and Video Pirates</title>
    <link>https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates</link>
    <description>
        &lt;b&gt;At a recent conference on counterfeiting and piracy, industry representatives variously pushed for stiffer laws for IP violation, more stringent enforcement of existing IP laws, and championed IP as the most important thing for businesses today.  This blog post tries to show how their arguments are flawed.&lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://www.cii.in"&gt;Confederation of Indian Industry&lt;/a&gt; (CII) organized its third annual conference on counterfeiting and piracy, with support from the United States Embassy and the Quality Brands Protection Committee of China (&lt;a class="external-link" href="http://www.apcoworldwide.com/Content/client_success/client_success.aspx?pid=0&amp;amp;csid=67a9334f-184b-4866-8ddc-975ca6ff485d"&gt;a body comprising more than 80 multinational companies&lt;/a&gt;).&amp;nbsp; Last week we &lt;a href="https://cis-india.org/../news/letter-from-civil-society-organizations-to-cii" class="internal-link" title="Letter from Civil Society Organizations to CII"&gt;criticised the conference in an open letter&lt;/a&gt;.&amp;nbsp; This week, we examine a few of the recurring themes that came up at the conference.&lt;/p&gt;
&lt;h3&gt;Something being substandard is not the same as something being counterfeit.&lt;/h3&gt;
&lt;p&gt;This was a mistake made by many whenever they invoked 'counterfeit' in the sense of something that is violative of one's patent and trademark rights.&amp;nbsp; The Indian Drugs and Cosmetics Act itself distinguishes between 'misbranded', 'adulterated', and 'spurious' drugs, thus recognizing that something that is made without proper authorization from rights owners isn't necessarily of a bad quality.&amp;nbsp; Indeed, this was substantiated by an audience member, a lawyer from Dr. Reddy's Lab.&amp;nbsp; She spoke of a &lt;em&gt;mandi&lt;/em&gt; in Agra where they seized medicines being sold under the Dr. Reddy's name, but produced by local manufacturers.&amp;nbsp; Upon lab testing, it turned out, much to their surprise, that the medicines were of the highest quality and were not substandard.&amp;nbsp; Similarly, many large companies including trusted FMCG companies like Hindustan Unilever and ITC are upbraided by authorities for violations of the Drugs and Cosmetics Act (for the cosmetics they produce) as well as the Prevention of Food Adulteration Act.&amp;nbsp; Thus, even legitimate businesses can produce substandard products.&amp;nbsp; Thus, a product can be unauthorized but not substandard, just as a product can be substandard but not counterfeit.&lt;/p&gt;
&lt;p&gt;This distinction becomes very important when we talk about patents, and especially drug patents.&amp;nbsp; A generic drug is &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Generic_drug"&gt;by definition&lt;/a&gt; identical or within an acceptable bio-equivalent range to the brand name counterpart with respect to pharmacokinetic and pharmacodynamic properties.&amp;nbsp; Thus, this entire category of high-quality drugs is often sought to be made illegal or counterfeit by large pharma companies.&amp;nbsp; Some countries like Kenya have capitulated.&amp;nbsp; But so far the World Health Assembly has been forced by developing countries to keep the issue of substandard medicines separate from patent-bypassing medicines.&lt;/p&gt;
&lt;p&gt;The industry, for all their talk about "out of the box" thinking on the issue, still only consider metrics such the number of piracy raids conducted as measures of success.&amp;nbsp; A question was put forth by Manisha Shridhar of the Intellectual Property &amp;amp; Trade Unit of the World Health Organization upon learning of the quality of the drugs seized at the Agra &lt;em&gt;mandi&lt;/em&gt;: Why not cut a licensing deal with those manufacturers, who obviously have excellent production facilities?&amp;nbsp; That kind of thinking, which helped HMV in India in the 1980s, and copying innovative features from video pirates and pricing their products competitively has helped an Indian company, Moserbaer, do extremely well.&lt;/p&gt;
&lt;h3&gt;Counterfeiters and pirates are not always seeking to fool consumers.&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Only lawyers hired by the industry would think that a consumer aspiring towards a Rolex watch would actually think that the one he purchased off the streets for one-hundredth the original's price was in fact original.&amp;nbsp; Street-side DVD hawkers are not thought by the general public to be selling original wares.&amp;nbsp; Still, despite knowing the difference between the original and the fake, consumers many times opt for the latter.&lt;/p&gt;
&lt;p&gt;Having said that, counterfeiting, by using someone else's trademark and trying to pass off fake goods as real ones, is quite obviously wrong.&amp;nbsp; It harms customers, and it harms the manufacturers.&amp;nbsp; Thus, a distinction deserves to be made here between the counterfeiters who try to deceive consumers (for instance by copying authenticity marks, like holograms, etc.) and those who are just providing them with highly cheaper alternatives (pirated DVDs, etc.).&amp;nbsp; In this light, it is also important here to distinguish between counterfeiting, traditionally taken to be trademark violation, and piracy, traditionally taken to be a violation of international law, but now generally meaning a large-scale violation of copyright law.&amp;nbsp; While the former can lead to consumer confusion, the latter scarcely ever does.&amp;nbsp; This is ignored by industry people who evoke the image of the consumer quite often, but only when it helps them, and not in any meaningful manner.&amp;nbsp; They negate consumer choice when it comes to consciously purchasing pirated goods, and &lt;a class="external-link" href="http://a2knetwork.org"&gt;consumer freedoms when it comes to usage of copyrighted materials&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;While commercial film piracy funds terrorists, so does pretty much every business activity.&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;A favourite of the MPAA (and by association, the MPA) is the RAND report on &lt;a href="http://www.rand.org/pubs/monographs/2009/RAND_MG742.pdf" target="_blank"&gt;Film Piracy and its Connection to Organized Crime and Terrorism&lt;/a&gt;.&amp;nbsp; This report, which was funded by the MPAA, predictably concludes that film piracy funds organized crime and terrorism.&amp;nbsp; Even if we are to believe its findings wholesale, it leaves us wondering whether all business activities from which terrorists derive funds should be banned.&lt;/p&gt;
&lt;p&gt;In India, there is a substantiated link between organized crime and film and music production, and terrorists have been said to make money off the stock market.&amp;nbsp; If the MPA's arguments are taken to their logical conclusions, then film production and equity trading should also be prosecuted.&amp;nbsp; Furthermore, while the mafia and terrorists are the ostensible targets, the laws that are brought about to tackle it affect poor roadside vendors and non-commercial online file sharers.&amp;nbsp; To tackle the funding of terrorists, roadside piracy shouldn't become the target just as film production &lt;em&gt;per se&lt;/em&gt; shouldn't.&amp;nbsp; The invocation of the RAND report is thus only meant for rhetorical effect, as it is hard to find logic in there.&lt;/p&gt;
&lt;h3&gt;"To copy without authorization is to steal", the death penalty, and drug peddling.&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;At the conference, Dominic Keating of the US Embassy pointed out that "to copy without authorization is to steal" and David Brener of US Customs and Border Protection kept emphasising, on at least two occasions, that "drug peddling merits an automatic death sentence in many countries".&amp;nbsp; There are numerous arguments one can make to show the lack of thought in the former.&amp;nbsp; One could point out that 'stealing' and 'theft' are things that happen to tangible property, and that not only is copyright not tangible, but it is barely property.&amp;nbsp; Copying without authorization creates one more of what existed, without depriving the authorizer (usually a corporation) of its original.&amp;nbsp; This goes against our notion of 'stealing'.&amp;nbsp; If the argument is to be shifted to the terrain of control over one's property/copyright, Mark Lemley in an &lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=582602"&gt;illuminative article&lt;/a&gt; shows how the economic theories behind externalities in property and copyright are vastly different, and that complete control over either has never been, nor should it ever be, an aim of the law.&amp;nbsp; Simply put, someone free riding on your property leaves you worse off than earlier, while someone free riding on your copyright &lt;em&gt;usually&lt;/em&gt; doesn't.&lt;/p&gt;
&lt;p&gt;One could also point out that 'stealing' is endemic in activities involving human creativity.&amp;nbsp; &lt;a class="external-link" href="http://www.bartleby.com/200/sw11.html"&gt;T.S. Eliot notes&lt;/a&gt; that "Immature poets imitate; mature poets steal; bad poets deface what they take, and good poets make it into something better, or at least something different".&amp;nbsp; He does not even consider the possibility that artistic borrowing, whether by imitation or by 'stealing' does not happen.&amp;nbsp; Even Y.S. Rajan, Principal Adviser to CII recognized this when during the conference he noted that "imitation and innovation have an interesting and intertwining philosophical history".&amp;nbsp; If we are to take Mr. Keating's admonishment seriously, we would indeed have a very illustrious list of thieves on our hands, including the &lt;a class="external-link" href="http://www.kimbawlion.com/rant2.htm"&gt;Walt Disney Corporation&lt;/a&gt;, &lt;a class="external-link" href="http://www.theatlantic.com/doc/200204/posner"&gt;William Shakespeare&lt;/a&gt;, &lt;a class="external-link" href="http://www.guardian.co.uk/world/2004/apr/02/books.booksnews"&gt;Vladamir Nabokov&lt;/a&gt;, &lt;a class="external-link" href="http://www.alternet.org/story/18830/"&gt;Public Enemy&lt;/a&gt;, and pretty much every creative person who has ever lived.&amp;nbsp; Books can be written about this (and indeed, numerous books have been), so we shall not dwell on this issue.&lt;/p&gt;
&lt;p&gt;Mr. Brener's repeatedly spoke of how drug peddling attracts death penalty in many countries (though in neither the US nor in India has anyone ever received capital punishment for drug peddling), but he also clarified that he is not advocating for the death penalty for copyright violations.&amp;nbsp; That made one wonder why he was bringing up the death penalty at all.&amp;nbsp; He also made the dubious, non-substantiated claim (noting it as "true fact") that pirating movies is more profitable than selling heroin.&amp;nbsp; This claim &lt;a class="external-link" href="http://www.news.com.au/technology/story/0,25642,24236266-5014108,00.html"&gt;appears in an article about a report&lt;/a&gt; produced by the Australian Federation Against Counterfeit Theft (AFACT), but the original report is &lt;a class="external-link" href="http://www.google.com/search?q=heroin+site%3Aafact.com.au"&gt;nowhere to be found&lt;/a&gt;.&amp;nbsp; The &lt;a class="external-link" href="http://www.news.com.au/technology/story/0,25642,24236266-5014108,00.html"&gt;article about the AFACT report&lt;/a&gt; also claims that the pirates are using their illicit profits promote drug smuggling.&amp;nbsp; The seeming contradiction of film pirates investing in something that is riskier and less profitable doesn't seem to have caught the eye of the writers.&amp;nbsp; One version of the 'drugs are less profitable than pirated DVDs' claim (with marijuana taking heroin's place) was &lt;a class="external-link" href="http://mail.sarai.net/pipermail/commons-law/2009-August/003100.html"&gt;debunked on the Commons Law mailing list&lt;/a&gt;.&amp;nbsp; Pirated DVDs are sold for a fraction of the cost of the original.&amp;nbsp; It would be obvious to anyone that DVDs that are typically sold for Rs.30-50, where the cost of manufacture alone may be estimable to be around Rs. 10, cannot be more profitable than heroin peddling.&amp;nbsp; That apart, most online file sharing (deemed to be "piracy") is non-commercial.&amp;nbsp; Thus the question of profit does not really arise.&amp;nbsp; Still, for the industry, absence of a profit is equal to a loss.&lt;/p&gt;
&lt;p&gt;Thus, the rhetoric of crime, and that too heinous crime, is continually used, despite its being completely inapposite. Why does used to try to make IP enforcement a matter of state concern, rather than a matter of private, and civil, interest.&amp;nbsp; This way, illegitimate statistics and factoids are used to make &lt;a class="external-link" href="http://www.theregister.co.uk/2005/05/06/drinkordie_sentencing/"&gt;individual file-sharers who earn no money get lengthy prison sentences&lt;/a&gt;.&amp;nbsp; This and other ways in which IP enforcement has expanded are carefully documented in &lt;a class="external-link" href="http://www.twnside.org.sg/title2/intellectual_property/development.research/SusanSellfinalversion.pdf"&gt;this paper by Susan Sell&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Repeating false 'statistics' does not make them true.&lt;/h3&gt;
&lt;p&gt;Again, we were subjected to a number of dubious claims during the conference: If only counterfeiting and piracy were eliminated, India's fiscal deficit would disappear; the Indian entertainment industry loses 16000 crore (USD 4 billion) yearly to piracy; 820,000 direct jobs are lost due to film piracy; software piracy costs the industry USD 2.7 billion annually, etc.&amp;nbsp; These reports' methodologies have been thorougly discredited.&amp;nbsp; Even The Economist, a very conservative and pro-industry newspaper, believes that the &lt;a class="external-link" href="http://www.economist.com/displaystory.cfm?story_id=3993427"&gt;BSA-IDC annual reports on software piracy are utterly distorted&lt;/a&gt;.&amp;nbsp; Similarly, in the U.S., the figure of 750,000 jobs (around 8% of the U.S. unemployed in 2008) being lost due to piracy were touted by everyone from the Department of Commerce, the Chamber of Commerce, U.S. Border and Customs Protection, and the MPAA, RIAA, and BSA.&amp;nbsp; The amount of money lost each year in the U.S. due to IP infringement has been estimated to be between USD 200-250 billion (that's more
than the &lt;em&gt;combined&lt;/em&gt; 2005 gross domestic revenues of the movie, music, software, and video game industries).&amp;nbsp; In &lt;a class="external-link" href="http://arstechnica.com/tech-policy/news/2008/10/dodgy-digits-behind-the-war-on-piracy.ars"&gt;a lengthy piece in Ars Technica&lt;/a&gt;, Julian Sanchez traces back the history of both these figures, and shows how they are just large numbers used for lobbying, and are not based on actual studies.&amp;nbsp; The industry-commissioned &lt;a class="external-link" href="http://www.ey.com/IN/en/Industries/Media---Entertainment"&gt;Ernst &amp;amp; Young&amp;nbsp; report&lt;/a&gt; ("The Effects of Counterfeiting and Piracy on India's Entertainment Industry") was never made available to the public at large, thereby making it impossible to judge the methodological soundness of the survey and the veracity of the figures.&lt;/p&gt;
&lt;h3&gt;IP expansion and more stringent enforcement is counter-productive.&lt;/h3&gt;
&lt;p&gt;Chander Mohan Lall, copyright lawyer to various film studios (including Warner Bros.) in India, used a number of short film clips in presentation during the conference.&amp;nbsp; Upon being questioned about it, he admitted that he did not have permissions of the copyright holders, but claimed that his use fell under "the education exception" in Indian copyright law.&amp;nbsp; While I wish he were correct (because what he was doing was indeed educational use), as per the law he is wrong.&amp;nbsp; Section 52(1)(i) of the Copyright Act only exempts educational usage of cinematograph film recordings when "audience is limited to such staff and students [of an educational institution], the parents and guardians of the students and persons directly connected with the activities of the institution".&amp;nbsp; While there are other arguments he could seek to use to make his usage of the film clilps non-infringing, being excepted by the educational fair dealings clauses isn't one of them.&amp;nbsp; Thus, more stringent enforcement of IP rights actually engenders such unauthorized, but perfectly legitimate copying and communication to the public such as that done by Mr. Lall.&lt;/p&gt;
&lt;p&gt;Another way in which IP enforcement is being sought to be increased is by way of the so-called Goonda Acts.&amp;nbsp; These are generally statutes aimed at criminals and lumpen elements in society.&amp;nbsp; The Maharastra version, the &lt;a class="external-link" href="http://www.maharashtra.gov.in/english/homedept/pdf/act_1981.pdf"&gt;Maharashtra Prevention of Dangerous Activities of Slumlords, Bootleggers, Drug-Offenders and Dangerous Persons Act, 1981&lt;/a&gt;, just became the &lt;a class="external-link" href="http://maharashtra.gov.in/data/gr/marathi/2009/07/15/20090717184706001.pdf"&gt;Maharashtra Prevention of Dangerous Activities of Slumlords, Bootleggers, Drug-Offenders, Dangerous Persons and Video Pirates Act&lt;/a&gt;.&amp;nbsp; The term "video pirate" is very widely defined, to include any copyright infringement-chargesheeter who is "engaged or is making preparations for engaging in any of his activities as a video pirates, which affect adversely or likely to affect adversely, the maintenance of public order". Public order is deemed to be disturbed by "producing and distributing pirated copies of music or film products, thereby resulting in a loss of confidence in administration".&amp;nbsp; Thus video pirates can possibly be interpreted to include individual sitting at home and using P2P networks to share films.&amp;nbsp; The only requirement is that they should have had a chargesheet lodged against them previously -- they needn't even have been convicted; being chargesheeted suffices.&amp;nbsp; Thus, non-commercial activities of file-sharing are equated to bootleggers and drug smugglers, and preventive detention (an anti-civil rights relic of India's colonial past) is applicable to them.&lt;/p&gt;
&lt;p&gt;IP expansion is happening without the ostensible justifications for IP being kept in mind. That Tirupathi ladoos are going to get GI (geographical indicator) protection was announced at the conference with great pride.&amp;nbsp; Geographical indicators are used to protect consumer interests, to ensure that no one outside a particular region (Champagne) can lay claim to be producing that product (Champagne) if the production of that product is intrinsically linked to special features found in that region (climate, etc.).&amp;nbsp; However, no devout person would want to purchase anything advertised as "Tirupathi ladoo" if it were produced outside the Venkateswara temple at Tirupathi, thus the question of consumer confusion does not arise.&amp;nbsp; What if someone malignantly advertises something as Tirupathi ladoo and claims it was made in Tirupathi (and not just that it tastes like the ladoo made there)?&amp;nbsp; Such a person can be taken to task for deceptive advertising, and there is no need for something to have IP protection to do so.&amp;nbsp; This represents a senseless expansionism of IP.&amp;nbsp; It is now IP for IP's sake.&lt;/p&gt;
&lt;p&gt;One of the speakers, Mr. V.N. Deshmukh, who though pro-stringent IP enforcement, astutely noted that, "When local demand is not met, they [consumers] turn to counterfeiters and pirates."&amp;nbsp; Local demand can be unsatisfied because of lack of supply, or because the supply is overpriced, or because the supply is not easy to access, or because what is supplied is inferior to what is demanded.&amp;nbsp; At the end of the day, as William Patry, Google's lead counsel, has noted, what companies sell to the public are products and services, and not IP.&amp;nbsp; It would thus be wise for businesses to be innovative and compete rather than trying to extend their monopolies and engaging in rent-seeking behaviour that is economical harmful to consumers.&amp;nbsp; They would also do well to remember that IP is not only a product but an input as well, so they are ultimately consumers themselves.&amp;nbsp; All the harsher laws and enforcement mechanisms that they push for right now will have unintended consequences, and come to affect them adversely.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates'&gt;https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-08-04T04:43:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/civil-society-letter-against-trips-plus-ip-enforcement">
    <title>Civil Society Letter Against TRIPS-Plus IP Enforcement</title>
    <link>https://cis-india.org/a2k/blogs/civil-society-letter-against-trips-plus-ip-enforcement</link>
    <description>
        &lt;b&gt;This open letter was sent to the president of Confederation of Indian Industry (CII) and high-level government officials on the eve of the Third International Conference on Counterfeiting &amp; Piracy organized by CII.  This conference aims to strengthen the enforcement of intellectual property rights and thus creating an imbalance in the protection that intellectual property offers to both those who own it as well as those who don't.
&lt;/b&gt;
        
&lt;h2&gt;An Open Letter to the President of Confederation of Indian Industry (CII) on the Third International Conference on Counterfeiting &amp;amp; Piracy&lt;/h2&gt;
&lt;p&gt;&lt;br /&gt;To&lt;br /&gt;Mr. Venu Srinivasan &lt;br /&gt;The President&amp;nbsp; &lt;br /&gt;Confederation of Indian Industry (CII) &lt;br /&gt;The Mantosh Sondhi Centre, 23,&amp;nbsp; &lt;br /&gt;Institutional Area, Lodi Road &lt;br /&gt;New Delhi - 110 003&amp;nbsp; &lt;br /&gt;&lt;br /&gt;Dear Mr. Srinivasan,&lt;br /&gt;&lt;br /&gt;We understand that Confederation of Indian Industry (CII) is hosting the Third International Conference on Counterfeiting and Piracy from 19-20th August 2009 in partnership with the Embassy of the United States and the Quality Brand Protection Committee (QBPC), China. As stated in the invitation letter the primary objectives of the conference are: 1) to initiate coordinated action for cross border enforcement; 2) to highlight the importance of protection of intellectual property rights (IPRs); 3) to combat the growing threat of piracy and counterfeiting; 4) to facilitate a global meeting of customs officials across the globe; 5) to recommend the creation and setting up of a governmental “National Brand Protection” group; 6) to serve as a forum to discuss legal guidelines related to the prosecution of IPR infringement and to eliminate ‘loopholes’ within the existing laws; and 7) to strengthen cooperation between enforcement agencies and chalk out strategies for enforcement agencies a industry action both at national &amp;amp; international level. We also understand that this international conference is part of CII Intellectual Property Division’s special initiative on enforcement of IPRs. As part of this special initiative CII aims at “engaging government to create conducive legislative measures, policy levels reform and impressing [upon them] to adopt stringent enforcement initiatives and exemplary punitive and monetary measures to further safeguard and secure the interest of industry”. CII also wants to “create a global partnership to synergise efforts of international community and to support and participate in India's efforts in combating counterfeiting both at domestic and international levels”.&amp;nbsp; We, the undersigned, representing various civil society organizations in India, write this letter to express our strong reservation on the conference as well as on CII’s special initiative on IP enforcement. Without raising any question on CII’s right to organize events we would like to convey the following concerns with regard to the conference and CII’s initiative on IP enforcement.&lt;/p&gt;
&lt;p&gt;Many of the above mentioned objectives of the conference and the special initiative are directed towards the enhancement of intellectual property (IP) standards like coordinated action on border measures, common guidelines for prosecution of IP infringement, exemplary punitive and monetary measures, etc. In other words, enhancement of IP standards means using more public money to protect private rights; very often protecting the monopoly over intangible property rights of multi-national corporations (MNCs).&lt;/p&gt;
&lt;p&gt;As you may be aware, MNCs and their developed country hosts are currently engaged in the implementation of &lt;a class="external-link" href="http://www.iqsensato.org/wp-content/uploads/Sell_IP_Enforcement_State_of_Play-OPs_1_June_2008.pdf"&gt;a multi-pronged strategy to enhance IP enforcement standards&lt;/a&gt;.[1] This is similar to the MNC’s initiatives in the mid 80s to enhance international IP protection, which resulted in the Agreement on Trade-Related aspects of Intellectual Property Rights (TRIPS). Unlike the 80s, now MNCs and developed countries use multiple forums to pursue the objective of enhancement of IP enforcement standards. Some developed countries have unilaterally enhanced their IP enforcement strategy to force other countries, especially developing countries, to accept the same through various multilateral organizations, namely the World Customs Organization (WCO), World Health Organization (WHO), Universal Postal Union (UPU), Interpol, WIPO and WTO. Developed countries are also using Free Trade Agreements (FTAs), Bilateral Agreements on IP Enforcements as well as financing lobbyist studies, conferences and policy recommendations to impose higher IP enforcement standards. These efforts for the enhancement of IP enforcement standards are a matter of grave concern for the people of developing countries and their governments. By partnering with the US Embassy and &lt;a class="external-link" href="http://www.qbpc.org.cn/About_QBPC/Introduction/2008-08/01_116.html."&gt;Quality Brand Protection Committee of China&lt;/a&gt; (QBPC)[2] in the organization of this conference, CII is allowing itself to play in the hands of MNCs and some developed countries, whose interests do not match with that of India industries and that of the Indian people.&lt;/p&gt;
&lt;p&gt;As you are aware, the Government of India is taking a very strong position in resisting enhancement of IP enforcement standards in all the multilateral forums. India along with like-minded developing countries successfully pushed back TRIPS-plus[3] IP enforcement agenda at WCO and WHO. India is also trying its level best to convince other developing countries the need to stick to TRIPS-compliant standards rather than adopting TRIPS-plus enforcement standards. In the wake of the controversial generic drug seizures by EU customs authorities, &lt;a class="external-link" href="http://www.livemint.com/2009/02/04232721/India-Brazil-raise-EU-drug-se.html"&gt;India has also raised the issue of TRIPS-plus IP enforcement standards&lt;/a&gt; contained in the EU IP Enforcement Directive at least two times at the TRIPS Council.[4]&amp;nbsp; The &lt;a class="external-link" href="http://www.keionline.org/blogs/2009/07/08/india-ecosoc-seizures/#more-2404"&gt;Indian political leadership has unequivocally raised its concern&lt;/a&gt; over the enhancement of IP enforcement standards at other forums also.[5] In adopting this stance, the Government of India has cited &lt;a class="external-link" href="http://www.centad.org/focus_77.asp"&gt;public interest as well as the operating freedom of Indian industry&lt;/a&gt; as its justifications.[6]&amp;nbsp; By partnering at this vital stage with an MNC lobby group and a heeding to developed country governments, CII is not acting in furtherance of the legitimate public interests of Indian domestic industry and the Indian people.&lt;/p&gt;
&lt;p&gt;It is a well-evidenced fact that TRIPS-plus enforcement standards adversely impact not only legitimate trade between nations (as shown by the EU seizures) but also the &lt;a class="external-link" href="http://www2.ohchr.org/english/bodies/hrcouncil/docs/11session/A.HRC.11.12_en.pdf"&gt;day-to-day life of millions of people&lt;/a&gt; especially in India and other developing countries.[7] Unfounded IP enforcement measures would adversely impact access to life saving medicines and educational materials. Thus the IP enforcement measures also have the potential to deny right to development to people in the global South. Hence an organization like CII should not view IP as only a business tool but should look at the larger scheme of things especially in the social and economic realities of India. In fact, by promoting enhancement of IP enforcement standards CII is advocating a policy, which would violate the right to health, the right to knowledge, as also the right to development.&lt;/p&gt;
&lt;p&gt;We would also like to point out that Indian pharmaceutical industry is one of the victims of TRIPS-plus IP enforcement standards. In 2008 alone, &lt;a class="external-link" href="http://www.thehindubusinessline.com/2009/06/08/stories/2009060851700300.htm"&gt;17 consignments&lt;/a&gt;[8] were seized in transit at Europe using the &lt;a class="external-link" href="http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2003:196:0007:0014:EN:PDF"&gt;EU Directive on IP Enforcement&lt;/a&gt;, which allows seizure of goods in transit.[9] These consignments were being exported from developing countries (such as India and Brazil) to other developing countries, and the contents of the consignments are perfectly legal in both the exporting as well as the importing nations.&amp;nbsp; These highly questionable seizures resulted in the crisis of health programmes as it resulted in delays in&amp;nbsp;&amp;nbsp; and prohibitive costs of access to life-saving medicines in developing countries of Africa and Latin America. CII can barely claim to be representative of the interests of Indian industry if it ignores such episodes and partners with self-promoting MNCs and developed countries’ governments to advocate for the enhancement of IP enforcement standards.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the light of above-mentioned issues, we request you to consider the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Rejecting the TRIPS-plus enforcement agenda in toto.&amp;nbsp; We demand CII, Federation of Indian Chambers of Commerce and Industry (FICCI), Associated Chambers of Commerce and Industry(ASSOCHAM) and other Indian business associations to&amp;nbsp; reject any and all attempts of&amp;nbsp; bringing in a TRIPS-plus enforcement agenda in India, in the interests of Indian industry and the Indian people.&lt;/li&gt;&lt;li&gt;Completely disengaging from any collaborative efforts with foreign institutions to further TRIPS-plus standards of IP protection in India and also abstaining from any engagements on the anti-counterfeiting efforts with foreign agencies.&amp;nbsp; CII should attempt to engage with domestic institutions and build national consensus before engaging with foreign institutions with the claim of representatives of Indian industry.&lt;/li&gt;&lt;li&gt;Taking necessary proactive steps to safeguard the interests of access to medicine and access to knowledge along with interest of the Indian domestic industry.&lt;/li&gt;&lt;li&gt;Participating in a more creative discussion on IP and development rather than simply accepting the simplistic and largely discredited view that stronger IP regime leads to more innovation and is a necessary condition for socio-economic development. &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;CC:&lt;br /&gt;Shri Anjan Das &lt;br /&gt;Senior Director &amp;amp; Head &lt;br /&gt;Technology, Innovation, IPR &amp;amp; Life Sciences &lt;br /&gt;Confederation of Indian Industry (CII) &lt;br /&gt;Plot No. 249-F, Sector-18; Udyog Vihar, Phase-IV, &lt;br /&gt;Gurgaon-122015, Haryana &lt;br /&gt;&lt;br /&gt;Shri. P. Chidambaram&lt;br /&gt;Minister&lt;br /&gt;Ministry of Home Affairs&lt;br /&gt;Government of India&lt;br /&gt;North Block, Central Secretariat&lt;br /&gt;New Delhi 110001 &lt;br /&gt;&lt;br /&gt;Shri G. K. Pillai&lt;br /&gt;Secretary Justice&lt;br /&gt;Department of Justice&lt;br /&gt;Ministry of Home Affairs&lt;br /&gt;Government of India&lt;br /&gt;North Block, Central Secretariat&lt;br /&gt;New Delhi 110001 &lt;br /&gt;&lt;br /&gt;Shri Naresh Dayal,&lt;br /&gt;Secretary, Dept. of Health and Family Welfare&lt;br /&gt;Ministry of Health and Family Welfare&lt;br /&gt;Government of India&lt;br /&gt;149-A, Nirman Bhawan, New Delhi – 110 011&amp;nbsp; &lt;br /&gt;&lt;br /&gt;Shri Ajay Shankar&lt;br /&gt;Secretary&lt;br /&gt;Department Of Industrial Policy &amp;amp; Promotion&lt;br /&gt;Ministry of Commerce and Industry&lt;br /&gt;Room 153, Udyog Bhavan,&lt;br /&gt;New Delhi – 110 011 &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h3&gt;Signatories to this letter&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Centre for Trade and Development (Centad), New Delhi&lt;/li&gt;&lt;li&gt;Centre for Internet and Society, Bangalore&lt;/li&gt;&lt;li&gt;National Working Group on Patent Laws, New Delhi&lt;/li&gt;&lt;li&gt;Lawyers Collective (HIV/AIDS Unit)&lt;/li&gt;&lt;li&gt;All India Drug Action Network (AIDAN)&lt;/li&gt;&lt;li&gt;International Treatment Preparedness Coalition (ITPC), India&lt;/li&gt;&lt;li&gt;Consumers Association of India, Chennai&lt;/li&gt;&lt;li&gt;IndoJuris Law Offices, Chennai&lt;/li&gt;&lt;li&gt;All Indian People’s Science Network, New Delhi&lt;/li&gt;&lt;li&gt;Delhi Science Forum&lt;/li&gt;&lt;li&gt;Alternative Law Forum, Bangalore&lt;/li&gt;&lt;li&gt;Knowledge Commons&lt;/li&gt;&lt;li&gt;Moving Republic&lt;/li&gt;&lt;li&gt;IT for Change&lt;/li&gt;&lt;li&gt;Centre for Health and Social Justice(CHSJ), New Delhi&lt;/li&gt;&lt;li&gt;Navdanya, New Delhi&lt;/li&gt;&lt;li&gt;Support for Advocacy and Training to Health Initiatives (SATHI)&lt;/li&gt;&lt;li&gt;Centre for Enquiry Into Health and Allied Themes (CEHAT)&lt;/li&gt;&lt;li&gt;Initiative for Health Equity &amp;amp; Society&lt;/li&gt;&lt;li&gt;International Peoples Health Council (South Asia)&lt;/li&gt;&lt;li&gt;Drug Action Forum – Dharwad, Karnataka&lt;/li&gt;&lt;li&gt;Dr. Mira Shiva, New Delhi&lt;/li&gt;&lt;li&gt;Tina Kuriakose, PhD Scholar, Jawaharlal Nehru University, New Delhi&lt;/li&gt;&lt;li&gt;Dr Gopal Dabade, Dharwad&lt;/li&gt;&lt;li&gt;Dinesh Abrol, Scientist NISTADS, CSIR, New Delhi&lt;/li&gt;&lt;li&gt;Madhavi Rahirkar, Lawyer/Consultant, Pune&lt;/li&gt;&lt;li&gt;Gautam John, Bangalore&lt;/li&gt;&lt;li&gt;Achal Prabhala, Bangalore&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;Endnotes&lt;/p&gt;
&lt;p&gt;[1] See Susan K Sell, The Global IP Upward Ratchet, Anti-counterfeiting and Piracy Enforcement Efforts: The State of Play.&lt;br /&gt;[2] QBPC barely qualifies as a representative of Chinese interest, as it comprises more than 180 multinational member companies.&lt;br /&gt;[3] ‘TRIPS-plus’ refers to any protection of IPRs that surpasses the standards and requirements spelt out in WTO-TRIPS provisions.&lt;br /&gt;[4] See Jonathan Lyn, India Brazil raise EU drug Seizures issue at WTO, available at http://www.livemint.com/2009/02/04232721/India-Brazil-raise-EU-drug-se.html&lt;br /&gt;[5] Indian Minister of State for External Affairs Broaches Seizures of Generics at ECOSOC, available at http://www.keionline.org/blogs/2009/07/08/india-ecosoc-seizures/#more-2404&lt;br /&gt;[6] Indian Commerce Secretary’s Speech to the African Community Ambassadors. available at http://www.centad.org/focus_77.asp.&lt;br /&gt;[7] For two very recent examples, see Intellectual Property Enforcement: International Perspectives, Xuan Li &amp;amp; Carlos Correa (eds.) (2009); Anand Grover, Report of the Special Rapporteur on the Right of Everyone to the Enjoyment of the Highest Attainable Standard of Physical and Mental Health, A/HRC/11/12 (2009).&lt;br /&gt;[8] Jyoti Datta, 16 out of 17 drug consignment seizures in the Dutch were from India available at http://www.thehindubusinessline.com/2009/06/08/stories/2009060851700300.htm&lt;br /&gt;[9] The EC Regulation No 1383/2003 allows for seizure of goods in transit.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/civil-society-letter-against-trips-plus-ip-enforcement'&gt;https://cis-india.org/a2k/blogs/civil-society-letter-against-trips-plus-ip-enforcement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Medicine</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2011-09-22T12:48:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/letter-from-civil-society-organizations-to-cii">
    <title>Letter from Civil Society Organizations to CII</title>
    <link>https://cis-india.org/news/letter-from-civil-society-organizations-to-cii</link>
    <description>
        &lt;b&gt;A total of 29 groups and individuals expressed their concern about the drive by CII to introduce TRIPS-plus enforcement standards in India.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.business-standard.com/india/news/govt-accepts-panel-report-against-narrowingindian-patent-law/367342/"&gt;Original report in Business Standard&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Govt accepts panel report against narrowing of Indian patent law&lt;/h2&gt;
&lt;p&gt;BS Reporter / New Delhi August 18, 2009, 1:14 IST&lt;/p&gt;
&lt;p&gt;The central government has accepted the recommendations of an expert committee headed by former Council of Scientific and Industrial Research (CSIR) chief R A Mashelkar on patent laws. The committee had concluded that limiting the grant of patents for pharmaceutical substances to new chemical entities will be a violation of the TRIPS agreement of the World Trade Organization (WTO).&lt;/p&gt;
&lt;p&gt;In effect, the committee endorsed the current position taken by India, in allowing patenting of known medicines if they have substantial new therapeutic uses.&lt;/p&gt;
&lt;p&gt;The Mashelkar committee was formed after the government got passed the Patent Bill in 2005. It was assigned to see if the demand for narrowing the patent laws would breach India’s obligations under the WTO agreement. Mashelkar had presented the committee report in 2007, only for it to be withdrawn due to complaints of “technical errors”. The revised copy, submitted to the government few months ago, was accepted recently.&lt;/p&gt;
&lt;p&gt;The move has come as a setback to many civic groups who were hoping to see a a constriction of Indian patent laws. The domestic lobby groups were heartened after a committee of Parliamentarians recently recommended changes in the existing rules to limit patenting of medicines to just “new chemical entities”.&lt;/p&gt;
&lt;p&gt;In a letter to commerce minister Anand Sharma, the National Working Group on Patent Laws asked for the “recommendations of the Parliamentary Committee to take precedence over those of the Mashelkar committee.” It wanted the Mashelkar committee recommendations to be disregarded and appropriate amendments introduced in the Patents Act, 1970.&lt;/p&gt;
&lt;p&gt;The civil society groups are stepping up protest against the “alleged” move to link “counterfeit” issues with intellectual property protection. In an open letter to Confederation of Indian Industry today, 21 groups have protested against the intellectual property enforcement initiatives of the CII.&lt;/p&gt;
&lt;p&gt;“It is disheartening to note that the CII, being an Indian industry organization, is hosting the Third International Conference on Counterfeiting and Piracy from 19-20th August 2009 in partnership with American Embassy and the Quality Brand Protection Committee (QBPC), China, a body that comprises over 80 multinational corporations”, Linu Mathew Phillip, acting director of the Delhi-based Centre for Trade and Development said. “It is of immense concern to all of us, since higher norms of intellectual property enforcement necessarily undermine various other rights of the people at large, including the right to access to medicines and access to knowledge,” he added.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/letter-from-civil-society-organizations-to-cii'&gt;https://cis-india.org/news/letter-from-civil-society-organizations-to-cii&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-02T15:15:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/piracy-boils-down-to-convenience">
    <title>Piracy Boils Down to Convenience</title>
    <link>https://cis-india.org/news/piracy-boils-down-to-convenience</link>
    <description>
        &lt;b&gt;Commercial Piracy is on the rise. But how big a role does money have to play in the piracy game was the question we asked those seated on either side of the proverbial fence.
&lt;/b&gt;
        
&lt;p&gt;“What started out as cassette piracy,&amp;nbsp; several decades ago,&amp;nbsp; has now become a flourishing business, thanks to the invention of CDs and DVDs,” says Mohan Chabria, proprietor, Anand Audio who goes on to add that piracy has drastically increased over the past few years.&lt;/p&gt;
&lt;p&gt;“In the earlier days, conducting a raid was easy. There were some professional pirates who could be easily tracked down. Now, the numbers are vast, and it seems like a no-win situation for us. This results in a tremendous loss for the companies,” adds Mohan.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Advertising professional and author Milan Vohra believes that piracy boils down to convenience. “Piracy is about making life easier, especially when it comes to downloading stuff off the net. Personally, I don’t think I have done anything wrong when I download songs from a public site on the Internet and then transfer it onto another portable device.”&lt;/p&gt;
&lt;p&gt;Piracy has more to do with economics than convenience for Sunil Abraham, Executive Director, Centre for Internet and Society. “We must remember that the problem came about mainly because the originals were far too expensive for the average person. The common practice today is to download everything and it is tough to eradicate that mindset. Most are not even aware of the laws surrounding piracy,” says Sunil. “It’s not the law,” disagrees Mohan, adding, “My problem is only with commercial piracy. What people do on the net does not affect us too much. It’s those living in rural areas and small towns, who aren’t even aware that they are buying pirated copies that matter. Most of our revenue comes from them,” he elaborates.&lt;/p&gt;
&lt;p&gt;Milan and Sunil both agree that original copies must be made affordable and only then can commercial piracy decrease. Though, Mohan feels that audio companies are doing their best in terms of making copies affordable for the public. “We compiled a CD comprising 50 songs of a famous actor which we priced at Rs.35 per copy. Despite this, people went ahead and bought pirated copies for Rs.50. It was only later that we found out that these copies had 150 songs of the same actor, which is why they got preference over ours,” recollects Mohan and adds that there is no support from law enforcers as well. Sunil responds to this by saying that law enforcers are under constant pressure by other companies, whether legal or illegal, and hence they do not support copyright laws, mainly because they get caught in the constant tug-of-war. &lt;/p&gt;
&lt;p&gt;So, is there any solution to eradicate or, at the very least, to control commercial piracy in India? Milan opines that the government needs to adopt a vigilante approach. Like, for instance, by providing a toll free number where people can call when they come across an instance of commercial piracy. “The only way to deal with the matter is to convince a consumer of piracy that there is no end-value to what he’s getting. The aim of copyright owners must be to ensure that copies are available to a larger mass and across different forms of technology,” she says. Mohan echoes the sentiment saying, “We request the government to provide us with a separate court and law enforcement officers who have specialised knowledge. Else, we need to start a thought-provoking campaign among both rural and urban consumers to convince them.”&lt;/p&gt;
&lt;p&gt;“I would aim for a more sustainable product. Instead of a thought-provoking campaign, there should be some sort of collaboration. For a consumer, a pirate is a friend and both the copyright owner as well as the consumer needs to be kept happy. In order for that to happen, business holders must stop looking at ancient methods to curb the menace and instead try to get revenues from the new technology,” concludes Sunil.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;img src="https://cis-india.org/news/copy_of_scancolor2008.jpg/image_preview" title="Piracy" height="395" width="400" alt="Piracy" class="image-inline" /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/piracy-boils-down-to-convenience'&gt;https://cis-india.org/news/piracy-boils-down-to-convenience&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>radha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-02T15:15:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/response-to-ficcis-call-for-review-of-the-copyright-act">
    <title>Response to the Call from Federation of Indian Chambers of Commerce and Industry for Review of the Copyright Act</title>
    <link>https://cis-india.org/accessibility/blog/response-to-ficcis-call-for-review-of-the-copyright-act</link>
    <description>
        &lt;b&gt;This blog entry contains a letter sent by Rahul Cherian of Indojuris and Nirmita Narsimhan of the Centre for Internet and Society in response to a call from the Federation of Indian Chambers of Commerce and Industry for review of the Copyright Act. &lt;/b&gt;
        
&lt;p&gt;The Federation of Indian Chambers of Commerce and Industry (FICCI) has recently&amp;nbsp; constituted a
Consultative Working Group to analyse various issues in the Copyright Act. This has been approved by the Department of Industrial Policy and
Promotion (DIPP). The group is to be chaired by Shri Amit Khare, Joint
Secretary,
Department of Higher Education, Ministry of Human Resource Development. The
purpose of the Consultative Working Group would be to look into the existing
provisions of the copyright law and the proposed amendments, as well as into the
international arrangements and suggestions. The Consultative Working Group
is expected to submit its report along with amendments or suggestion, as
required.&lt;/p&gt;
&lt;p&gt;Rahul Cherian of Indojuris and Nirmita Narasimhan of CIS have submitted a report on
the provisions of the Copyright Act with respect to the limitations for
print disabled persons. This has been submitted in the form of a letter to Sheetal Chopra of FICCI; the letter is reproduced below.&lt;/p&gt;
&lt;p&gt;-----&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Sheetal
Chopra&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Senior
Assistant Director and Head&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;IPR
Division&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;FICCI&lt;/p&gt;
&lt;p&gt;Dear
Madam:&lt;/p&gt;
&lt;p style="text-align: justify;" class="SubjectLine"&gt;&lt;strong&gt;Subject:
Consultative Working Group on Copyright Issues – issues to be addressed by the
Consultative Working Group. &lt;/strong&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As
required by you we give below the issues to be addressed by the Consultative
Working Group. This document is prepared by Nirmita Narasimhan of the Centre for
Internet and Society, Bangalore, and Rahul Cherian Jacob of IndoJuris Law
Offices, Chennai.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Scope -
Exceptions and Limitations for Print Impaired Persons &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The scope of the issues raised here are limited to
the exceptions and limitations under the Copyright Act that are required to
facilitate access of books by the visually impaired and other print impaired
persons.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Problem faced by
Print Impaired Persons &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;India has approximately 70 million Print Impaired
Persons (loosely defined as persons who are unable to access print as a result
of disability and include persons who are visually impaired, persons who have
learning disabilities such as dyslexia and persons who due to physical
disability are unable to hold a book or turn pages) who do not have access to
knowledge due to a lack of reading material in accessible formats. It is
estimated that even in developed countries not more than 5% of publications get
converted into accessible formats for the benefit of Print Impaired Persons. As
a result, Print Impaired Persons are excluded from the education system, are
unable to seek meaningful employment and are on the whole excluded from all
aspects of civil society.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It is observed that publishers do not make available
books in formats accessible by Print Impaired Persons and the Copyright Act
does not provide exceptions and limitations to the rights of the copyright
owner for third parties to convert and make available books in accessible
formats for Print Impaired Persons. This has lead to a “book famine” from the
perspective of Print Impaired Persons.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Technological
Advances and Accessible Formats &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Till a few years ago, Print Impaired Persons had to
rely on audio files and Braille (in the case of the persons who became visually
impaired at a young age) to enjoy printed matter. Each of these formats have
severe limitations. For example audio files have to be played serially and
navigation is severely limited. In the case of Braille, the printing costs are
expensive, reading a Braille book is up to 4 times slower than a normal book,
Braille is extremely difficult to learn if you loose sight at a later age, and
persons using Braille can communicate only with others who know Braille.&amp;nbsp; However with the information technology
revolution and the creation of text-to-speech screen readers that read out
documents in electronic formats to Print Impaired Persons there are now
countless ways in which Print Impaired Persons can access books in any easy and
simple manner. Specialized electronic formats such as the DAISY Format not only
permit the visually impaired to “read” the material using screen readers but
also permit a digital file to be printed in Braille for the blind, in large
print for the partially sighted and also provide audio with inbuilt search and
indexation features for those Print Impaired Persons who have computers. The
key is that technological innovation now provides the much-needed flexibility
required by Print Impaired Persons to access material in formats they are most
comfortable with. However the availability of these technology solutions alone
does not solve the problem of dearth of books in formats that can be enjoyed by
Print Impaired Persons.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Legal compulsions
for providing exceptions and limitations for the benefit of Print Impaired
Persons &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At present Indian copyright law
does not provide exceptions and limitations to the rights of copyright owners
for the benefit of Print Impaired Persons. The Indian Constitution expressly
provides for “equality” (Article 14), “non-discrimination” (Article 15),
“freedom of speech and expression” (Article 19), and “right to life” (Article
21). Indian courts have not yet had the opportunity to pronounce any judgment
on whether the Constitution requires copyright law to provide exceptions and
limitations for the benefit of Print Impaired Persons. However, Indian courts
have routinely upheld the rights of persons with disability and the Supreme
Court has specifically recognized that the “right to life” as enshrined in
Article 21 of the Constitution includes right to dignity including basic
necessities such as reading and writing. Right to education has also been
recognized as a fundamental right. For Print Impaired Persons to enjoy their
fundamental rights it is essential that they have access to material, including
but not limited to educational material, in accessible formats. As present, 70
million Indians cannot enjoy their fundamental rights due to the fact that the
Copyright Act does not provide exemptions and limitations for Print Impaired
Persons. It is to be noted that about 50 countries around the world already
provide copyright exceptions and limitations for the benefit of the visually
impaired/printed impaired.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;India has also
ratified the United Nations Convention on the Rights of Persons with
Disabilities and the objects of the aforesaid convention include providing
persons with disability, access, on an equal basis with others, to information
and communication. Indian courts have read into Indian law provisions of the
United Nations Convention on the Rights of Persons with Disabilities. It is
also to be noted that the Standing Committee on Copyright and Related Rights of
the World Intellectual Property Organisation is currently discussing the
proposed WIPO Treaty for Blind, Visually Impaired and Other Reading Disabled Persons.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;India has also
recognized the requirements of Print Impaired Persons and had circulated draft
amendments to the Copyright Act in _________ for feedback and comments from the
public. All the leading organisations representing visually impaired persons
has submitted their responses stating that the proposed amendments did not
adequately meet the requirements of visually impaired persons.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In light of the above the question is not whether
exceptions and limitations for the benefit of Print Impaired Persons must be
provided (they must), but what form these exceptions and limitations must take.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Exceptions and
Limitations – Issues to be considered &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Given below are the issues that must be considered
when providing exceptions and limitations for the benefit of Print Impaired
Persons.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Beneficiaries&lt;/strong&gt; – The
beneficiaries of any amendment should include all persons with disability who,
due to that disability, need an accessible format to access a book to
substantially the same degree as a person without a disability. This definition
should be functional and not medical since medical definitions cannot be
exhaustive.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Formats &lt;/strong&gt;– Print Impaired
Persons should be able to enjoy the benefits of the information technology
revolution in the same way that non-disabled persons have been able to. Any
amendment should therefore take into account technological developments and
should be format neutral to give full flexibility and utility to Print Impaired
Persons. As mentioned above Braille as a format has limited application and a
majority of visually impaired persons are not able to use Braille. Moreover,
Braille cannot be used by persons with other print impairments such as dyslexia
or persons with physical disabilities.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Permitted
Activities&lt;/strong&gt; – The activities permitted by any amendment should include the making
of accessible formats of a work, supplying that accessible format, or copies of
that format, to Print Impaired Persons by any means, including by lending or by
electronic communication by wire or wireless means, and undertaking any
intermediate steps to achieve these objectives.&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Who can conduct
the Permitted Activities &lt;/strong&gt;– It is noted that the cost of making an accessible
copy of a book is far higher than the cost of the book itself. It is observed
that non-profit organisations have been able to convert only a few thousands
books till date due to lack of funds. Print Impaired Persons, their families
and other members of their support group also convert books into accessible
formats at very high cost. The number of books converted by these persons is
also minimal. Keeping in mind the fact that publishers are not selling books in
accessible formats there appears to be complete market failure in this area.
The solution for this problem appears to be that, apart from non-profit
organisations, Print Impaired Persons and their support group being permitted
to conduct the Permitted Activities, volunteers and for-profit organisations
should also be able to conduct the Permitted Activities. If any of the
Permitted Activity is undertaken for profit, then the entity carrying out the
Permitted Activity must give notice to, and pay prescribed royalty to the
copyright owner. The quantum of royalty payable should be determined keeping in
mind the fact that the average income of Print Impaired Persons is far lower
than the income of non disabled persons. The possibility of creating a
collecting society for this purpose can also be explored.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Conclusion &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“Inclusiveness” is the
underlying theme of the Indian Constitution and “Inclusion” is a word used
liberally by the courts and politicians alike. The Universal Declaration of
Human Rights prohibits discrimination on the basis of disability. The United
Nations Convention on Rights of Persons of Disabilities aims to support the
full and effective participation of persons with disabilities in social life
and development; and to advance the rights and protect the dignity of persons
with disabilities and to promote equal access to employment, education,
information, goods and services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, these concepts
mean nothing to Print Impaired Persons as long as their most basic fundamental
rights continue to be denied due to the fact that Indian copyright law does not
provide exceptions and limitations for the benefit of Print Impaired Persons.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In light of the above,
appropriate amendments must be made to the Copyright Act as soon as possible to
remove the barriers placed before Print Impaired Persons that prevent their
exercise of fundamental rights.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;If
you require any additional information or any clarification regarding the above
please let us know. Thank you and best regards,&lt;/p&gt;
Nirmita
Narasimhan and Rahul Cherian
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/response-to-ficcis-call-for-review-of-the-copyright-act'&gt;https://cis-india.org/accessibility/blog/response-to-ficcis-call-for-review-of-the-copyright-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sachia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2011-08-17T08:51:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-draft-rules">
    <title>Comments on the Draft Rules under the Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/blog/comments-draft-rules</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society commissioned an advocate, Ananth Padmanabhan, to produce a comment on the Draft Rules that have been published by the government under the Information Technology Act.  In his comments, Mr. Padmanabhan highlights the problems with each of the rules and presents specific recommendations on how they can be improved.  These comments were sent to the Department of Information and Technology.&lt;/b&gt;
        
&lt;h2&gt;&lt;em&gt;Comments on the Draft Rules under the Information Technology Act as Amended by the Information Technology (Amendment) Act, 2008&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Submitted by the Centre for Internet and Society, Bangalore&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Prepared by Ananth Padmanabhan, Advocate in the Madras High Court&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;h2&gt;Interception, Monitoring and Decryption&lt;/h2&gt;
&lt;h3&gt;Section 69&lt;/h3&gt;
&lt;p&gt;The section says:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Where the Central Government or a State Government or any of its officer specially authorised by the Central Government or the State Government, as the case may be, in this behalf may, if satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence, it may subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource. &lt;/li&gt;&lt;li&gt;The procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed.&lt;/li&gt;&lt;li&gt;The subscriber or intermediary or any person in-charge of the computer resource shall, when called upon by any agency referred to in sub-section (1), extend all facilities and technical assistance to-&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (a) provide access to or secure access to the computer resource
generating transmitting, receiving or storing such information; or&lt;/p&gt;
&lt;p&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; (b) intercept, monitor, or decrypt the information, as the case may be; or&lt;/p&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; (c) provide information stored in computer resource.
&lt;ol&gt;&lt;li&gt;The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with imprisonment for a term which may extend to seven years and shall also be liable to fine. &lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recommendation #1&lt;/strong&gt;&lt;br /&gt;Section 69(3) should be amended and the following proviso be inserted:&lt;/p&gt;
&lt;p class="callout"&gt;Provided that only those intermediaries with respect to any information or computer resource that is sought to be monitored, intercepted or decrypted, shall be subject to the obligations contained in this sub-section, who are, in the opinion of the appropriate authority, prima facie in control of such transmission of the information or computer resource. The nexus between the intermediary and the information or the computer resource that is sought to be intercepted, monitored or decrypted should be clearly indicated in the direction referred to in sub-section (1) of this section.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;In the case of any information or computer resource, there may be more than one intermediary who is associated with such information. This is because “intermediary” is defined in section 2(w) of the amended Act as,&lt;/p&gt;
&lt;p class="callout"&gt;“with respect to any electronic record means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record, including telecom service providers, network service providers, internet service providers, webhosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The State or Central Government should not be given wide-ranging powers to enforce cooperation on the part of any such intermediary without there being a clear nexus between the information that is sought to be decrypted or monitored by the competent authority, and the control that any particular intermediary may have over such information.&lt;/p&gt;
&lt;p&gt;To give an illustration, merely because some information may have been posted on an online portal, the computer resources in the office of the portal should not be monitored unless the portal has some concrete control over the nature of information posted in it. This has to be stipulated in the order of the Central or State Government which authorizes interception of the intermediary.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #2&lt;/strong&gt;&lt;br /&gt;Section 69(4) should be repealed.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;The closest parallels to Section 69 of the Act are the provisions in the Telegraph Rules which were brought in after the decision in PUCL v. Union of India, (1997) 1 SCC 301, famously known as the telephone tapping case.&lt;/p&gt;
&lt;p&gt;Section 69(4) fixes tremendous liability on the intermediary for non-cooperation. This is violative of Article 14.&amp;nbsp; Similar provisions in the Indian Penal Code and Code of Criminal Procedure, which demand cooperation from members of the public as regards production of documents, letters etc., and impose punishment for non-cooperation on their part, impose a maximum punishment of one month. It is bewildering why the punishment is 7 years imprisonment for an intermediary, when the only point of distinction between an intermediary under the IT Act and a member of the public under the IPC and CrPC is the difference in the media which contains the information.&lt;/p&gt;
&lt;p&gt;Section 69(3) is akin to the duty cast upon members of the public to extend cooperation under Section 39 of the Code of Criminal Procedure by way of providing information as to commission of any offence, or the duty, when a summons is issued by the Court or the police, to produce documents under Sections 91 and 92 of the Code of Criminal Procedure. The maximum punishment for non-cooperation prescribed by the Indian Penal Code for omission to cooperate or wilful breach of summons is only a month under Sections 175 and 176 of the Indian Penal Code. Even the maximum punishment for furnishing false information to the police is only six months under Section 177 of the IPC. When this is the case with production of documents required for the purpose of trial or inquiry, it is wholly arbitrary to impose a punishment of six years in the case of intermediaries who do not extend cooperation for providing access to a computer resource which is merely apprehended as being a threat to national security etc. A mere apprehension, however reasonable it may be, should not be used to pin down a liability of such extreme nature on the intermediary.&lt;/p&gt;
&lt;p&gt;This would also amount to a violation of Articles 19(1)(a) as well as 19(1)(g) of the Constitution, not to mention Article 20(3). To give an example, much of the information received from confidential sources by members of the press would be stored in computer resources. By coercing them, through the 7 year imprisonment threat, to allow access to this computer resource and thereby part with this information, the State is directly infringing on their right under Article 19(1)(a).&amp;nbsp; Furthermore, if the “subscriber” is the accused, then section 69(4) goes against Article 20(3) by forcing the accused to bear witness against himself.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 69 &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Rule 3&lt;/strong&gt;&lt;br /&gt;Directions for interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource under sub- section (2) of section 69 of the Information Technology (Amendment) Act, 2008 (hereinafter referred to as the said Act) shall not be issued except by an order made by the concerned competent authority who is Union Home Secretary in case of Government of India; the Secretary in-charge of Home Department in a State Government or Union Territory as the case may be. In unavoidable circumstances, such order may be made by an officer, not below the rank of a Joint Secretary to the Government of India, who has been duly authorised by the Union Home Secretary or by an officer equivalent to rank of Joint Secretary to Government of India duly authorised by the Secretary in-charge of Home Department in the State Government or Union Territory, as the case may be:&lt;/p&gt;
&lt;p&gt;Provided that in emergency cases – &lt;br /&gt;(i) in remote areas, where obtaining of prior directions for interception or monitoring or decryption of information is not feasible; or &lt;br /&gt;(ii) for operational reasons, where obtaining of prior directions for interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource is not feasible;&lt;/p&gt;
&lt;p&gt;the required interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource shall be carried out with the prior approval of the Head or the second senior most officer of the Security and Law Enforcement Agencies (hereinafter referred to as the said Security Agencies) at the Central Level and the officers authorised in this behalf, not below the rank of Inspector General of Police or an officer of equivalent rank, at the State and Union Territory level. The concerned competent authority, however, shall be informed of such interceptions or monitoring or decryption by the approving authority within three working days and that such interceptions or monitoring or decryption shall be got confirmed by the concerned competent authority within a period of seven working days. If the confirmation from the concerned competent authority is not received within the stipulated seven working days, such interception or monitoring or decryption shall cease and the same information shall not be intercepted or monitored or decrypted thereafter without the prior approval of the concerned competent authority, as the case may be.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #3&lt;/strong&gt;&lt;br /&gt;In Rule 3, the following proviso may be inserted:&lt;/p&gt;
&lt;p class="callout"&gt;“Provided that in the event of cooperation by any intermediary being required for the purpose of interception, monitoring or decryption of such information as is referred to in this Rule, prior permission from a Supervisory Committee headed by a retired Judge of the Supreme Court or the High Courts shall be obtained before seeking to enforce the Order mentioned in this Rule against such intermediary.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;Section 69 and the draft rules suffer from absence of essential procedural safeguards. This has come in due to the blanket emulation of the Telegraph Rules. Additional safeguards should have been prescribed to ensure that the intermediary is put to minimum hardship when carrying on the monitoring or being granted access to a computer resource. Those are akin to a raid, in the sense that it can stop an online e-commerce portal from carrying out operations for a day or even more, thus affecting their revenue. It is therefore recommended that in any situation where cooperation from the intermediary is sought, prior judicial approval has to be taken. The Central or State Government cannot be the sole authority in such cases.&lt;/p&gt;
&lt;p&gt;Furthermore, since access to the computer resource is required, an executive order should not suffice, and a search warrant or an equivalent which results from a judicial application of the mind (by the Supervisory Committee, for instance) should be required.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #4&lt;/strong&gt;&lt;br /&gt;The following should be inserted after the last line in Rule 22:&lt;/p&gt;
&lt;p class="callout"&gt;The Review Committee shall also have the power to award compensation to the intermediary in cases where the intermediary has suffered loss or damage due to the actions of the competent authority while implementing the order issued under Rule 3.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;The Review Committee should be given the power to award compensation to the loss suffered by the intermediary in cases where the police use equipment or software for monitoring/decryption that causes damage to the intermediary’s computer resources / networks. The Review Committee should also be given the power to award compensation in the case of monitoring directions which are later found to be frivolous or even worse, borne out of mala fide considerations. These provisions will act as a disincentive against the abuse of power contained in Section 69.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Blocking of Access to Information&lt;/h2&gt;
&lt;h3&gt;Section 69A&lt;/h3&gt;
&lt;p&gt;The section provides for blocking of websites if the government is satisfied that it is in the interests of the purposes enlisted in the section. It also provides for penalty of up to seven years for intermediaries who fail to comply with the directions under this section. &lt;br /&gt;The rules under this section describe the procedure which have to be followed barring which the review committee may, after due examination of the procedural defects, order an unblocking of the website.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Section 69A(3)&lt;/strong&gt;&lt;br /&gt;The intermediary who fails to comply with the direction issued under sub-section (1) shall be punished with an imprisonment for a term which may extend to seven years and also be liable to fine.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recommendation #5&lt;/strong&gt;&lt;br /&gt;The penalty for intermediaries must be lessened.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for Recommendations &lt;/strong&gt;&lt;br /&gt;The penal provision in this section which prescribes up to seven years imprisonment and a fine on an intermediary who fails to comply with the directions so issued is also excessively harsh. Considering the fact that various mechanisms are available to escape the blocking of websites, the intermediaries must be given enough time and space to administer the block effectively and strict application of the penal provisions must be avoided in bona fide cases.&lt;/p&gt;
&lt;p&gt;The criticism about Section 69 and the draft rules in so far as intermediary liability is concerned, will also apply mutatis mutandis to these rules as well as Section 69A.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 69A&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Rule 22: Review Committee&lt;/strong&gt;&lt;br /&gt;The Review Committee shall meet at least once in two months and record its findings whether the directions issued under Rule (16) are in accordance with the provisions of sub-section (2) of section 69A of the Act. When the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and order for unblocking of said information generated, transmitted, received, stored or hosted in a computer resource for public access.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #6&lt;/strong&gt;&lt;br /&gt;A permanent Review Committee should be specially for the purposes of examining procedural lapses.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendation &lt;/strong&gt;&lt;br /&gt;Rule 22 provides for a review committee which shall meet a minimum of once in every two months and order for the unblocking of a site of due procedures have not been followed. This would mean that if a site is blocked, there could take up to two months for a procedural lapse to be corrected and it to be unblocked. Even a writ filed against the policing agencies for unfair blocking would probably take around the same time. Also, it could well be the case that the review committee will be overborne by cases and may fall short of time to inquire into each. Therefore, it is recommended that a permanent Review Committee be set up which will monitor procedural lapses and ensure that there is no blocking in the first place before all the due procedural requirements are met. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Monitoring and Collection of Traffic Data&lt;/h2&gt;
&lt;h3&gt;Draft Rules under Section 69B&lt;/h3&gt;
&lt;p&gt;The section provides for monitoring of computer networks or resources if the Central Government is satisfied that conditions so mentioned are satisfied.&lt;/p&gt;
&lt;p&gt;The rules provide for the manner in which the monitoring will be done, the process by which the directions for the same will be issued and the liabilities of the intermediaries and monitoring officers with respect to confidentiality of the information so monitored.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Grounds for Monitoring &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Rule 4&lt;/strong&gt;&lt;br /&gt;The competent authority may issue directions for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource for any or all of the following purposes related to cyber security:&lt;br /&gt;(a) forecasting of imminent cyber incidents;&lt;br /&gt;(b) monitoring network application with traffic data or information on computer resource;&lt;br /&gt;(c) identification and determination of viruses/computer contaminant;&lt;br /&gt;(d) tracking cyber security breaches or cyber security incidents;&lt;br /&gt;(e) tracking computer resource breaching cyber security or spreading virus/computer contaminants;&lt;br /&gt;(f) identifying or tracking of any person who has contravened, or is suspected of having contravened or being likely to contravene cyber security;&lt;br /&gt;(g) undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resource;&lt;br /&gt;(h) accessing a stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;br /&gt;(i) any other matter relating to cyber security.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Rule 6&lt;/strong&gt;&lt;br /&gt;No direction for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource shall be given for purposes other than those specified in Rule (4).&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #7&lt;/strong&gt;&lt;br /&gt;Clauses (a), (b), (c), and (i) of Rule 4 must be repealed.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendations &lt;/strong&gt;&lt;br /&gt;The term “cyber incident” has not been defined, and “cyber security” has been provided a circular definition.&amp;nbsp; Rule 6 clearly states that no direction for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource shall be given for purposes other than those specified in Rule 4. Therefore, it may prima facie appear that the government is trying to lay down clear and strict safeguards when it comes to monitoring at the expense of a citizens' privacy. However, Rule 4(i) allows the government to monitor if it is satisfied that it is “any matter related to cyber security”. This may well play as a ‘catch all’ clause to legalise any kind of monitoring and collection and therefore defeats the purported intention of Rule 6 of safeguarding citizen’s interests against arbitrary and groundless intrusion of privacy. Also, the question of degree of liability of the intermediaries or persons in charge of the computer resources for leak of secret and confidential information remains unanswered. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Rule 24: Disclosure of monitored data &lt;/strong&gt;&lt;br /&gt;Any monitoring or collection of traffic data or information in computer resource by the employee of an intermediary or person in-charge of computer resource or a person duly authorised by the intermediary, undertaken in course of his duty relating to the services provided by that intermediary, shall not be unlawful, if such activities are reasonably necessary for the discharge his duties as per the prevailing industry practices, in connection with :&lt;br /&gt;(vi) Accessing or analysing information from a computer resource for the purpose of tracing a computer resource or any person who has contravened, or is suspected of having contravened or being likely to contravene, any provision of the Act that is likely to have an adverse impact on the services provided by the intermediary.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #8&lt;/strong&gt;&lt;br /&gt;Safeguards must be introduced with respect to exercise of powers conferred by Rule 24(vi).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendations &lt;/strong&gt;&lt;br /&gt;Rule 24(vi) provides for access, collection and monitoring of information from a computer resource for the purposes of tracing another computer resource which has or is likely to contravened provisions of the Act and this is likely to have an adverse impact on the services provided by the intermediary. Analysis of a computer resource may reveal extremely confidential and important data, the compromise of which may cause losses worth millions. Therefore, the burden of proof for such an intrusion of privacy of the computer resource, which is first used to track another computer resource which is likely to contravene the Act, should be heavy. Also, this violation of privacy should be weighed against the benefits accruing to the intermediary. The framing of sub rules under this clearly specifying the same is recommended.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The disclosure of sensitive information by a monitoring agency for purposes of ‘general trends’ and ‘general analysis of cyber information’ is uncalled for as it dissipates information among lesser bodies that are not governed by sufficient safeguards and this could result in outright violation of citizen’s privacy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Manner of Functioning of CERT-In&lt;/h2&gt;
&lt;h3&gt;Draft Rules under Section 70B(5)&lt;/h3&gt;
&lt;p&gt;Section 70B provides for an Indian Computer Emergency Response Team (CERT-In) which shall serve as a national agency for performing duties as prescribed by clause 4 of this section in accordance to the rules as prescribed.&lt;br /&gt;The rules provide for CERT-In’s authority, composition of advisory committee, constituency, functions and responsibilities, services, stakeholders, policies and procedures, modus operandi, disclosure of information and measures to deal with non compliance of orders so issued. However, there are a few issues which need to be addressed as under:&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Definitions&lt;/strong&gt;&lt;br /&gt;In these Rules, unless the context otherwise requires, “Cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicit or implied security policy resulting in unauthorized access, denial of service/ disruption, unauthorized use of a computer resource for processing or storage of information or changes to data, information without authorization.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #9&lt;/strong&gt;&lt;br /&gt;The words ‘or implied’’ must be excluded from rule 2(g) which defines ‘cyber security incident’, and the term ‘security policy’ must be qualified to state what security policy is being referred to.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendation&lt;/strong&gt;&lt;br /&gt;“Cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicit or implied security policy resulting in unauthorized access, denial of service/disruption, unauthorized use of a computer resource for processing or storage of information or changes to data, information without authorization.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Thus, the section defines any circumstance where an explicit or implied security policy is contravened as a ‘cyber security incident’. Without clearly stating what the security policy is, an inquiry into its contravention is against an individual’s civil rights. If an individual’s actions are to be restricted for reasons of security, then the restrictions must be expressly defined and such restrictions cannot be said to be implied.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Rule 13(4): Disclosure of Information &lt;/strong&gt;&lt;br /&gt;Save as provided in sub-rules (1), (2), (3) of rule 13, it may be necessary or expedient to so to do, for CERT-In to disclose all relevant information to the stakeholders, in the interest of sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence relating to cognizable offence or enhancing cyber security in the country.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #10&lt;/strong&gt;&lt;br /&gt;Burden of necessity for disclosure of information should be made heavier.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;Rule 13(4) allows the disclosure of information by CERT-In in the interests of ‘enhancing cyber security’. This enhancement however needs to be weighed against the detriment caused to the individual and the burden of proof must be on the CERT-In to show that this was the only way of achieving the required.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Rule 19: Protection for actions taken in Good Faith &lt;/strong&gt;&lt;br /&gt;All actions of CERT-In and its staff acting on behalf of CERT-In are taken in good faith in fulfillment of its mandated roles and functions, in pursuance of the provisions of the Act or any rule, regulations or orders made thereunder. CERT-In and its staff acting on behalf of CERT-In shall not be held responsible for any unintended fallout of their actions.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #11&lt;/strong&gt;&lt;br /&gt;CERT-In should be made liable for their negligent action and no presumption of good faith should be as such provided for.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;Rule 19 provides for the protection of CERT-In members for the actions taken in ‘good faith’. It defines such actions as ‘unintended fallouts’. Clearly, if information has been called for and the same is highly confidential, then this rule bars the remedy for any leak of the same due to the negligence of the CERT-In members. This is clearly not permissible as an agency that calls for delicate information should also be held responsible for mishandling the same, intentionally or negligently.&amp;nbsp; Good faith can be established if the need arises, and no presumption as to good faith needs to be provided.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 52&lt;/h3&gt;
&lt;p&gt;These rules, entitled the “Cyber Appellate Tribunal (Salary, Allowances and Other Terms and Conditions of Service of Chairperson and Members) Rules, 2009” are meant to prescribe the framework for the independent and smooth functioning of the Cyber Appellate Tribunal. This is so because of the specific functions entrusted to this Appellate Tribunal. Under the IT Act, 2000 as amended by the IT (Amendment) Act, 2008, this Tribunal has the power to entertain appeals against orders passed by the adjudicating officer under Section 47.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #12&lt;/strong&gt;&lt;br /&gt;Amend qualifications Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003, to require judicial training and experience.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;It is submitted that an examination of these rules governing the Appellate Tribunal cannot be made independent of the powers and qualifications of Adjudicating Officers who are the original authority to decide on contravention of provisions in the IT Act dealing with damage to computer system and failure to furnish information. Even as per the Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003, persons who did not possess judicial experience and training, such as those holding the post of Director in the Central Government, were qualified to perform functions under Section 46 and decide whether there has been unauthorized access to a computer system. This involves appreciation of evidence and is not a merely administrative function that could be carried on by any person who has basic knowledge of information technology.&lt;/p&gt;
&lt;p&gt;Viewed from this angle, the qualifications of the Cyber Appellate Tribunal members should have been made much tighter as per the new draft rules. The above rules when read with Section 50 of the IT Act, as amended in 2008, do not say anything about the qualification of the technical members apart from the fact that such person shall not be appointed as a Member, unless he is, or has been, in the service of the Central Government or a State Government, and has held the post of Additional Secretary or Joint Secretary or any equivalent post. Though special knowledge of, and professional experience in, information technology, telecommunication, industry, management or consumer affairs, has been prescribed in the Act as a requirement for any technical member.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 54&lt;/h3&gt;
&lt;p&gt;These Rules do not suffer any defect and provide for a fair and reasonable enquiry in so far as allegations made against the Chairperson or the members of the Cyber Appellate Tribunal are concerned.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Penal Provisions&lt;/h2&gt;
&lt;h3&gt;Section 66A&lt;/h3&gt;
&lt;p&gt;Any person who sends, by means of a computer resource or a communication device,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (a) any information that is grossly offensive or has menacing character; or&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages,&lt;br /&gt;shall be punishable with imprisonment for a term which may extend to three years and with fine.&lt;br /&gt;Sec. 32 of the 2008 Act inserts Sec. 66A which provides for penal measures for mala fide use of electronic resources to send information detrimental to the receiver. For the section to be attracted the ‘information’ needs to be grossly offensive, menacing, etc. and the sender needs to have known it to be false.&lt;/p&gt;
&lt;p&gt;While the intention of the section – to prevent activities such as spam-sending – might be sound and even desirable, there is still a strong argument to be made that words is submitted that the use of words such as ‘annoyance’ and ‘inconvenience’ (in s.66A(c)) are highly problematic.&amp;nbsp; Further, something can be grossly offensive without touching upon any of the conditions laid down in Article 19(2).&amp;nbsp; Without satisfying the conditions of Article 19(2), this provision would be ultra vires the Constitution.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #13&lt;/strong&gt;&lt;br /&gt;The section should be amended and words which lead to ambiguity must be excluded.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;A clearer phrasing as to what exactly could convey ‘ill will’ or cause annoyance in the electronic forms needs to be clarified. It is possible in some electronic forms for the receiver to know the content of the information. In such circumstances, if such a possibility is ignored and annoyance does occur, is the sender still liable? Keeping in mind the complexity of use of electronic modes of transmitting information, it can be said that several such conditions arise which the section has vaguely covered. Therefore, a stricter and more clinical approach is necessary.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #14&lt;/strong&gt;&lt;br /&gt;A proviso should be inserted to this section providing for specific exceptions to the offence contained in this section for reasons such as fair comment, truth, criticism of actions of public officials etc.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;The major problem with Section 66A lies in clause (c) as per which any electronic mail or electronic mail message sent with the purpose of causing annoyance or inconvenience is covered within the ambit of offensive messages. This does not pay heed to the fact that even a valid and true criticism of the actions of an individual, when brought to his notice, can amount to annoyance. Indeed, it may be brought to his attention with the sole purpose of causing annoyance to him. When interpreting the Information Technology Act, it is to be kept in mind that the offences created under this Act should not go beyond those prescribed in the Indian Penal Code except where there is a wholly new activity or conduct, such as hacking for instance, which is sought to be criminalized.&lt;/p&gt;
&lt;p&gt;Offensive messages have been criminalized in the Indian Penal Code subject to the conditions specified in Chapter XXII being present. It is not an offence to verbally insult or annoy someone without anything more being done such as a threat to commit an offence, etc. When this is the case with verbal communications, there is no reason to make an exception for those made through the electronic medium and bring any electronic mail or message sent with the purpose of causing annoyance or inconvenience within the purview of an offensive message.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Section 66F&lt;/h3&gt;
&lt;p&gt;The definition of cyber-terrorism under this provision is too wide and can cover several activities which are not actually of a “terrorist” character. &lt;br /&gt;Section 66F(1)(B) is particularly harsh and goes much beyond acts of “terrorism” to include various other activities within its purview. As per this provision, &lt;br /&gt;“[w]hoever knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State or foreign relations, or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or is likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber terrorism.”&lt;/p&gt;
&lt;p&gt;This provision suffers from several defects and hence ought to be repealed.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #15&lt;/strong&gt;&lt;br /&gt;Section 66F(1)(B) has to be repealed or suitably amended to water down the excessively harsh operation of this provision. The restrictive nature of the information that is unauthorisedly accessed must be confined to those that are restricted on grounds of security of the State or foreign relations. The use to which such information may be put should again be confined to injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order. A mere advantage to a foreign nation cannot render the act of unauthorized access one of cyber-terrorism as long as such advantage is not injurious or harmful in any manner to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order. A mens rea requirement should also be introduced whereby mere knowledge that the information which is unauthorisedly accessed can be put to such uses as given in this provision should not suffice for the unauthorised access to amount to cyber-terrorism. The unauthorised access should be with the intention to put such information to this use. The amended provision would read as follows:&lt;/p&gt;
&lt;p class="callout"&gt;“[w]hoever knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State or foreign relations, with the intention that such information, data or computer database so obtained may be used to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order, commits the offence of cyber terrorism.”&lt;/p&gt;
&lt;p class="callout"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;The ambit of this provision goes much beyond information, data or computer database which is restricted only on grounds of security of the State or foreign relations and extends to “any restricted information, data or computer database”. This expression covers any government file which is marked as confidential or saved in a computer used exclusively by the government. It also covers any file saved in a computer exclusively used by a private corporation or enterprise. Even the use to which such information can be put need not be confined to those that cause or are likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, or friendly relations with foreign States. Information or data which is defamatory, amounting to contempt of court, or against decency / morality, are all covered within the scope of this provision. This goes way beyond the idea of a terrorist activity and poses serious questions.&amp;nbsp; While there is no one globally accepted definition of cyberterrorism, it is tough to conceive of slander as a terrorist activity.&lt;/p&gt;
&lt;p&gt;To give an illustration, if a journalist managed to unauthorisedly break into a restricted database, even one owned by a private corporation, and stumbled upon information that is defamatory in character, he would have committed an act of “cyber-terrorism.” Various kinds of information pertaining to corruption in the judiciary may be precluded from being unauthorisedly accessed on the ground that such information may be put to use for committing contempt of court. Any person who gains such access would again qualify as a cyber-terrorist. The factual situations are numerous where this provision can be put to gross misuse with the ulterior motive of muzzling dissent or freezing access to information that may be restricted in nature but nonetheless have a bearing on probity in public life etc. It is therefore imperative that this provision may be toned down as recommended above. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-draft-rules'&gt;https://cis-india.org/internet-governance/blog/comments-draft-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-09-21T06:13:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india">
    <title>Emerging Bit Torrent Trends in India</title>
    <link>https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india</link>
    <description>
        &lt;b&gt;Internet has been a revelation ever since its introduction. The writer in this blog examines how the progress made by Internet based technologies could never be reversed.&lt;/b&gt;
        &lt;h2&gt;From Kazaa to The Pirate Bay&lt;/h2&gt;
&lt;p&gt;Little did the world of the VHS era realize in its time where the future of pirate technologies were heading to. The world's favourite music and films were quickly transferred onto optical discs as magnetic tapes went obsolete a few years before the end of the last century. Internet was soon to become the nemesis of discs, which were bulky to store and scratched easily. The first tryst with peer to peer technologies on networks sent shivers down the spine of Jack Valenti and the Motion Pictures Association of America. The speed of dissemination and distribution of content over the Internet was something the world had never seen before. The lawsuits against peer to peer networks such as Kaaza and Limewire ran into millions of dollars. Websites were shut down, but time and progress of technology could never be reversed.  BitTorrent soon became the most common protocol to transfer content over the Internet.  BitTorrent metafiles themselves do not store copyrighted data. Hence, BitTorrent itself is not illegal. However, its use to make copies of copyrighted material that contravenes laws in many countries has created many controversies, including the now famous Pirate Bay Trial in Sweden. The popularity of torrents though
is not specific to the Western world. The strength of the Internet lies in its ability to generate content from any corner of the world
which is then spread across the world through a web of distribution reaching many computers and granting them access to the content simultaneously.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Desi content on Torrent Networks&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Desi : A term derived from Sanskrit, meaning region, province or country. It now refers to the people and culture of South Asian Diaspora.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;On the most popular BitTorrent search engines, &lt;a href="http://torrentz.com/" target="_blank"&gt;torrentz.com&lt;/a&gt;, Hindi and Hindi movies are permanent search tags. Often, one would even see the names of popular Bollywood releases such as Dev D, or at the time of writing this blog entry, Telegu Films, prominently displayed on the site. Bollywood and other content created in India and the rest of the subcontinent is driving the cyberspace. With a huge diaspora spread across every part of the world and increasing Internet penetration alongside rising broadband speeds in urban India, the demand for desi content on torrent networks is on the rise. Websites such as &lt;a href="http://desitorrents.com/" target="_blank"&gt;desitorrents.com&lt;/a&gt; and &lt;a href="http://dctorrent.com/" target="_blank"&gt;dctorrent.com&lt;/a&gt; are two torrent search engines that are popular amongst Internet users and cater exclusively to desi content. A closer look at the content on these sites reveal that the most popular content on these torrent networks are television shows, cricket matches, Bollywood movies, music and regional cinema. Torrent scenes such as aXXo are not unique to Hollywood uploads alone.  Desi content has its own torrent scenes, responsible for uploading torrent trackers, as soon as the content is out in the public. Users identifying themselves as Jay, Captain Jack or Gunga Din are busy uploading these files on the desi networks. 
&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Online since January 2004 and an Internet traffic rank of 7,302, an average visitor spends 8.3 minutes on the Desi Torrents site everyday. Relative to the general Internet population, the website has the highest number of male visitors in the age group of 18 to 34.&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Most users are college graduates who prefer to access the website from home. In comparison, Desi Club Torrents, which is a free website has
a younger representative web demographic with males between 18 to 24 years of age being the most prominent visitors. According to the
data, it is also revealed that the website has a higher ratio of visitors who have not attended Graduate School but still have attended some college for education&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Impact on the Traditional Markets&lt;/strong&gt;&lt;/h2&gt;
&lt;strong&gt;
&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;In most cases, the popularity of Bollywood films in cinema halls and
on torrent sites seems to be linked. For example, the most successful
Bollywood film of 2008, Ghajini, which ended up raking Rs. 200 crores
on the box office, is also one of the most downloaded films on Bit
Torrent Networks. However, for the Pirate selling DVD's of latest
films, this is not great news.&amp;nbsp;A majority of their customers have migrated to
downloading films on the Internet using Peer to Peer technologies.
The upper middle-class niche film watching audiences, have been the
fastest to acquire computers and get on the Internet. Increasing
broadband speeds have ensured that this segment of consumer
transitions away from the traditional 'on the corner' pirate shop. &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india'&gt;https://cis-india.org/a2k/blogs/emerging-bit-torrrent-trends-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>siddharth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyberspace</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>cybercultures</dc:subject>
    
    
        <dc:subject>cyberspaces</dc:subject>
    

   <dc:date>2011-08-04T04:44:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/consumers-international-ip-watch-list-2009">
    <title>Consumers International IP Watch List 2009</title>
    <link>https://cis-india.org/a2k/blogs/consumers-international-ip-watch-list-2009</link>
    <description>
        &lt;b&gt;In response to the US Special 301 report, Consumers International brought out an IP Watch List.  CIS contributed the India Country Report for the Watch List.&lt;/b&gt;
        
&lt;p&gt;Every year the Office of the United States Trade Representative (USTR) publishes a report known as the Special 301 Report, documenting IP regimes in various countries, and publishing a list of those countries which do not afford 'adequate and effective' protection for US intellectual property.&amp;nbsp; This year &lt;a class="external-link" href="http://www.consumersinternational.org"&gt;Consumers International&lt;/a&gt;, which set up the &lt;a class="external-link" href="http://a2knetwork.org"&gt;A2K Network&lt;/a&gt;, published a counter-report, the &lt;a class="external-link" href="http://a2knetwork.org/watchlist"&gt;IP Watch List 2009&lt;/a&gt; for which the &lt;a class="external-link" href="http://a2knetwork.org/reports2009/india"&gt;India report&lt;/a&gt; [pdf &lt;a href="https://cis-india.org/../publications/cis-publications/pranesh/IP%20Watch%20List%20-%20India%20Report.pdf" class="internal-link" title="CI IP Watch List 2009 - India Report"&gt;here&lt;/a&gt;] was prepared by the Centre for Internet and Society.&amp;nbsp; While the Special 301 Report labels India a "Priority Watch List" country (meaning that it has an IP regime least conducive to the trade interests of the United States), the Consumers International report holds India to have the most consumer-friendly and balanced IP regulation amongst the sixteen countries surveyed.&amp;nbsp; The CI report lambasts the USTR's attempts to make countries comply with unreasonable demands which go over and above the countries' international obligations.&amp;nbsp; For instance, the WIPO Internet Treaties, which have been criticised by many, is sought to be imposed on countries like Israel, India, and Canada.&amp;nbsp; &lt;a class="external-link" href="http://www.michaelgeist.ca/content/view/62/128/"&gt;Prof. Michael Geist&lt;/a&gt; of the University of&amp;nbsp; Ottawa even notes that piracy levels and accession to the WCT and WPPT do not seem to be correlated: "In fact, only five countries that have ratified the WIPO Internet treaties have software piracy rates lower than Canada."&amp;nbsp; Still, the USTR has placed both India, whose IP laws are being praised by Consumers International and Canada, which has low piracy rates even by the accounts of the &lt;a class="external-link" href="http://www.economist.com/opinion/displaystory.cfm?story_id=3993427"&gt;notoriously propagandist BSA&lt;/a&gt;, have both been placed in the Priority Watch List.&amp;nbsp; The reasons for doing so are not all that unclear if we look at who really shapes the USTR's Special 301 report.&lt;/p&gt;
&lt;p&gt;The India section of the &lt;a class="external-link" href="http://www.ustr.gov/sites/default/files/Full%20Version%20of%20the%202009%20SPECIAL%20301%20REPORT.pdf"&gt;USTR Special 301 report [pdf]&lt;/a&gt; (pp. 18-19) notes:&lt;br /&gt; "India will remain on the Priority Watch List in 2009. India has made progress on improving its IPR infrastructure, including through the modernization of its IP offices and the introduction of an e-filing system for trademark and patent applications. Further, the IP offices have started the process of digitization of intellectual property files. In addition, the Indian ministerial committee on IPR enforcement has supported the creation of specialized IPR police units. Customs enforcement has also improved through the implementation of the 2007 IPR (Imported Goods) Enforcement Rules as well as by seizures of unlicensed copyrighted goods intended for export. However, the United States remains concerned about weak IPR protection and enforcement in India. The United States continues to urge India to improve its IPR regime by providing stronger protection for copyrights and patents, as well as effective protection against unfair commercial use of undisclosed test and other data generated to obtain marketing approval for pharmaceutical and agrochemical products. The United States encourages India to enact legislation in the near term to strengthen its copyright laws and implement the provisions of the WIPO Internet Treaties. The United States also encourages India to improve its IPR enforcement system by enacting effective optical disc legislation to combat optical disc piracy. Piracy and counterfeiting, including of pharmaceuticals, remain a serious problem in India. India’s criminal IPR enforcement regime remains weak. Police action against those engaged in manufacturing, distributing, or selling pirated and counterfeit goods, and expeditious judicial dispositions for IPR infringement and imposition of deterrent-level sentences, is needed. As counterfeit medicines are a serious problem in India, the United States is encouraged by the recent passage of the Drugs and Cosmetics (Amendment) Act 2008 that will increase penalties for spurious and adulterated pharmaceuticals. The United States urges India to strengthen its IPR regime and stands ready to work with India on these issues during the coming year."&lt;/p&gt;
&lt;p&gt;Large chunks of it seem to have been 'borrowed' from the &lt;a class="external-link" href="http://www.iipa.com/rbc/2009/2009SPEC301INDIA.pdf"&gt;IIPA submissions&lt;/a&gt;.&amp;nbsp; The IIPA (International Intellectual Property Alliance), which is made up of US-based IP-maximalist lobbyists like the Motion Picture Association of America, Recording Industry Association of America, National Music Publishers Association, Association of American Publishers, and Business Software Alliance, is a body that was created to lobby the USTR to impose trade sanctions on those countries which did not follow the path that IIPA thought best for those countries.&lt;br /&gt;Interestingly, the IIPA submissions talk not of IIPA's concern about weak IPR protection and enforcement in India, but instead states: "the United States remains concerned about weak IPR protection and enforcement in India".&amp;nbsp; This exact line even manages to finds itself in the USTR Special 301 report.&amp;nbsp; Many IIPA complaints find themselves as USTR recommendations, including: a) fast-track judical dispositions of IP cases; b) special laws against optical disc piracy; c) ratification of the WCT and WPPT (the "WIPO Internet Treaties"); d) increased criminal enforcement of intellectual property.&lt;/p&gt;
&lt;p&gt;Thus, the Special 301 report emerges as a &lt;a class="external-link" href="http://www.zeropaid.com/news/86148/is-putting-canada-on-a-priority-watchlist-going-to-backfire/"&gt;discredited report&lt;/a&gt; that the US's trade partners should not (and by &lt;a class="external-link" href="http://www.michaelgeist.ca/content/view/3911/125/"&gt;many accounts&lt;/a&gt; &lt;a class="external-link" href="http://www.michaelgeist.ca/content/view/2870/125/"&gt;do not&lt;/a&gt;) pay attention to.&amp;nbsp; Measurement of IP balance and consumer-friendliness such as the Consumers International IP Watch List are more important, and should eventually lead to a &lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1021065"&gt;measurement index for Access to Knowledge&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/consumers-international-ip-watch-list-2009'&gt;https://cis-india.org/a2k/blogs/consumers-international-ip-watch-list-2009&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Fair Dealings</dc:subject>
    

   <dc:date>2011-08-04T04:42:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations">
    <title>Letter on South Africa's IPRs from Publicly Financed R&amp;D Regulations</title>
    <link>https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations</link>
    <description>
        &lt;b&gt;Being interested in legislations in developing nations styled after the United States' Bayh-Dole Act, CIS responded to the call issued by the South African Department of Science and Technology for comments to the Intellectual Property Rights from Publicly Financed Research and Development Regulations.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations'&gt;https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Bayh-Dole</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Open Innovation</dc:subject>
    

   <dc:date>2011-08-04T04:42:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
